Juniper Networks M7i, M10i, M40e, M120, M320, T320, T640, T1600, MX240, MX480 and MX960 Services Routers and EX3200, EX4200 and EX8200 Switches running JUNOS 10

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status archived
Valid from 08.10.2010
Valid until 08.10.2015
Scheme 🇬🇧 UK
Manufacturer Juniper Networks, Inc.
Category Network and Network-Related Devices and Systems
Security level ALC_FLR.3, EAL3+

Heuristics summary ?

Certificate ID: CRP258

Certificate ?

Certification report ?

Extracted keywords

Hash functions
SHA-1, MD5
Protocols
SSH

Security level
EAL3, EAL3 augmented
Security Assurance Requirements (SAR)
ALC_FLR.3
Certificates
CRP258, CRP248

Standards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Title Certification Report CRP258 v1.1
Author NWA
Creation date D:20110401134243+01'00'
Modification date D:20110401134249+01'00'
Pages 18
Creator Acrobat PDFMaker 7.0.5 for Word
Producer Acrobat Elements 7.0.5 (Windows)

References

Outgoing
  • CRP248 - archived - JUNOS 9.3R1 M/MX/T & EX family of routers and switches

Security target ?

Extracted keywords

Protocols
SSH, SSL

Security level
EAL3, EAL3 augmented
Claims
O.FLOW, O.PROTECT, O.EADMIN, O.AMANAGE, O.ACCESS, O.ROLBAK, O.AUDIT, T.ROUTE, T.PRIVIL, T.OPS, T.MANDAT, T.CONFLOSS, T.NOAUDIT, A.LOCATE, A.NOEVIL, A.EAUTH, A.TIME, A.CRYPTO, OE.EAUTH, OE.TIME, OE.CRYPTO, OE.PHYSICAL, OE.ADMIN
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_ARP.1, FAU_SAR.1, FAU_GEN.2, FAU_SAA.1, FAU_STG.1, FAU_ARP.1.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FDP_IFC.1, FDP_IFF.1, FDP_ROL.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ROL.1.1, FDP_ROL.1.2, FIA_ATD.1, FIA_SOS.1, FIA_UAU.2, FIA_UAU.5, FIA_UID.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UID.2.1, FIA_UAU.5.1, FIA_UAU.1, FIA_UAU.5.2, FIA_UID.1, FMT_SMF.1, FMT_MSA.3, FMT_MTD.1, FMT_MOF, FMT_MTD, FMT_SMR.1, FMT_MOF.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.1, FPT_STM.1, FPT_STM.1.1, FTA_TSE.1, FTA_TSE.1.1
Certification process
out of scope, which are out of scope), SSH, , and FTP4 , This covers all services used to exchange information, including telnet and SSL (which are out of scope), SSH, , and FTP4 . Authentication services can be handled either internally (user selected, accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: • All

Certification process
out of scope, which are out of scope), SSH, , and FTP4 , This covers all services used to exchange information, including telnet and SSL (which are out of scope), SSH, , and FTP4 . Authentication services can be handled either internally (user selected, accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: • All

File metadata

Title JUNOS 10.0 for M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches
Subject EAL3 Security Target
Author JANE MEDEFESSER
Creation date D:20101007131521+01'00'
Modification date D:20101007131533+01'00'
Pages 37
Creator Acrobat PDFMaker 8.0 for Word
Producer Acrobat Distiller 8.0.0 (Windows)

Heuristics ?

Certificate ID: CRP258

Extracted SARs

ALC_LCD.1, ASE_SPD.1, ASE_REQ.2, ALC_CMC.3, ASE_INT.1, ADV_FSP.3, ASE_CCL.1, AGD_OPE.1, ALC_DVS.1, ALC_DEL.1, ASE_TSS.1, ATE_DPT.1, ATE_FUN.1, ATE_COV.2, ADV_ARC.1, ADV_TDS.2, AVA_VAN.2, AGD_PRE.1, ATE_IND.2, ALC_FLR.3, ASE_OBJ.2, ALC_CMS.3, ASE_ECD.1

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2013-4686
C M N
HIGH 7.1 6.9 11.07.2013 14:55
CVE-2013-4689
C M N
MEDIUM 5.1 6.4 17.10.2013 23:55
CVE-2013-6014
C M N
CRITICAL 9.3 5.8 28.10.2013 22:55
CVE-2013-6170
C M N
MEDIUM 4.3 2.9 17.10.2013 23:55
CVE-2013-6618
C M N
HIGH 9.0 10.0 05.11.2013 20:55
CVE-2013-7313
C M N
MEDIUM 5.4 6.4 23.01.2014 17:55
CVE-2014-0613
C M N
HIGH 7.1 6.9 15.01.2014 16:08
CVE-2014-0615
C M N
HIGH 7.2 10.0 15.01.2014 16:08
CVE-2014-0616
C M N
HIGH 7.1 6.9 15.01.2014 16:08
CVE-2014-2712
C M N
MEDIUM 4.3 2.9 14.04.2014 15:09
CVE-2014-2714
C M N
HIGH 7.1 6.9 14.04.2014 15:09
CVE-2014-3818
C M N
HIGH 7.8 6.9 14.10.2014 14:55
CVE-2021-31362
C M N
MEDIUM 6.5 3.6 19.10.2021 19:15
CVE-2021-31372
C M N
HIGH 8.8 5.9 19.10.2021 19:15
CVE-2022-22156
C M N
HIGH 7.4 5.2 19.01.2022 01:15
CVE-2022-22162
C M N
HIGH 7.8 5.9 19.01.2022 01:15
CVE-2022-22163
C M N
MEDIUM 6.5 3.6 19.01.2022 01:15
CVE-2022-22173
C M N
HIGH 7.5 3.6 19.01.2022 01:15
CVE-2022-22181
C M N
MEDIUM 5.4 2.7 14.04.2022 16:15
CVE-2022-22197
C M N
HIGH 7.5 3.6 14.04.2022 16:15
CVE-2022-22208
C M N
MEDIUM 5.9 3.6 18.10.2022 03:15
CVE-2022-22214
C M N
MEDIUM 6.5 3.6 20.07.2022 15:15
CVE-2022-22215
C M N
MEDIUM 5.5 3.6 20.07.2022 15:15
CVE-2022-22220
C M N
MEDIUM 5.9 3.6 18.10.2022 03:15
CVE-2022-22224
C M N
MEDIUM 6.5 3.6 18.10.2022 03:15
CVE-2022-22238
C M N
MEDIUM 6.5 3.6 18.10.2022 03:15
CVE-2022-22241
C M N
CRITICAL 9.8 5.9 18.10.2022 03:15
CVE-2022-22242
C M N
MEDIUM 6.1 2.7 18.10.2022 03:15
CVE-2022-22243
C M N
MEDIUM 4.3 1.4 18.10.2022 03:15
CVE-2022-22244
C M N
MEDIUM 5.3 1.4 18.10.2022 03:15
CVE-2022-22245
C M N
MEDIUM 4.3 1.4 18.10.2022 03:15
CVE-2022-22246
C M N
HIGH 8.8 5.9 18.10.2022 03:15
CVE-2023-22391
C M N
HIGH 7.5 3.6 13.01.2023 00:15
CVE-2023-22395
C M N
MEDIUM 6.5 3.6 13.01.2023 00:15
CVE-2023-22406
C M N
MEDIUM 6.5 3.6 13.01.2023 00:15
CVE-2023-22407
C M N
MEDIUM 6.5 3.6 13.01.2023 00:15

References ?

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '671c74eace6ff791d339e7e9475c7c8de2673862129bdc1a2c37682f6e9b588e', 'txt_hash': '7a0a5c1b4d5ecd6f2a0a7ed410e00a63bf7f2b5454a421d0422347400887bef0'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '1201d4e4f56df0b50be6476a5f8288155ac56a5a502cd1a80113a7ea747f0aa1', 'txt_hash': '081f26e4115295ca6468b11cb77d0957478a6243aeabedf5e58d44530369a942'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 312433, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/CreationDate': "D:20110401134243+01'00'", '/_EmailSubject': 'Word to PDF', '/Author': 'NWA', '/Creator': 'Acrobat PDFMaker 7.0.5 for Word', '/_AuthorEmailDisplayName': 'WhittakerAxon, Nigel', '/Producer': 'Acrobat Elements 7.0.5 (Windows)', '/_AuthorEmail': '[email protected]', '/ModDate': "D:20110401134249+01'00'", '/_AdHocReviewCycleID': '-812047709', '/Company': 'CESG Certification Body', '/Title': 'Certification Report CRP258 v1.1', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.juniper.net/', 'http://www.juniper.net/techpubs/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 525224, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 37, '/CreationDate': "D:20101007131521+01'00'", '/Subject': 'EAL3 Security Target', '/Author': 'JANE MEDEFESSER', '/Creator': 'Acrobat PDFMaker 8.0 for Word', '/Producer': 'Acrobat Distiller 8.0.0 (Windows)', '/_Client': 'Juniper Network', '/Checked by': '-507199406', '/ModDate': "D:20101007131533+01'00'", '/Company': 'Juniper Networks, Inc', '/SourceModified': 'D:20101007121506', '/Title': 'JUNOS 10.0 for M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'UK': {'CRP258': 2, 'CRP248': 3}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3, 'EAL3 augmented': 2}}, 'cc_sar': {'ALC': {'ALC_FLR.3': 3}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}, 'MD': {'MD5': {'MD5': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 3}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 5, 'EAL3 augmented': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.3': 7, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 6, 'FAU_ARP.1': 6, 'FAU_SAR.1': 5, 'FAU_GEN.2': 5, 'FAU_SAA.1': 5, 'FAU_STG.1': 5, 'FAU_ARP.1.1': 1, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FDP': {'FDP_IFC.1': 5, 'FDP_IFF.1': 6, 'FDP_ROL.1': 5, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ROL.1.1': 1, 'FDP_ROL.1.2': 1}, 'FIA': {'FIA_ATD.1': 5, 'FIA_SOS.1': 5, 'FIA_UAU.2': 8, 'FIA_UAU.5': 5, 'FIA_UID.2': 7, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.2.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.1': 2, 'FIA_UAU.5.2': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_SMF.1': 6, 'FMT_MSA.3': 10, 'FMT_MTD.1': 6, 'FMT_MOF': 10, 'FMT_MTD': 27, 'FMT_SMR.1': 5, 'FMT_MOF.1': 2, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.1': 3}, 'FPT': {'FPT_STM.1': 5, 'FPT_STM.1.1': 1}, 'FTA': {'FTA_TSE.1': 5, 'FTA_TSE.1.1': 1}}, 'cc_claims': {'O': {'O.FLOW': 11, 'O.PROTECT': 17, 'O.EADMIN': 8, 'O.AMANAGE': 17, 'O.ACCESS': 14, 'O.ROLBAK': 4, 'O.AUDIT': 17}, 'T': {'T.ROUTE': 10, 'T.PRIVIL': 7, 'T.OPS': 7, 'T.MANDAT': 4, 'T.CONFLOSS': 5, 'T.NOAUDIT': 2}, 'A': {'A.LOCATE': 4, 'A.NOEVIL': 3, 'A.EAUTH': 2, 'A.TIME': 4, 'A.CRYPTO': 4}, 'OE': {'OE.EAUTH': 3, 'OE.TIME': 3, 'OE.CRYPTO': 3, 'OE.PHYSICAL': 3, 'OE.ADMIN': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 20}, 'TLS': {'SSL': {'SSL': 2}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'which are out of scope), SSH, , and FTP4 ': 1, 'This covers all services used to exchange information, including telnet and SSL (which are out of scope), SSH, , and FTP4 . Authentication services can be handled either internally (user selected': 1, 'accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: • All': 1}}}.
    • The report_filename property was set to crp258.pdf.
    • The st_filename property was set to juniper-t009-st-v1.3.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to CRP258.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['CRP248']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['CRP237', 'CRP248']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/crp258.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/juniper-t009-st-v1.3.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Juniper Networks M7i, M10i, M40e, M120, M320, T320, T640, T1600, MX240, MX480 and MX960 Services Routers and EX3200, EX4200 and EX8200 Switches running JUNOS 10 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": null,
  "dgst": "5c38bf7165e0821f",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CRP258",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:o:juniper:junos:10.3:*:*:*:*:*:*:*",
        "cpe:2.3:o:juniper:junos:10.4:*:*:*:*:*:*:*",
        "cpe:2.3:o:juniper:junos:10.0:*:*:*:*:*:*:*",
        "cpe:2.3:o:juniper:junos:10.2:*:*:*:*:*:*:*",
        "cpe:2.3:o:juniper:junos:10.1:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "10"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2021-31362",
        "CVE-2022-22241",
        "CVE-2022-22214",
        "CVE-2022-22244",
        "CVE-2022-22162",
        "CVE-2013-6014",
        "CVE-2013-4686",
        "CVE-2022-22243",
        "CVE-2014-2712",
        "CVE-2022-22163",
        "CVE-2023-22406",
        "CVE-2013-4689",
        "CVE-2019-0036",
        "CVE-2022-22220",
        "CVE-2014-0616",
        "CVE-2021-31372",
        "CVE-2022-22242",
        "CVE-2014-3818",
        "CVE-2013-7313",
        "CVE-2022-22156",
        "CVE-2022-22238",
        "CVE-2022-22246",
        "CVE-2004-0230",
        "CVE-2014-0613",
        "CVE-2022-22181",
        "CVE-2022-22208",
        "CVE-2023-22395",
        "CVE-2022-22224",
        "CVE-2004-0468",
        "CVE-2022-22245",
        "CVE-2022-22197",
        "CVE-2023-22407",
        "CVE-2023-22391",
        "CVE-2013-6170",
        "CVE-2022-22215",
        "CVE-2013-6618",
        "CVE-2022-22173",
        "CVE-2014-0615",
        "CVE-2014-2714"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "CRP248"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "CRP248",
          "CRP237"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Juniper Networks, Inc.",
  "manufacturer_web": "https://www.juniper.net/",
  "name": "Juniper Networks M7i, M10i, M40e, M120, M320, T320, T640, T1600, MX240, MX480 and MX960 Services Routers and EX3200, EX4200 and EX8200 Switches running JUNOS 10",
  "not_valid_after": "2015-10-08",
  "not_valid_before": "2010-10-08",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "crp258.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "UK": {
          "CRP248": 3,
          "CRP258": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.3": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 3,
          "EAL3 augmented": 2
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 3
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2009-07-001": 1,
          "CCMB-2009-07-002": 1,
          "CCMB-2009-07-003": 1,
          "CCMB-2009-07-004": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "NWA",
      "/Company": "CESG Certification Body",
      "/CreationDate": "D:20110401134243+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 7.0.5 for Word",
      "/ModDate": "D:20110401134249+01\u002700\u0027",
      "/Producer": "Acrobat Elements 7.0.5 (Windows)",
      "/Title": "Certification Report CRP258 v1.1",
      "/_AdHocReviewCycleID": "-812047709",
      "/_AuthorEmail": "[email protected]",
      "/_AuthorEmailDisplayName": "WhittakerAxon, Nigel",
      "/_EmailSubject": "Word to PDF",
      "pdf_file_size_bytes": 312433,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.juniper.net/",
          "http://www.juniper.net/techpubs/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 18
    },
    "st_filename": "juniper-t009-st-v1.3.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CRYPTO": 4,
          "A.EAUTH": 2,
          "A.LOCATE": 4,
          "A.NOEVIL": 3,
          "A.TIME": 4
        },
        "O": {
          "O.ACCESS": 14,
          "O.AMANAGE": 17,
          "O.AUDIT": 17,
          "O.EADMIN": 8,
          "O.FLOW": 11,
          "O.PROTECT": 17,
          "O.ROLBAK": 4
        },
        "OE": {
          "OE.ADMIN": 3,
          "OE.CRYPTO": 3,
          "OE.EAUTH": 3,
          "OE.PHYSICAL": 3,
          "OE.TIME": 3
        },
        "T": {
          "T.CONFLOSS": 5,
          "T.MANDAT": 4,
          "T.NOAUDIT": 2,
          "T.OPS": 7,
          "T.PRIVIL": 7,
          "T.ROUTE": 10
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.3": 1,
          "ADV_TDS.2": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.3": 1,
          "ALC_CMS.3": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR.3": 7,
          "ALC_LCD.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 5,
          "EAL3 augmented": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 6,
          "FAU_ARP.1.1": 1,
          "FAU_GEN.1": 6,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 5,
          "FAU_GEN.2.1": 1,
          "FAU_SAA.1": 5,
          "FAU_SAA.1.1": 1,
          "FAU_SAA.1.2": 1,
          "FAU_SAR.1": 5,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_STG.1": 5,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1
        },
        "FDP": {
          "FDP_IFC.1": 5,
          "FDP_IFC.1.1": 1,
          "FDP_IFF.1": 6,
          "FDP_IFF.1.1": 1,
          "FDP_IFF.1.2": 1,
          "FDP_IFF.1.3": 1,
          "FDP_IFF.1.4": 1,
          "FDP_IFF.1.5": 1,
          "FDP_ROL.1": 5,
          "FDP_ROL.1.1": 1,
          "FDP_ROL.1.2": 1
        },
        "FIA": {
          "FIA_ATD.1": 5,
          "FIA_ATD.1.1": 1,
          "FIA_SOS.1": 5,
          "FIA_SOS.1.1": 1,
          "FIA_UAU.1": 2,
          "FIA_UAU.2": 8,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.5": 5,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UID.1": 1,
          "FIA_UID.2": 7,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF": 10,
          "FMT_MOF.1": 2,
          "FMT_MSA.1": 3,
          "FMT_MSA.3": 10,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD": 27,
          "FMT_MTD.1": 6,
          "FMT_SMF.1": 6,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 5,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_STM.1": 5,
          "FPT_STM.1.1": 1
        },
        "FTA": {
          "FTA_TSE.1": 5,
          "FTA_TSE.1.1": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "This covers all services used to exchange information, including telnet and SSL (which are out of scope), SSH, , and FTP4 . Authentication services can be handled either internally (user selected": 1,
          "accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: \u2022 All": 1,
          "out of scope": 2,
          "which are out of scope), SSH, , and FTP4 ": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 20
        },
        "TLS": {
          "SSL": {
            "SSL": 2
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "JANE MEDEFESSER",
      "/Checked by": "-507199406",
      "/Company": "Juniper Networks, Inc",
      "/CreationDate": "D:20101007131521+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 8.0 for Word",
      "/ModDate": "D:20101007131533+01\u002700\u0027",
      "/Producer": "Acrobat Distiller 8.0.0 (Windows)",
      "/SourceModified": "D:20101007121506",
      "/Subject": "EAL3 Security Target",
      "/Title": "JUNOS 10.0 for M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches",
      "/_Client": "Juniper Network",
      "pdf_file_size_bytes": 525224,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 37
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/crp258.pdf",
  "scheme": "UK",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3+",
      "ALC_FLR.3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/juniper-t009-st-v1.3.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "671c74eace6ff791d339e7e9475c7c8de2673862129bdc1a2c37682f6e9b588e",
      "txt_hash": "7a0a5c1b4d5ecd6f2a0a7ed410e00a63bf7f2b5454a421d0422347400887bef0"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "1201d4e4f56df0b50be6476a5f8288155ac56a5a502cd1a80113a7ea747f0aa1",
      "txt_hash": "081f26e4115295ca6468b11cb77d0957478a6243aeabedf5e58d44530369a942"
    }
  },
  "status": "archived"
}