No evidence indicates that the back door was also placed on the other Juniper Networks operating system or unit.
Juniper Networks independent consultants mentioned that two different vulnerabilities are not enough to be called unauthorized code.
Before they are sent to their final destination, the information in the gear firmware installed hidden implants.

Because many processes are involved, installing unauthorized code to an official operating system behavior has been more subtle.
In recent years, it seems to have become a more sophisticated and forward work.
Of course, it can also install another way at the back door.

Ars Juniper has asked for more details; like sustain attention.
