Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

02:20 PM
Connect Directly

Juniper Discovers Unauthorized Code In Its Firewall OS

'Troubling' incident exposes code designed to decrypt VPN communication and enable remote administrative control of devices.

Security researchers today expressed deep concern over the disclosure by Juniper Networks this week that it had discovered unauthorized code in its ScreenOS firewall operating system that could allow an attacker to decrypt VPN communications or take complete administrative control of a compromised system.

In an out-of-cycle advisory issued yesterday, Juniper senior vice president and CIO Bob Worrall said the company discovered the code during a recent internal review and moved quickly to patch the vulnerabilities. “We launched an investigation into the matter, and worked to develop and issue patched releases for the latest versions of ScreenOS,” Worrall said.

According to the company, all Juniper NetScreen devices running versions OS 6.2.0r15 through 6.2.0r18 and 6.3.0r12 through 6.3.0r20 of ScreenOS are vulnerable and need to be patched immediately.

In a separate advisory, Juniper said the code causes two security issues. “The first issue allows unauthorized remote administrative access to the device over SSH or telnet. Exploitation of this vulnerability can lead to complete compromise of the affected system,” the company noted. Certain entries in the log file would indicate if someone had exploited the vulnerability, Juniper said.

The second issue allows someone with the know-how to monitor and decrypt VPN traffic. Enterprises would have no way of knowing if the vulnerability has been exploited to snoop in on their encrypted VPN traffic. Juniper said the two issues are separate and distinct from each other.

Security experts described the disclosure as being deeply troubling and said it raised several questions about who might have had access to the source code, how they might have tampered with it unnoticed and most importantly, why.

Edward Snowden’s leaks about U.S. surveillance practices at home and abroad included details about the National Security Agency’s Tailored Access Operations (TAO) and the tools the agency apparently used as part of the operation to infiltrate systems. One of the tools allegedly was a software exploit for Juniper’s firewalls dubbed Bananaglee.

It’s quite possible that Juniper’s disclosure this week has nothing to do with Bananaglee at all and is a completely separate issue. But that does not mitigate the serious nature of the disclosure, analysts say.

“This is extremely worrisome,” says Richard Stiennon, chief research analyst at IT-Harvest. “It has all the hallmarks of a very sophisticated infiltration and corruption [campaign] ... One can’t help wonder if Juniper has discovered a TAO backdoor.”

Though documents leaked by Snowden listed Juniper as one of several equipment manufacturers that may have been targeted as part of TAO, the company, like others has never publicly disclosed any known backdoors in its products, Stiennon says. Businesses using unpatched firewalls run the risk of having all the network traffic routed through a VPN being read by an attacker and having additional APT-style code installed on their systems, Stiennon says.

There are several possible ways the code could have been inserted into Juniper’s operating systems, says John Pescatore, director at the SANS Institute. An insider, for instance, could easily hide unauthorized code in such a manner as to evade detection during the testing and QA process.

If Juniper hadn’t taken adequate measures to protect its source code, an external attacker could have gained access to it as well, Pescatore says. “A variant is someone compromising tools Juniper developers used,” he says. “[But] that doesn’t seem too likely here.”

It’s important for enterprises to find out from Juniper what exactly happened, Pescatore says, and how and what the vendor has changed to prevent it from occurring again. “Then make sure to ask your other vendors why this won’t happen. This is all part of supply chain integrity in IT,” Pescatore says.

Rich Mogull, CEO of security research firm Securosis, says it appears that the backdoor code was inserted into the Juniper supply chain. “We can’t really speculate as to how it happened, but some options include everything from malicious employees to compromise of development pipeline servers and repositories, to compromise of employee systems with access to any of those assets," he says.

This is not the first example of a company’s code development and release process being compromised -- and it won't be the last, he says. In fact, this sort of compromise happens far more commonly than most vendors, especially security companies want to admit, Mogull says.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-12
Cross Site Scripting (XSS) in LAOBANCMS v2.0 allows remote attackers to execute arbitrary code by injecting commands into the "Website SEO Keywords" field on the page "admin/info.php?shuyu".
PUBLISHED: 2021-05-12
An Information Disclosure vulnerability exists in dhcms 2017-09-18 when entering invalid characters after the normal interface, which causes an error that will leak the physical path.
PUBLISHED: 2021-05-12
evm is a pure Rust implementation of Ethereum Virtual Machine. Prior to the patch, when executing specific EVM opcodes related to memory operations that use `evm_core::Memory::copy_large`, the `evm` crate can over-allocate memory when it is not needed, making it possible for an attacker to perform d...
PUBLISHED: 2021-05-12
A Cross SIte Scripting (XSS) vulnerability exists in Dhcms 2017-09-18 in guestbook via the message board, which could let a remote malicious user execute arbitrary code.
PUBLISHED: 2021-05-12
Knowage Suite 7.3 is vulnerable to Stored Cross-Site Scripting (XSS). An attacker can inject arbitrary web script in '/knowage/restful-services/signup/update' via the 'surname' parameter.