-
Tips for becoming a good boxer - November 6, 2020
-
7 expert tips for making your hens night a memorable one - November 6, 2020
-
5 reasons to host your Christmas party on a cruise boat - November 6, 2020
-
What to do when you’re charged with a crime - November 6, 2020
-
Should you get one or multiple dogs? Here’s all you need to know - November 3, 2020
-
A Guide: How to Build Your Very Own Magic Mirror - February 14, 2019
-
Our Top Inspirational Baseball Stars - November 24, 2018
-
Five Tech Tools That Will Help You Turn Your Blog into a Business - November 24, 2018
-
How to Indulge on Vacation without Expanding Your Waist - November 9, 2018
-
5 Strategies for Businesses to Appeal to Today’s Increasingly Mobile-Crazed Customers - November 9, 2018
Juniper finds backdoors in enterprise firewalls
For Juniper customers that may be impacted by the ScreenOS issue, Tod Beardsley, security research manager at Rapid7, recommends that, in addition to updating the firmware immediately, organizations also change passwords and investigate their own networks for potential compromises.
Advertisement
Juniper claimed that there were two independent issues regarding the unauthorized code: the first issue allows unauthorized remote administrative access to the device over SSH or telnet, and exploitation of the vulnerability can lead to complete compromise of the affected system.
Juniper Networks has revealed that “unauthorised code” has been found in an operating system used to manage firewalls that can be exploited to decrypt traffic as it flows through virtual private networks (VPNs). Firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on some security rules.
The code can be used by an attacker who knows about its existence to get administrative access to devices running ScreenOS and decrypt VPN connections, Juniper senior VP and CIO Bob Worrall wrote in a security advisory issued Thursday.
After identifying these vulnerabilities, the firm launched an investigation into the matter, and worked to develop and issue patched releases for the latest versions of ScreenOS.
Malware known as Feedtrough “burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers, “Der Spiegel said”.
The second issue (CVE-2015-7756) could allow a skilled attacker to intercept and decrypt VPN traffic, but Juniper says that there is no indication that there have been any successful exploits.
The vulnerability was found in ScreenOS which powers NetScreen firewall devices. Juniper has recently announced a new strategy for a disaggregated Junos to enable a more flexible software-defined networking (SDN) approach.
Advertisement
Unfortunately, the earliest affected operating system version, ScreenOS 6.2.0r15, has been released in 2008, which means attackers had nine years at their disposal to carry out their attacks and then step back into the shadows. The NSA has targeted Juniper firewalls in the past.