Skip to main content

The context you need, when you need it

When news breaks, you need to understand what actually matters — and what to do about it. At Vox, our mission to help you make sense of the world has never been more vital. But we can’t do it on our own.

We rely on readers like you to fund our journalism. Will you support our work and become a Vox Member today?

Join now

Who Hid a Secret Back Door in Juniper’s Security Gear?

Was it maybe the NSA?

Juniper Networks

Has Juniper lost control of the operating systems running its security gear?

That’s the question everyone’s asking after the company disclosed that someone inserted code into the operating system of its Netscreen firewall and virtual private network products that would give an attacker the ability to capture and decrypt connections that are supposed to be secure.

Juniper said in a security disclosure issued last night that it discovered the rogue add-on during a routine review of its internal software code. Someone, somehow, inserted the renegade code, essentially creating a secret back door into Juniper’s products — a back door that only someone in the know would be able to use. Secret, that is, until now.

Firewalls protect corporate networks from outside attackers. And VPNs — or virtual private networks — are a mainstay of corporate IT environments. Companies and governments often require their use for employees when they travel or log in to office networks from home. VPNs create encrypted tunnels that shield a user’s connection while they’re on public networks like hotel Wi-Fi. Juniper’s operating system for its VPN and firewall products is called ScreenOS. The break-in means that the very thing meant to protect you has been compromised.

Juniper said nothing about who it suspects is responsible for the code (in theory, it should have some records of the changes occurring). But there are some enticing and as yet inconclusive hints about who might have done it.

One important tell here is that the back doors were found during a code review. Auditing software code for security vulnerabilities is in fashion these days, so I reached out to someone who knows a lot about that: Chris Wysopal is the CTO of Veracode, which offers a cloud-based service for scanning code for weaknesses.

“For code as critical as an OS, it is standard industry practice to have two sets of eyes on any code change,” he said by email. “Juniper should have a record of who this was. If they don’t know who this was, then they have lost control of the integrity of their OS.”

Wysopal’s observation pretty much gets to the heart of the matter. If Juniper doesn’t have a record of who changed its code, then how can it know that its code isn’t being changed by unauthorized parties all the time? I’ve asked Juniper to respond to that question and haven’t yet heard back.

The company says in its disclosure that four versions of ScreenOS are affected and require updates with patched versions of the software issued yesterday.

Also unclear is how the rogue code was inserted in the first place. Did the parties responsible carry out some kind of break-in committed against Juniper’s internal systems? Or was it someone working internally on behalf of the attackers? There’s a wide range of plausible scenarios, about which Juniper’s disclosure thus far offers no clues.

This brings us back to a short list of possible suspects. The biggest one is the U.S. National Security Agency. Among the documents leaked from the NSA by way of the whistleblower Edward Snowden and first disclosed by the German magazine Der Speigel was this: Feedthrough. It’s described in a catalog of devices and software used by an NSA division called ANT as a “persistence technique for two software implants … used against Juniper Netscreen Firewalls.”

Juniper’s disclosures describe two bits of inserted code. One allows an attacker aware of the inserted code to remotely access the hardware using common remote access tools. The second allows the attacker to “monitor and decrypt the traffic.” It sure sounds a lot like what’s described in the Feedthrough document.

There’s also no evidence, Juniper says in its disclosure documents, that anyone used the back door, but it seems like the sort of thing that would be impossible to know.

Juniper shareholders don’t seem bothered by the news: Juniper shares fell six cents to $29.05 by mid-morning, down only slightly. Security products amounted to about $464 million in sales during its 2014 fiscal year, or approximately 10 percent of its overall business.

This article originally appeared on Recode.net.

See More:

More in Technology

Technology
The case for AI realismThe case for AI realism
Technology

AI isn’t going to be the end of the world — no matter what this documentary sometimes argues.

By Shayna Korol
Politics
OpenAI’s oddly socialist, wildly hypocritical new economic agendaOpenAI’s oddly socialist, wildly hypocritical new economic agenda
Politics

The AI company released a set of highly progressive policy ideas. There’s just one small problem.

By Eric Levitz
Future Perfect
Human bodies aren’t ready to travel to Mars. Space medicine can help.Human bodies aren’t ready to travel to Mars. Space medicine can help.
Future Perfect

Protecting astronauts in space — and maybe even Mars — will help transform health on Earth.

By Shayna Korol
Podcasts
The importance of space toilets, explainedThe importance of space toilets, explained
Podcast
Podcasts

Houston, we have a plumbing problem.

By Peter Balonon-Rosen and Sean Rameswaram
Technology
What happened when they installed ChatGPT on a nuclear supercomputerWhat happened when they installed ChatGPT on a nuclear supercomputer
Technology

How they’re using AI at the lab that created the atom bomb.

By Joshua Keating
Future Perfect
Humanity’s return to the moon is a deeply religious missionHumanity’s return to the moon is a deeply religious mission
Future Perfect

Space barons like Jeff Bezos and Elon Musk don’t seem religious. But their quest to colonize outer space is.

By Sigal Samuel