Hi,
Received an email from newsletter@teltonika-iot.com.au today linking to this article (on your site); the article says:
Two independent research groups, OTORIO and Claroty, identified a total of six vulnerabilities in our Remote Management System (RMS) and two vulnerabilities in the firmware of RUT series devices. These vulnerabilities exposed potential attack vectors, including unauthorized access, remote code execution, denial of service, and potential device takeover via RMS.
and
The RMS vulnerabilities were resolved with version 4.14.0, which was released on April 26th, 2023; and the RutOS vulnerabilities were resolved with version 7.03.04, which was released on February 9th, 2023. We highly recommend our clients to update the firmware of their Teltonika Networks devices.
The article provides no specifics with regards to the vulnerabilities and the release notes for the firmware in question (on the RUT955 at least) does not appear to address security issues (nothing specific is mentioned):
- Fix
- Network
- Changed generic modem restart method
- Fixed mobile page VoLTE switching issues
- Services
- Sanitized tcpdump storage location
- Fixed RS485 issue on devices from batch > 110
- Removed OPOST stty output setting with legacy Over IP mode
- System
- Fixed legacy backup upload
- Fixed upgrade from legacy FW issue with keep settings
Can you please provide sufficient details (ideally within the article) to make this actionable? Applying firmware updates to remote devices is somewhat risky (your updates have broken things in the past!), and time consuming, so it's important to understand the potential impact of the identified issues (providing CVE's as you do with RUT9_R_00.07.04 would be a good start).
Thanks,
Matt