Multi-layered Security Features
Safeguard Your Communications

Device Security Features

·Secure Boot: Yealink ensures a device boots using only software trusted to ensure device integrity.
·Integrity Verification: SHA256 digital signature verification is performed when importing ROMs, ensuring that only ROMs signed by Yealink can be successfully upgraded and booted.
·Firmware Encryption: The highest-level encryption algorithm AES-256 protects the core software not to be accessed and tampered.

Devices are pre-installed with a certificate with a unique identifier issued by Yealink Root CA. The certificate is used for device authentication.
The certificate uses the SHA256 signature algorithm and follows the strict protocol standard of RFC 2818.
Network Security Features

Network Authentication:
If you're connected, you're protected.
Both wired and wireless devices support the standard 802.1X protocol, enabling network authentication for devices connected to switch ports. This prevents unauthorized access to the VLAN.
Multiple authentication methods are supported, including Secure Tunnel (EAP-FAST), Transport Layer Security (EAP-TLS), and Protected Extensible Authentication Protocol (EAP-PEAP).

Solid WPA3 Encryption
WPA3 strengthens security with advanced key management, protection against offline dictionary and KRACK attacks, and forward secrecy. Even if a password is cracked, captured data remains secure and undetectable.

·Prevent Cross-Site Scripting (XSS) Attacks: Implement strict input validation and output encoding to block malicious script injection and execution at the source.
·Prevent Cross-Site Request Forgery (CSRF) Attacks: Attach a unique CSRF token to every sensitive action, ensuring the legitimacy of all requests.
·Prevent Framework Injection and Sensitive Character Attacks: Use comprehensive input filtering and escaping mechanisms to effectively block framework injections and attacks targeting sensitive characters.
·Content Security Policy (CSP): Restrict resource loading and execution to detect and prevent external attacks, significantly enhancing web application security.
Transmission Security Features

·TLS 1.2+ by default: The device signaling communications of Yealink phones are protected by TLS (Transport Layer Security) using AES-256 encryption. By default, only high-security TLS protocols, TLS 1.3 and TLS 1.2, are supported to ensure robust protection.
·Strong cypher suites: Based on TLS, strong cipher suites such as ECDHE, ECDSA, SHA2 Authentication and 128-bit or 256-bit encryption ciphers are employed to ensure that information transmitted between the device and the server is protected from interception or tampering.

Secure Calls provides a high level of security, providing integrity and privacy for calls. Stay clear of potential threats such as secret recording or eavesdropping.
·Media Authentication and Encryption with SRTP: Media data is authenticated and encrypted using SRTP (Secure Real-time Transport Protocol), ensuring the integrity, authenticity, and confidentiality of the transmitted media.
·Encrypted Call Indicator: When media encryption is successfully negotiated between devices, a security icon is displayed to inform users that the call is encrypted.

·Encrypted Configuration Files: Configuration files are encrypted, and when creating backups, password-related configurations are automatically removed.
·Data Encryption for User Information: User data, including stored contacts and call history, is encrypted to protect sensitive information.