On Jan. 3, two processor vulnerabilities, known as Spectre and Meltdown, were published by Google’s Project Zero security team. Variants of this issue are known to affect many modern processors, including certain processors by Intel, AMD and Arm.
A successful exploit of this vulnerability allows an attacker to access sensitive information (e.g., passwords, emails, documents) inside protected memory regions on modern processors. Because the OS-level memory isolation is usually considered trustworthy, this data is most likely to appear in plaintext in memory when processed by the OS and applications.
Your SonicWall customers are not susceptible to Spectre and Meltdown vulnerabilities.No updates are needed at this time.
The SonicWall Capture Labs investigated the Spectre and Meltdown vulnerabilities and found the following:
- The full range of SonicWall TZ, NSA and SuperMassive firewalls are not vulnerableto the Meltdown or Spectre vulnerabilities.
- All other SonicWall products, including Email Security, Secure Mobile Access and Global Management System, also are not at risk. These products are hardened and do not run third-party code, which is a prerequisite for this attack.
For additional details on Spectre and Meltdown vulnerabilities, as well as recommended action for third-party solutions, please review our detailed SonicAlert, the knowledge base (KB) support article and the SonicWall University Spectre & Meltdown video.