HITBSecConf2017 Amsterdam (April 10th - 14th)
Register Online Now!
Juniper Networks has announced its own investigations have found none of the "oops ... how did that code get there" trouble in Junos OS and that it will kill off Dual Elliptic Curve (Dual_EC) encryption in ScreenOS.
The company says it hired a "respected security organization" that "undertook a detailed investigation of ScreenOS and Junos OS® source code."
Security researchers believe they have finally solved the mystery around how a sophisticated backdoor embedded in Juniper firewalls works. Juniper Networks, a tech giant that produces networking equipment used by an array of corporate and government systems, announced on Thursday that it had discovered two unauthorized backdoors in its firewalls, including one that allows the attackers to decrypt protected traffic passing through Juniper’s devices.
A serious flaw in the operating system running Juniper routers can make them crash and reboot, the network equipment vendor has advised.
By sending a specially crafted transmission control protocol (TCP) packet to a listening port on a Juniper Routing Engine, it's possible to make the kernel in JunOS crash, and cause them to swich over or reboot.
Juniper Networks is not, it turns out, all that enthusiastic about the OpenFlow technology that is at the heart of a lot of software-defined network (SDN) strategies these days. But don't be confused. That does not mean that Juniper doesn't believe in SDN or has not been quietly putting together its own SDN battle plan to take on Cisco, which has its own ideas about SDN, just like other OpenFlow enthusiasts who are trying to break up the network control and forwarding planes and make them more malleable and manageable.
Juniper has added 30 new features to the Mykonos security software including 'tar traps' to catch attackers.
Following the acquisition of Mykonos in February, Juniper has added new software to offer improved protection against a wider range of attackers and hacking techniques and simplified management and configuration for security administrators.