REMINDER - If you have a legacy network-connected Tablo device still running firmware version 2.2.42, you must update it by Friday, May 22nd.
Version 2.2.60 contains a critical security patch that must be processed by May 22, 2026. (This patch was already included in firmware 2.2.58.)
If you do not update your Tablo’s firmware before that date, connectivity between your Tablo device and Tablo servers will fail, impacting your experience in the following ways:
-
Access to All Subscription Features Will Expire
Since your Tablo won’t be able to verify its subscription status, access to all subscription-enabled features will expire, including extended 14-day TV Guide Data, series and advanced recording features, Tablo Connect for out-of-home streaming and Automatic Commercial Skip. -
Connectivity Through Some Tablo Apps May Fail
Tablo apps that rely on our servers to authenticate new connections may fail to discover or connect to your Tablo device. This could affect Tablo apps for Samsung and LG smart TVs, Windows 10 and the web app. -
Your Tablo Won’t Receive Updates
Tablo servers also manage firmware update notifications and downloads. If your Tablo cannot connect to our servers, it won’t receive any future firmware updates.
Processing this firmware update will allow you to continue enjoying your Tablo beyond May 22nd.
FAQs About the 2.2.60 Critical Security Patch
-
Which Tablo models require a firmware-based critical security patch?
The following legacy network-connected Tablo models require the application of a firmware-based critical security patch by May 22nd, 2026: Tablo DUAL LITE, Tablo DUAL 64GB, Tablo DUAL 128GB, Tablo QUAD, Tablo QUAD 1TB and the original 2-Tuner and 4-Tuner Tablo. If you have updated to firmware 2.2.58 or 2.2.60, this patch was already applied to your device. This patch isn’t required for Tablo DUAL HDMI, QUAD HDMI or 4th Generation Tablo devices as they use more recent and up-to-date security credentials. -
What does the critical security patch update do?
When Tablo devices connect to the servers at Tablo HQ, it uses specific security credentials to ensure that communication between the server and the device is protected and encrypted. The security patch in firmware versions 2.2.58 and 2.2.60 replaces older security credentials that are expiring with newer ones, extending the life of your legacy Tablo device. If you have already updated to firmware 2.2.58 or 2.2.60, your Tablo is now using the newer security credentials. -
Was my Tablo or network at risk without this security patch?
No, your Tablo or home network was never at risk. Imagine this patch as your Tablo’s passport to Tablo HQ, which is expiring on May 23rd. The ‘border’ remains secure, and ‘passports’ included in previous firmware versions, including 2.2.42, will remain valid until then. But, if you don’t update your firmware to receive a new ‘passport’ before then, your Tablo will be ‘refused entry’ and won’t be able to obtain a new ‘passport’. -
Why couldn’t Tablo just keep the old security credentials?
Security credentials for devices and servers have set expiry dates, just like passports. Setting expiry dates is one of the best practices Tablo uses to help reduce overall security risks. -
I don’t want to use the new 4th Generation Tablo apps. Do I still need to update?
Yes. All legacy network-connected Tablo devices must update by May 22nd. Even if you never plan to enable the Legacy Transition and use 4th Generation apps, updating will ensure that connectivity between your Tablo device and Tablo servers can continue. Without it, access to all subscription-enabled features will expire, connectivity through some Tablo apps may fail and your Tablo will no longer be eligible to receive updates. Updating to 2.2.60 WILL NOT prevent you from accessing your Tablo through the legacy Tablo apps you use today or alter the features available to you within legacy apps. -
I have a different Tablo model. Does my device need this security patch?
This patch isn’t required for Tablo DUAL HDMI, QUAD HDMI or 4th Generation Tablo devices. As comparably newer devices, they use more recent and up-to-date security credentials.