This only complicates the questions about who added the rogue code and how it was done, which the security community is hoping Juniper will eventually address.
Juniper NetScreen users should upgrade their devices to the newly released ScreenOS versions 6.2.0r19 or 6.3.0r21, or should install a backdoor-free version of the firmware they're already running, which Juniper also made available. These re-releases have the original version numbers followed by the letter b.
The likelihood of attacks is high, especially since the backdoor password is now public.
Sign up for CIO Asia eNewsletters.