Insecure TLS Versions - End of Life
This topic answers to the main questions surrounding TLS Versions accepted by Telit deviceWISE CLOUD.
From June 01, 2025, there will be a planned enforcement of minimum version of TLS/DTLS v1.2 with modern cipher suites and disablement of non-secure protocols.
To enhance the security and integrity of all communications, the Telit deviceWISE Cloud platform is being upgraded to enforce a minimum requirement of TLS/DTLS version 1.2 with modern cipher suites. Going forward, only devices and applications that support TLS/DTLS v1.2 or higher using secure, up-to-date cryptographic algorithms will be able to connect to the IoT Portal. This update ensures compliance with current industry standards and protects against known vulnerabilities in older TLS versions and less secure cipher suites like SHA-1. This update to a restricted set of cipher suites will occur on September 1, 2025.. Below, you'll find answers for frequent questions:

If this update isn’t manageable for your current internal timeline please contact your Account Manager or . Technical Support.

For deviceWISE EDGE customers it is recommended to update deviceWISE Edge to at least version 21.05 in order connect with deviceWISE CLOUD. Customers using applications or devices that are accessing the platform using APIs over WebSocket, WebSocket (secure TLS v1.1 or lower ), MQTT, MQTTs ( TLS v1.1 or lower), HTTP, HTTPs ( TLS v.1. or lower) will need to upgrade to TLS v1.2.

You can use the following approaches to determine if your device or TR-50 application will be impacted.
For Devices:
-
Navigate to the Thing Details page to identify your Device’s “Connection Protocol”. See https://docs.devicewise.com/Content/Products/Management_Portal/Things/ViewingThing/Thing-Details.htm
For Applications:
-
Navigate to the Developer page and then Event Log. Filter by ‘Audit Log’. See https://docs.devicewise.com/Content/Products/Management_Portal/Developer/EventLog/Event-log.htm The message will be as follows:
XXXX logged in from WW.XX.YY.ZZ:aaaaa via HTTPS
The protocol is identified by the string following the word “via”.
If the protocol is any of the following then your device or application will be impacted.
-
MQTT(ws)
-
MQTT
-
MQTT ( TLSv10 )
-
MQTT ( HTTP_Proxy )
-
HTTPS (TLSv11)
-
HTTPS ( TLSv10 )