Get started >
Get in contact with SonicWall Authorized Distributors. >
Get In Touch >
Get expert guidance >
Partner to win with SonicWall.
A sophisticated enablement platform designed to train partners.
Access to deal registration, MDF, sales and marketing tools, training and more.
Join the SecureFirst Partner Program.
Get in contact with the SonicWall Authorized Distributors.
Extensive technical training curriculum for partners.
Learn about SonicWall technology and alliance partners. >
Expand your managed security offerings with the MSSP Program and Security-as-a-Service (SECaaS). >
Contact the SonicWall Channel team. >
Find the answers to your questions by searching or browsing our knowledge base.
Our Support Videos help you set-up, manage and troubleshoot your SonicWall appliance or software
Get official SonicWall Technical Documentation for your product.
Professional Services delivered by SonicWall Partners
Review our Support Offerings and Policies
Develop SonicWall product expertise and earn industry recognized Certifications
Create a support ticket or contact us by phone >
Manage license, services software and firmware for SonicWall products >
Obtain a quote or renew a support contract >
See how we solve complex network security threats for customers like you
Learn about network security threats and how to stop them with SonicWall white papers.
Learn how our customers prevent complex network security threats around the globe.
News, trends and insights from SonicWall security experts
Get expert guidance on best practice solutions to fit your needs
Get details on SonicWall product features, specifications and ordering in our datasheets.
On January 3rd 2018, the Project Zero team published details on two processor vulnerabilities known as Spectre and Meltdown. Variants of this issue are known to affect many modern processors, including certain processors by Intel, AMD and ARM. So far, we are tracking and providing updates on the following three known variants of the issue: Variant 1: bounds check bypass (CVE-2017-5753) Variant 2: branch target injection (CVE-2017-5715) Variant 3: rogue data cache load (CVE-2017-5754)
This article will be kept updated by the SonicWall Threat Research team as we have more information available.
The SonicWall Capture Threat Research team has evaluated these vulnerabilities and determined that our firewalls are not vulnerable to the Meltdown or Spectre vulnerabilities.SonicWall firewalls utilize custom high performance security processors (not x86 or other processors with known flaws). Further, SonicOS is a specialized security operating system that does not run arbitrary code and has no exploitable shell. SonicWall firewalls protect against known and unknown malware, and network based exploits against Meltdown and Spectre have artifacts that can be identified and therefore prevented. The SonicWall Capture Threat Research team is releasing protection against attacks that leverage these vulnerabilities to help defend our customers’ extended infrastructure.
Other SonicWall appliances are hardened and do not run 3rd party code, which is a prerequisite to this attack. Therefore, SonicWall email security, remote access and centralized management appliances are not at risk.
Secure Remote Access
Global Management System
Local CFS Responder
In order to minimize the potential impact of these vulnerabilities, SonicWall recommends customers take the following actions:
Additional details on these vulnerabilities can be found at:
Should you have further questions or need assistance, please contact your preferred SonicWall reseller or SonicWall Support. You can also expect to see a blog post about this vulnerability on https://blog.sonicwall.com/ shortly.
Request a topic for a future Knowledge Base article