TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Unauthorized code in Juniper ScreenOS allows for administrative access

271 pointsby tshtfover 9 years ago

18 comments

adrtessierover 9 years ago
Hoo boy, most of these things don&#x27;t worry me, but this one does.<p>I&#x27;m semi-responsible for some Juniper gear, thankfully all Junos (BSD) based, but I no longer trust any of it if this is malicious injection vs. a bad review. However, what the hell can I do? I can&#x27;t audit the code. I trusted Juniper, and now I&#x27;m stuck with that trust being burned. Running to any other proprietary network vendor is just as uncertain.<p>If Junos gets a bulletin, I have a lot of work on my hands very soon, as do a good chunk of service providers. I remember there being rumors of a certain three-letter agency saying they had some type of exploit for the Cisco ASA as well; I wonder if it was something this deep, vs. just a run of the mill RCE vuln.<p>This is one more reason to use open-source products for actually security-sensitive systems, maintain a good amount of defense in depth, and do a little bit of auditing of the code you&#x27;re using yourself. More often than not these days, it sure pays to be paranoid.<p>EDIT: At the same time, this also really makes me respect Juniper more than I have previously. A company that finds this internally, on their own audit, could have patched it silently and said nothing about it to anybody. It probably would have been better for them PR-wise. The honesty is worth me not jumping ship to another (probably compromised) proprietary vendor, but you betcha if I can get away with it, I&#x27;ll run something open-source and community audited when I can.
评论 #10757384 未加载
评论 #10756623 未加载
评论 #10757514 未加载
评论 #10756805 未加载
评论 #10757972 未加载
评论 #10757473 未加载
评论 #10757448 未加载
nathanbover 9 years ago
I work for a company which makes network devices. We&#x27;ve detected many hostile intrusions in our network. If you make hardware or software that runs in enterprise datacenters, someone is surely going to be trying to steal your source code to find exploits and possibly put backdoors in.<p>We use multi-factor authentication just to get in the corporate network and a separate, airlocked engineering network to store our IP. From what I&#x27;ve talked to from my colleagues at other major device manufacturers, this is becoming the industry standard (seven years ago I scoffed at Ericsson&#x27;s paranoia for having a sequestered engineering network. Turns out they just saw the attacks earlier than we did).<p>In our case, doesn&#x27;t seem to be the NSA. Looks more like China. Could easily be either one, or yet another party. This is the world we live in.
评论 #10757493 未加载
评论 #10757446 未加载
tptacekover 9 years ago
Holy shit. You thought you&#x27;d read the important security news of the day on HN, but, nope: Netscreen VPNs were backdoored!
评论 #10756488 未加载
snowpandaover 9 years ago
This might not mean anything, but NetScreen-5GT 6.2.0r15 (The first affected version) was the first release with a SHA-1 sum. April 2015 is the first archive of this page I could find.[0]<p>I wonder if the reasoning behind the SHA-1 is (possibly) that they were starting to notice some strange activity.<p>I applaud them for disclosing all of this. That could not have been an easy thing to have to do.<p>[0] <a href="https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20150422145246&#x2F;http:&#x2F;&#x2F;www.juniper.net&#x2F;support&#x2F;products&#x2F;screenos&#x2F;ns5gt&#x2F;6.2&#x2F;#sw" rel="nofollow">https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20150422145246&#x2F;http:&#x2F;&#x2F;www.junipe...</a><p>Archive link:<p><a href="https:&#x2F;&#x2F;archive.is&#x2F;jdw13" rel="nofollow">https:&#x2F;&#x2F;archive.is&#x2F;jdw13</a>
late2partover 9 years ago
Your government is illegaly modifying commercial software so they can spy on you without warrants. Your government is doing this through illegal breaking and entering, or by paying people to defraud their employers, or by using extortion to force people do these illegal acts.<p>Your government put CISA (Warrantless Wiretaps) into the budget bill.<p>Wake up.<p>Vote against any elected official that supports these things. Tell your elected officials you want your privacy and you will work to put them out of office if they don&#x27;t defend it.
评论 #10757428 未加载
评论 #10756802 未加载
评论 #10759024 未加载
reigerover 9 years ago
<a href="http:&#x2F;&#x2F;arstechnica.com&#x2F;security&#x2F;2015&#x2F;12&#x2F;unauthorized-code-in-juniper-firewalls-decrypts-encrypted-vpn-traffic&#x2F;" rel="nofollow">http:&#x2F;&#x2F;arstechnica.com&#x2F;security&#x2F;2015&#x2F;12&#x2F;unauthorized-code-in...</a>
评论 #10756825 未加载
geofftover 9 years ago
Should we take that as a dysphemism for &quot;code that wasn&#x27;t security-reviewed by someone who should have been Cc&#x27;d on the review&quot; instead of the much more obvious &quot;malicious commit, either from an employee or an attacker&quot;?
评论 #10755744 未加载
yuhongover 9 years ago
An attempt at a diff: <a href="https:&#x2F;&#x2F;gist.github.com&#x2F;hdm&#x2F;107614ea292e856faa81" rel="nofollow">https:&#x2F;&#x2F;gist.github.com&#x2F;hdm&#x2F;107614ea292e856faa81</a>
marshrayover 9 years ago
Isn&#x27;t this somewhat unprecedented: a major vendor announced their source base has been actively compromised by a malicious party?<p>If so, this is a potentially industry-changing event.
评论 #10756618 未加载
评论 #10756789 未加载
blacksmith_tbover 9 years ago
&quot;Unauthorized&quot; seems strangely vague - does that suggest something was released without code review, or that an attacker actually managed to get something into their codebase?
评论 #10756603 未加载
评论 #10756295 未加载
评论 #10755340 未加载
firebonesover 9 years ago
Sounds more like an insider committing an obfuscated exploit, or a plausibly deniable bug.<p>Props to Juniper for owning up. Unless that is part of the con...
kccqzyover 9 years ago
Can someone explain how the code is able to decrypt VPN traffic? I&#x27;m no expert on VPNs but I thought they provide end-to-end security and the protocols could detect tampering?
评论 #10759189 未加载
评论 #10757382 未加载
评论 #10757853 未加载
chiphover 9 years ago
There&#x27;s no proof at this stage that a government agency is behind this. It could easily have been an employee inserting this code in an attempt to blackmail the firm, or perhaps to gain financial advantage by learning corporate secrets that would allow them to beat the stock market.<p>Hopefully there are source-control logs that show when this alteration was made and by whom, but given how hardware companies treat software I doubt it.
hdmooreover 9 years ago
If anyone is interested, I have been working on diffing the code for the backdoored vs patched versions: <a href="https:&#x2F;&#x2F;github.com&#x2F;hdm&#x2F;juniper-cve-2015-7755" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;hdm&#x2F;juniper-cve-2015-7755</a>
lifeisstillgoodover 9 years ago
tl;dr Project aurora was a series of attacks in 2010&#x2F;11 where Chinese attacked the SCM of major companies. Juniper <i>may</i> have had its SCM polluted without going through normal review processes<p>And so signing code patches looks like a good idea.
评论 #10757007 未加载
secfirstmdover 9 years ago
I think a lot of the focus here is on technical penetration of organisations. Much easier in many cases to just do a human intelligence penetration of an organisation to put the code in place.
rmdossover 9 years ago
TLDR: ScreenOS was backdoored.
ossrealityover 9 years ago
Can someone detail how widely Juniper&#x2F;ScreenOS is deployed in the wild?
评论 #10757404 未加载
评论 #10757244 未加载