News from 2025-09-02


Meinberg Security Advisory: [MBGSA-2025.05] LANTIME Firmware V7.08.025


The LANTIME Firmware Version 7.08.025 includes security updates of several libraries and programs.

Meinberg recommends updating to LANTIME Firmware Version 7.08.025.

Estimation of Severity up to and including
  • LANTIME Firmware Version 7.08.024:
    Severity Level critical(0), high (0), medium (5), low (6), info (1), unknown (0)
Updated Version:
  • LANTIME Firmware: V7.08.025
  1. Description of the Vulnerabilities

  2. Systems Affected

    All LANTIME Firmware versions before 7.08.025 are affected by the corresponding vulnerabilities. The LANTIME Firmware is used by all devices of the LANTIME M-Series (M100, M150, M200, M250, M300, M320, M400, M450, M600, M900) as well as all devices of the LANTIME IMS series (M500, M1000, M1000S, M2000S, M3000, M3000S, M4000) and the SyncFire product family (SF1000, SF1100, SF1200, SF1500) and LANTIME CPU Expansions (LCES).

    Whether and to what extent individual clients or LANTIME systems are vulnerable depends on the individual configuration, network infrastructure, and other factors, and it is therefore not possible to provide a general statement on how vulnerable a given system in use actually is.

  3. Possible Security Measures

    The relevant security updates are included in the LANTIME Firmware versions 7.08.025 and 7.08.025-light. Updating to these versions eliminates the listed vulnerabilities.

    Download the latest LANTIME Firmware at:

    The update is now available for Meinberg customers. An update of the LANTIME Firmware to Version 7.08.025 or 7.08.025-light is recommended. Clients who cannot install version 7.08.025 should install version 7.08.025-light instead.

  4. Further Information

    Further details and information are available from the following website:

    If you have any questions or need assistance, please, do not hesitate to contact Meinberg’s Technical Support Team.

  5. Acknowledgments

    We would like to express our gratitude to all those who have advised us of vulnerabilities or other bugs, and have also suggested improvements to us.

    Thank you!


Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact Meinberg Mail Contact