Juniper Networks has identified products it says are vulnerable to the DROWN attack.
DROWN turned up at the end of February, and is a relic of enduring but pointless support for the long-deprecated SSLv2 protocol.
More ReadingJuniper bleeding data and money: slaps Band-Aids all over Junos OS and warns marketsLenovo, Juniper in hyper-converged mashup.... hang on, who's doing storage?Juniper slurps packet-optical outfit BTI SystemsJuniper resets 'days since last rogue code incident' clockJuniper's VPN security hole is proof that govt backdoors are bonkers
The most prominent exposure to DROWN is in web sites that weren't configured to refuse attempts at SSLv2 connection. However, hardware vendors use HTTPS to secure access to management consoles, which means the vulnerability sent the whole industry scrambling to identify and patch vulnerable systems.
In Juniper's advisory, the company says its ScreenOS (the operating system for NetScreen firewalls), Security Threat Response Manager (STRM), its JSA virtual appliance, and its WLC Wireless LAN Controller had the DROWN vulnerability.
For ScreenOS later than version 6.3.0r19, the fix is straightforward: disable SSLv2 and SSLv3 at the CLI with the <ttl>unset sll ssl3 command.
The company promises a fix for the STRM and JSA Series products in versions 2014.6.r4 and 2013.2.r14, and fixes are promised for other products.
Listed as not vulnerable are Junos OS, Junos Space, JunosE, QFabric Director, Standalone IDP (intrusion detection and prevention), NSM, WLAN RingMaster and WLAN SmartPass.
If you have vulnerable products that don't yet have a fix, Juniper notes that SSL traffic can be blocked at the firewall. ®