December 18, 2015
Juniper is warning of unauthorized code in ScreenOS, the operating system for its NetScreen firewalls, that could allow attackers to gain administrative access and decrypt VPN connections.
"During a recent internal code review, Juniper discovered unauthorized code in ScreenOS that could allow a knowledgeable attacker to gain administrative access to NetScreen devices and to decrypt VPN connections," Bob Worrall, Juniper Networks Inc. (NYSE: JNPR)'s SVP and CIO, said on the Juniper support forums Thursday.
"At this time, we have not received any reports of these vulnerabilities being exploited; however, we strongly recommend that customers update their systems and apply the patched releases with the highest priority," Worrall said.
The vulnerability affects NetScreen devices using ScreenOS 6.2.0r15 through 6.2.0r18 and 6.3.0r12 through 6.3.0r20.
Want to know more about security? Visit Light Reading's security content channel. Juniper found no evidence SRX or other Junos devices were affected, Worrall said. Juniper declined to comment on how the code got into ScreenOS. A 2013 article in Der Spiegel said the NSA was able to break Juniper firewalls, along with "nearly all the security architecture made by the major players in the industry," including Cisco Systems Inc. (Nasdaq: CSCO), Huawei Technologies Co. Ltd. and Dell Technologies (Nasdaq: DELL) Related posts: Polymorphic Attacks Reshape Security Landscape Juniper Boosts Router Automation & Performance Juniper Bets Big on White Box & NFV AT&T's Spying Activities Risk Backlash Verizon Responds to German Spying Concerns NSA Reportedly Spying on Huawei: What's Chinese for 'Ironic'? Huawei Names US Lead, Reminds Us It's Still Here — Mitch Wagner, , West Coast Bureau Chief, Light Reading. Got a tip about SDN or NFV? Send it to [email protected].
About the Author(s)
You May Also Like
SCTE® LiveLearning for Professionals Webinar™ Series: Going to 10G & BeyondJul 26, 2023
Cable Next-Gen Business Services Digital Symposium 2023Jul 26, 2023
SCTE® LiveLearning for Professionals Webinar™ Series: Priming the Pump for Next-Gen PONJul 26, 2023
Open RAN Evolution Digital Symposium Day 2Jul 26, 2023