Juniper Networks’ ScreenOS firmware was backdoored by up to three different domestic and foreign intelligence agencies, beginning in 2008. The backdoors could have allowed attackers to remotely access devices by bypassing authentication checks, as well as decrypt VPN traffic. Any organization using NetScreen devices since 2008 has potentially been the victim of eavesdropping attacks, which may be ongoing. The results of the House probe could theoretically lead to crafting new, related, related policies for the U.S. intelligence community.”]
Source: https://www.govinfosecurity.com/blogs/4-juniper-questions-congress-should-be-asking-p-2049

