This article will be kept updated by the SonicWall Threat Research team as we have more information available.
Impact to SonicWall customers
The SonicWall Capture Threat Research team has evaluated these vulnerabilities and determined that our firewalls are not vulnerable to the Meltdown or Spectre vulnerabilities.
SonicWall firewalls utilize custom high performance security processors (not x86 or other processors with known flaws). Further, SonicOS is a specialized security operating system that does not run arbitrary code and has no exploitable shell. SonicWall firewalls protect against known and unknown malware, and network based exploits against Meltdown and Spectre have artifacts that can be identified and therefore prevented.
The SonicWall Capture Threat Research team is releasing protection against attacks that leverage these vulnerabilities to help defend our customers’ extended infrastructure.
Other SonicWall appliances are hardened and do not run 3rd party code, which is a prerequisite to this attack. Therefore, SonicWall email security, remote access and centralized management appliances are not at risk.
Firewalls (TZ, NSA, SuperMassive)
Not vulnerable, not utilizing a vulnerable processor/OS
Secure Remote Access
Global Management System
Local CFS Responder
Not vulnerable, does not run arbitrary 3rd party code
In order to minimize the potential impact of these vulnerabilities, SonicWall recommends customers take the following actions:
Patch all Windows, Linux, Android, iOS and Mac OS clients with the latest updates from client vendors.
Enable the SonicWall Capture ATP Service, Intrusion Prevention Service (IPS) and the anti-malware protection on their firewalls
Additional details on these vulnerabilities can be found at:
Should you have further questions or need assistance, please contact your preferred SonicWall reseller or SonicWall Support. You can also expect to see a blog post about this vulnerability on https://blog.sonicwall.com/ shortly.