Juniper’s ScreenOS firmware – which runs its NetScreen firewalls and VPN devices – was backdoored by up to three different domestic and foreign intelligence agencies, beginning in 2008. The backdoors could have allowed attackers to remotely access devices by bypassing authentication checks, as well as decrypt VPN traffic. Any organization that’s been using NetScreen devices since 2008 has potentially been the victim of eavesdropping attacks, which may be ongoing. The House probe could theoretically lead to crafting new, related policies for the U.S. intelligence community.”]
Source: https://www.cuinfosecurity.com/blogs/4-juniper-questions-congress-should-be-asking-p-2049

