Juniper firewalls compromised by bad code: What you need to know

Juniper Networks is warning customers to patch their NetScreen enterprise firewalls against bad code that enables attackers to take over the machines and decrypt VPN traffic among corporate sites and with mobile employees.

The danger is that attackers could exploit the code “to gain administrative access to NetScreen devices and to decrypt VPN connections,” Juniper says in a security announcement.

It would enable smart attackers to exploit the vulnerability and wipe out log files, making compromises untraceable, the company says.

To read this article in full or to leave a comment, please click here

Network World Tim Greene