Juniper Networks JUNOS® 10.4R5 for M-Series, MX-Series, T-Series Routers and EX Series Switches
CSV information ?
Status | archived |
---|---|
Valid from | 10.08.2012 |
Valid until | 19.04.2018 |
Scheme | 🇨🇦 CA |
Manufacturer | Juniper Networks, Inc. |
Category | Network and Network-Related Devices and Systems |
Security level | EAL3+, ALC_FLR.3 |
Heuristics summary ?
Certification report ?
Extracted keywords
Schemes
MACProtocols
SSHSecurity level
EAL 3+, EAL 3, EAL3+, EAL 3 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.3Certificates
383-4-188-CRStandards
ISO/IEC 17025:2005File metadata
Title: | EAL 3 Evaluation of <TOE name and version> |
---|---|
Author: | User |
Creation date: | D:20120810083649-04'00' |
Modification date: | D:20120810083654-04'00' |
Pages: | 13 |
Creator: | Acrobat PDFMaker 9.0 for Word |
Producer: | Acrobat Distiller 9.0.0 (Windows) |
Frontpage
Certificate ID: | 383-4-188-CR |
---|---|
Certification lab: | CANADA |
References
No references.
Security target ?
Extracted keywords
Protocols
SSH, SSLSecurity level
EAL3, EAL3 augmentedClaims
O.FLOW, O.PROTECT, O.EADMIN, O.ACCESS, O.ROLBAK, O.AUDIT, O.CONN, T.ROUTE, T.PRIVIL, T.OPS, T.MANDAT, T.CONFLOSS, T.NOAUDIT, A.LOCATE, A.NOEVIL, A.EAUTH, A.TIME, A.CRYPTO, A.NWCOMP, OE.EAUTH, OE.TIME, OE.CRYPTO, OE.PHYSICAL, OE.ADMIN, OE.NWCOMPSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_ARP.1, FAU_SAR.1, FAU_GEN.2, FAU_SAA.1, FAU_STG.1, FAU_ARP.1.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FDP_IFC.1, FDP_IFF.1, FDP_ROL.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ROL.1.1, FDP_ROL.1.2, FIA_ATD.1, FIA_SOS.1, FIA_UAU.2, FIA_UAU.5, FIA_UID.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UAU.1, FIA_UID.2.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.1, FMT_SMF.1, FMT_MSA.3, FMT_MTD.1, FMT_MOF, FMT_MTD, FMT_SMR.1, FMT_MOF.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.1, FPT_STM.1, FPT_STM.1.1, FTA_TSE.1, FTA_TSE.1.1Certification process
out of scope, which are out of scope), and SSH (which is provided by the operational environment, This covers all services used to exchange information, including telnet and SSL (which are out of scope), and SSH (which is provided by the operational environment). Authentication services can be, accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: AllCertification process
out of scope, which are out of scope), and SSH (which is provided by the operational environment, This covers all services used to exchange information, including telnet and SSL (which are out of scope), and SSH (which is provided by the operational environment). Authentication services can be, accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: AllStandards
CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
Title: | JUNOS 10.4 M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches |
---|---|
Subject: | EAL3 Security Target |
Author: | Juniper |
Creation date: | D:20120725095220-04'00' |
Modification date: | D:20120725095220-04'00' |
Pages: | 39 |
Creator: | Microsoft® Word 2010 |
Producer: | Microsoft® Word 2010 |
References
No references.
Heuristics ?
Extracted SARs
ADV_FSP.3, ALC_DVS.1, ASE_TSS.1, ATE_FUN.1, ATE_DPT.1, ALC_CMC.3, ASE_CCL.1, ASE_INT.1, ADV_TDS.2, AVA_VAN.2, ALC_LCD.1, ALC_CMS.3, ASE_REQ.2, ASE_SPD.1, ALC_DEL.1, AGD_PRE.1, ASE_OBJ.2, AGD_OPE.1, ATE_IND.2, ASE_ECD.1, ALC_FLR.3, ATE_COV.2, ADV_ARC.1CPE matches
Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-2004-0230 | MEDIUM | 5.0 | 2.9 | 18.08.2004 04:00 | ||
CVE-2004-0468 | MEDIUM | 5.0 | 2.9 | 06.12.2004 05:00 | ||
CVE-2013-4686 | HIGH | 7.1 | 6.9 | 11.07.2013 14:55 | ||
CVE-2013-4689 | MEDIUM | 5.1 | 6.4 | 17.10.2013 23:55 | ||
CVE-2013-6014 | CRITICAL | 9.3 | 5.8 | 28.10.2013 22:55 | ||
CVE-2013-6170 | MEDIUM | 4.3 | 2.9 | 17.10.2013 23:55 | ||
CVE-2013-6618 | HIGH | 9.0 | 10.0 | 05.11.2013 20:55 | ||
CVE-2013-7313 | MEDIUM | 5.4 | 6.4 | 23.01.2014 17:55 | ||
CVE-2014-0613 | HIGH | 7.1 | 6.9 | 15.01.2014 16:08 | ||
CVE-2014-0615 | HIGH | 7.2 | 10.0 | 15.01.2014 16:08 | ||
CVE-2014-0616 | HIGH | 7.1 | 6.9 | 15.01.2014 16:08 | ||
CVE-2014-2712 | MEDIUM | 4.3 | 2.9 | 14.04.2014 15:09 | ||
CVE-2014-2714 | HIGH | 7.1 | 6.9 | 14.04.2014 15:09 | ||
CVE-2014-3818 | HIGH | 7.8 | 6.9 | 14.10.2014 14:55 | ||
CVE-2019-0036 | CRITICAL | 9.8 | 5.9 | 10.04.2019 20:29 | ||
CVE-2021-31362 | MEDIUM | 6.5 | 3.6 | 19.10.2021 19:15 | ||
CVE-2021-31372 | HIGH | 8.8 | 5.9 | 19.10.2021 19:15 | ||
CVE-2022-22156 | HIGH | 7.4 | 5.2 | 19.01.2022 01:15 | ||
CVE-2022-22162 | HIGH | 7.8 | 5.9 | 19.01.2022 01:15 | ||
CVE-2022-22163 | MEDIUM | 6.5 | 3.6 | 19.01.2022 01:15 | ||
CVE-2022-22173 | HIGH | 7.5 | 3.6 | 19.01.2022 01:15 | ||
CVE-2022-22181 | MEDIUM | 5.4 | 2.7 | 14.04.2022 16:15 | ||
CVE-2022-22197 | HIGH | 7.5 | 3.6 | 14.04.2022 16:15 | ||
CVE-2022-22208 | MEDIUM | 5.9 | 3.6 | 18.10.2022 03:15 | ||
CVE-2022-22214 | MEDIUM | 6.5 | 3.6 | 20.07.2022 15:15 | ||
CVE-2022-22215 | MEDIUM | 5.5 | 3.6 | 20.07.2022 15:15 | ||
CVE-2022-22220 | MEDIUM | 5.9 | 3.6 | 18.10.2022 03:15 | ||
CVE-2022-22224 | MEDIUM | 6.5 | 3.6 | 18.10.2022 03:15 | ||
CVE-2022-22238 | MEDIUM | 6.5 | 3.6 | 18.10.2022 03:15 | ||
CVE-2022-22241 | CRITICAL | 9.8 | 5.9 | 18.10.2022 03:15 | ||
CVE-2022-22242 | MEDIUM | 6.1 | 2.7 | 18.10.2022 03:15 | ||
CVE-2022-22243 | MEDIUM | 4.3 | 1.4 | 18.10.2022 03:15 | ||
CVE-2022-22244 | MEDIUM | 5.3 | 1.4 | 18.10.2022 03:15 | ||
CVE-2022-22245 | MEDIUM | 4.3 | 1.4 | 18.10.2022 03:15 | ||
CVE-2022-22246 | HIGH | 8.8 | 5.9 | 18.10.2022 03:15 | ||
CVE-2023-22391 | HIGH | 7.5 | 3.6 | 13.01.2023 00:15 | ||
CVE-2023-22395 | MEDIUM | 6.5 | 3.6 | 13.01.2023 00:15 | ||
CVE-2023-22406 | MEDIUM | 6.5 | 3.6 | 13.01.2023 00:15 | ||
CVE-2023-22407 | MEDIUM | 6.5 | 3.6 | 13.01.2023 00:15 |
References ?
No references are available for this certificate.
Updates ?
-
26.04.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'scheme_data': None}
. - The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2022-22208', 'CVE-2022-22238', 'CVE-2022-22246', 'CVE-2023-22407', 'CVE-2022-22163', 'CVE-2022-22220', 'CVE-2023-22406', 'CVE-2022-22156', 'CVE-2022-22224', 'CVE-2004-0468', 'CVE-2022-22173', 'CVE-2022-22197', 'CVE-2022-22215', 'CVE-2022-22241', 'CVE-2023-22395', 'CVE-2022-22245', 'CVE-2021-31362', 'CVE-2022-22214', 'CVE-2021-31372', 'CVE-2023-22391', 'CVE-2022-22181', 'CVE-2022-22162', 'CVE-2022-22244', 'CVE-2022-22243', 'CVE-2022-22242']}
values added.
- The following values were inserted:
-
24.03.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2022-22208', 'CVE-2022-22238', 'CVE-2022-22246', 'CVE-2023-22407', 'CVE-2022-22163', 'CVE-2023-22406', 'CVE-2022-22220', 'CVE-2022-22224', 'CVE-2022-22156', 'CVE-2004-0468', 'CVE-2022-22173', 'CVE-2022-22197', 'CVE-2022-22215', 'CVE-2022-22241', 'CVE-2023-22395', 'CVE-2022-22245', 'CVE-2021-31362', 'CVE-2022-22214', 'CVE-2021-31372', 'CVE-2023-22391', 'CVE-2022-22181', 'CVE-2022-22162', 'CVE-2022-22244', 'CVE-2022-22243', 'CVE-2022-22242']}
values discarded.
- The related_cves property was updated, with the
-
11.02.2023 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.cc.CCCertificate
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.InternalState
. - The following properties were deleted:
['errors']
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.PdfData
.
The computed heuristics were updated.
- The following values were inserted:
{'direct_transitive_cves': None, 'indirect_transitive_cves': None}
. - The _type property was set to
sec_certs.sample.cc.CCCertificate.Heuristics
. - The following properties were deleted:
['direct_dependency_cves', 'indirect_dependency_cves']
.
- The new value is
-
05.02.2023 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
[]
.
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2004-0468', 'CVE-2013-7313', 'CVE-2023-22406', 'CVE-2004-0230', 'CVE-2013-6170', 'CVE-2023-22391', 'CVE-2013-6014', 'CVE-2013-4689', 'CVE-2023-22407', 'CVE-2013-6618', 'CVE-2023-22395', 'CVE-2013-4686']}
values added.
- The errors property was set to
-
26.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/383-4-188%20CR%20v1.0e.pdf, code: 408']
.
- The errors property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
f78145d5d79856030397a11292bbea924c27cd38a3e8ce8764bb2fe7e604b861
. - The st_txt_hash property was set to
2f40d00f6037d7d4bbdea95d84640a4865d4f681d67f0d29ae39db856a3bd3f5
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 817354, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 39, '/Title': 'JUNOS 10.4 M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches', '/Author': 'Juniper', '/Subject': 'EAL3 Security Target', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20120725095220-04'00'", '/ModDate': "D:20120725095220-04'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 5, 'EAL3 augmented': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.3': 7, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 6, 'FAU_ARP.1': 6, 'FAU_SAR.1': 5, 'FAU_GEN.2': 5, 'FAU_SAA.1': 5, 'FAU_STG.1': 5, 'FAU_ARP.1.1': 1, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FDP': {'FDP_IFC.1': 5, 'FDP_IFF.1': 6, 'FDP_ROL.1': 5, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ROL.1.1': 1, 'FDP_ROL.1.2': 1}, 'FIA': {'FIA_ATD.1': 5, 'FIA_SOS.1': 5, 'FIA_UAU.2': 8, 'FIA_UAU.5': 5, 'FIA_UID.2': 7, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.1': 2, 'FIA_UID.2.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_SMF.1': 7, 'FMT_MSA.3': 10, 'FMT_MTD.1': 7, 'FMT_MOF': 10, 'FMT_MTD': 32, 'FMT_SMR.1': 5, 'FMT_MOF.1': 2, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.1': 3}, 'FPT': {'FPT_STM.1': 5, 'FPT_STM.1.1': 1}, 'FTA': {'FTA_TSE.1': 5, 'FTA_TSE.1.1': 1}}, 'cc_claims': {'O': {'O.FLOW': 11, 'O.PROTECT': 15, 'O.EADMIN': 8, 'O.ACCESS': 14, 'O.ROLBAK': 6, 'O.AUDIT': 13, 'O.CONN': 6}, 'T': {'T.ROUTE': 9, 'T.PRIVIL': 7, 'T.OPS': 8, 'T.MANDAT': 3, 'T.CONFLOSS': 5, 'T.NOAUDIT': 2}, 'A': {'A.LOCATE': 4, 'A.NOEVIL': 3, 'A.EAUTH': 2, 'A.TIME': 4, 'A.CRYPTO': 4, 'A.NWCOMP': 2}, 'OE': {'OE.EAUTH': 3, 'OE.TIME': 3, 'OE.CRYPTO': 3, 'OE.PHYSICAL': 3, 'OE.ADMIN': 3, 'OE.NWCOMP': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 13}, 'TLS': {'SSL': {'SSL': 2}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'which are out of scope), and SSH (which is provided by the operational environment': 1, 'This covers all services used to exchange information, including telnet and SSL (which are out of scope), and SSH (which is provided by the operational environment). Authentication services can be': 1, 'accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: All': 1}}}
. - The st_filename property was set to
383-4-188 ST v2.2.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values added.
- The st_download_ok property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/383-4-188%20ST%20v2.2.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values discarded.
- The st_download_ok property was set to
-
24.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
[]
.
- The errors property was set to
-
24.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was updated.
- The st_pdf_hash property was set to
f78145d5d79856030397a11292bbea924c27cd38a3e8ce8764bb2fe7e604b861
. - The st_txt_hash property was set to
2f40d00f6037d7d4bbdea95d84640a4865d4f681d67f0d29ae39db856a3bd3f5
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 817354, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 39, '/Title': 'JUNOS 10.4 M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches', '/Author': 'Juniper', '/Subject': 'EAL3 Security Target', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20120725095220-04'00'", '/ModDate': "D:20120725095220-04'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 5, 'EAL3 augmented': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.3': 7, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 6, 'FAU_ARP.1': 6, 'FAU_SAR.1': 5, 'FAU_GEN.2': 5, 'FAU_SAA.1': 5, 'FAU_STG.1': 5, 'FAU_ARP.1.1': 1, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FDP': {'FDP_IFC.1': 5, 'FDP_IFF.1': 6, 'FDP_ROL.1': 5, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ROL.1.1': 1, 'FDP_ROL.1.2': 1}, 'FIA': {'FIA_ATD.1': 5, 'FIA_SOS.1': 5, 'FIA_UAU.2': 8, 'FIA_UAU.5': 5, 'FIA_UID.2': 7, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.1': 2, 'FIA_UID.2.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_SMF.1': 7, 'FMT_MSA.3': 10, 'FMT_MTD.1': 7, 'FMT_MOF': 10, 'FMT_MTD': 32, 'FMT_SMR.1': 5, 'FMT_MOF.1': 2, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.1': 3}, 'FPT': {'FPT_STM.1': 5, 'FPT_STM.1.1': 1}, 'FTA': {'FTA_TSE.1': 5, 'FTA_TSE.1.1': 1}}, 'cc_claims': {'O': {'O.FLOW': 11, 'O.PROTECT': 15, 'O.EADMIN': 8, 'O.ACCESS': 14, 'O.ROLBAK': 6, 'O.AUDIT': 13, 'O.CONN': 6}, 'T': {'T.ROUTE': 9, 'T.PRIVIL': 7, 'T.OPS': 8, 'T.MANDAT': 3, 'T.CONFLOSS': 5, 'T.NOAUDIT': 2}, 'A': {'A.LOCATE': 4, 'A.NOEVIL': 3, 'A.EAUTH': 2, 'A.TIME': 4, 'A.CRYPTO': 4, 'A.NWCOMP': 2}, 'OE': {'OE.EAUTH': 3, 'OE.TIME': 3, 'OE.CRYPTO': 3, 'OE.PHYSICAL': 3, 'OE.ADMIN': 3, 'OE.NWCOMP': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 13}, 'TLS': {'SSL': {'SSL': 2}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'which are out of scope), and SSH (which is provided by the operational environment': 1, 'This covers all services used to exchange information, including telnet and SSL (which are out of scope), and SSH (which is provided by the operational environment). Authentication services can be': 1, 'accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: All': 1}}}
. - The st_filename property was set to
383-4-188 ST v2.2.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values added.
- The st_download_ok property was set to
-
23.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/383-4-188%20CR%20v1.0e.pdf, code: nok', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/383-4-188%20ST%20v2.2.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values discarded.
- The st_download_ok property was set to
-
23.12.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2004-0468', 'CVE-2013-7313', 'CVE-2004-0230', 'CVE-2013-6170', 'CVE-2013-6014', 'CVE-2013-4689', 'CVE-2013-6618', 'CVE-2013-4686']}
values discarded.
- The related_cves property was updated, with the
-
16.11.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_metadata property was updated, with the
{'/CR date': '10 August 2012', '/CR version': '1.0', '/Certificate date': '10 August 2012', '/Developer name': 'Juniper Networks, Inc.', '/Document number': '383-4-188-CR', '/ETR title, version, date': 'Juniper Networks M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches running JUNOS 10.4R5 Common Criteria EAL3+ Evaluation Technical Report (ETR), Document Version 1.2,', '/Evaluation completion date': '30 July 2012', '/ST Title': 'Juniper Networks Security Target for Juniper Networks M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches running JUNOS 10.4R5', '/ST date': '11 July 2012', '/ST version': 'Version 2.2', '/TOE Version': '5.0', '/TOE name and version': 'Juniper Networks JUNOS® 10.4R5 for M-Series, MX-Series, T-Series Routers and EX Series Switches', '/TOE short name': 'JUNOS® 10.4R5 '}
values inserted.
- The report_metadata property was updated, with the
-
23.10.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2022-22238']}
values added.
- The related_cves property was updated, with the
-
22.10.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2022-22208', 'CVE-2022-22244', 'CVE-2022-22241', 'CVE-2022-22243', 'CVE-2022-22242', 'CVE-2022-22246', 'CVE-2022-22220', 'CVE-2022-22245', 'CVE-2022-22224']}
values added.
- The related_cves property was updated, with the
-
10.10.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
{'_type': 'Set', 'elements': ['cpe:2.3:o:juniper:junos:10.4s:*:*:*:*:*:*:*', 'cpe:2.3:o:juniper:junos:10.4r:*:*:*:*:*:*:*']}
values discarded.
- The cpe_matches property was updated, with the
-
05.10.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'st_convert_garbage': False, 'report_convert_garbage': False}
.
- The following values were inserted:
-
24.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The following values were inserted:
{'report_filename': '383-4-188 CR v1.0e.pdf', 'st_filename': '383-4-188 ST v2.2.pdf'}
. - The st_keywords property was updated, with the
{'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.3': 7}}}}, 'cc_sfr': {'__update__': {'FMT': {'__insert__': {'FMT_MOF': 10, 'FMT_MTD': 32, 'FMT_MOF.1': 2}, '__update__': {'FMT_MTD.1': 7, 'FMT_MSA.1': 3}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.PROTECT': 15, 'O.ACCESS': 14, 'O.AUDIT': 13}}, 'T': {'__update__': {'T.PRIVIL': 7, 'T.MANDAT': 3, 'T.NOAUDIT': 2}}, 'A': {'__update__': {'A.NOEVIL': 3, 'A.EAUTH': 2, 'A.NWCOMP': 2}}, 'OE': {'__delete__': ['OE']}}}, 'vendor': {}, 'crypto_protocol': {'__update__': {'SSH': {'__update__': {'SSH': 13}}}}, 'tee_name': {}, 'standard_id': {'CC': {'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'which are out of scope), and SSH (which is provided by the operational environment': 1, 'This covers all services used to exchange information, including telnet and SSL (which are out of scope), and SSH (which is provided by the operational environment). Authentication services can be': 1}, '__delete__': ['. This covers all services used to exchange information, including telnet and SSL (which are out of scope), and SSH (which is provided by the operational environment', 'xchange. This covers all services used to exchange information, including telnet and SSL (which are out of scope), and SSH (which is provided by the operational environment). Authentication services can be']}}}}
data.
The computed heuristics were updated.
- The cert_id property was set to
383-4-188
.
- The following values were inserted:
-
31.07.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2022-22214', 'CVE-2022-22215']}
values added.
- The related_cves property was updated, with the
-
28.07.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report_extract_ok property was set to
True
. - The errors property was set to
[]
.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 64990, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 13, '/Author': 'User', '/CCEF': 'CGI IT Security Evaluation & Test Facility', '/CR#20date': '10 August 2012', '/CR#20version': '1.0', '/Certificate#20date': '10 August 2012', '/CreationDate': "D:20120810083649-04'00'", '/Creator': 'Acrobat PDFMaker 9.0 for Word', '/Developer#20name': 'Juniper Networks, Inc.', '/Document#20number': '383-4-188-CR', '/ETR#20title,#20version,#20date': 'Juniper Networks M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches running JUNOS 10.4R5 Common Criteria EAL3+ Evaluation Technical Report (ETR), Document Version 1.2,', '/Evaluation#20completion#20date': '30 July 2012', '/ModDate': "D:20120810083654-04'00'", '/Producer': 'Acrobat Distiller 9.0.0 (Windows)', '/ST#20Title': 'Juniper Networks Security Target for Juniper Networks M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches running JUNOS 10.4R5', '/ST#20date': '11 July 2012', '/ST#20version': 'Version 2.2', '/SourceModified': 'D:20120809122721', '/Sponsor': 'Juniper Networks, Inc.', '/TOE#20Version': '5.0', '/TOE#20name#20and#20version': 'Juniper Networks JUNOS® 10.4R5 for M-Series, MX-Series, T-Series Routers and EX Series Switches', '/TOE#20short#20name': 'JUNOS® 10.4R5 ', '/Title': 'EAL 3 Evaluation of <TOE name and version>', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
.
The computed heuristics were updated.
- The cert_lab property was set to
['CANADA']
.
- The report_extract_ok property was set to
-
27.07.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2013-6013', 'CVE-2013-6015', 'CVE-2021-31371', 'CVE-2021-0289', 'CVE-2014-0618', 'CVE-2020-1614', 'CVE-2013-4685', 'CVE-2013-4690', 'CVE-2014-0617', 'CVE-2019-0070', 'CVE-2013-4684', 'CVE-2021-31365', 'CVE-2021-0248', 'CVE-2022-22153', 'CVE-2021-31368', 'CVE-2022-22168', 'CVE-2013-4687', 'CVE-2022-22186', 'CVE-2022-22191', 'CVE-2013-4688', 'CVE-2019-0057', 'CVE-2022-22161', 'CVE-2021-31369']}
values discarded.
- The related_cves property was updated, with the
-
18.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.common_criteria.CommonCriteriaCert
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData
.
The computed heuristics were updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The report_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
.
- The new value is
-
17.07.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report_extract_ok property was set to
False
. - The errors property was set to
["Failed to read metadata of certs/reports/pdf/8a173df48df69805.pdf, error: unsupported operand type(s) for +: 'IndirectObject' and 'list'", "Failed to read metadata of certs/reports/pdf/8a173df48df69805.pdf, error: unsupported operand type(s) for +: 'IndirectObject' and 'list'"]
.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
values inserted. - The report_keywords property was set to
{'cc_cert_id': {'CA': {'383-4-188-CR': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3+': 2, 'EAL 3': 4, 'EAL3+': 1, 'EAL 3 augmented': 2}}, 'cc_sar': {'ALC': {'ALC_FLR.3': 2}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 2}}, 'crypto_protocol': {'SSH': {'SSH': 3}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 17025:2005': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 5, 'EAL3 augmented': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.3': 5, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 6, 'FAU_ARP.1': 6, 'FAU_SAR.1': 5, 'FAU_GEN.2': 5, 'FAU_SAA.1': 5, 'FAU_STG.1': 5, 'FAU_ARP.1.1': 1, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FDP': {'FDP_IFC.1': 5, 'FDP_IFF.1': 6, 'FDP_ROL.1': 5, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ROL.1.1': 1, 'FDP_ROL.1.2': 1}, 'FIA': {'FIA_ATD.1': 5, 'FIA_SOS.1': 5, 'FIA_UAU.2': 8, 'FIA_UAU.5': 5, 'FIA_UID.2': 7, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.1': 2, 'FIA_UID.2.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_SMF.1': 7, 'FMT_MSA.3': 10, 'FMT_MTD.1': 1, 'FMT_SMR.1': 5, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.1': 2}, 'FPT': {'FPT_STM.1': 5, 'FPT_STM.1.1': 1}, 'FTA': {'FTA_TSE.1': 5, 'FTA_TSE.1.1': 1}}, 'cc_claims': {'O': {'O.FLOW': 11, 'O.PROTECT': 17, 'O.EADMIN': 8, 'O.ACCESS': 16, 'O.ROLBAK': 6, 'O.AUDIT': 15, 'O.CONN': 6}, 'T': {'T.ROUTE': 9, 'T.PRIVIL': 9, 'T.OPS': 8, 'T.MANDAT': 5, 'T.CONFLOSS': 5, 'T.NOAUDIT': 4}, 'A': {'A.LOCATE': 4, 'A.NOEVIL': 5, 'A.EAUTH': 4, 'A.TIME': 4, 'A.CRYPTO': 4, 'A.NWCOMP': 4}, 'OE': {'OE': 2, 'OE.EAUTH': 3, 'OE.TIME': 3, 'OE.CRYPTO': 3, 'OE.PHYSICAL': 3, 'OE.ADMIN': 3, 'OE.NWCOMP': 3}}, 'vendor': {'STMicroelectronics': {'STM': 6}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 12}, 'TLS': {'SSL': {'SSL': 2}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, '. This covers all services used to exchange information, including telnet and SSL (which are out of scope), and SSH (which is provided by the operational environment': 1, 'xchange. This covers all services used to exchange information, including telnet and SSL (which are out of scope), and SSH (which is provided by the operational environment). Authentication services can be': 1, 'accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: All': 1}}}
.
The computed heuristics were updated.
- The _type property was set to
Heuristics
. - The cert_lab property was set to
None
.
- The report_extract_ok property was set to
-
14.06.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report_pdf_hash': '9c6dae203d11062a123ce73a602e77a238100532c4de58d8c92aab57caaf17e8', 'st_pdf_hash': 'f78145d5d79856030397a11292bbea924c27cd38a3e8ce8764bb2fe7e604b861', 'report_txt_hash': '050a2ce508f42fc934a825f4bc666b440b35baf1f6794c567182b30e29178252', 'st_txt_hash': '2f40d00f6037d7d4bbdea95d84640a4865d4f681d67f0d29ae39db856a3bd3f5'}
.
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'MAC': 2}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}}
values inserted. - The st_keywords property was updated, with the
{'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'SSL': 2}, 'rules_randomness': {}, 'rules_tee': {'SE': 1}, 'rules_side_channels': {}}
values inserted.
- The following values were inserted:
-
13.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}]}}
.
- The following values were inserted:
-
24.04.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'direct_dependency_cves': None, 'indirect_dependency_cves': None}
.
- The following values were inserted:
-
23.04.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2022-22197', 'CVE-2022-22181', 'CVE-2022-22191', 'CVE-2022-22186']}
values added.
- The related_cves property was updated, with the
-
29.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2021-0289', 'CVE-2022-22168', 'CVE-2004-0468', 'CVE-2021-31365', 'CVE-2021-0248', 'CVE-2022-22162', 'CVE-2021-31371', 'CVE-2021-31369', 'CVE-2022-22153', 'CVE-2022-22173', 'CVE-2021-31372', 'CVE-2004-0230', 'CVE-2021-31368', 'CVE-2022-22163', 'CVE-2022-22161', 'CVE-2022-22156', 'CVE-2021-31362']}
values added.
- The related_cves property was updated, with the
-
28.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2021-0289', 'CVE-2022-22168', 'CVE-2004-0468', 'CVE-2021-31365', 'CVE-2021-0248', 'CVE-2022-22162', 'CVE-2021-31371', 'CVE-2021-31372', 'CVE-2022-22153', 'CVE-2022-22173', 'CVE-2021-31369', 'CVE-2004-0230', 'CVE-2021-31368', 'CVE-2022-22163', 'CVE-2022-22161', 'CVE-2022-22156', 'CVE-2021-31362']}
values discarded.
- The related_cves property was updated, with the
-
08.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}
. - The cert_lab property was set to
['CANADA']
. - The following properties were deleted:
['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting']
.
- The following values were inserted:
-
18.02.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {'cert_id': '383-4-188-CR', 'cert_lab': 'CANADA'}}
values inserted. - The st_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted. - The report_keywords property was updated, with the
{'rules_cert_id': {'383-4-188-CR': 1}}
data.
The computed heuristics were updated.
- The extracted_versions property was set to
{'_type': 'Set', 'elements': ['10.4']}
. - The cpe_matches property was set to
{'_type': 'Set', 'elements': ['cpe:2.3:o:juniper:junos:10.4:*:*:*:*:*:*:*', 'cpe:2.3:o:juniper:junos:10.4s:*:*:*:*:*:*:*', 'cpe:2.3:o:juniper:junos:10.4r:*:*:*:*:*:*:*']}
. - The cert_id property was set to
383-4-188-CR
.
- The report_frontpage property was updated, with the
-
11.02.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
[[1, 'cpe:2.3:o:juniper:junos:10.4r:*:*:*:*:*:*:*'], [2, 'cpe:2.3:o:juniper:junos:10.4s:*:*:*:*:*:*:*']]
values inserted.
- The cpe_matches property was updated, with the
-
03.02.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
[[1, 'cpe:2.3:o:juniper:junos:10.4r:*:*:*:*:*:*:*'], [2, 'cpe:2.3:o:juniper:junos:10.4:*:*:*:*:*:*:*']]
values inserted. - The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2022-22173']}
values added.
- The cpe_matches property was updated, with the
-
02.02.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
[[1, 'cpe:2.3:o:juniper:junos:10.4r:*:*:*:*:*:*:*'], [2, 'cpe:2.3:o:juniper:junos:10.4s:*:*:*:*:*:*:*']]
values inserted.
- The cpe_matches property was updated, with the
-
01.02.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
[[2, 'cpe:2.3:o:juniper:junos:10.4:*:*:*:*:*:*:*']]
values inserted.
- The cpe_matches property was updated, with the
-
30.01.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2022-22163', 'CVE-2022-22153']}
values added.
- The related_cves property was updated, with the
-
28.01.2022 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Juniper Networks JUNOS® 10.4R5 for M-Series, MX-Series, T-Series Routers and EX Series Switches was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": null,
"dgst": "8a173df48df69805",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"cert_id": "383-4-188",
"cert_lab": [
"CANADA"
],
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:juniper:junos:10.4:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"10.4"
]
},
"indirect_transitive_cves": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2022-22224",
"CVE-2014-2714",
"CVE-2022-22245",
"CVE-2014-0615",
"CVE-2013-6014",
"CVE-2013-6618",
"CVE-2022-22163",
"CVE-2022-22208",
"CVE-2022-22215",
"CVE-2022-22156",
"CVE-2013-6170",
"CVE-2022-22238",
"CVE-2021-31362",
"CVE-2014-3818",
"CVE-2004-0230",
"CVE-2022-22173",
"CVE-2004-0468",
"CVE-2022-22242",
"CVE-2023-22395",
"CVE-2022-22243",
"CVE-2023-22391",
"CVE-2022-22162",
"CVE-2019-0036",
"CVE-2022-22241",
"CVE-2022-22244",
"CVE-2014-0616",
"CVE-2013-4686",
"CVE-2022-22181",
"CVE-2013-4689",
"CVE-2021-31372",
"CVE-2022-22220",
"CVE-2013-7313",
"CVE-2014-0613",
"CVE-2022-22214",
"CVE-2022-22246",
"CVE-2023-22407",
"CVE-2022-22197",
"CVE-2014-2712",
"CVE-2023-22406"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Juniper Networks, Inc.",
"manufacturer_web": "https://www.juniper.net/",
"name": "Juniper Networks JUNOS\u00ae 10.4R5 for M-Series, MX-Series, T-Series Routers and EX Series Switches",
"not_valid_after": "2018-04-19",
"not_valid_before": "2012-08-10",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"report_filename": "383-4-188 CR v1.0e.pdf",
"report_frontpage": {
"anssi": {},
"bsi": {},
"canada": {
"cert_id": "383-4-188-CR",
"cert_lab": "CANADA"
},
"niap": {},
"nscib": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"CA": {
"383-4-188-CR": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.3": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 4,
"EAL 3 augmented": 2,
"EAL 3+": 2,
"EAL3+": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 3
}
},
"crypto_scheme": {
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 17025:2005": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "User",
"/CCEF": "CGI IT Security Evaluation \u0026 Test Facility",
"/CR date": "10 August 2012",
"/CR version": "1.0",
"/Certificate date": "10 August 2012",
"/CreationDate": "D:20120810083649-04\u002700\u0027",
"/Creator": "Acrobat PDFMaker 9.0 for Word",
"/Developer name": "Juniper Networks, Inc.",
"/Document number": "383-4-188-CR",
"/ETR title, version, date": "Juniper Networks M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches running JUNOS 10.4R5 Common Criteria EAL3+ Evaluation Technical Report (ETR), Document Version 1.2,",
"/Evaluation completion date": "30 July 2012",
"/ModDate": "D:20120810083654-04\u002700\u0027",
"/Producer": "Acrobat Distiller 9.0.0 (Windows)",
"/ST Title": "Juniper Networks Security Target for Juniper Networks M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches running JUNOS 10.4R5",
"/ST date": "11 July 2012",
"/ST version": "Version 2.2",
"/SourceModified": "D:20120809122721",
"/Sponsor": "Juniper Networks, Inc.",
"/TOE Version": "5.0",
"/TOE name and version": "Juniper Networks JUNOS\u00ae 10.4R5 for M-Series, MX-Series, T-Series Routers and EX Series Switches",
"/TOE short name": "JUNOS\u00ae 10.4R5 ",
"/Title": "EAL 3 Evaluation of \u003cTOE name and version\u003e",
"pdf_file_size_bytes": 64990,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 13
},
"st_filename": "383-4-188 ST v2.2.pdf",
"st_frontpage": {
"anssi": {},
"bsi": {},
"canada": {},
"niap": {},
"nscib": {}
},
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CRYPTO": 4,
"A.EAUTH": 2,
"A.LOCATE": 4,
"A.NOEVIL": 3,
"A.NWCOMP": 2,
"A.TIME": 4
},
"O": {
"O.ACCESS": 14,
"O.AUDIT": 13,
"O.CONN": 6,
"O.EADMIN": 8,
"O.FLOW": 11,
"O.PROTECT": 15,
"O.ROLBAK": 6
},
"OE": {
"OE.ADMIN": 3,
"OE.CRYPTO": 3,
"OE.EAUTH": 3,
"OE.NWCOMP": 3,
"OE.PHYSICAL": 3,
"OE.TIME": 3
},
"T": {
"T.CONFLOSS": 5,
"T.MANDAT": 3,
"T.NOAUDIT": 2,
"T.OPS": 8,
"T.PRIVIL": 7,
"T.ROUTE": 9
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.3": 1,
"ADV_TDS.2": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.3": 1,
"ALC_CMS.3": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR.3": 7,
"ALC_LCD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL3": 5,
"EAL3 augmented": 4
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 6,
"FAU_ARP.1.1": 1,
"FAU_GEN.1": 6,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 5,
"FAU_GEN.2.1": 1,
"FAU_SAA.1": 5,
"FAU_SAA.1.1": 1,
"FAU_SAA.1.2": 1,
"FAU_SAR.1": 5,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_STG.1": 5,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1
},
"FDP": {
"FDP_IFC.1": 5,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 6,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1,
"FDP_ROL.1": 5,
"FDP_ROL.1.1": 1,
"FDP_ROL.1.2": 1
},
"FIA": {
"FIA_ATD.1": 5,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 5,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 2,
"FIA_UAU.2": 8,
"FIA_UAU.2.1": 1,
"FIA_UAU.5": 5,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UID.1": 1,
"FIA_UID.2": 7,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF": 10,
"FMT_MOF.1": 2,
"FMT_MSA.1": 3,
"FMT_MSA.3": 10,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 32,
"FMT_MTD.1": 7,
"FMT_SMF.1": 7,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 5,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM.1": 5,
"FPT_STM.1.1": 1
},
"FTA": {
"FTA_TSE.1": 5,
"FTA_TSE.1.1": 1
}
},
"certification_process": {
"OutOfScope": {
"This covers all services used to exchange information, including telnet and SSL (which are out of scope), and SSH (which is provided by the operational environment). Authentication services can be": 1,
"accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: All": 1,
"out of scope": 2,
"which are out of scope), and SSH (which is provided by the operational environment": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 13
},
"TLS": {
"SSL": {
"SSL": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1,
"CCMB-2009-07-004": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Juniper",
"/CreationDate": "D:20120725095220-04\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20120725095220-04\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Subject": "EAL3 Security Target",
"/Title": "JUNOS 10.4 M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches",
"pdf_file_size_bytes": 817354,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 39
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/383-4-188%20CR%20v1.0e.pdf",
"scheme": "CA",
"security_level": {
"_type": "Set",
"elements": [
"EAL3+",
"ALC_FLR.3"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/383-4-188%20ST%20v2.2.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"report_convert_garbage": false,
"report_convert_ok": true,
"report_download_ok": true,
"report_extract_ok": true,
"report_pdf_hash": "9c6dae203d11062a123ce73a602e77a238100532c4de58d8c92aab57caaf17e8",
"report_txt_hash": "050a2ce508f42fc934a825f4bc666b440b35baf1f6794c567182b30e29178252",
"st_convert_garbage": false,
"st_convert_ok": true,
"st_download_ok": true,
"st_extract_ok": true,
"st_pdf_hash": "f78145d5d79856030397a11292bbea924c27cd38a3e8ce8764bb2fe7e604b861",
"st_txt_hash": "2f40d00f6037d7d4bbdea95d84640a4865d4f681d67f0d29ae39db856a3bd3f5"
},
"status": "archived"
}