Business Wire

Quectel response to FCC about IoT module security

Share

Quectel Wireless Solutions, a global IoT solutions provider, today commented on the recent letter and response being published by the FCC and the Select Committee of the US Congress questioning if Quectel’s IoT modules represent a potential security risk.

“We welcome the opportunity to work with the FCC and other U.S. government entities to demonstrate our compliance and best practice device security approach, says Norbert Muhrer, President and CSO, Quectel Wireless Solutions. “We are committed to contributing to the advancement of a smarter world by delivering best-in-class and secure products. This commitment is evidenced by our extensive device OEM customer base and our constant focus on providing our customers with the best and most secure modules in the industry.”

The Select Committee to the US Congress’ letter to the FCC had several misconceptions about how Quectel modules work. Quectel’s clarification regarding the statements made in the letter is as follows.

Committee letter: “Connectivity modules are typically controlled remotely and are the necessary link between the device and the internet.”

Quectel’s U.S. customers or their customers’ third-party suppliers/service providers handle device and data management exclusively. Firmware updates are managed and controlled by the device original equipment manufacturer (OEM), not Quectel.

Committee letter: “Serving as the link between the device and the internet, these modules have the capacity both to brick the device and to access the data flowing from the device to the web server that runs each device”

The control of Quectel modules resides with the microcontroller unit (MCU) or central processing unit (CPU) embedded within the customer's device. Quectel itself does not possess any control; instead, this authority rests solely with the OEM – the entity responsible for developing the device. Remote management of the device is achievable solely through the OEM's device management platform. A notable instance of this, referred to in the letter, is the widely covered case involving John Deere agricultural equipment, where just the OEM typically can disable the equipment by accessing and shutting down its own MCU’s controlling the machine.

Committee letter: “As a result, if the CCP can control the module, it may be able to effectively exfiltrate data or shut down the IoT device.”

Once Quectel modules leave the factory and are delivered to its customers, Quectel customers own the data, and Quectel has no access to any of the data collected. The ownership, control, storage, and modification of the data generated by IoT devices within the market firmly rest with the OEM device makers and its customers. Even in the rare cases outside of the U.S. where Quectel resells the connectivity service of a wireless carrier, Quectel does not have access to the device data.

Committee letter: “This raises particularly grave concerns in the context of critical infrastructure and any type of sensitive data.”

Applications that require high security, such as critical infrastructure, typically use private access point names (APNs) and other methods which strictly control and monitor network access. This can be used to control and monitor any data flowing to and from the device. Critical infrastructure is meticulously fashioned with a multi-tiered security approach defined and implemented solely by the device OEM, not Quectel.

The cellular industry is heavily regulated and requires intensive testing and accreditation. Carrier and regulatory certifications are executed by trusted third-party labs and carrier labs, assuring that the module complies with strict technical requirements. The Quectel modules have obtained certifications from the FCC, PCS Type Certification Review Board (PTCRB) and major carriers throughout the world, which underlines Quectel’s commitment to meeting rigorous industry standards.

In addition to cellular modules, Quectel also provides Wi-Fi, Bluetooth and GNSS modules and antennas. As a GSMA member, Quectel and its carrier partners comply with all cellular industry regulations and applicable standards to ensure that end customer data is securely transmitted between customer device and mobile network operator. Quectel does not have access to ANY of the device data.

Quectel is committed to delivering high-quality, best-in-class, secure modules and go above and beyond industry standard practices by conducting independent third-party cyber security audits. More recently Quectel also retained the security firm Finite State, which is auditing and penetration testing the security of its modules through rigorous security testing, improved software supply chain visibility, and comprehensive software risk management. Quectel is also participating in the formulation of new industry security certification standards, such as the CTIA Cybersecurity Certification Working Group and pursuing additional cyber security certifications from various U.S. entities as new standards are formulated and adopted.

Qualcomm manufactures the chipsets and software platforms that are at the core of the Quectel modules. “Our Qualcomm partnership underlines the importance we place on working with well-trusted and secure partners from across the ecosystem to deliver high-quality solutions globally,” Mr. Muhrer continues. “Quectel's impact on the global IoT industry is profound. We supplied millions of cellular modules to support the distribution of Covid-19 vaccines for leading U.S. and global organizations including Pfizer, Johnson & Johnson, and other leading suppliers of vaccines. This underscores our commitment to playing a pivotal role in critical global initiatives.”

About Quectel

Quectel’s passion for a smarter world drives us to accelerate IoT innovation. A highly customer-centric organization, we are a global IoT solutions provider backed by outstanding support and services. Our growing global team of 5,900 professionals sets the pace for innovation in cellular, GNSS, Wi-Fi and Bluetooth modules as well as antennas and services.

With regional offices and support across the globe, our international leadership is devoted to advancing IoT and helping build a smarter world.

For more information, please visit: www.quectel.com, LinkedIn, Facebook, and X (formerly known as Twitter).

To view this piece of content from cts.businesswire.com, please give your consent at the top of this page.

Contact information

Media contact: media@quectel.com

About Business Wire

For more than 50 years, Business Wire has been the global leader in press release distribution and regulatory disclosure.

Subscribe to releases from Business Wire

Subscribe to all the latest releases from Business Wire by registering your e-mail address below. You can unsubscribe at any time.

Latest releases from Business Wire

Kinaxis Inc. to Host Third Quarter 2025 Financial Results Conference Call on November 6, 202517.10.2025 00:00:00 EEST | Press release

Kinaxis® Inc. (TSX:KXS), a global leader in end-to-end supply chain orchestration, today announced that it has scheduled its conference call to discuss the financial results for its third quarter ended September 30, 2025. The call will be hosted on Thursday, November 6 at 8:30 a.m. Eastern Time by Bob Courteau, interim chief executive officer and chair, and Blaine Fitzgerald, chief financial officer, followed by a question and answer period. The Company will report its financial results for the third quarter after the close of markets on Wednesday, November 5, 2025. CONFERENCE CALL DETAILS DATE: Thursday, November 6, 2025 TIME: 8:30 a.m. Eastern Time CALL REGISTRATION:https://registrations.events/direct/Q4I91416498WEBCAST:https://events.q4inc.com/attendee/875765587 (available for three months) Advance call registration Participants must register in advance for the live call. After registering, instructions on how to join the call will automatically be emailed, including dial-in informa

HCLTech and Zscaler Expand Partnership for AI-Powered Security and Network Transformation16.10.2025 21:13:00 EEST | Press release

HCLTech, a leading global technology company, and Zscaler™, a leader in cloud security, announced the expansion of their strategic partnership to provide AI-powered network transformation and enhanced zero-trust security services to enterprises worldwide. Under the new partnership scope, Zscaler's Zero Trust Exchange™ platform has been integrated with HCLTech's Cybersecurity Fusion Center (CSFC) platform. HCLTech’s AI capabilities, including SecOps and Responsible AI guardrails within HCLTech AI Force and AI Foundry are key to this partnership. This collaboration aims to enhance enterprise resilience and achieve business outcomes with a cloud-first, scalable security solution. HCLTech's Universal Managed Detection and Response (UMDR) services now integrate with Zscaler Internet Access™ (ZIA™), Zscaler Private Access™ (ZPA™) and other Zscaler components, providing context-rich threat detection, advanced analytics and faster response powered by AI and automation. Other key highlights of

Beyon Cyber and Haven Sign MoU to Launch Advanced AI-Powered SOC Capabilities in the UK and Worldwide16.10.2025 20:58:00 EEST | Press release

Beyon Cyber, part of the Beyon Group and the fastest growing cyber security company in the Middle East, has signed a Memorandum of Understanding (MoU) with Haven Cyber Technologies, a global cyber security services provider and a Microsoft Solutions Partner, through its UK-based subsidiary ITC Secure. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20251016047852/en/ Beyon Cyber and Haven Sign MoU Under the MoU, Beyon Cyber and Haven will form a strategic partnership to revolutionize cyber security operations through the launch of advanced AI-driven Security Operations Centers (AI SOCs) in the United Kingdom and worldwide. As part of this collaboration, Haven will integrate Beyon Cyber’s cutting-edge AI SOC platform, Orryx AI, into its operations; harnessing the power of smart automation and agentic AI workflows to enhance threat detection, investigation, hunting, intelligence, and response. This partnership will enable both or

Stefanini Honored at ISG Women in Digital Awards EMEA as Natalia Chiritescu Wins Bronze Luminary for AI Leadership16.10.2025 18:23:00 EEST | Press release

Information Services Group (ISG) has honored Stefanini at the Women in Digital Awards in EMEA, celebrating Natalia Chiritescu. Chiritescu, Digital Solutions Center (DSC) Director for EMEA, NA, & APAC, was awarded “Bronze Luminary” in the AI Champion category recognizing AI adoption and enablement impact. The ISG Women in Digital Awards program, launched in the Americas in 2022, was expanded in 2023 to the Europe, Middle East and Africa (EMEA) and Asia Pacific regions, including India. In 2025, the global program had a total of 536 finalists and winners were announced on September. “The Women in Digital Awards aim to elevate and connect visionary women across the tech landscape. Natalia Chiritescu’s achievement is a testament to the program’s purpose: to foster collaboration, innovation, and diversity, empowering leaders to drive AI-enabled transformation worldwide,” said Kimberly Tobias, Partner and Leader of ISG Women in Digital. “Being named an AI Champion by ISG is an honor I share

CyberArk Named a Leader in the 2025 Gartner® Magic Quadrant™ for Privileged Access Management16.10.2025 18:06:00 EEST | Press release

CyberArk (NASDAQ: CYBR), the global leader in identity security, today announced it has been named a Leader in the 2025 Gartner® Magic Quadrant™ for Privileged Access Management1. Recognized as a Leader for the seventh consecutive time, CyberArk is positioned furthest in Completeness of Vision which, from the company's standpoint, reflects CyberArk's commitment to defining the future of privilege access management (PAM), where every identity is protected with flexible as-needed access, smart AI-driven privilege controls, and unified security across both cloud and on-premises systems. The report evaluates tools that manage privileged access for both humans and machines. The CyberArk Identity Security Platform enables organizations to secure all identities – human, machine and AI – with the right level of privilege controls from a single, unified platform. As part of this platform, CyberArk's Privileged Access Management solutions help security teams secure privileged credentials, secret

In our pressroom you can read all our latest releases, find our press contacts, images, documents and other relevant information about us.

Visit our pressroom
World GlobeA line styled icon from Orion Icon Library.HiddenA line styled icon from Orion Icon Library.Eye