SonicWall Product Notice: Spectre & Meltdown Vulnerability Update
On Jan. 3, two processor vulnerabilities, known as Spectre and Meltdown, were published by Google’s Project Zero security team. Variants of this issue are known to affect many modern processors, including certain processors by Intel, AMD and Arm.
A successful exploit of this vulnerability allows an attacker to access sensitive information (e.g., passwords, emails, documents) inside protected memory regions on modern processors. Because the OS-level memory isolation is usually considered trustworthy, this data is most likely to appear in plaintext in memory when processed by the OS and applications.
Your SonicWall customers are not susceptible to Spectre and Meltdown vulnerabilities.No updates are needed at this time.
The SonicWall Capture Labs investigated the Spectre and Meltdown vulnerabilities and found the following:
- The full range of SonicWall TZ, NSA and SuperMassive firewalls are not vulnerableto the Meltdown or Spectre vulnerabilities.
- All other SonicWall products, including Email Security, Secure Mobile Access and Global Management System, also are not at risk. These products are hardened and do not run third-party code, which is a prerequisite for this attack.
- Signatures for SonicWall Gateway Anti-Virus (Exploit.Spectre.A) and Intrusion Prevention Service (IPS 13149: Suspicious Javascript Code) have been released to identify and defend the networks. Each are automatically applied to licensed firewalls with GAV and IPS enabled.
For additional details on Spectre and Meltdown vulnerabilities, as well as recommended action for third-party solutions, please review our detailed SonicAlert, the knowledge base (KB) support article and the SonicWall University Spectre & Meltdown video.
Danh Mục
Khuyến Mãi
Số lượng có hạn, hãy liên lạc ngay với chúng tôi
Hỗ trợ trực tuyến
Bộ phận kinh doanh
Bộ phận kỹ thuật
Bộ phận bảo hành
Bộ phận tư vấn