Juniper Networks M7i, M10i, M40e, M120, M320, T320, T640, T1600, MX240, MX480 and MX960 Services Routers and EX3200, EX4200 and EX8200 Switches running JUNOS 10

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status archived
Valid from 08.10.2010
Valid until 08.10.2015
Scheme 🇬🇧 UK
Manufacturer Juniper Networks, Inc.
Category Network and Network-Related Devices and Systems
Security level ALC_FLR.3, EAL3+

Heuristics summary ?

Certificate ID: CRP258

Certificate ?

Certification report ?

Extracted keywords

Hash functions
SHA-1, MD5
Protocols
SSH

Security level
EAL3, EAL3 augmented
Security Assurance Requirements (SAR)
ALC_FLR.3
Certificates
CRP258, CRP248

Standards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Title: Certification Report CRP258 v1.1
Author: NWA
Creation date: D:20110401134243+01'00'
Modification date: D:20110401134249+01'00'
Pages: 18
Creator: Acrobat PDFMaker 7.0.5 for Word
Producer: Acrobat Elements 7.0.5 (Windows)

References

Outgoing
  • CRP248 - JUNOS 9.3R1 M/MX/T & EX family of routers and switches

Security target ?

Extracted keywords

Protocols
SSH, SSL

Security level
EAL3, EAL3 augmented
Claims
O.FLOW, O.PROTECT, O.EADMIN, O.AMANAGE, O.ACCESS, O.ROLBAK, O.AUDIT, T.ROUTE, T.PRIVIL, T.OPS, T.MANDAT, T.CONFLOSS, T.NOAUDIT, A.LOCATE, A.NOEVIL, A.EAUTH, A.TIME, A.CRYPTO, OE.EAUTH, OE.TIME, OE.CRYPTO, OE.PHYSICAL, OE.ADMIN
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_ARP.1, FAU_SAR.1, FAU_GEN.2, FAU_SAA.1, FAU_STG.1, FAU_ARP.1.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FDP_IFC.1, FDP_IFF.1, FDP_ROL.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ROL.1.1, FDP_ROL.1.2, FIA_ATD.1, FIA_SOS.1, FIA_UAU.2, FIA_UAU.5, FIA_UID.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UID.2.1, FIA_UAU.5.1, FIA_UAU.1, FIA_UAU.5.2, FIA_UID.1, FMT_SMF.1, FMT_MSA.3, FMT_MTD.1, FMT_MOF, FMT_MTD, FMT_SMR.1, FMT_MOF.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.1, FPT_STM.1, FPT_STM.1.1, FTA_TSE.1, FTA_TSE.1.1
Certification process
out of scope, which are out of scope), SSH, , and FTP4 , This covers all services used to exchange information, including telnet and SSL (which are out of scope), SSH, , and FTP4 . Authentication services can be handled either internally (user selected, accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: • All

Certification process
out of scope, which are out of scope), SSH, , and FTP4 , This covers all services used to exchange information, including telnet and SSL (which are out of scope), SSH, , and FTP4 . Authentication services can be handled either internally (user selected, accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: • All

File metadata

Title: JUNOS 10.0 for M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches
Subject: EAL3 Security Target
Author: JANE MEDEFESSER
Creation date: D:20101007131521+01'00'
Modification date: D:20101007131533+01'00'
Pages: 37
Creator: Acrobat PDFMaker 8.0 for Word
Producer: Acrobat Distiller 8.0.0 (Windows)

References

Outgoing

Heuristics ?

Certificate ID: CRP258

Extracted SARs

ALC_DVS.1, ADV_TDS.2, AGD_PRE.1, ASE_REQ.2, ASE_OBJ.2, ALC_FLR.3, AGD_OPE.1, ASE_TSS.1, ALC_CMC.3, AVA_VAN.2, ALC_CMS.3, ASE_CCL.1, ASE_INT.1, ALC_DEL.1, ASE_ECD.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, ADV_FSP.3, ASE_SPD.1, ATE_COV.2, ATE_IND.2, ADV_ARC.1

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2004-0230
C M N
MEDIUM 5.0 2.9 18.08.2004 04:00
CVE-2004-0468
C M N
MEDIUM 5.0 2.9 06.12.2004 05:00
CVE-2013-4686
C M N
HIGH 7.1 6.9 11.07.2013 14:55
CVE-2013-4689
C M N
MEDIUM 5.1 6.4 17.10.2013 23:55
CVE-2013-6014
C M N
CRITICAL 9.3 5.8 28.10.2013 22:55
CVE-2013-6170
C M N
MEDIUM 4.3 2.9 17.10.2013 23:55
CVE-2013-6618
C M N
HIGH 9.0 10.0 05.11.2013 20:55
CVE-2013-7313
C M N
MEDIUM 5.4 6.4 23.01.2014 17:55
CVE-2014-0613
C M N
HIGH 7.1 6.9 15.01.2014 16:08
CVE-2014-0615
C M N
HIGH 7.2 10.0 15.01.2014 16:08
CVE-2014-0616
C M N
HIGH 7.1 6.9 15.01.2014 16:08
CVE-2014-2712
C M N
MEDIUM 4.3 2.9 14.04.2014 15:09
CVE-2014-2714
C M N
HIGH 7.1 6.9 14.04.2014 15:09
CVE-2014-3818
C M N
HIGH 7.8 6.9 14.10.2014 14:55
CVE-2019-0036
C M N
CRITICAL 9.8 5.9 10.04.2019 20:29
CVE-2021-31362
C M N
MEDIUM 6.5 3.6 19.10.2021 19:15
CVE-2021-31372
C M N
HIGH 8.8 5.9 19.10.2021 19:15
CVE-2022-22156
C M N
HIGH 7.4 5.2 19.01.2022 01:15
CVE-2022-22162
C M N
HIGH 7.8 5.9 19.01.2022 01:15
CVE-2022-22163
C M N
MEDIUM 6.5 3.6 19.01.2022 01:15
CVE-2022-22173
C M N
HIGH 7.5 3.6 19.01.2022 01:15
CVE-2022-22181
C M N
MEDIUM 5.4 2.7 14.04.2022 16:15
CVE-2022-22197
C M N
HIGH 7.5 3.6 14.04.2022 16:15
CVE-2022-22208
C M N
MEDIUM 5.9 3.6 18.10.2022 03:15
CVE-2022-22214
C M N
MEDIUM 6.5 3.6 20.07.2022 15:15
CVE-2022-22215
C M N
MEDIUM 5.5 3.6 20.07.2022 15:15
CVE-2022-22220
C M N
MEDIUM 5.9 3.6 18.10.2022 03:15
CVE-2022-22224
C M N
MEDIUM 6.5 3.6 18.10.2022 03:15
CVE-2022-22238
C M N
MEDIUM 6.5 3.6 18.10.2022 03:15
CVE-2022-22241
C M N
CRITICAL 9.8 5.9 18.10.2022 03:15
CVE-2022-22242
C M N
MEDIUM 6.1 2.7 18.10.2022 03:15
CVE-2022-22243
C M N
MEDIUM 4.3 1.4 18.10.2022 03:15
CVE-2022-22244
C M N
MEDIUM 5.3 1.4 18.10.2022 03:15
CVE-2022-22245
C M N
MEDIUM 4.3 1.4 18.10.2022 03:15
CVE-2022-22246
C M N
HIGH 8.8 5.9 18.10.2022 03:15
CVE-2023-22391
C M N
HIGH 7.5 3.6 13.01.2023 00:15
CVE-2023-22395
C M N
MEDIUM 6.5 3.6 13.01.2023 00:15
CVE-2023-22406
C M N
MEDIUM 6.5 3.6 13.01.2023 00:15
CVE-2023-22407
C M N
MEDIUM 6.5 3.6 13.01.2023 00:15

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '671c74eace6ff791d339e7e9475c7c8de2673862129bdc1a2c37682f6e9b588e', 'txt_hash': '7a0a5c1b4d5ecd6f2a0a7ed410e00a63bf7f2b5454a421d0422347400887bef0'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '1201d4e4f56df0b50be6476a5f8288155ac56a5a502cd1a80113a7ea747f0aa1', 'txt_hash': '081f26e4115295ca6468b11cb77d0957478a6243aeabedf5e58d44530369a942'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}.
    • The report_frontpage property was set to {}.
    • The st_frontpage property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'CA': {'0 0 0': 1, '1 2 1': 1}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'CA': {'9 9 9': 10, '1 9 9': 8, '2 9 9': 2, '5 9 9': 1, '3 9 9': 1}}} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': None}.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2022-22241', 'CVE-2022-22163', 'CVE-2022-22224', 'CVE-2022-22173', 'CVE-2023-22395', 'CVE-2023-22406', 'CVE-2022-22181', 'CVE-2023-22391', 'CVE-2023-22407', 'CVE-2022-22208', 'CVE-2021-31362', 'CVE-2022-22220', 'CVE-2022-22215', 'CVE-2021-31372', 'CVE-2022-22246', 'CVE-2022-22238', 'CVE-2022-22197', 'CVE-2022-22244', 'CVE-2004-0468', 'CVE-2022-22214', 'CVE-2022-22162', 'CVE-2022-22243', 'CVE-2022-22156', 'CVE-2022-22245', 'CVE-2022-22242']} values added.
  • 24.03.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2022-22241', 'CVE-2022-22163', 'CVE-2022-22224', 'CVE-2023-22395', 'CVE-2022-22173', 'CVE-2023-22406', 'CVE-2022-22181', 'CVE-2023-22407', 'CVE-2023-22391', 'CVE-2022-22208', 'CVE-2021-31362', 'CVE-2022-22220', 'CVE-2022-22215', 'CVE-2021-31372', 'CVE-2022-22246', 'CVE-2022-22238', 'CVE-2022-22197', 'CVE-2022-22244', 'CVE-2004-0468', 'CVE-2022-22214', 'CVE-2022-22162', 'CVE-2022-22243', 'CVE-2022-22156', 'CVE-2022-22245', 'CVE-2022-22242']} values discarded.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 05.02.2023 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 1201d4e4f56df0b50be6476a5f8288155ac56a5a502cd1a80113a7ea747f0aa1.
    • The st_txt_hash property was set to 081f26e4115295ca6468b11cb77d0957478a6243aeabedf5e58d44530369a942.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 525224, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 37, '/CreationDate': "D:20101007131521+01'00'", '/Subject': 'EAL3 Security Target', '/Author': 'JANE MEDEFESSER', '/Creator': 'Acrobat PDFMaker 8.0 for Word', '/Producer': 'Acrobat Distiller 8.0.0 (Windows)', '/_Client': 'Juniper Network', '/Checked by': '-507199406', '/ModDate': "D:20101007131533+01'00'", '/Company': 'Juniper Networks, Inc', '/SourceModified': 'D:20101007121506', '/Title': 'JUNOS 10.0 for M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 5, 'EAL3 augmented': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.3': 7, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 6, 'FAU_ARP.1': 6, 'FAU_SAR.1': 5, 'FAU_GEN.2': 5, 'FAU_SAA.1': 5, 'FAU_STG.1': 5, 'FAU_ARP.1.1': 1, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FDP': {'FDP_IFC.1': 5, 'FDP_IFF.1': 6, 'FDP_ROL.1': 5, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ROL.1.1': 1, 'FDP_ROL.1.2': 1}, 'FIA': {'FIA_ATD.1': 5, 'FIA_SOS.1': 5, 'FIA_UAU.2': 8, 'FIA_UAU.5': 5, 'FIA_UID.2': 7, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.2.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.1': 2, 'FIA_UAU.5.2': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_SMF.1': 6, 'FMT_MSA.3': 10, 'FMT_MTD.1': 6, 'FMT_MOF': 10, 'FMT_MTD': 27, 'FMT_SMR.1': 5, 'FMT_MOF.1': 2, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.1': 3}, 'FPT': {'FPT_STM.1': 5, 'FPT_STM.1.1': 1}, 'FTA': {'FTA_TSE.1': 5, 'FTA_TSE.1.1': 1}}, 'cc_claims': {'O': {'O.FLOW': 11, 'O.PROTECT': 17, 'O.EADMIN': 8, 'O.AMANAGE': 17, 'O.ACCESS': 14, 'O.ROLBAK': 4, 'O.AUDIT': 17}, 'T': {'T.ROUTE': 10, 'T.PRIVIL': 7, 'T.OPS': 7, 'T.MANDAT': 4, 'T.CONFLOSS': 5, 'T.NOAUDIT': 2}, 'A': {'A.LOCATE': 4, 'A.NOEVIL': 3, 'A.EAUTH': 2, 'A.TIME': 4, 'A.CRYPTO': 4}, 'OE': {'OE.EAUTH': 3, 'OE.TIME': 3, 'OE.CRYPTO': 3, 'OE.PHYSICAL': 3, 'OE.ADMIN': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 20}, 'TLS': {'SSL': {'SSL': 2}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'which are out of scope), SSH, , and FTP4 ': 1, 'This covers all services used to exchange information, including telnet and SSL (which are out of scope), SSH, , and FTP4 . Authentication services can be handled either internally (user selected': 1, 'accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: • All': 1}}}.
    • The st_filename property was set to juniper-t009-st-v1.3.pdf.

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2013-7313', 'CVE-2023-22391', 'CVE-2004-0230', 'CVE-2004-0468', 'CVE-2013-6014', 'CVE-2013-6618', 'CVE-2023-22395', 'CVE-2013-6170', 'CVE-2023-22406', 'CVE-2013-4689', 'CVE-2013-4686', 'CVE-2023-22407']} values added.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/crp258.pdf, code: nok', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/juniper-t009-st-v1.3.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/crp258.pdf, code: nok'].
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 1201d4e4f56df0b50be6476a5f8288155ac56a5a502cd1a80113a7ea747f0aa1.
    • The st_txt_hash property was set to 081f26e4115295ca6468b11cb77d0957478a6243aeabedf5e58d44530369a942.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 525224, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 37, '/CreationDate': "D:20101007131521+01'00'", '/Subject': 'EAL3 Security Target', '/Author': 'JANE MEDEFESSER', '/Creator': 'Acrobat PDFMaker 8.0 for Word', '/Producer': 'Acrobat Distiller 8.0.0 (Windows)', '/_Client': 'Juniper Network', '/Checked by': '-507199406', '/ModDate': "D:20101007131533+01'00'", '/Company': 'Juniper Networks, Inc', '/SourceModified': 'D:20101007121506', '/Title': 'JUNOS 10.0 for M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 5, 'EAL3 augmented': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.3': 7, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 6, 'FAU_ARP.1': 6, 'FAU_SAR.1': 5, 'FAU_GEN.2': 5, 'FAU_SAA.1': 5, 'FAU_STG.1': 5, 'FAU_ARP.1.1': 1, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FDP': {'FDP_IFC.1': 5, 'FDP_IFF.1': 6, 'FDP_ROL.1': 5, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ROL.1.1': 1, 'FDP_ROL.1.2': 1}, 'FIA': {'FIA_ATD.1': 5, 'FIA_SOS.1': 5, 'FIA_UAU.2': 8, 'FIA_UAU.5': 5, 'FIA_UID.2': 7, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.2.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.1': 2, 'FIA_UAU.5.2': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_SMF.1': 6, 'FMT_MSA.3': 10, 'FMT_MTD.1': 6, 'FMT_MOF': 10, 'FMT_MTD': 27, 'FMT_SMR.1': 5, 'FMT_MOF.1': 2, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.1': 3}, 'FPT': {'FPT_STM.1': 5, 'FPT_STM.1.1': 1}, 'FTA': {'FTA_TSE.1': 5, 'FTA_TSE.1.1': 1}}, 'cc_claims': {'O': {'O.FLOW': 11, 'O.PROTECT': 17, 'O.EADMIN': 8, 'O.AMANAGE': 17, 'O.ACCESS': 14, 'O.ROLBAK': 4, 'O.AUDIT': 17}, 'T': {'T.ROUTE': 10, 'T.PRIVIL': 7, 'T.OPS': 7, 'T.MANDAT': 4, 'T.CONFLOSS': 5, 'T.NOAUDIT': 2}, 'A': {'A.LOCATE': 4, 'A.NOEVIL': 3, 'A.EAUTH': 2, 'A.TIME': 4, 'A.CRYPTO': 4}, 'OE': {'OE.EAUTH': 3, 'OE.TIME': 3, 'OE.CRYPTO': 3, 'OE.PHYSICAL': 3, 'OE.ADMIN': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 20}, 'TLS': {'SSL': {'SSL': 2}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'which are out of scope), SSH, , and FTP4 ': 1, 'This covers all services used to exchange information, including telnet and SSL (which are out of scope), SSH, , and FTP4 . Authentication services can be handled either internally (user selected': 1, 'accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: • All': 1}}}.
    • The st_filename property was set to juniper-t009-st-v1.3.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2013-7313', 'CVE-2004-0230', 'CVE-2013-4686', 'CVE-2013-6618', 'CVE-2013-6014', 'CVE-2013-6170', 'CVE-2004-0468', 'CVE-2013-4689']} values discarded.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/juniper-t009-st-v1.3.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 16.11.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The st_metadata property was updated, with the {'/Checked by': '-507199406'} values inserted.
  • 23.10.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2022-22238']} values added.
  • 22.10.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2022-22243', 'CVE-2022-22241', 'CVE-2022-22244', 'CVE-2022-22208', 'CVE-2022-22220', 'CVE-2022-22224', 'CVE-2022-22245', 'CVE-2022-22246', 'CVE-2022-22242']} values added.
  • 10.10.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:o:juniper:junos:10.4s:*:*:*:*:*:*:*', 'cpe:2.3:o:juniper:junos:10.4r:*:*:*:*:*:*:*']} values discarded.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'crp258.pdf', 'st_filename': 'juniper-t009-st-v1.3.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'UK': {'__update__': {'CRP258': 2, 'CRP248': 3}}}}, 'crypto_protocol': {'__update__': {'SSH': {'__update__': {'SSH': 3}}}}} data.
    • The st_keywords property was updated, with the {'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.3': 7}}}}, 'cc_sfr': {'__update__': {'FMT': {'__insert__': {'FMT_MOF': 10, 'FMT_MTD': 27, 'FMT_MOF.1': 2}, '__update__': {'FMT_MTD.1': 6, 'FMT_MSA.1': 3}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.PROTECT': 17, 'O.AMANAGE': 17, 'O.ROLBAK': 4}}, 'T': {'__update__': {'T.PRIVIL': 7, 'T.MANDAT': 4, 'T.NOAUDIT': 2}}, 'A': {'__update__': {'A.NOEVIL': 3, 'A.EAUTH': 2}}}}, 'vendor': {}, 'tee_name': {}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'which are out of scope), SSH, , and FTP4 ': 1, 'This covers all services used to exchange information, including telnet and SSL (which are out of scope), SSH, , and FTP4 . Authentication services can be handled either internally (user selected': 1}, '__delete__': ['. This covers all services used to exchange information, including telnet and SSL (which are out of scope), SSH, , and FTP4 ', 'xchange. This covers all services used to exchange information, including telnet and SSL (which are out of scope), SSH, , and FTP4 . Authentication services can be handled either internally (user selected']}}}} data.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['CRP248']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['CRP237', 'CRP248']}} data.
  • 31.07.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2022-22215', 'CVE-2022-22214']} values added.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to True.
    • The report_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 312433, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/CreationDate': "D:20110401134243+01'00'", '/_EmailSubject': 'Word to PDF', '/Author': 'NWA', '/Creator': 'Acrobat PDFMaker 7.0.5 for Word', '/_AuthorEmailDisplayName': 'WhittakerAxon, Nigel', '/Producer': 'Acrobat Elements 7.0.5 (Windows)', '/_AuthorEmail': 'Nigel.WhittakerAxon@cesg.gsi.gov.uk', '/ModDate': "D:20110401134249+01'00'", '/_AdHocReviewCycleID': '-812047709', '/Company': 'CESG Certification Body', '/Title': 'Certification Report CRP258 v1.1', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.juniper.net/', 'http://www.juniper.net/techpubs/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 525224, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 37, '/CreationDate': "D:20101007131521+01'00'", '/Subject': 'EAL3 Security Target', '/Author': 'JANE MEDEFESSER', '/Creator': 'Acrobat PDFMaker 8.0 for Word', '/Producer': 'Acrobat Distiller 8.0.0 (Windows)', '/_Client': 'Juniper Network', '/Checked#20by': '-507199406', '/ModDate': "D:20101007131533+01'00'", '/Company': 'Juniper Networks, Inc', '/SourceModified': 'D:20101007121506', '/Title': 'JUNOS 10.0 for M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.

    The computed heuristics were updated.

    • The cert_lab property was set to [''].
  • 27.07.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2019-0057', 'CVE-2021-31371', 'CVE-2013-6015', 'CVE-2021-0248', 'CVE-2022-22161', 'CVE-2013-4684', 'CVE-2019-0070', 'CVE-2014-0618', 'CVE-2022-22186', 'CVE-2013-6013', 'CVE-2020-1614', 'CVE-2022-22191', 'CVE-2021-31368', 'CVE-2021-31365', 'CVE-2013-4688', 'CVE-2013-4687', 'CVE-2013-4690', 'CVE-2022-22153', 'CVE-2013-4685', 'CVE-2021-0289', 'CVE-2021-31369', 'CVE-2022-22168', 'CVE-2014-0617']} values discarded.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to False.
    • The report_extract_ok property was set to False.
    • The errors property was set to ['Failed to read metadata of certs/reports/pdf/376b8eb06fc0b40a.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/376b8eb06fc0b40a.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/reports/pdf/376b8eb06fc0b40a.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/376b8eb06fc0b40a.pdf, error: can only concatenate list (not "IndirectObject") to list'].

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_keywords property was set to {'cc_cert_id': {'UK': {'CRP258': 38, 'CRP248': 6}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3, 'EAL3 augmented': 2}}, 'cc_sar': {'ALC': {'ALC_FLR.3': 3}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}, 'MD': {'MD5': {'MD5': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 2}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 5, 'EAL3 augmented': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.3': 5, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 6, 'FAU_ARP.1': 6, 'FAU_SAR.1': 5, 'FAU_GEN.2': 5, 'FAU_SAA.1': 5, 'FAU_STG.1': 5, 'FAU_ARP.1.1': 1, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FDP': {'FDP_IFC.1': 5, 'FDP_IFF.1': 6, 'FDP_ROL.1': 5, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ROL.1.1': 1, 'FDP_ROL.1.2': 1}, 'FIA': {'FIA_ATD.1': 5, 'FIA_SOS.1': 5, 'FIA_UAU.2': 8, 'FIA_UAU.5': 5, 'FIA_UID.2': 7, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.2.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.1': 2, 'FIA_UAU.5.2': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_SMF.1': 6, 'FMT_MSA.3': 10, 'FMT_MTD.1': 1, 'FMT_SMR.1': 5, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.1': 2}, 'FPT': {'FPT_STM.1': 5, 'FPT_STM.1.1': 1}, 'FTA': {'FTA_TSE.1': 5, 'FTA_TSE.1.1': 1}}, 'cc_claims': {'O': {'O.FLOW': 11, 'O.PROTECT': 19, 'O.EADMIN': 8, 'O.AMANAGE': 19, 'O.ACCESS': 14, 'O.ROLBAK': 6, 'O.AUDIT': 17}, 'T': {'T.ROUTE': 10, 'T.PRIVIL': 9, 'T.OPS': 7, 'T.MANDAT': 6, 'T.CONFLOSS': 5, 'T.NOAUDIT': 4}, 'A': {'A.LOCATE': 4, 'A.NOEVIL': 5, 'A.EAUTH': 4, 'A.TIME': 4, 'A.CRYPTO': 4}, 'OE': {'OE.EAUTH': 3, 'OE.TIME': 3, 'OE.CRYPTO': 3, 'OE.PHYSICAL': 3, 'OE.ADMIN': 3}}, 'vendor': {'STMicroelectronics': {'STM': 6}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 20}, 'TLS': {'SSL': {'SSL': 2}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, '. This covers all services used to exchange information, including telnet and SSL (which are out of scope), SSH, , and FTP4 ': 1, 'xchange. This covers all services used to exchange information, including telnet and SSL (which are out of scope), SSH, , and FTP4 . Authentication services can be handled either internally (user selected': 1, 'accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: • All': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The cert_lab property was set to None.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '671c74eace6ff791d339e7e9475c7c8de2673862129bdc1a2c37682f6e9b588e', 'st_pdf_hash': '1201d4e4f56df0b50be6476a5f8288155ac56a5a502cd1a80113a7ea747f0aa1', 'report_txt_hash': '7a0a5c1b4d5ecd6f2a0a7ed410e00a63bf7f2b5454a421d0422347400887bef0', 'st_txt_hash': '081f26e4115295ca6468b11cb77d0957478a6243aeabedf5e58d44530369a942'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 1, 'MD5': 1}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'SSL': 2}, 'rules_randomness': {}, 'rules_tee': {'SE': 1}, 'rules_side_channels': {}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 23.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2022-22197', 'CVE-2022-22186', 'CVE-2022-22181', 'CVE-2022-22191']} values added.
  • 29.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2022-22153', 'CVE-2022-22161', 'CVE-2022-22156', 'CVE-2004-0230', 'CVE-2022-22163', 'CVE-2021-0289', 'CVE-2021-31368', 'CVE-2021-31362', 'CVE-2021-31365', 'CVE-2021-31371', 'CVE-2022-22173', 'CVE-2021-31369', 'CVE-2021-31372', 'CVE-2021-0248', 'CVE-2004-0468', 'CVE-2022-22168', 'CVE-2022-22162']} values added.
  • 28.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2022-22153', 'CVE-2022-22161', 'CVE-2022-22156', 'CVE-2004-0230', 'CVE-2022-22163', 'CVE-2021-0289', 'CVE-2021-31368', 'CVE-2021-31362', 'CVE-2021-31365', 'CVE-2021-31371', 'CVE-2022-22173', 'CVE-2021-31369', 'CVE-2021-31372', 'CVE-2021-0248', 'CVE-2004-0468', 'CVE-2022-22168', 'CVE-2022-22162']} values discarded.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The cert_lab property was set to [''].
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {'cert_id': '', 'cert_item': 'of the Evaluation Facility which carried out the evaluation. Use of the logo does not imply acceptance by other Participants of liability in 122-B March 2011 Issue 1.1 Page 1 of 18 CERTIFICATION REPORT No. CRP258 Juniper Networks M7i, M10i, M40e, M120, M320, T320, T640, T1600, MX240, MX480 and MX960 Services Routers and EX3200, EX4200 and EX8200 Switches running JUNOS 10.0R3.10 Version 10.0R3.10 Issue 1.1 March 2011 © Crown Copyright 2011 – All Rights Reserved Reproduction is authorised, provided that this report is copied in its entirety. CESG Certification Body IACS Delivery Office, CESG Hubble Road, Cheltenham Gloucestershire, GL51 0EX United Kingdom CRP258 – JUNOS R3.10 Page 2 of 18 Issue 1.1 March 2011 CERTIFICATION STATEMENT The product detailed below has been evaluated under the terms of the UK IT Security Evaluation and Certification Scheme and has met the specified Common Criteria requirements. The scope of the evaluation and the assumed usage environment are specified in the body of this report', 'developer': 'Juniper Networks Inc', 'cert_lab': ''}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['10']}.
    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:o:juniper:junos:10.4r:*:*:*:*:*:*:*', 'cpe:2.3:o:juniper:junos:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:juniper:junos:10.1:*:*:*:*:*:*:*', 'cpe:2.3:o:juniper:junos:10.4s:*:*:*:*:*:*:*', 'cpe:2.3:o:juniper:junos:10.3:*:*:*:*:*:*:*', 'cpe:2.3:o:juniper:junos:10.2:*:*:*:*:*:*:*', 'cpe:2.3:o:juniper:junos:10.4:*:*:*:*:*:*:*']}.
  • 12.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[3, 'cpe:2.3:o:juniper:junos:10.1:*:*:*:*:*:*:*'], [4, 'cpe:2.3:o:juniper:junos:10.3:*:*:*:*:*:*:*'], [5, 'cpe:2.3:o:juniper:junos:10.2:*:*:*:*:*:*:*'], [6, 'cpe:2.3:o:juniper:junos:10.0:*:*:*:*:*:*:*']] values inserted.
  • 11.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[2, 'cpe:2.3:o:juniper:junos:10.1:*:*:*:*:*:*:*'], [4, 'cpe:2.3:o:juniper:junos:10.4:*:*:*:*:*:*:*'], [5, 'cpe:2.3:o:juniper:junos:10.4r:*:*:*:*:*:*:*'], [6, 'cpe:2.3:o:juniper:junos:10.4s:*:*:*:*:*:*:*']] values inserted.
  • 03.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[2, 'cpe:2.3:o:juniper:junos:10.4r:*:*:*:*:*:*:*'], [3, 'cpe:2.3:o:juniper:junos:10.4:*:*:*:*:*:*:*'], [4, 'cpe:2.3:o:juniper:junos:10.1:*:*:*:*:*:*:*'], [6, 'cpe:2.3:o:juniper:junos:10.2:*:*:*:*:*:*:*']] values inserted.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2022-22173']} values added.
  • 02.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[0, 'cpe:2.3:o:juniper:junos:10.1:*:*:*:*:*:*:*'], [1, 'cpe:2.3:o:juniper:junos:10.4:*:*:*:*:*:*:*'], [3, 'cpe:2.3:o:juniper:junos:10.3:*:*:*:*:*:*:*'], [4, 'cpe:2.3:o:juniper:junos:10.4r:*:*:*:*:*:*:*']] values inserted.
  • 01.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[1, 'cpe:2.3:o:juniper:junos:10.2:*:*:*:*:*:*:*'], [5, 'cpe:2.3:o:juniper:junos:10.4r:*:*:*:*:*:*:*'], [6, 'cpe:2.3:o:juniper:junos:10.4:*:*:*:*:*:*:*']] values inserted.
  • 30.01.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2022-22153', 'CVE-2022-22163']} values added.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Juniper Networks M7i, M10i, M40e, M120, M320, T320, T640, T1600, MX240, MX480 and MX960 Services Routers and EX3200, EX4200 and EX8200 Switches running JUNOS 10 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": null,
  "dgst": "376b8eb06fc0b40a",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CRP258",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:o:juniper:junos:10.1:*:*:*:*:*:*:*",
        "cpe:2.3:o:juniper:junos:10.2:*:*:*:*:*:*:*",
        "cpe:2.3:o:juniper:junos:10.4:*:*:*:*:*:*:*",
        "cpe:2.3:o:juniper:junos:10.3:*:*:*:*:*:*:*",
        "cpe:2.3:o:juniper:junos:10.0:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "10"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2014-2712",
        "CVE-2013-6618",
        "CVE-2021-31372",
        "CVE-2022-22246",
        "CVE-2013-7313",
        "CVE-2014-2714",
        "CVE-2014-0613",
        "CVE-2022-22162",
        "CVE-2022-22238",
        "CVE-2022-22243",
        "CVE-2013-6014",
        "CVE-2022-22244",
        "CVE-2014-0615",
        "CVE-2022-22220",
        "CVE-2022-22208",
        "CVE-2022-22241",
        "CVE-2022-22181",
        "CVE-2019-0036",
        "CVE-2013-4686",
        "CVE-2022-22224",
        "CVE-2023-22395",
        "CVE-2023-22406",
        "CVE-2022-22173",
        "CVE-2022-22242",
        "CVE-2022-22156",
        "CVE-2013-4689",
        "CVE-2021-31362",
        "CVE-2014-3818",
        "CVE-2022-22163",
        "CVE-2022-22215",
        "CVE-2014-0616",
        "CVE-2004-0468",
        "CVE-2023-22391",
        "CVE-2022-22197",
        "CVE-2013-6170",
        "CVE-2022-22214",
        "CVE-2004-0230",
        "CVE-2023-22407",
        "CVE-2022-22245"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "CRP248"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "CRP237",
          "CRP248"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Juniper Networks, Inc.",
  "manufacturer_web": "https://www.juniper.net/",
  "name": "Juniper Networks M7i, M10i, M40e, M120, M320, T320, T640, T1600, MX240, MX480 and MX960 Services Routers and EX3200, EX4200 and EX8200 Switches running JUNOS 10",
  "not_valid_after": "2015-10-08",
  "not_valid_before": "2010-10-08",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "crp258.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "UK": {
          "CRP248": 3,
          "CRP258": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.3": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 3,
          "EAL3 augmented": 2
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 3
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2009-07-001": 1,
          "CCMB-2009-07-002": 1,
          "CCMB-2009-07-003": 1,
          "CCMB-2009-07-004": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "NWA",
      "/Company": "CESG Certification Body",
      "/CreationDate": "D:20110401134243+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 7.0.5 for Word",
      "/ModDate": "D:20110401134249+01\u002700\u0027",
      "/Producer": "Acrobat Elements 7.0.5 (Windows)",
      "/Title": "Certification Report CRP258 v1.1",
      "/_AdHocReviewCycleID": "-812047709",
      "/_AuthorEmail": "Nigel.WhittakerAxon@cesg.gsi.gov.uk",
      "/_AuthorEmailDisplayName": "WhittakerAxon, Nigel",
      "/_EmailSubject": "Word to PDF",
      "pdf_file_size_bytes": 312433,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.juniper.net/",
          "http://www.juniper.net/techpubs/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 18
    },
    "st_filename": "juniper-t009-st-v1.3.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CRYPTO": 4,
          "A.EAUTH": 2,
          "A.LOCATE": 4,
          "A.NOEVIL": 3,
          "A.TIME": 4
        },
        "O": {
          "O.ACCESS": 14,
          "O.AMANAGE": 17,
          "O.AUDIT": 17,
          "O.EADMIN": 8,
          "O.FLOW": 11,
          "O.PROTECT": 17,
          "O.ROLBAK": 4
        },
        "OE": {
          "OE.ADMIN": 3,
          "OE.CRYPTO": 3,
          "OE.EAUTH": 3,
          "OE.PHYSICAL": 3,
          "OE.TIME": 3
        },
        "T": {
          "T.CONFLOSS": 5,
          "T.MANDAT": 4,
          "T.NOAUDIT": 2,
          "T.OPS": 7,
          "T.PRIVIL": 7,
          "T.ROUTE": 10
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.3": 1,
          "ADV_TDS.2": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.3": 1,
          "ALC_CMS.3": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR.3": 7,
          "ALC_LCD.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 5,
          "EAL3 augmented": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 6,
          "FAU_ARP.1.1": 1,
          "FAU_GEN.1": 6,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 5,
          "FAU_GEN.2.1": 1,
          "FAU_SAA.1": 5,
          "FAU_SAA.1.1": 1,
          "FAU_SAA.1.2": 1,
          "FAU_SAR.1": 5,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_STG.1": 5,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1
        },
        "FDP": {
          "FDP_IFC.1": 5,
          "FDP_IFC.1.1": 1,
          "FDP_IFF.1": 6,
          "FDP_IFF.1.1": 1,
          "FDP_IFF.1.2": 1,
          "FDP_IFF.1.3": 1,
          "FDP_IFF.1.4": 1,
          "FDP_IFF.1.5": 1,
          "FDP_ROL.1": 5,
          "FDP_ROL.1.1": 1,
          "FDP_ROL.1.2": 1
        },
        "FIA": {
          "FIA_ATD.1": 5,
          "FIA_ATD.1.1": 1,
          "FIA_SOS.1": 5,
          "FIA_SOS.1.1": 1,
          "FIA_UAU.1": 2,
          "FIA_UAU.2": 8,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.5": 5,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UID.1": 1,
          "FIA_UID.2": 7,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF": 10,
          "FMT_MOF.1": 2,
          "FMT_MSA.1": 3,
          "FMT_MSA.3": 10,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD": 27,
          "FMT_MTD.1": 6,
          "FMT_SMF.1": 6,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 5,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_STM.1": 5,
          "FPT_STM.1.1": 1
        },
        "FTA": {
          "FTA_TSE.1": 5,
          "FTA_TSE.1.1": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "This covers all services used to exchange information, including telnet and SSL (which are out of scope), SSH, , and FTP4 . Authentication services can be handled either internally (user selected": 1,
          "accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: \u2022 All": 1,
          "out of scope": 2,
          "which are out of scope), SSH, , and FTP4 ": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 20
        },
        "TLS": {
          "SSL": {
            "SSL": 2
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "JANE MEDEFESSER",
      "/Checked by": "-507199406",
      "/Company": "Juniper Networks, Inc",
      "/CreationDate": "D:20101007131521+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 8.0 for Word",
      "/ModDate": "D:20101007131533+01\u002700\u0027",
      "/Producer": "Acrobat Distiller 8.0.0 (Windows)",
      "/SourceModified": "D:20101007121506",
      "/Subject": "EAL3 Security Target",
      "/Title": "JUNOS 10.0 for M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches",
      "/_Client": "Juniper Network",
      "pdf_file_size_bytes": 525224,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 37
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/crp258.pdf",
  "scheme": "UK",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3+",
      "ALC_FLR.3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/juniper-t009-st-v1.3.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "671c74eace6ff791d339e7e9475c7c8de2673862129bdc1a2c37682f6e9b588e",
      "txt_hash": "7a0a5c1b4d5ecd6f2a0a7ed410e00a63bf7f2b5454a421d0422347400887bef0"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "1201d4e4f56df0b50be6476a5f8288155ac56a5a502cd1a80113a7ea747f0aa1",
      "txt_hash": "081f26e4115295ca6468b11cb77d0957478a6243aeabedf5e58d44530369a942"
    }
  },
  "status": "archived"
}