>>7785295 (pb)
Juniper is only the beginning.
This has been going on for a very long time. They are typically sold as "maintenance", "update" "administrative" ports. Or not documented at all.
If you really want to scare yourself on how corrupt "data security" products are, look into checkpoint firewall. (reports of back doors all the way back to the 90's. Never fully confirmed. Always covered up with plausible deniability.). Rabbit hole goes deep and wide. founders, governments, and origins, are very interesting. Other security products they developed are some of the best surveillance and monitoring tools ever built.