Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Juniper finds backdoors in enterprise firewalls
iTnews AUS ^ | Dec 18 2015 9:37AM (AUS) | Juha Saarinen

Posted on 12/17/2015 7:54:53 PM PST by Utilizer

Urges customers to patch Netscreen devices immediately.

Network equipment vendor Juniper has issued an urgent security alert for its Netscreen range of enterprise firewalls, after discovering "unauthorised code" in the device operating system that allows them to be fully compromised.

According to Juniper chief information officer Bob Worrall, the code was discovered during an internal review of the ScreenOS operating system for the Netscreen firewalls.

One vulnerability could be triggered to permit an attacker to log in via Secure Shell or telnet connections, and gain administrative privileges on Netscreen firewalls.

(Excerpt) Read more at itnews.com.au ...


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: juniper; malware; netscreen; secureshell
Enterprise ScreenOS security flaw!
1 posted on 12/17/2015 7:54:53 PM PST by Utilizer
[ Post Reply | Private Reply | View Replies]

To: Utilizer

F’en Lovely


2 posted on 12/17/2015 7:57:59 PM PST by CGASMIA68
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer

I would like to hear a full explanation of “unauthorized code”.

A sneaky Chinese agent added code when they weren’t looking?
A smartass US hacker managed to add some secret sauce during production?
Incompetent engineers at Juniper didn’t actually verify and validate the code the way they should have?


3 posted on 12/17/2015 7:58:45 PM PST by ClearCase_guy (I support anything which diminishes the Muslim population.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: BenLurkin; Admin Moderator

Ben, beat Me by about ten minutes. :)

http://freerepublic.com/focus/f-chat/3374004/posts

Mods, this is not an identical post but is preceded by Ben’s post so ‘your call’ to Lock, Pull, or Ignore.

Cheers!


4 posted on 12/17/2015 7:59:55 PM PST by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzlims trying to kill them)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer
uh, that's some pretty severe flaws

Spookiest of all, the code shipped with the box.

5 posted on 12/17/2015 8:01:13 PM PST by Mariner (War Criminal #18 - Be The Leaderless Resistance)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer

That’s kind of a big “oh s#it”! for a company in their business


6 posted on 12/17/2015 8:02:33 PM PST by bigbob ("Victorious warriors win first and then go to war" Sun Tzu.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer

Sounds like IBM’s froot bug.

http://seclists.org/bugtraq/1994/Jul/99


7 posted on 12/17/2015 8:03:24 PM PST by Black Agnes
[ Post Reply | Private Reply | To 1 | View Replies]

To: ClearCase_guy
"I would like to hear a full explanation of “unauthorized code”.

And, to top it off, they are NIST compliant and certified by the Federal Government for use in all government networks.

And the secure networks of those who have business with the Government.

8 posted on 12/17/2015 8:05:10 PM PST by Mariner (War Criminal #18 - Be The Leaderless Resistance)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Utilizer

How’s that H1B staffing workin’ for ya?


9 posted on 12/17/2015 8:08:49 PM PST by JJ_Folderol (Just my opinion and only worth what you paid for it.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer

Somebody’s got some ‘splainin’ to do.

Most of this stuff is built in China. Cisco, too.


10 posted on 12/17/2015 9:20:29 PM PST by Noumenon (Resistance. Restoration. Retribution.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Noumenon

Bet you it ends up someone at the company supplanted their income. Some third party got to them and either paid them or coerced them into putting the modified code in the build. Ultimately they are going to have to look at their build/ship process. Who had access, who actually built the release image, who had access to the image (ie could have replaced it).


11 posted on 12/17/2015 9:39:03 PM PST by ThunderSleeps (Stop obarma now! Stop the hussein - insane agenda!)
[ Post Reply | Private Reply | To 10 | View Replies]

To: ThunderSleeps

Yes, and I’d bet a bag of crullers that there’s more than one involved. Someone had to sign of on this. And someone above that someone, I’d wager.


12 posted on 12/18/2015 7:31:00 AM PST by Noumenon (Resistance. Restoration. Retribution.)
[ Post Reply | Private Reply | To 11 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson