Networks Appliances: ISG 1000, ISG2000, NetScreen 5200, NetScreen 5400, SSG5, SSG20, SSG140, SSG320M, SSG350M, SSG520M and SSG550M with ScreenOS Version 6.3
CSV information ?
Status | archived |
---|---|
Valid from | 28.06.2012 |
Valid until | 01.11.2014 |
Scheme | 🇺🇸 US |
Manufacturer | Juniper Networks, Inc. |
Category | Boundary Protection Devices and Systems |
Security level | EAL2+, ALC_FLR.2 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AESHash functions
SHA-1Protocols
SSH, VPNSecurity level
EAL 2, EAL4, EAL 2 augmentedClaims
T.NOAUTH, T.REPEAT, T.REPLAY, T.ASPOOF, T.MEDIAT, T.OLDINF, T.PROCOM, T.AUDACC, T.SELPRO, T.AUDFUL, A.PHYSEC, A.LOWEXP, A.GENPUR, A.PUBLIC, A.NOEVIL, A.SINGEN, A.DIRECT, A.NOREMO, A.REMACCSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_TDS, AGD_OPE, AGD_PRE, ALC_FLR.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_FLR, ATE_COV, ATE_FUN, ATE_IND, AVA_VANCertificates
CCEVS-VR-10452-2012Standards
FIPS 140-2, FIPS 140, RFC 2406, RFC 2404File metadata
Author | Mallett, Patrick W. |
---|---|
Creation date | D:20121005092651 |
Modification date | D:20121005092651 |
Pages | 20 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
Frontpage
Certificate ID | CCEVS-VR-10452-2012 |
---|---|
Certified item | Juniper Networks Security Appliances |
Certification lab | US NIAP |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, HMACAsymmetric Algorithms
ECDSAHash functions
SHA-1, SHA-256, SHA256, MD5Protocols
SSH, IKE, VPNElliptic Curves
P-256, secp256r1Security level
EAL2, EAL4, EAL 2, EAL2 augmented, EAL 2 augmentedClaims
O.INTEGRITY, O.IDAUTH, O.SINUSE, O.MEDIAT, O.SECSTA, O.ENCRYP, O.SELPRO, O.AUDREC, O.ACCOUN, O.SECFUN, O.LIMEXT, O.GUIDAN, O.ADMTRA, T.NOAUTH, T.REPEAT, T.REPLAY, T.ASPOOF, T.MEDIAT, T.OLDINF, T.PROCOM, T.AUDACC, T.SELPRO, T.AUDFUL, A.PHYSEC, A.LOWEXP, A.GENPUR, A.PUBLIC, A.NOEVIL, A.SINGEN, A.DIRECT, A.NOREMO, A.REMACCSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_TDS, ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_FLR, ALC_CMC.2, ALC_CMS.4, ALC_CMS.2, ALC_DEL.1, ATE_COV, ATE_FUN, ATE_IND, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN, AVA_VAN.2Security Functional Requirements (SFR)
FAU_GEN, FAU_SAR, FAU_STG, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.3.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.4.1, FAU_SAR.1, FAU_SAR.3, FAU_STG.1, FAU_STG.4, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.4, FDP_ACC.1, FDP_IFC.1, FDP_IFF.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FDP_RIP, FDP_RIP.2.1, FDP_RIP.1, FDP_RIP.2, FDP_ITC.1, FDP_ITC.2, FIA_AFL, FIA_ATD, FIA_UAU, FIA_UID, FIA_UID.2, FIA_UAU.1, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.2.1, FIA_UAU.4.1, FIA_ATD.1, FIA_UAU.4, FMT_MOF, FMT_MSA, FMT_SMR, FMT_SMF, FMT_SMR.1, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_MSA.3, FPT_STM, FPT_STM.1, FPT_STM.1.1, FPT_RVM.1Side-channel analysis
physical tamperingStandards
FIPS 140-2, FIPS 197, FIPS PUB 140-2, FIPS 186-3, FIPS 180-2, SP 800-67, RFC 2406, RFC 2404File metadata
Title | Security Appliances Security Target |
---|---|
Subject | Security Target |
Author | Neal |
Creation date | D:20121005092759 |
Modification date | D:20121005092759 |
Pages | 57 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
Heuristics ?
Extracted SARs
ATE_FUN.1, ADV_ARC.1, AVA_VAN.2, ATE_COV.1, ALC_CMC.2, AGD_OPE.1, AGD_PRE.1, ADV_TDS.1, ALC_FLR.2, ALC_DEL.1, ADV_FSP.2, ALC_CMS.4, ATE_IND.2CPE matches
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0r10:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0r11:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0r12:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0r13:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0r14:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0r15:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0r16:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0r17:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0r18:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0r19:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0r1:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0r21:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0r22:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0r23:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0r23:b:*:*:*:*:*:*
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0r24:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0r24:b:*:*:*:*:*:*
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0r25:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0r26:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0r27:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0r2:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0r3:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0r4:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0r5:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0r6:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0r7:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0r8:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:netscreen_screenos:6.3.0r9:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0:r10:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0:r11:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0:r12:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0:r13:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0:r14:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0:r15:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0:r16:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0:r17:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0:r18:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0:r19:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0:r20:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0:r21:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0:r22:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0:r23:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0:r23b:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0:r4:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0:r5:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0:r6:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0:r7:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0:r8:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0:r9:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0r10:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0r11:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0r12:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0r13:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0r14:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0r15:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0r16:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0r17:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0r18:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0r19:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0r1:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0r21:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0r22:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0r23:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0r23b:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0r24:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0r24b:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0r25:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0r26:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0r27:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0r2:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0r3:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0r4:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0r5:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0r6:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0r7:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0r8:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:screenos:6.3.0r9:*:*:*:*:*:*:*
Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-2013-7313 | MEDIUM | 5.4 | 6.4 | 23.01.2014 17:55 | ||
CVE-2014-2842 | HIGH | 7.8 | 6.9 | 15.04.2014 14:55 | ||
CVE-2015-7750 | MEDIUM | 5.0 | 2.9 | 19.10.2015 18:59 | ||
CVE-2015-7754 | HIGH | 8.1 | 5.9 | 08.01.2016 19:59 | ||
CVE-2015-7755 | HIGH | 10.0 | 10.0 | 19.12.2015 14:59 | ||
CVE-2015-7756 | MEDIUM | 5.0 | 2.9 | 19.12.2015 14:59 | ||
CVE-2016-1268 | HIGH | 7.5 | 3.6 | 15.04.2016 14:59 | ||
CVE-2017-2335 | MEDIUM | 5.4 | 2.7 | 17.07.2017 13:18 | ||
CVE-2017-2336 | MEDIUM | 5.4 | 2.7 | 17.07.2017 13:18 | ||
CVE-2017-2337 | MEDIUM | 5.4 | 2.7 | 17.07.2017 13:18 | ||
CVE-2017-2338 | MEDIUM | 5.4 | 2.7 | 17.07.2017 13:18 | ||
CVE-2017-2339 | MEDIUM | 5.4 | 2.7 | 17.07.2017 13:18 | ||
CVE-2018-0014 | MEDIUM | 6.5 | 3.6 | 10.01.2018 22:29 | ||
CVE-2018-0059 | MEDIUM | 5.4 | 2.7 | 10.10.2018 18:29 |
Similar certificates
Scheme data ?
Product | Juniper Networks Security Appliances: ISG 1000, ISG2000, NetScreen 5200, NetScreen 5400, SSG5, SSG20, SSG140, SSG320M, SSG350M, SSG520M and SSG550M with ScreenOS Version 6.3 | |
---|---|---|
Id | CCEVS-VR-VID10452 | |
Url | https://www.niap-ccevs.org/product/10452 | |
Certification Date | 28.06.2012 | |
Expiration Date | 01.11.2014 | |
Category | Firewall | |
Vendor | Juniper Networks, Inc. | |
Evaluation Facility | Leidos Common Criteria Testing Laboratory | |
Scheme | US |
References ?
No references are available for this certificate.
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2012-06-28', 'expiration_date': '2014-11-01'}
data.
- The scheme_data property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2018-0059', 'CVE-2016-1268']}
values added.
- The related_cves property was updated, with the
-
30.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2018-0059', 'CVE-2016-1268']}
values discarded.
- The related_cves property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '27e557bd175669fee514f83906abfe851a0141f53b26410c08b2f1b07250f9b1', 'txt_hash': 'c65fc270ead3569bf09ebbaf0b1d0b9e0d84dbc771f6d09f24a320078d8293ce'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '9ba112f692be672c7168870d452801bb50f4dde94584eb6c476ab0588ec611b2', 'txt_hash': '2e14d7093da2bb456a45860743c7a7ee9bb233644f475b1af6713f7aee22dca0'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 329777, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 20, '/Author': 'Mallett, Patrick W.', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20121005092651', '/ModDate': 'D:20121005092651', '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 867098, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 57, '/Title': 'Security Appliances Security Target', '/Author': 'Neal', '/Subject': 'Security Target', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20121005092759', '/ModDate': 'D:20121005092759', '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'US': {'cert_id': 'CCEVS-VR-10452-2012', 'cert_item': 'Juniper Networks Security Appliances', 'cert_lab': 'US NIAP'}}
. - The report_keywords property was set to
{'cc_cert_id': {'US': {'CCEVS-VR-10452-2012': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 2, 'EAL4': 2, 'EAL 2 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.2': 4, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_FLR': 1}, 'ATE': {'ATE_COV': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN': 1}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.NOAUTH': 1, 'T.REPEAT': 1, 'T.REPLAY': 1, 'T.ASPOOF': 1, 'T.MEDIAT': 1, 'T.OLDINF': 1, 'T.PROCOM': 1, 'T.AUDACC': 1, 'T.SELPRO': 1, 'T.AUDFUL': 1}, 'A': {'A.PHYSEC': 1, 'A.LOWEXP': 1, 'A.GENPUR': 1, 'A.PUBLIC': 1, 'A.NOEVIL': 1, 'A.SINGEN': 1, 'A.DIRECT': 1, 'A.NOREMO': 1, 'A.REMACC': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 4}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 8}, 'VPN': {'VPN': 8}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 3, 'FIPS 140': 1}, 'RFC': {'RFC 2406': 1, 'RFC 2404': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1, 'EAL4': 1, 'EAL 2': 1, 'EAL2 augmented': 1, 'EAL 2 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_TDS': 1, 'ADV_ARC.1': 10, 'ADV_FSP.2': 11, 'ADV_TDS.1': 11}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 10, 'AGD_PRE.1': 6}, 'ALC': {'ALC_FLR.2': 15, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_FLR': 1, 'ALC_CMC.2': 8, 'ALC_CMS.4': 1, 'ALC_CMS.2': 5, 'ALC_DEL.1': 5}, 'ATE': {'ATE_COV': 1, 'ATE_FUN': 1, 'ATE_IND': 1, 'ATE_COV.1': 4, 'ATE_FUN.1': 8, 'ATE_IND.2': 7}, 'AVA': {'AVA_VAN': 1, 'AVA_VAN.2': 7}}, 'cc_sfr': {'FAU': {'FAU_GEN': 4, 'FAU_SAR': 8, 'FAU_STG': 8, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.1': 2, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.3.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.4.1': 1, 'FAU_SAR.1': 1, 'FAU_SAR.3': 1, 'FAU_STG.1': 1, 'FAU_STG.4': 1}, 'FCS': {'FCS_COP.1': 18, 'FCS_COP.1.1': 2, 'FCS_CKM.1': 2, 'FCS_CKM.4': 2}, 'FDP': {'FDP_ACC.1': 3, 'FDP_IFC.1': 15, 'FDP_IFF.1': 14, 'FDP_IFC.1.1': 2, 'FDP_IFF.1.1': 2, 'FDP_IFF.1.2': 2, 'FDP_IFF.1.3': 2, 'FDP_IFF.1.4': 2, 'FDP_IFF.1.5': 2, 'FDP_IFF.1.6': 2, 'FDP_RIP': 3, 'FDP_RIP.2.1': 1, 'FDP_RIP.1': 1, 'FDP_RIP.2': 2, 'FDP_ITC.1': 1, 'FDP_ITC.2': 1}, 'FIA': {'FIA_AFL': 4, 'FIA_ATD': 4, 'FIA_UAU': 8, 'FIA_UID': 4, 'FIA_UID.2': 3, 'FIA_UAU.1': 2, 'FIA_AFL.1': 2, 'FIA_AFL.1.1': 2, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 2, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UID.2.1': 1, 'FIA_UAU.4.1': 1, 'FIA_ATD.1': 3, 'FIA_UAU.4': 3}, 'FMT': {'FMT_MOF': 4, 'FMT_MSA': 4, 'FMT_SMR': 4, 'FMT_SMF': 4, 'FMT_SMR.1': 2, 'FMT_MOF.1': 2, 'FMT_MOF.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 3, 'FMT_MSA.3': 3}, 'FPT': {'FPT_STM': 4, 'FPT_STM.1': 2, 'FPT_STM.1.1': 1, 'FPT_RVM.1': 1}}, 'cc_claims': {'O': {'O.INTEGRITY': 4, 'O.IDAUTH': 1, 'O.SINUSE': 1, 'O.MEDIAT': 1, 'O.SECSTA': 1, 'O.ENCRYP': 1, 'O.SELPRO': 1, 'O.AUDREC': 1, 'O.ACCOUN': 1, 'O.SECFUN': 1, 'O.LIMEXT': 1, 'O.GUIDAN': 1, 'O.ADMTRA': 1}, 'T': {'T.NOAUTH': 1, 'T.REPEAT': 1, 'T.REPLAY': 1, 'T.ASPOOF': 1, 'T.MEDIAT': 1, 'T.OLDINF': 1, 'T.PROCOM': 1, 'T.AUDACC': 1, 'T.SELPRO': 1, 'T.AUDFUL': 1}, 'A': {'A.PHYSEC': 2, 'A.LOWEXP': 2, 'A.GENPUR': 2, 'A.PUBLIC': 2, 'A.NOEVIL': 2, 'A.SINGEN': 2, 'A.DIRECT': 2, 'A.NOREMO': 2, 'A.REMACC': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 12}}, 'DES': {'DES': {'DES': 1}}, 'constructions': {'MAC': {'HMAC': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-256': 3, 'SHA256': 1}}, 'MD': {'MD5': {'MD5': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 25}, 'IKE': {'IKE': 3}, 'VPN': {'VPN': 76}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {'NIST': {'P-256': 4, 'secp256r1': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 5, 'FIPS 197': 2, 'FIPS PUB 140-2': 6, 'FIPS 186-3': 1, 'FIPS 180-2': 1}, 'NIST': {'SP 800-67': 2}, 'RFC': {'RFC 2406': 2, 'RFC 2404': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
st_vid10452-vr.pdf
. - The st_filename property was set to
st_vid10452-st.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['US']
. - The cert_id property was set to
CCEVS-VR-10452-2012
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10452-vr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10452-st.pdf
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}]}
values discarded.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Networks Appliances: ISG 1000, ISG2000, NetScreen 5200, NetScreen 5400, SSG5, SSG20, SSG140, SSG320M, SSG350M, SSG520M and SSG550M with ScreenOS Version 6.3 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Boundary Protection Devices and Systems",
"cert_link": null,
"dgst": "2874fcfdedc57721",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CCEVS-VR-10452-2012",
"cert_lab": [
"US"
],
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:juniper:screenos:6.3.0:r21:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r24:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r12:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r9:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r14:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0:r4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0:r17:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r21:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r4:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0:r9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r23:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0r21:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r7:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r6:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0r13:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0r2:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0r9:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r24b:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0:r15:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0r25:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0:r18:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0:r20:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0r4:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0r5:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r2:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0r10:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0r15:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0r27:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r11:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0:r23:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0:r13:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0r23:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0r14:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r13:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r17:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0:r11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0r19:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0:r10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0:r19:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0r12:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0:r23b:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r15:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0r7:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0r3:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0:r14:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0r26:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0:r8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0:r6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r8:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0:r7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r3:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r22:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0r18:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r10:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0:r16:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r16:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r18:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0r16:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r1:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0r24:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0r22:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r26:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r25:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r23b:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0:r5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0r8:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0r6:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0r17:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0r1:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r19:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0:r12:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0r24:b:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0:r22:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0r23:b:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r5:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:screenos:6.3.0r27:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:netscreen_screenos:6.3.0r11:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"6.3"
]
},
"indirect_transitive_cves": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2015-7754",
"CVE-2017-2339",
"CVE-2018-0059",
"CVE-2018-0014",
"CVE-2017-2336",
"CVE-2015-7755",
"CVE-2015-7756",
"CVE-2013-7313",
"CVE-2016-1268",
"CVE-2015-7750",
"CVE-2017-2337",
"CVE-2017-2338",
"CVE-2017-2335",
"CVE-2014-2842"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "Firewall",
"certification_date": "2012-06-28",
"evaluation_facility": "Leidos Common Criteria Testing Laboratory",
"expiration_date": "2014-11-01",
"id": "CCEVS-VR-VID10452",
"product": "Juniper Networks Security Appliances: ISG 1000, ISG2000, NetScreen 5200, NetScreen 5400, SSG5, SSG20, SSG140, SSG320M, SSG350M, SSG520M and SSG550M with ScreenOS Version 6.3",
"scheme": "US",
"url": "https://www.niap-ccevs.org/product/10452",
"vendor": "Juniper Networks, Inc."
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Juniper Networks, Inc.",
"manufacturer_web": "https://www.juniper.net/",
"name": "Networks Appliances: ISG 1000, ISG2000, NetScreen 5200, NetScreen 5400, SSG5, SSG20, SSG140, SSG320M, SSG350M, SSG520M and SSG550M with ScreenOS Version 6.3",
"not_valid_after": "2014-11-01",
"not_valid_before": "2012-06-28",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "st_vid10452-vr.pdf",
"report_frontpage": {
"US": {
"cert_id": "CCEVS-VR-10452-2012",
"cert_item": "Juniper Networks Security Appliances",
"cert_lab": "US NIAP"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"US": {
"CCEVS-VR-10452-2012": 1
}
},
"cc_claims": {
"A": {
"A.DIRECT": 1,
"A.GENPUR": 1,
"A.LOWEXP": 1,
"A.NOEVIL": 1,
"A.NOREMO": 1,
"A.PHYSEC": 1,
"A.PUBLIC": 1,
"A.REMACC": 1,
"A.SINGEN": 1
},
"T": {
"T.ASPOOF": 1,
"T.AUDACC": 1,
"T.AUDFUL": 1,
"T.MEDIAT": 1,
"T.NOAUTH": 1,
"T.OLDINF": 1,
"T.PROCOM": 1,
"T.REPEAT": 1,
"T.REPLAY": 1,
"T.SELPRO": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_FLR": 1,
"ALC_FLR.2": 4
},
"ATE": {
"ATE_COV": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 2,
"EAL 2 augmented": 2,
"EAL4": 2
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 8
},
"VPN": {
"VPN": 8
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140": 1,
"FIPS 140-2": 3
},
"RFC": {
"RFC 2404": 1,
"RFC 2406": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 4
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Mallett, Patrick W.",
"/CreationDate": "D:20121005092651",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20121005092651",
"/Producer": "Microsoft\u00ae Office Word 2007",
"pdf_file_size_bytes": 329777,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 20
},
"st_filename": "st_vid10452-st.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 4
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.DIRECT": 2,
"A.GENPUR": 2,
"A.LOWEXP": 2,
"A.NOEVIL": 2,
"A.NOREMO": 2,
"A.PHYSEC": 2,
"A.PUBLIC": 2,
"A.REMACC": 2,
"A.SINGEN": 2
},
"O": {
"O.ACCOUN": 1,
"O.ADMTRA": 1,
"O.AUDREC": 1,
"O.ENCRYP": 1,
"O.GUIDAN": 1,
"O.IDAUTH": 1,
"O.INTEGRITY": 4,
"O.LIMEXT": 1,
"O.MEDIAT": 1,
"O.SECFUN": 1,
"O.SECSTA": 1,
"O.SELPRO": 1,
"O.SINUSE": 1
},
"T": {
"T.ASPOOF": 1,
"T.AUDACC": 1,
"T.AUDFUL": 1,
"T.MEDIAT": 1,
"T.NOAUTH": 1,
"T.OLDINF": 1,
"T.PROCOM": 1,
"T.REPEAT": 1,
"T.REPLAY": 1,
"T.SELPRO": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 10,
"ADV_FSP": 1,
"ADV_FSP.2": 11,
"ADV_TDS": 1,
"ADV_TDS.1": 11
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 10,
"AGD_PRE": 1,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.2": 8,
"ALC_CMS": 1,
"ALC_CMS.2": 5,
"ALC_CMS.4": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 5,
"ALC_FLR": 1,
"ALC_FLR.2": 15
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 4,
"ATE_FUN": 1,
"ATE_FUN.1": 8,
"ATE_IND": 1,
"ATE_IND.2": 7
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.2": 7
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 2 augmented": 1,
"EAL2": 1,
"EAL2 augmented": 1,
"EAL4": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 4,
"FAU_GEN.1": 2,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAR": 8,
"FAU_SAR.1": 1,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.3": 1,
"FAU_SAR.3.1": 1,
"FAU_STG": 8,
"FAU_STG.1": 1,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.4": 1,
"FAU_STG.4.1": 1
},
"FCS": {
"FCS_CKM.1": 2,
"FCS_CKM.4": 2,
"FCS_COP.1": 18,
"FCS_COP.1.1": 2
},
"FDP": {
"FDP_ACC.1": 3,
"FDP_IFC.1": 15,
"FDP_IFC.1.1": 2,
"FDP_IFF.1": 14,
"FDP_IFF.1.1": 2,
"FDP_IFF.1.2": 2,
"FDP_IFF.1.3": 2,
"FDP_IFF.1.4": 2,
"FDP_IFF.1.5": 2,
"FDP_IFF.1.6": 2,
"FDP_ITC.1": 1,
"FDP_ITC.2": 1,
"FDP_RIP": 3,
"FDP_RIP.1": 1,
"FDP_RIP.2": 2,
"FDP_RIP.2.1": 1
},
"FIA": {
"FIA_AFL": 4,
"FIA_AFL.1": 2,
"FIA_AFL.1.1": 2,
"FIA_AFL.1.2": 1,
"FIA_ATD": 4,
"FIA_ATD.1": 3,
"FIA_ATD.1.1": 2,
"FIA_UAU": 8,
"FIA_UAU.1": 2,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 3,
"FIA_UAU.4.1": 1,
"FIA_UID": 4,
"FIA_UID.2": 3,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF": 4,
"FMT_MOF.1": 2,
"FMT_MOF.1.1": 1,
"FMT_MSA": 4,
"FMT_MSA.3": 3,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF": 4,
"FMT_SMF.1": 3,
"FMT_SMF.1.1": 1,
"FMT_SMR": 4,
"FMT_SMR.1": 2,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_RVM.1": 1,
"FPT_STM": 4,
"FPT_STM.1": 2,
"FPT_STM.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 3
},
"SSH": {
"SSH": 25
},
"VPN": {
"VPN": 76
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 4,
"secp256r1": 1
}
},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 1
}
},
"SHA": {
"SHA1": {
"SHA-1": 4
},
"SHA2": {
"SHA-256": 3,
"SHA256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"physical tampering": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 5,
"FIPS 180-2": 1,
"FIPS 186-3": 1,
"FIPS 197": 2,
"FIPS PUB 140-2": 6
},
"NIST": {
"SP 800-67": 2
},
"RFC": {
"RFC 2404": 1,
"RFC 2406": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 12
}
},
"DES": {
"DES": {
"DES": 1
}
},
"constructions": {
"MAC": {
"HMAC": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Neal",
"/CreationDate": "D:20121005092759",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20121005092759",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Subject": "Security Target",
"/Title": "Security Appliances Security Target",
"pdf_file_size_bytes": 867098,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 57
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10452-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL2+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10452-st.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "27e557bd175669fee514f83906abfe851a0141f53b26410c08b2f1b07250f9b1",
"txt_hash": "c65fc270ead3569bf09ebbaf0b1d0b9e0d84dbc771f6d09f24a320078d8293ce"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "9ba112f692be672c7168870d452801bb50f4dde94584eb6c476ab0588ec611b2",
"txt_hash": "2e14d7093da2bb456a45860743c7a7ee9bb233644f475b1af6713f7aee22dca0"
}
},
"status": "archived"
}