NetScreen Technologies: Difference between revisions

Content deleted Content added
mNo edit summary
Line 49:
 
==2015 "Unauthorized Code" Incident==
{{main|ScreenOS}}
 
In December 2015 Juniper Systems announced that they had discovered "unauthorized code" in the ScreenOS software that underlies their NetScreen devices, present from 2012 onwards.
In December 2015 Juniper Systems announced that they had discovered "unauthorized code" in the ScreenOS software that underlies their NetScreen devices, present from 2012 onwards. They said this allowed unauthorized remote administrative access to Netscreen devices, and also ''“may allow a knowledgeable attacker who can monitor VPN traffic to decrypt that traffic.”''<ref>https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10713&cat=SIRT_1&actp=LIST</ref> The second vulnerability added to the [[Crypto Wars|public debate]] about the installation of [[backdoor (computing)|backdoors]] in cryptographic systems.<ref name="wired-secret-code-in-junipers-firewalls">{{cite web | url=http://www.wired.com/2015/12/juniper-networks-hidden-backdoors-show-the-risk-of-government-backdoors | title=Secret Code Found in Juniper's Firewalls Shows Risk of Government Backdoors | author=Kim Zetter | work=Wired | publisher= | language=Englisch | format=HTML | date=2015-12-18 | accessdate=2015-12-25 | archiveurl=ARCHIVE | archivedate=2015-12-25}}</ref>
 
==References==