Security Appliances are often viewed as secure devices and used for the very first line of defense. Although those devices are mostly unix servers they benefit from a big trust and can contain sensitive information or credentials.
After looking several years consecutively at security appliance it´s about time to wrap up some internal insights and encountered problems. Starting with the past we will talk about the internals of previously reviewed systems. Further, we will talk about other security appliances (namely IDS/IPS) and how they were designed and what to consider at the acquisition and feature enabling of such appliances. Besides describing the internals we will introduce our newly discovered vulnerabilities which can lead to a full compromise of the system.