What does the Juniper backdoor actually allow an attacker to do?

As the exploit gives root access to the Juniper device, an attacker can:

  • Decrypt all VPN traffic to the device, thus allowing viewing of all traffic through encrypted tunnels that terminate at the Juniper box
  • Edit firewall rules on the box, allowing an attacker to remove rules protecting assets within the network
  • Alter routing tables where these are used, perhaps redirecting traffic
  • View logs stored on the device
  • Edit logs on the device to remove any trace of compromise

Root on the box.

So, "yes" to all.

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10713&actp=search

Exploitation of this vulnerability can lead to complete compromise of the affected system.

Update: Password disclosed
Rapid7 have disclosed the password.