Η Juniper Networks has already confirmed that some of the exploits and implants leaked data from Shadow Brokers affect its products, more accurately NetScreen firewalls run the ScreenOS operating system.
The company did not say in detail what the exploits that affect its products, nor what models or versions of the operating system they are targeting.
But the company said it is still investigating the code and will not release any security advisory until it learns the full extent of the code and what all the contaminated products are.
Derrick Scholl of the juniper Product Security Information Response said (we are quoting his statement):
"As part of our analysis of these files, we identified an attack against NetScreen devices running ScreenOS. We are investigating the extent of the attack, but initial analysis indicates that it targets the boot loader and does not exploit a vulnerability on ScreenOS devices. »
Based on this list (press here to see it), several security researchers claim that the BARGLEE, FEEDTROUGH, and ZESTYLEAK implants are the ones that can be used against Juniper devices.
At the end of last week, Cisco, Fortinet, and WatchGuard have recognized that their products have been affected.
Cisco has already released two security warnings. Fortinet advised its customers to upgrade to the latest version of FortiGuard 5.x while WatchGuard said implants only affected a range of products called RapidStream and that the current modules of the device have been affected.