Posted on 01/27/2016 7:23:22 PM PST by Utilizer
Congress plans to question about two dozen federal agencies on whether they were using backdoored Juniper network security appliances.
In December, Juniper Networks said it had discovered unauthorized code added to ScreenOS, the operating system that runs on its NetScreen network firewalls. The rogue code, which remained undetected for two years or more, could have allowed remote attackers to gain administrative access to vulnerable devices or to decrypt VPN connections.
The U.S. House Committee on Oversight and Government Reform wants to determine the impact that this issue had on government organizations and how those organizations responded to the incident.
The committee sent letters on Jan. 21 to, the Departments of Defense, Health and Human Services, State, the Securities and Exchange Commission the Nuclear Regulatory Commission, NASA, the Social Security Administration, USAID and many other government agencies.
The letters ask the recipients to identify whether they used devices running the affected ScreenOS versions, to explain how they learned about the issues and whether they took any corrective actions before Juniper released patches and to specify when they applied the company's patches.
(Excerpt) Read more at computerworld.com ...
Other informational links on site.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.