logo

Security

Center

Any device that is connected to the internet is subject to cyber-attacks. Here we provide all the information about any existing or potential security vulnerabilities related to our connectivity products.
SECURITY NOTIFICATIONS
2023-05-24 09:00
RMS and RutOS Vulnerabilities from CISA Advisory ICSA-23-131-08

8 vulnerabilities were recently remediated from the RMS platform and RusOS firmware:

  • 6 RMS vulnerabilities were remediated with version 4.10.0 (2023-03-22) and 4.14.0 (2023-04-26): CVE-2023-32346, CVE-2023-32347, CVE-2023-32348, CVE-2023-2587, CVE-2023-2588, CVE-2023-2586
  • 2 RutOS vulnerabilities were remediated with version 7.03 (2022-12-16) and 7.03.4 (2023-02-09): CVE-2023-32349, CVE-2023-32350
2023-02-07 08:15
Recommendation: Medusa Botnet - a threat to Linux based devices
  • Medusa Botnet infects devices via bruteforce attacks, and our devices are fitted with bruteforce prevention mechanisms to block attackers after 10 incorrect attempts which is enabled by default.
  • To further enhance your resistance to Medusa, you may also change the default ports for SSH and Telnet services, which Medusa cannot identify.
2022-12-13 07:20
cURL multiple vulnerabilities patched

Multiple vulnerabilities were remediated as cURL was patched to version 7.86.0 in RUTOS 7.3 firmware.

  • Several cURL vulnerabilities were discovered in RUTOS, ranging from LOW to MEDIUM severity
  • CVE-2022-42915 CVE-2022-32221 CVE-2022-35252
  • POST following PUT confusion; HTTP proxy double-free; control code in cookie denial of service


2022-10-05 12:00
Linux Kernel Wi-Fi vulnerabilities remediated with 7.3

Vulnerabilities are patched with our RUTOS 7.3 firmware, as such it is advised to update your firmware to the latest one available.

  • 5 WiFi CVE's discovered in total:
  • CVE-2022-41674 CVE-2022-42719 CVE-2022-42720 CVE-2022-42721 CVE-2022-42722
  • Vulnerabilities stem from holes triggered by "Beacon Frames".
  • Any Linux device vulnerable to these exploits would be susceptible to attacks when scanning for a network if a rogue AP was present.


REPORT A VULNERABILITY
VULNERABILITY DISCLOSURE POLICY
REPORT DETAILS

-Affected product(s) and software version(s);

-Vulnerability overview;

-Issue description and impact (including arbitrary code execution, information disclosure, etc.);

-Instructions to reproduce the issue; A proof-of-concept (POC).

SCOPE

We'd appreciate it if people reported other bugs via appropriate channels. Since the purpose here is to fix security vulnerabilities, only bugs that lead to security threats will be eligible.

The vulnerability must exist in the latest public release of the software or firmware to confirm it. The newest version is available in Teltonika Wiki Knowledge Base under the Firmware Errata category.

Please see the vulnerability handling process below:

STOP
VULNERABILITY CONFIRMED
VULNERABILITY NOT CONFIRMED
discovery
notification
investigation
RESOLUTION
RELEASE
image
"In an ever-increasing complexity of globally connected digital devices, ensuring cybersecurity is no longer an optional task. The first step should always be keeping your devices up-to date."
SECURITY DECLARATION

Providing secure products and services is a high priority to us. Therefore, we strive to ensure that our products and services are designed, developed, and rigorously tested with a focus on security at every stage.

For this reason, we have a dedicated Cyber Security Team closely collaborating with engineers through the development lifecycle. The Cyber Security Team regularly performs internal and external security audits. They include vulnerability management, penetration tests, threat modeling, attack surface reduction, code reviews, static code scanning, and continuous improvements of the development process to meet “secure by design” principles.

Every employee in Teltonika Networks must complete an annual cyber security course involving general cyber security awareness and development practices. Besides, our development teams are educated in common software weakness types and vulnerabilities, unsecure functions, memory management, and information security concepts, such as defense in depth, attack surface, or privilege escalation.

We welcome all customer reports regarding security issues and take high-priority action on quick and decisive remediation. Any information provided to us will only be used to resolve security vulnerabilities swiftly and efficiently. 

REPORTS
High
VULNERABILITY TITLE
Inclusion of web functionality from an untrusted source
PRODUCT TYPE
RMS
ID
CVE-2023-2588
VULNERABILITY REPORT DATE
2023-02-05 04:36
LAST UPDATE
2023-05-18 06:23
High
VULNERABILITY TITLE
Stored XSS in RMS Devices page
PRODUCT TYPE
RMS
ID
CVE-2023-2587
VULNERABILITY REPORT DATE
2023-02-05 01:33
LAST UPDATE
2023-05-18 03:54
High
VULNERABILITY TITLE
RMS Device Impersonation
PRODUCT TYPE
RMS
ID
CVE-2023-32347
VULNERABILITY REPORT DATE
2023-01-31 04:45
LAST UPDATE
2023-05-12 08:49
Medium
VULNERABILITY TITLE
Access to Internal RMS Services using SSRF
PRODUCT TYPE
RMS
ID
CVE-2023-32348
VULNERABILITY REPORT DATE
2023-01-31 02:40
LAST UPDATE
2023-05-18 10:12
Medium
VULNERABILITY TITLE
RMS Device Enumeration and Profiling
PRODUCT TYPE
RMS
ID
CVE-2023-32346
VULNERABILITY REPORT DATE
2023-01-31 02:31
LAST UPDATE
2023-05-12 10:38
High
VULNERABILITY TITLE
Remote Code Execution Through OS Command Injection
PRODUCT TYPE
Gateway, Routers
ID
CVE-2023-32350
VULNERABILITY REPORT DATE
2023-01-31 10:55
LAST UPDATE
2023-05-18 11:31

Contact

us

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.