I would like to hear a full explanation of “unauthorized code”.
A sneaky Chinese agent added code when they weren’t looking?
A smartass US hacker managed to add some secret sauce during production?
Incompetent engineers at Juniper didn’t actually verify and validate the code the way they should have?
And, to top it off, they are NIST compliant and certified by the Federal Government for use in all government networks.
And the secure networks of those who have business with the Government.