Log in to ask questions, share your expertise, or stay connected to content you value. Don’t have a login? Learn how to become a member.
In August 2016, a group calling themselves The Shadow Brokers released a set of files. This blog detailed our analysis of the impact of those files on Juniper devices. At that time, the Shadow Brokers also released a second set of files that were encrypted. They recently published the...
Juniper Networks is investigating the recent release of files reported to have been taken from the so-called Equation Group. For reference, we addressed the existence of these kinds of tools in JSA10605 . However, this is the first time possible examples of those tools have been available...
Vulnerability Details HTTP Evader: Automate Firewall and IDS Evasion Tests, Analyse Browser Behavior (Research) http://noxxi.de/research.html (Semantic Gap) http://noxxi.de/research/semantic-gap.html (Tool – FW Evasion Test) http://http-evader.semantic-gap.de (GitHub – Code) ...
Juniper Networks Completes ScreenOS Update POSTED BY BOB WORRALL, SVP CHIEF INFORMATION OFFICER ON APRIL 6, 2016 I am pleased to share that Juniper Networks has completed the process of updating ScreenOS, by implementing the same random number generation technology currently employed...
On February 16, 2016, Google Security announced a new vulnerability in the getaddrinfo() library function of glibc. The glibc DNS client side resolver is vulnerable to a stack-based buffer overflow when the getaddrinfo() library function is used. Software using this function may be exploited...
Advancing the Security of Juniper Products POSTED BY BOB WORRALL, SVP CHIEF INFORMATION OFFICER ON JANUARY 8, 2016 Recently Juniper Networks announced the discovery of unauthorized code in the ScreenOS® software used in our Netscreen® products. This malicious code could allow a...
IMPORTANT JUNIPER SECURITY ANNOUNCEMENT CUSTOMER UPDATE: DECEMBER 20, 2015 Administrative Access (CVE-2015-7755) only affects ScreenOS 6.3.0r17 through 6.3.0r20. VPN Decryption (CVE-2015-7756) only affects ScreenOS 6.2.0r15 through 6.2.0r18 and 6.3.0r12 through 6.3.0r20. ...
11 Comments - no search term matches found in comments.
Hello World We are the Juniper Networks Security Incident Response Team (SIRT) and we handle all aspects of possible security issues with Juniper products. Our team looks for them, accepts information about them, works to get bugs fixed, and publishes Juniper Security Advisories . We also...
2 Comments - no search term matches found in comments.