NIST NVD Details:
Based on the article above, Juniper announced a security flaw in their source code within Juniper NetScreen's ScreenOS. The 'spying code' has been found in products running ScreenOS versions 6.2.0r15 through 6.2.0r18 and 6.3.0r12 through 6.3.0r20. Has anyone been able to use NPM and/or NCM to help identify Juniper nodes in their environment that run the ScreenOS version in question?
Unfortunately we do not have any Juniper NetScreen devices for me to test on but here's some food for thought:
Run CLI command 'get system' on multiple nodes (NCM)
Create Universal Device Poller (UnDP) for the OID that provides the ScreenOS version (NPM)
Description: NetScreen OS Version.
Additional Information on UnDP:
Hopefully that'll be a start to some awesome ideas and results! Please discuss and share thoughts/results below!
SolarWinds solutions are rooted in our deep connection to our user base in the THWACK® online community. More than 150,000 members are here to solve problems, share technology and best practices, and directly contribute to our product development process.