Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 422

Firmware Over-the-Air (OTA)

What is Firmware Over-the-Air (OTA)?

Firmware Over-the-Air (OTA)A mechanism for delivering and installing firmware updates to remote devices through wireless or networked channels, without physical access.


Firmware Over-the-Air (OTA) refers to the secure delivery of firmware updates to devices through wireless or networked channels, used in smartphones, vehicles, IoT sensors, routers, smart meters, and industrial gateways. A robust OTA pipeline produces firmware images, signs them with a private key held in an HSM, distributes them via a CDN or update server, verifies the signature on the device with a chain of trust rooted in immutable code (secure boot), and supports A/B partitions or rollbacks. Standards such as SUIT (RFC 9019) and Uptane (used in connected vehicles) formalize manifest formats, anti-rollback, and multi-party signing. Insecure OTA — unsigned updates, hard-coded keys, or update servers reachable from the public internet — is one of the most common ways to compromise an entire IoT fleet at once.

Examples

  1. 01

    A smart-meter fleet receiving a signed firmware bundle over LPWAN and verifying it against a vendor-rooted certificate chain.

  2. 02

    An EV manufacturer pushing an OTA update to fix a battery-management bug across its global fleet.

Frequently asked questions

What is Firmware Over-the-Air (OTA)?

A mechanism for delivering and installing firmware updates to remote devices through wireless or networked channels, without physical access. It belongs to the OT / ICS / IoT category of cybersecurity.

What does Firmware Over-the-Air (OTA) mean?

A mechanism for delivering and installing firmware updates to remote devices through wireless or networked channels, without physical access.

How does Firmware Over-the-Air (OTA) work?

Firmware Over-the-Air (OTA) refers to the secure delivery of firmware updates to devices through wireless or networked channels, used in smartphones, vehicles, IoT sensors, routers, smart meters, and industrial gateways. A robust OTA pipeline produces firmware images, signs them with a private key held in an HSM, distributes them via a CDN or update server, verifies the signature on the device with a chain of trust rooted in immutable code (secure boot), and supports A/B partitions or rollbacks. Standards such as SUIT (RFC 9019) and Uptane (used in connected vehicles) formalize manifest formats, anti-rollback, and multi-party signing. Insecure OTA — unsigned updates, hard-coded keys, or update servers reachable from the public internet — is one of the most common ways to compromise an entire IoT fleet at once.

How do you defend against Firmware Over-the-Air (OTA)?

Defences for Firmware Over-the-Air (OTA) typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Firmware Over-the-Air (OTA)?

Common alternative names include: OTA update, FOTA, Over-the-air firmware update.

Related terms

See also