1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Juniper's backdoor password disclosed, likely added in late 2013

Discussion in 'CSO' started by RSS, Dec 21, 2015.

  1. RSS

    RSS New Member Member

    Rapid7's Chief Research Officer, HD Moore, has posted some notes on the Juniper ScreenOS incident. After analyzing the patches released by Juniper, Moore's team discovered the backdoor password that enables the Telnet and SSH bypass.

    In a blog post on Rapid7's community portal, Moore said that a quick Shodan search identified 26,000 public-facing Netscreen devices with SSH open. Considering the severity of the issues disclosed by Juniper on December 18, his team started digging.

    Last week, Juniper said that an internal audit uncovered unauthorized code that was added to ScreenOS. The added code created two security issues. The first is an authentication bypass, and the second issue would allow an attacker to monitor and decrypt VPN traffic.

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page