Cisco is looking for “malicious modifications” in its equipment after Juniper announced earlier this week that its ScreenOS operating system has been vulnerable for years, Network World announced.
The additional review was Cisco’s idea, said the senior director of the company’s Security and Trust Organization.
Documents stolen by Edward Snowden in 2013 said the NSA had backdoored Juniper and Cisco gear.
The company says it will release its findings in accordance with its security vulnerability policy.
Some have speculated that the malicious code Juniper is currently patching was placed there by the NSA, and that Cisco may also have been affected.
“Our additional review includes penetration testing and code reviews by engineers with deep networking and cryptography experience,” said Anthony Grieco, senior director of Cisco’s Security and Trust Organization. “We have seen none of the indicators discussed in Juniper’s disclosure. Although our normal practices should detect unauthorized software, we recognize that no process can eliminate all risk.”