Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 



















Contents

   



(Top)
 


1 Features  





2 Possible NSA backdoor and 2015 "Unauthorized Code" incident  





3 NSA and GCHQ  





4 Versions  





5 References  





6 External links  














ScreenOS






Español
Français
Русский
 

Edit links
 









Article
Talk
 

















Read
Edit
View history
 








Tools
   


Actions  



Read
Edit
View history
 




General  



What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Wikidata item
 




Print/export  



Download as PDF
Printable version
 
















Appearance
   

 






From Wikipedia, the free encyclopedia
 


ScreenOS
DeveloperJuniper Networks
Working stateCurrent
Source modelClosed source
Latest release6.3.0r27 / 23 April 2019; 5 years ago (2019-04-23)[1]
LicenseProprietary
Succeeded byJunos OS (on later hardware)

ScreenOS is a real-time embedded operating system for the NetScreen range of hardware firewall devices from Juniper Networks.

Features[edit]

Beside transport level security ScreenOS also integrates these flow management applications:

Possible NSA backdoor and 2015 "Unauthorized Code" incident[edit]

In December 2015, Juniper Networks announced that it had found unauthorized code in ScreenOS that had been there since August 2012. The two backdoors it created would allow sophisticated hackers to control the firewall of un-patched Juniper Netscreen products and decrypt network traffic. At least one of the backdoors appeared likely to have been the effort of a governmental interest. There was speculation in the security field about whether it was the NSA.[2] Many in the security industry praised Juniper for being transparent about the breach.[2] WIRED speculated that the lack of details that were disclosed and the intentional use of a random number generator with known security flaws could suggest that it was planted intentionally.[2]

NSA and GCHQ[edit]

A 2011 leaked NSA document says that GCHQ had current exploit capability against the following ScreenOS devices: NS5gt, N25, NS50, NS500, NS204, NS208, NS5200, NS5000, SSG5, SSG20, SSG140, ISG 1000, ISG 2000. The exploit capabilities seem consistent with the program codenamed FEEDTROUGH.[3]

Versions[edit]

ScreenOS version Release date End of Support End of life
6.3.0r27[1] 23 April 2019
6.0 19 April 2007 19 April 2010 19 April 2011
5.4 24 July 2006 24 July 2009 24 July 2010
5.3 24 October 2005 24 October 2008 24 October 2009
5.2 11 May 2005 11 May 2008 11 May 2009
5.1 22 October 2004 22 October 2007 22 October 2008
5.0 18 December 2003 18 December 2006 18 December 2007
4.0 1 August 2002 31 October 2006 31 October 2007

References[edit]

  • ^ a b c Zetter, Kim (27 October 2008). "New Discovery Around Juniper Backdoor Raises More Questions About the Company". WIRED. Retrieved 15 January 2016.
  • ^ Ryan Gallagher, Glenn Greenwald (23 December 2015). "NSA Helped British Spies Find Security Holes In Juniper Firewalls". Retrieved 27 December 2015.
  • External links[edit]


    Retrieved from "https://en.wikipedia.org/w/index.php?title=ScreenOS&oldid=1117922916"

    Categories: 
    Embedded operating systems
    Real-time operating systems
    Network operating systems
    Juniper Networks
    Computer networking
    Hidden categories: 
    Articles with short description
    Short description is different from Wikidata
    Use dmy dates from May 2016
     



    This page was last edited on 24 October 2022, at 07:45 (UTC).

    Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.



    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Mobile view



    Wikimedia Foundation
    Powered by MediaWiki