SonicWall statement on Meltdown and Spectre vulnerabilities
03/26/2020 81 People found this article helpful 200,841 Views
Article Last Updated: January 4th 2018; 8.02pm CST.
On January 3rd 2018, the Project Zero team published details on two processor vulnerabilities known as Spectre and Meltdown.
Variants of this issue are known to affect many modern processors, including certain processors by Intel, AMD and ARM.
So far, we are tracking and providing updates on the following three known variants of the issue:
Variant 1: bounds check bypass (CVE-2017-5753)
Variant 2: branch target injection (CVE-2017-5715)
Variant 3: rogue data cache load (CVE-2017-5754)
This article will be kept updated by the SonicWall Threat Research team as we have more information available.
Impact to SonicWall customers
The SonicWall Capture Threat Research team has evaluated these vulnerabilities and determined that our firewalls are not vulnerable to the Meltdown or Spectre vulnerabilities.
SonicWall firewalls utilize custom high performance security processors (not x86 or other processors with known flaws). Further, SonicOS is a specialized security operating system that does not run arbitrary code and has no exploitable shell. SonicWall firewalls protect against known and unknown malware, and network based exploits against Meltdown and Spectre have artifacts that can be identified and therefore prevented.
The SonicWall Capture Threat Research team is releasing protection against attacks that leverage these vulnerabilities to help defend our customers’ extended infrastructure.
- GAV: Exploit.Spectre.A (Exploit)
Other SonicWall appliances are hardened and do not run 3rd party code, which is a prerequisite to this attack. Therefore, SonicWall email security, remote access and centralized management appliances are not at risk.
|Firewalls (TZ, NSA, SuperMassive) ||Not vulnerable, not utilizing a vulnerable processor/OS |
Secure Remote Access
Global Management System
Local CFS Responder
|Not vulnerable, does not run arbitrary 3rd party code |
In order to minimize the potential impact of these vulnerabilities, SonicWall recommends customers take the following actions:
- Patch all Windows, Linux, Android, iOS and Mac OS clients with the latest updates from client vendors.
- Enable the SonicWall Capture ATP Service, Intrusion Prevention Service (IPS) and the anti-malware protection on their firewalls
Additional details on these vulnerabilities can be found at:
Should you have further questions or need assistance, please contact your preferred SonicWall reseller or SonicWall Support. You can also expect to see a blog post about this vulnerability on https://blog.sonicwall.com/ shortly.
Was This Article Helpful?