Unauthorized code in Juniper devices provided backdoor access and compromised VPN connections