Juniper Junos OS 18.1R2 for QFX10002, QFX10008 and QFX10016

Known vulnerabilities detected

Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.

CSV information

Status archived
Valid from 28.01.2019
Valid until 28.01.2021
Scheme 🇺🇸 US
Manufacturer Juniper Networks, Inc.
Category Network and Network-Related Devices and Systems
Security level
Protection profiles

Heuristics summary

Certificate ID: CCEVS-VR-VID-10930-2019

Certificate

Extracted keywords

Certificates
CCEVS-VR-VID10930-2019
Evaluation facilities
Acumen Security

File metadata

Creation date D:20190130140323-05'00'
Modification date D:20190130140323-05'00'
Pages 1
Producer iText 2.1.0 (by lowagie.com)

Certification report

Extracted keywords

Protocols
SSH, SSHv2, SSL

Claims
T.UNAUTHORIZED_ADMINI, T.WEAK_CRYPTOGRAPHY, T.UNTRUSTED_COMMUNIC, T.WEAK_AUTHENTICATION, T.UPDATE_COMPROMISE, T.UNDETECTED_ACTIVITY, T.SECURITY_FUNCTIONALIT, T.PASSWORD_CRACKING, A.PHYSICAL_PROTECTION, A.LIMITED_FUNCTIONALITY, A.NO_THRU_TRAFFIC_PROTECTION, A.TRUSTED_ADMINISTRATOR, A.REGULAR_UPDATES, A.ADMIN_CREDENTIALS_SECURE, A.RESIDUAL_INFORMATION
Certificates
CCEVS-VR-VID10930-2019
Evaluation facilities
Acumen Security

File metadata

Creation date D:20190130140026-05'00'
Modification date D:20190130140026-05'00'
Pages 24

Frontpage

Certificate ID CCEVS-VR-VID10930-2019
Certified item for the Junos OS 18.1R2 for QFX10002, QFX10008 and QFX100016, Version 1.1
Certification lab US NIAP

Security target

Extracted keywords

Symmetric Algorithms
AES, HMAC, HMAC-SHA-256, HMAC-SHA-512
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DH
Hash functions
SHA-1, SHA1, SHA-256, SHA-384, SHA-512
Schemes
MAC, Key Exchange, Key exchange, Key Agreement
Protocols
SSH, SSHv2, SSL, TLS, DTLS
Randomness
DRBG, RNG, RBG
Libraries
OpenSSL
Elliptic Curves
P-256, P-384, P-521
Block cipher modes
CBC, CTR

Claims
T.UNAUTHORIZED_ADMINISTRATOR_ACCESS, T.WEAK_CRYPTOGRAPHY, T.UNTRUSTED_COMMUNICATION_CHANNELS, T.WEAK_AUTHENTICATION_ENDPOINTS, T.UPDATE_COMPROMISE, T.UNDETECTED_ACTIVITY, T.SECURITY_FUNCTIONALITY_COMPROMISE, T.PASSWORD_CRACKING, T.SECURITY_FUNCTIONALITY_FAILURE, A.PHYSICAL_PROTECTION, A.LIMITED_FUNCTIONALITY, A.NO_THRU_TRAFFIC_PROTECTION, A.TRUSTED_ADMINSTRATOR, A.REGULAR_UPDATES, A.ADMIN_CREDENTIALS_SECURE, A.RESIDUAL_INFORMATION, OE.PHYSICAL, OE.NO_GENERAL_PURPOSE, OE.NO_THRU_TRAFFIC_PROTECTION, OE.TRUSTED_ADMIN, OE.UPDATES, OE.ADMIN_CREDENTIALS_SECURE, OE.RESIDUAL_INFORMATION
Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN, FAU_STG_EXT, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_STG_EXT.1, FAU_STG.1, FAU_GEN.2.1, FAU_STG_EXT.1.1, FAU_STG_EXT.1.2, FAU_STG_EXT.1.3, FAU_STG.1.1, FAU_STG.1.2, FCS_CKM, FCS_COP, FCS_RBG_EXT, FCS_SSHS_EXT, FCS_TLSS_EXT.1, FCS_TLSS_EXT.2, FCS_TLSC_EXT.1.2, FCS_TLSC_EXT.2.2, FCS_SSHS_EXT.1.2, FCS_SSHC_EXT.1, FCS_SSHS_EXT.1, FCS_SSHC_EXT.1.8, FCS_SSHS_EXT.1.8, FCS_DTLS, FCS_TLSC_EXT.1.1, FCS_TLSC_EXT.2.1, FCS_TLSS_EXT.1.1, FCS_TLSS_EXT.2.1, FCS_SSHC_EXT.1.9, FCS_TLSS_EXT.2.4, FCS_TLSS_EXT.2.5, FCS_CKM.1, FCS_TLSC_EXT, FCS_SSHS_EXT.1.4, FCS_TLSC_EXT.1, FCS_TLSC_EXT.2, FCS_CKM.2, FCS_CKM.4, FCS_RBG_EXT.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_SSHS_EXT.1.1, FCS_SSHS_EXT.1.3, FCS_SSHS_EXT.1.5, FCS_SSHS_EXT.1.6, FCS_SSHS_EXT.1.7, FIA_AFL, FIA_PMG_EXT, FIA_UIA_EXT, FIA_UAU, FIA_UAU_EXT, FIA_AFL.1, FIA_PMG_EXT.1, FIA_UIA_EXT.1, FIA_UAU_EXT.2, FIA_UAU.7, FIA_AFL.1.1, FIA_AFL.1.2, FIA_PMG_EXT.1.1, FIA_UIA_EXT.1.1, FIA_UIA_EXT.1.2, FIA_UAU_EXT.2.1, FIA_UAU.7.1, FIA_UID.1, FMT_MOF, FMT_MTD, FMT_SMF, FMT_SMR, FMT_SMF.1, FMT_SMR.2, FMT_MOF.1, FMT_MTD.1, FMT_SMF.1.1, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_SMR.1, FPT_SKP_EXT, FPT_APW_EXT, FPT_TST_EXT, FPT_TUD_EXT, FPT_STM_EXT, FPT_STM_EXT.1, FPT_ITT.1, FPT_SKP_EXT.1, FPT_APW_EXT.1, FPT_TST_EXT.1, FPT_TUD_EXT.1, FPT_TUD_EXT.2, FPT_SKP_EXT.1.1, FPT_APW_EXT.1.1, FPT_APW_EXT.1.2, FPT_TST_EXT.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_TUD_EXT.2.1, FPT_TUD_EXT.2.2, FPT_STM_EXT.1.1, FPT_STM_EXT.1.2, FPT_STM.1, FTA_SSL_EXT, FTA_SSL, FTA_TAB, FTA_TAB.1, FTA_SSL_EXT.1, FTA_SSL.3, FTA_SSL.4, FTA_SSL_EXT.1.1, FTP_ITC, FTP_TRP, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_ITC.2

Standards
FIPS PUB 186-4, FIPS 197, FIPS 180-4, FIPS 198-1, FIPS 186-4, SP 800-38A, SP 800-56A, SP 800-90A, PKCS #1, PKCS#1, RFC 6187, RFC 3526, RFC 4253, RFC 5280, RFC3526, RFC 4251, RFC 5656, RFC 4252, RFC 4254, RFC5656, RFC 6668, ISO/IEC 9796-2, ISO/IEC 14888-3, ISO/IEC 18031:2011, X.509, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004

File metadata

Title Security Target Junos OS 18.1R2 for QFX10002, QFX10008 and QFX100016
Subject Junos
Author Denise Cater
Creation date D:20190125200031-05'00'
Modification date D:20190125200031-05'00'
Pages 48
Creator Microsoft® Word for Office 365
Producer Microsoft® Word for Office 365

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

CCEVS-VR-VID-10930-2019

Extracted SARs

ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1, ASE_TSS.1, ATE_IND.1, AVA_VAN.1

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2004-0468
C N
MEDIUM 5.0 2.9 06.12.2004
CVE-2014-9708
C N
MEDIUM 5.0 2.9 31.03.2015
CVE-2018-0031
C N
MEDIUM 5.9 3.6 11.07.2018
CVE-2018-0045
C N
HIGH 8.8 5.9 10.10.2018
CVE-2018-0048
C N
HIGH 7.5 3.6 10.10.2018
CVE-2018-0056
C N
MEDIUM 5.3 3.6 10.10.2018
CVE-2018-0057
C N
CRITICAL 9.6 5.8 10.10.2018
CVE-2018-0058
C N
HIGH 7.5 3.6 10.10.2018
CVE-2018-15504
C N
HIGH 7.5 3.6 18.08.2018
CVE-2018-15505
C N
HIGH 7.5 3.6 18.08.2018
CVE-2019-0012
C N
HIGH 7.5 3.6 15.01.2019
CVE-2019-0019
C N
HIGH 7.5 3.6 10.04.2019
CVE-2019-0031
C N
HIGH 7.5 3.6 10.04.2019
CVE-2019-0035
C N
MEDIUM 6.8 5.9 10.04.2019
CVE-2019-0036
C N
CRITICAL 9.8 5.9 10.04.2019
CVE-2019-0037
C N
HIGH 7.5 3.6 10.04.2019
CVE-2019-0039
C N
HIGH 8.1 5.9 10.04.2019
CVE-2019-0046
C N
MEDIUM 6.5 3.6 11.07.2019
CVE-2019-0047
C N
HIGH 8.8 5.9 09.10.2019
CVE-2019-0049
C N
HIGH 7.5 3.6 11.07.2019
CVE-2019-0053
C N
HIGH 7.8 5.9 11.07.2019
CVE-2019-0059
C N
HIGH 7.5 3.6 09.10.2019
CVE-2019-0061
C N
HIGH 7.8 5.9 09.10.2019
CVE-2019-0062
C N
HIGH 8.8 5.9 09.10.2019
CVE-2019-0073
C N
HIGH 7.1 5.2 09.10.2019
CVE-2020-10188
C N
CRITICAL 9.8 5.9 06.03.2020
CVE-2020-1600
C N
MEDIUM 6.5 3.6 15.01.2020
CVE-2020-1601
C N
HIGH 7.5 3.6 15.01.2020
CVE-2020-1603
C N
HIGH 8.6 4.0 15.01.2020
CVE-2020-1606
C N
HIGH 8.1 5.2 15.01.2020
CVE-2020-1607
C N
MEDIUM 6.1 2.7 15.01.2020
CVE-2020-1613
C N
HIGH 7.5 3.6 08.04.2020
CVE-2020-1619
C N
MEDIUM 6.7 5.9 08.04.2020
CVE-2020-1625
C N
MEDIUM 6.5 3.6 08.04.2020
CVE-2020-1629
C N
MEDIUM 5.9 3.6 08.04.2020
CVE-2020-1630
C N
MEDIUM 5.5 3.6 08.04.2020
CVE-2020-1631
C N
CRITICAL 9.8 5.9 04.05.2020
CVE-2020-1632
C N
HIGH 8.6 4.0 15.04.2020
CVE-2020-1637
C N
MEDIUM 6.5 2.5 08.04.2020
CVE-2020-1641
C N
MEDIUM 6.5 3.6 17.07.2020
CVE-2020-1643
C N
MEDIUM 5.5 3.6 17.07.2020
CVE-2020-1644
C N
HIGH 7.5 3.6 17.07.2020
CVE-2020-1647
C N
CRITICAL 9.8 5.9 17.07.2020
CVE-2020-1653
C N
HIGH 7.5 3.6 17.07.2020
CVE-2020-1654
C N
CRITICAL 9.8 5.9 17.07.2020
CVE-2020-1656
C N
MEDIUM 5.8 6.4 16.10.2020
CVE-2020-1657
C N
MEDIUM 5.0 2.9 16.10.2020
CVE-2020-1664
C N
HIGH 7.2 10.0 16.10.2020
CVE-2020-1671
C N
MEDIUM 5.0 2.9 16.10.2020
CVE-2020-1672
C N
MEDIUM 5.0 2.9 16.10.2020
CVE-2020-1673
C N
HIGH 7.6 10.0 16.10.2020
CVE-2020-1684
C N
HIGH 7.5 3.6 16.10.2020
CVE-2020-1687
C N
LOW 2.9 2.9 16.10.2020
CVE-2021-0204
C N
HIGH 7.2 10.0 15.01.2021
CVE-2021-0208
C N
LOW 3.3 2.9 15.01.2021
CVE-2021-0210
C N
MEDIUM 5.0 2.9 15.01.2021
CVE-2021-0211
C N
MEDIUM 6.4 4.9 15.01.2021
CVE-2021-0214
C N
LOW 3.3 2.9 22.04.2021
CVE-2021-0215
C N
LOW 2.9 2.9 15.01.2021
CVE-2021-0218
C N
HIGH 7.2 10.0 15.01.2021
CVE-2021-0219
C N
HIGH 7.2 10.0 15.01.2021
CVE-2021-0221
C N
MEDIUM 6.5 3.6 15.01.2021
CVE-2021-0223
C N
HIGH 7.2 10.0 15.01.2021
CVE-2021-0224
C N
MEDIUM 6.5 3.6 22.04.2021
CVE-2021-0229
C N
MEDIUM 5.3 1.4 22.04.2021
CVE-2021-0240
C N
MEDIUM 6.5 3.6 22.04.2021
CVE-2021-0241
C N
MEDIUM 6.5 3.6 22.04.2021
CVE-2021-0244
C N
MEDIUM 4.3 2.9 22.04.2021
CVE-2021-0245
C N
HIGH 7.2 10.0 22.04.2021
CVE-2021-0250
C N
MEDIUM 5.0 2.9 22.04.2021
CVE-2021-0254
C N
HIGH 7.5 6.4 22.04.2021
CVE-2021-0255
C N
HIGH 7.8 5.9 22.04.2021
CVE-2021-0256
C N
LOW 2.1 2.9 22.04.2021
CVE-2021-0258
C N
HIGH 7.1 6.9 22.04.2021
CVE-2021-0260
C N
HIGH 7.5 6.4 22.04.2021
CVE-2021-0261
C N
MEDIUM 5.0 2.9 22.04.2021
CVE-2021-0268
C N
CRITICAL 9.3 5.8 22.04.2021
CVE-2021-0269
C N
MEDIUM 5.1 6.4 22.04.2021
CVE-2021-0275
C N
HIGH 9.3 10.0 22.04.2021
CVE-2021-0277
C N
MEDIUM 5.8 6.4 15.07.2021
CVE-2021-0281
C N
HIGH 7.5 3.6 15.07.2021
CVE-2021-0282
C N
HIGH 7.1 6.9 15.07.2021
CVE-2021-0283
C N
HIGH 7.8 6.9 15.07.2021
CVE-2021-31362
C N
LOW 3.3 2.9 19.10.2021
CVE-2021-31372
C N
HIGH 9.0 10.0 19.10.2021
CVE-2021-31374
C N
MEDIUM 5.0 2.9 19.10.2021
CVE-2021-31375
C N
MEDIUM 5.3 1.4 19.10.2021
CVE-2021-31377
C N
LOW 2.1 2.9 19.10.2021
CVE-2021-31378
C N
HIGH 7.5 3.6 19.10.2021
CVE-2022-22154
C N
MEDIUM 6.8 5.9 19.01.2022
CVE-2022-22156
C N
HIGH 7.4 5.2 19.01.2022
CVE-2022-22173
C N
HIGH 7.5 3.6 19.01.2022
CVE-2022-22179
C N
MEDIUM 6.5 3.6 19.01.2022
CVE-2022-22181
C N
MEDIUM 5.4 2.7 14.04.2022
CVE-2022-22208
C N
MEDIUM 5.9 3.6 18.10.2022
CVE-2022-22215
C N
MEDIUM 5.5 3.6 20.07.2022
CVE-2022-22220
C N
MEDIUM 5.9 3.6 18.10.2022
CVE-2022-22224
C N
MEDIUM 6.5 3.6 18.10.2022
CVE-2022-22238
C N
MEDIUM 6.5 3.6 18.10.2022
CVE-2022-22241
C N
CRITICAL 9.8 5.9 18.10.2022
CVE-2022-22242
C N
MEDIUM 6.1 2.7 18.10.2022
CVE-2022-22243
C N
MEDIUM 4.3 1.4 18.10.2022
CVE-2022-22244
C N
MEDIUM 5.3 1.4 18.10.2022
CVE-2022-22245
C N
MEDIUM 4.3 1.4 18.10.2022
CVE-2022-22246
C N
HIGH 8.8 5.9 18.10.2022
CVE-2022-22250
C N
MEDIUM 6.5 3.6 18.10.2022
CVE-2023-0026
C N
HIGH 7.5 3.6 21.06.2023
CVE-2023-22391
C N
HIGH 7.5 3.6 13.01.2023
CVE-2023-22395
C N
MEDIUM 6.5 3.6 13.01.2023
CVE-2023-22406
C N
MEDIUM 6.5 3.6 13.01.2023
CVE-2023-22407
C N
MEDIUM 6.5 3.6 13.01.2023
CVE-2023-28962
C N
CRITICAL 9.8 5.9 17.04.2023
CVE-2023-28963
C N
MEDIUM 5.3 1.4 17.04.2023
CVE-2023-28964
C N
HIGH 7.5 3.6 17.04.2023
CVE-2023-28975
C N
MEDIUM 4.6 3.6 17.04.2023
CVE-2023-28979
C N
MEDIUM 4.7 1.4 17.04.2023
CVE-2023-36839
C N
MEDIUM 6.5 3.6 12.10.2023
CVE-2023-36840
C N
MEDIUM 5.5 3.6 14.07.2023
CVE-2023-36841
C N
HIGH 7.5 3.6 12.10.2023
CVE-2023-36842
C N
MEDIUM 6.5 3.6 12.01.2024
CVE-2023-36843
C N
HIGH 7.5 3.6 12.10.2023
CVE-2023-44175
C N
HIGH 7.5 3.6 12.10.2023
CVE-2023-44176
C N
MEDIUM 5.5 3.6 13.10.2023
CVE-2023-44177
C N
MEDIUM 5.5 3.6 13.10.2023
CVE-2023-44178
C N
MEDIUM 5.5 3.6 13.10.2023
CVE-2023-44182
C N
HIGH 8.8 5.9 13.10.2023
CVE-2023-44184
C N
MEDIUM 6.5 3.6 13.10.2023
CVE-2023-44185
C N
HIGH 7.5 3.6 13.10.2023
CVE-2023-44186
C N
HIGH 7.5 3.6 11.10.2023
CVE-2023-44194
C N
HIGH 7.8 5.9 13.10.2023
CVE-2023-44197
C N
HIGH 7.5 3.6 13.10.2023
CVE-2023-44201
C N
MEDIUM 5.5 3.6 13.10.2023
CVE-2023-4481
C N
HIGH 7.5 3.6 01.09.2023
CVE-2024-21591
C N
CRITICAL 9.8 5.9 12.01.2024
CVE-2024-21594
C N
MEDIUM 5.5 3.6 12.01.2024
CVE-2024-30380
C N
MEDIUM 6.5 3.6 16.04.2024
CVE-2024-30397
C N
HIGH 7.5 3.6 12.04.2024
CVE-2024-39511
C N
MEDIUM 5.5 3.6 10.07.2024
CVE-2024-39514
C N
MEDIUM 6.5 3.6 10.07.2024
CVE-2024-39517
C N
MEDIUM 6.5 3.6 10.07.2024
CVE-2024-39528
C N
MEDIUM 5.7 3.6 11.07.2024
CVE-2024-39549
C N
HIGH 7.5 3.6 11.07.2024
CVE-2024-39555
C N
HIGH 7.5 3.6 10.07.2024
CVE-2024-39556
C N
HIGH 7.0 5.9 10.07.2024
CVE-2024-39558
C N
MEDIUM 6.5 3.6 10.07.2024
Showing 5 out of 145.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10930-ci.pdf",
  "dgst": "1c43338984269361",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-VID-10930-2019",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "eal": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "18.1"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "48ac4778e4272298"
      ]
    },
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2021-0214",
        "CVE-2021-0244",
        "CVE-2024-39549",
        "CVE-2021-0224",
        "CVE-2023-0026",
        "CVE-2023-22391",
        "CVE-2021-31362",
        "CVE-2022-22220",
        "CVE-2023-22406",
        "CVE-2020-1601",
        "CVE-2021-0258",
        "CVE-2018-15504",
        "CVE-2018-0057",
        "CVE-2018-0058",
        "CVE-2022-22245",
        "CVE-2023-36843",
        "CVE-2021-0283",
        "CVE-2023-22395",
        "CVE-2020-1619",
        "CVE-2023-28964",
        "CVE-2023-4481",
        "CVE-2020-1647",
        "CVE-2020-1629",
        "CVE-2023-44201",
        "CVE-2021-0221",
        "CVE-2020-1644",
        "CVE-2020-1631",
        "CVE-2023-36841",
        "CVE-2021-0218",
        "CVE-2021-31375",
        "CVE-2024-39556",
        "CVE-2021-0260",
        "CVE-2023-44197",
        "CVE-2020-1664",
        "CVE-2022-22179",
        "CVE-2020-1673",
        "CVE-2019-0039",
        "CVE-2021-0256",
        "CVE-2022-22246",
        "CVE-2020-1606",
        "CVE-2024-39517",
        "CVE-2022-22154",
        "CVE-2023-36840",
        "CVE-2022-22173",
        "CVE-2022-22215",
        "CVE-2020-1607",
        "CVE-2022-22250",
        "CVE-2022-22156",
        "CVE-2019-0012",
        "CVE-2022-22208",
        "CVE-2021-0250",
        "CVE-2023-28962",
        "CVE-2020-1625",
        "CVE-2021-0219",
        "CVE-2024-39511",
        "CVE-2019-0047",
        "CVE-2018-0045",
        "CVE-2023-28975",
        "CVE-2020-1603",
        "CVE-2021-0275",
        "CVE-2019-0059",
        "CVE-2022-22238",
        "CVE-2021-0261",
        "CVE-2023-28979",
        "CVE-2020-1657",
        "CVE-2020-1671",
        "CVE-2022-22181",
        "CVE-2020-1637",
        "CVE-2019-0031",
        "CVE-2020-1643",
        "CVE-2020-1656",
        "CVE-2022-22224",
        "CVE-2020-1641",
        "CVE-2019-0036",
        "CVE-2019-0046",
        "CVE-2023-44184",
        "CVE-2021-0281",
        "CVE-2019-0053",
        "CVE-2018-0056",
        "CVE-2021-0210",
        "CVE-2019-0062",
        "CVE-2020-1630",
        "CVE-2023-44175",
        "CVE-2019-0019",
        "CVE-2023-44177",
        "CVE-2021-0245",
        "CVE-2021-0255",
        "CVE-2020-1687",
        "CVE-2021-0211",
        "CVE-2019-0073",
        "CVE-2022-22244",
        "CVE-2019-0035",
        "CVE-2021-31372",
        "CVE-2024-21594",
        "CVE-2021-0282",
        "CVE-2023-44186",
        "CVE-2021-0229",
        "CVE-2021-0277",
        "CVE-2021-31377",
        "CVE-2019-0037",
        "CVE-2021-0269",
        "CVE-2021-0215",
        "CVE-2020-1613",
        "CVE-2021-31374",
        "CVE-2024-39558",
        "CVE-2023-22407",
        "CVE-2021-0204",
        "CVE-2024-21591",
        "CVE-2014-9708",
        "CVE-2022-22243",
        "CVE-2020-1672",
        "CVE-2020-1684",
        "CVE-2021-0208",
        "CVE-2022-22242",
        "CVE-2023-44185",
        "CVE-2021-0240",
        "CVE-2024-39514",
        "CVE-2020-1653",
        "CVE-2019-0061",
        "CVE-2020-10188",
        "CVE-2021-0241",
        "CVE-2023-28963",
        "CVE-2018-0031",
        "CVE-2022-22241",
        "CVE-2018-0048",
        "CVE-2024-30380",
        "CVE-2018-15505",
        "CVE-2020-1654",
        "CVE-2004-0468",
        "CVE-2023-36839",
        "CVE-2024-39528",
        "CVE-2023-44178",
        "CVE-2023-36842",
        "CVE-2019-0049",
        "CVE-2023-44182",
        "CVE-2020-1600",
        "CVE-2020-1632",
        "CVE-2021-0254",
        "CVE-2021-31378",
        "CVE-2021-0268",
        "CVE-2023-44176",
        "CVE-2023-44194",
        "CVE-2021-0223",
        "CVE-2024-39555",
        "CVE-2024-30397"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Juniper Networks, Inc.",
  "manufacturer_web": "https://www.juniper.net/",
  "name": "Juniper Junos OS 18.1R2 for QFX10002, QFX10008 and QFX10016",
  "not_valid_after": "2021-01-28",
  "not_valid_before": "2019-01-28",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "st_vid10930-ci.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID10930-2019": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Acumen": {
          "Acumen Security": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20190130140323-05\u002700\u0027",
      "/ModDate": "D:20190130140323-05\u002700\u0027",
      "/Producer": "iText 2.1.0 (by lowagie.com)",
      "pdf_file_size_bytes": 181078,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "st_vid10930-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-VID10930-2019",
        "cert_item": "for the Junos OS 18.1R2 for QFX10002, QFX10008 and QFX100016, Version 1.1",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID10930-2019": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.ADMIN_CREDENTIALS_SECURE": 1,
          "A.LIMITED_FUNCTIONALITY": 1,
          "A.NO_THRU_TRAFFIC_PROTECTION": 1,
          "A.PHYSICAL_PROTECTION": 1,
          "A.REGULAR_UPDATES": 1,
          "A.RESIDUAL_INFORMATION": 1,
          "A.TRUSTED_ADMINISTRATOR": 1
        },
        "T": {
          "T.PASSWORD_CRACKING": 1,
          "T.SECURITY_FUNCTIONALIT": 2,
          "T.UNAUTHORIZED_ADMINI": 1,
          "T.UNDETECTED_ACTIVITY": 1,
          "T.UNTRUSTED_COMMUNIC": 1,
          "T.UPDATE_COMPROMISE": 1,
          "T.WEAK_AUTHENTICATION": 1,
          "T.WEAK_CRYPTOGRAPHY": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 5,
          "SSHv2": 1
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Acumen": {
          "Acumen Security": 4
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20190130140026-05\u002700\u0027",
      "/ModDate": "D:20190130140026-05\u002700\u0027",
      "pdf_file_size_bytes": 730975,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 24
    },
    "st_filename": "st_vid10930-st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 5
          },
          "ECDH": {
            "ECDH": 2
          },
          "ECDSA": {
            "ECDSA": 9
          }
        },
        "FF": {
          "DH": {
            "DH": 2,
            "Diffie-Hellman": 4
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ADMIN_CREDENTIALS_SECURE": 1,
          "A.LIMITED_FUNCTIONALITY": 1,
          "A.NO_THRU_TRAFFIC_PROTECTION": 1,
          "A.PHYSICAL_PROTECTION": 1,
          "A.REGULAR_UPDATES": 1,
          "A.RESIDUAL_INFORMATION": 1,
          "A.TRUSTED_ADMINSTRATOR": 1
        },
        "OE": {
          "OE.ADMIN_CREDENTIALS_SECURE": 1,
          "OE.NO_GENERAL_PURPOSE": 1,
          "OE.NO_THRU_TRAFFIC_PROTECTION": 1,
          "OE.PHYSICAL": 1,
          "OE.RESIDUAL_INFORMATION": 1,
          "OE.TRUSTED_ADMIN": 1,
          "OE.UPDATES": 1
        },
        "T": {
          "T.PASSWORD_CRACKING": 1,
          "T.SECURITY_FUNCTIONALITY_COMPROMISE": 1,
          "T.SECURITY_FUNCTIONALITY_FAILURE": 1,
          "T.UNAUTHORIZED_ADMINISTRATOR_ACCESS": 1,
          "T.UNDETECTED_ACTIVITY": 1,
          "T.UNTRUSTED_COMMUNICATION_CHANNELS": 1,
          "T.UPDATE_COMPROMISE": 1,
          "T.WEAK_AUTHENTICATION_ENDPOINTS": 1,
          "T.WEAK_CRYPTOGRAPHY": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.1": 1,
          "ALC_CMS.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.1": 1,
          "ASE_REQ.1": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_IND.1": 1
        },
        "AVA": {
          "AVA_VAN.1": 1
        }
      },
      "cc_security_level": {},
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 2,
          "FAU_GEN.1": 9,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 5,
          "FAU_GEN.2.1": 1,
          "FAU_STG.1": 5,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG_EXT": 2,
          "FAU_STG_EXT.1": 5,
          "FAU_STG_EXT.1.1": 1,
          "FAU_STG_EXT.1.2": 1,
          "FAU_STG_EXT.1.3": 1
        },
        "FCS": {
          "FCS_CKM": 2,
          "FCS_CKM.1": 18,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 8,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.4": 11,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 29,
          "FCS_COP.1": 6,
          "FCS_DTLS": 1,
          "FCS_RBG_EXT": 2,
          "FCS_RBG_EXT.1": 7,
          "FCS_RBG_EXT.1.1": 2,
          "FCS_RBG_EXT.1.2": 1,
          "FCS_SSHC_EXT.1": 4,
          "FCS_SSHC_EXT.1.8": 2,
          "FCS_SSHC_EXT.1.9": 1,
          "FCS_SSHS_EXT": 2,
          "FCS_SSHS_EXT.1": 8,
          "FCS_SSHS_EXT.1.1": 1,
          "FCS_SSHS_EXT.1.2": 3,
          "FCS_SSHS_EXT.1.3": 1,
          "FCS_SSHS_EXT.1.4": 3,
          "FCS_SSHS_EXT.1.5": 1,
          "FCS_SSHS_EXT.1.6": 1,
          "FCS_SSHS_EXT.1.7": 1,
          "FCS_SSHS_EXT.1.8": 3,
          "FCS_TLSC_EXT": 1,
          "FCS_TLSC_EXT.1": 1,
          "FCS_TLSC_EXT.1.1": 2,
          "FCS_TLSC_EXT.1.2": 1,
          "FCS_TLSC_EXT.2": 1,
          "FCS_TLSC_EXT.2.1": 2,
          "FCS_TLSC_EXT.2.2": 1,
          "FCS_TLSS_EXT.1": 1,
          "FCS_TLSS_EXT.1.1": 1,
          "FCS_TLSS_EXT.2": 3,
          "FCS_TLSS_EXT.2.1": 1,
          "FCS_TLSS_EXT.2.4": 2,
          "FCS_TLSS_EXT.2.5": 2
        },
        "FIA": {
          "FIA_AFL": 2,
          "FIA_AFL.1": 8,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_PMG_EXT": 2,
          "FIA_PMG_EXT.1": 5,
          "FIA_PMG_EXT.1.1": 1,
          "FIA_UAU": 2,
          "FIA_UAU.7": 5,
          "FIA_UAU.7.1": 1,
          "FIA_UAU_EXT": 2,
          "FIA_UAU_EXT.2": 5,
          "FIA_UAU_EXT.2.1": 1,
          "FIA_UIA_EXT": 2,
          "FIA_UIA_EXT.1": 11,
          "FIA_UIA_EXT.1.1": 1,
          "FIA_UIA_EXT.1.2": 1,
          "FIA_UID.1": 3
        },
        "FMT": {
          "FMT_MOF": 20,
          "FMT_MOF.1": 3,
          "FMT_MTD": 14,
          "FMT_MTD.1": 2,
          "FMT_SMF": 2,
          "FMT_SMF.1": 14,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 2,
          "FMT_SMR.1": 5,
          "FMT_SMR.2": 12,
          "FMT_SMR.2.1": 1,
          "FMT_SMR.2.2": 1,
          "FMT_SMR.2.3": 1
        },
        "FPT": {
          "FPT_APW_EXT": 2,
          "FPT_APW_EXT.1": 5,
          "FPT_APW_EXT.1.1": 1,
          "FPT_APW_EXT.1.2": 1,
          "FPT_ITT.1": 2,
          "FPT_SKP_EXT": 2,
          "FPT_SKP_EXT.1": 5,
          "FPT_SKP_EXT.1.1": 1,
          "FPT_STM.1": 2,
          "FPT_STM_EXT": 2,
          "FPT_STM_EXT.1": 8,
          "FPT_STM_EXT.1.1": 1,
          "FPT_STM_EXT.1.2": 1,
          "FPT_TST_EXT": 2,
          "FPT_TST_EXT.1": 6,
          "FPT_TST_EXT.1.1": 1,
          "FPT_TUD_EXT": 2,
          "FPT_TUD_EXT.1": 9,
          "FPT_TUD_EXT.1.1": 1,
          "FPT_TUD_EXT.1.2": 1,
          "FPT_TUD_EXT.1.3": 1,
          "FPT_TUD_EXT.2": 6,
          "FPT_TUD_EXT.2.1": 1,
          "FPT_TUD_EXT.2.2": 1
        },
        "FTA": {
          "FTA_SSL": 2,
          "FTA_SSL.3": 7,
          "FTA_SSL.4": 6,
          "FTA_SSL_EXT": 2,
          "FTA_SSL_EXT.1": 6,
          "FTA_SSL_EXT.1.1": 1,
          "FTA_TAB": 2,
          "FTA_TAB.1": 10
        },
        "FTP": {
          "FTP_ITC": 2,
          "FTP_ITC.1": 24,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_ITC.2": 6,
          "FTP_TRP": 8,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        },
        "CTR": {
          "CTR": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 5
        }
      },
      "crypto_protocol": {
        "SSH": {
          "SSH": 88,
          "SSHv2": 11
        },
        "TLS": {
          "DTLS": {
            "DTLS": 2
          },
          "SSL": {
            "SSL": 2
          },
          "TLS": {
            "TLS": 7
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "KEX": {
          "Key Exchange": 2,
          "Key exchange": 1
        },
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 12,
          "P-384": 8,
          "P-521": 8
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1,
            "SHA1": 5
          },
          "SHA2": {
            "SHA-256": 5,
            "SHA-384": 4,
            "SHA-512": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 4
        },
        "RNG": {
          "RBG": 2,
          "RNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 1,
          "CCMB-2012-09-003": 1,
          "CCMB-2012-09-004": 1
        },
        "FIPS": {
          "FIPS 180-4": 3,
          "FIPS 186-4": 2,
          "FIPS 197": 2,
          "FIPS 198-1": 3,
          "FIPS PUB 186-4": 6
        },
        "ISO": {
          "ISO/IEC 14888-3": 1,
          "ISO/IEC 18031:2011": 2,
          "ISO/IEC 9796-2": 1
        },
        "NIST": {
          "SP 800-38A": 2,
          "SP 800-56A": 1,
          "SP 800-90A": 2
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS#1": 1
        },
        "RFC": {
          "RFC 3526": 2,
          "RFC 4251": 2,
          "RFC 4252": 1,
          "RFC 4253": 3,
          "RFC 4254": 1,
          "RFC 5280": 4,
          "RFC 5656": 1,
          "RFC 6187": 1,
          "RFC 6668": 1,
          "RFC3526": 1,
          "RFC5656": 1
        },
        "X509": {
          "X.509": 7
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 9
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 1,
            "HMAC-SHA-256": 2,
            "HMAC-SHA-512": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Denise Cater",
      "/CreationDate": "D:20190125200031-05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Office 365",
      "/ModDate": "D:20190125200031-05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Office 365",
      "/Subject": "Junos",
      "/Title": "Security Target Junos OS 18.1R2 for QFX10002, QFX10008 and QFX100016",
      "pdf_file_size_bytes": 912891,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=328",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=353",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=349",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=330",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=327",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=287",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=348",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=263",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=345",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=352",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=296",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=344",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=266",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=351",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=265",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=347",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=346",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=343",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=262",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=234",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=350",
          "http://www.juniper.net/",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=295",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=297",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=268",
          "https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=329"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 48
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.0E.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10930-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": []
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10930-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4838d760dee0e3095d39d82ebc824e6dccd45dd9992827a7a31b629f2ba23a2d",
      "txt_hash": "5ffdd79da1509b09a20732784974b8b8eb6cc2736718dc9cb1a37766a48bfd91"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "69620cc0d777c6a3074d49b456d544e14cd2af26ae74f1186240f901b7f1cbe2",
      "txt_hash": "ee05de55b440b343912d3e7f97a70409d839fc3f1ade8786ab2f5c62a18a58c6"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "dde8ab31bae3cdfd60ea9f1c66af9921a3a4aea63136e127de2e0c596d9afa4d",
      "txt_hash": "a6950d461dd5153f6d4cbe1bb5f59092df8f885bfc59a93280180b324d1d1c04"
    }
  },
  "status": "archived"
}