Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Juniper updates list of backdoored enterprise firewall OS versions

Lucian Constantin | Dec. 22, 2015
The administrative access issue affects fewer ScreenOS versions than previously believed

This only complicates the questions about who added the rogue code and how it was done, which the security community is hoping Juniper will eventually address.

Juniper NetScreen users should upgrade their devices to the newly released ScreenOS versions 6.2.0r19 or 6.3.0r21, or should install a backdoor-free version of the firmware they're already running, which Juniper also made available. These re-releases have the original version numbers followed by the letter b.

The likelihood of attacks is high, especially since the backdoor password is now public.

 

Previous Page  1  2 

Sign up for CIO Asia eNewsletters.