← Supply-Chain Attack Compendium

juniper-screenos

Incident Summary

Juniper ScreenOS firmware contained unauthorized backdoors

Juniper disclosed on 2015-12-17 that unauthorized code was found in official ScreenOS firmware shipped on NetScreen firewalls. CVE-2015-7755 added a hardcoded master password (`<<< %s(un='%s') = %u`) granting administrative SSH/Telnet access to any device. CVE-2015-7756 weakened the Dual_EC_DRBG random number generator by replacing the Q parameter, enabling passive decryption of VPN traffic by anyone holding the corresponding private key. The malicious code is believed to have been present since 2012 (in 6.2.0r15 and later, and 6.3.0r12 and later) and is widely attributed to a nation-state actor — possibly building on a pre-existing NSA-influenced backdoor.

Date
2012-09-01 to 2015-12-17
Category
Commercial
Target Surface
Other
Insertion Phase
source
Impact
Backdoor
Cause
Source code compromise

What Was Affected

Package juniper-screenos
Languagec
ComponentFirmware
Artifact typefirmware
Domain typevendor
Domain juniper.net

Compromised Versions

  • ScreenOS 6.2.0r15 - 6.2.0r18
  • ScreenOS 6.3.0r12 - 6.3.0r20

Incident Context

Motive
Espionage
Attribution
Nation-state
Transitive
No
Observed Duration
1202 days

External References

Source Data

Source record: proprietary/juniper-screenos/meta.yaml