News from 2024-12-17


Meinberg Security Advisory: [MBGSA-2024.08] LANTIME Firmware V7.08.018


The LANTIME Firmware Version 7.08.018 includes security updates for several libraries and programs:

Meinberg recommends updating to LANTIME Firmware Version 7.08.018.

Estimation of severity up to and including:
  • LANTIME Firmware Version 7.08.017:
    Severity Level Critical (0), High (0), Medium (2), Low (2), Info (0), Unknown (0)
Updated Version:
  • LANTIME Firmware: V7.08.018
  1. Description of the Vulnerabilities

    • Third-Party Software:
    • Systems Affected

      All LANTIME Firmware versions before 7.08.018 are affected by the corresponding vulnerabilities. The LANTIME Firmware is used by all devices of the LANTIME series (M100, M150, M200, M250, M300, M320, M400, M450, M600, M900) as well as all devices of the LANTIME IMS series (M500, M1000, M1000S, M2000S, M3000, M3000S, M4000), the SyncFire product family (SF1000, SF1100, SF1200, SF1500), and LANTIME CPU Expansions (LCES).

      Whether and to what extent individual clients or LANTIME systems are vulnerable depends on the individual configuration, network infrastructure, and other factors, and it is therefore not possible to provide a general statement on how vulnerable a given system in use actually is.

    • Possible Security Measures

      The relevant security updates are included in the LANTIME Firmware Version 7.08.018(-light). Updating to these versions eliminates the listed vulnerabilities.

      Download the latest LANTIME Firmware at:

      The update is now available for Meinberg customers. An update of the LANTIME Firmware to Version 7.08.018 or 7.08.018-light as appropriate is recommended. Customers who cannot install Version 7.08.018 should install Version 7.08.018-light instead.

    • Further Information

      Further details and information are available from the following website:

      If you have any questions or need assistance, please do not hesitate to contact Meinberg's Technical Support Team..

    • Acknowledgments

      We would like to express our gratitude to all those who have advised us of vulnerabilities or other bugs, and have also suggested improvements to us.

      Thank you!


Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact