This page was not yet optimized for use on mobile devices.
Juniper Junos OS 23.4R1 for SRX1600
This certificate has known related CVEs, which means that
the certified
product might be vulnerable.
CSV information ?
Status | active |
---|---|
Valid from | 18.03.2025 |
Valid until | 18.03.2030 |
Scheme | 🇦🇺 AU |
Manufacturer | Juniper Networks, Inc. |
Category | Network and Network-Related Devices and Systems |
Security level | |
Protection profiles |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Schemes
Key ExchangeProtocols
SSH, SSHv2, SSL, TLS, IKE, IPsec, VPNEvaluation facilities
Teron LabsFile metadata
Creation date | D:20250318233218+05'30' |
---|---|
Modification date | D:20250318233218+05'30' |
Pages | 19 |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512Asymmetric Algorithms
RSA 2048, ECDH, ECDSA, ECC, Diffie-Hellman, DH, DSAHash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA256, SHA-2Schemes
MAC, Key Exchange, Key AgreementProtocols
SSH, SSHv2, SSL, TLS, DTLS, IKEv2, IKE, IPsec, VPNRandomness
DRBG, RNG, RBGLibraries
OpenSSLElliptic Curves
P-256, P-384, P-521Block cipher modes
CBC, CTR, GCMClaims
O.AUTHENTICATION, O.CRYPTOGRAPHIC_, O.FAIL_SECURE, O.PORT_FILTERING, O.SYSTEM_MONITORING, O.TOE_ADMINISTRATION, O.STATEFUL_TRAFFIC, O.IPS_ANALYZE, O.IPS_REACT, T.UNAUTHORIZED_, T.WEAK_CRYPTOGRAPHY, T.UNTRUSTED_, T.WEAK_AUTHENTICATION_, T.UPDATE_COMPROMISE, T.UNDETECTED_ACTIVITY, T.SECURITY_FUNCTIONALITY_, T.PASSWORD_CRACKING, T.DATA_INTEGRITY, T.NETWORK_ACCESS, T.NETWORK_DISCLOSURE, T.NETWORK_MISUSE, T.REPLAY_ATTACK, T.MALICIOUS_TRAFFIC, T.NETWORK_DOS, A.PHYSICAL_PROTECTION, A.LIMITED_, A.NO_THRU_TRAFFIC_, A.TRUSTED_, A.REGULAR_UPDATES, A.ADMIN_CREDENTIALS_, A.RESIDUAL_INFORMATION, A.CONNECTIONS, OE.PHYSICAL, OE.NO_GENERAL_, OE.NO_THRU_TRAFFIC_, OE.TRUSTED_ADMIN, OE.UPDATES, OE.ADMIN_CREDENTIALS_, OE.RESDUAL_, OE.CONNECTIONSSecurity Assurance Requirements (SAR)
ADV_FSP, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN, AVA_VAN.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1Security Functional Requirements (SFR)
FAU_GEN, FAU_STG_EXT, FAU_GEN.1, FAU_GEN.2, FAU_STG_EXT.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_STG_EXT.1.1, FAU_STG_EXT.1.2, FAU_STG_EXT.1.3, FCS_CKM, FCS_COP, FCS_NTP_EXT, FCS_RBG_EXT, FCS_TLSC_EXT.2.3, FCS_NTP_EXT.1.4, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_RBG_EXT.1, FCS_SSHC_EXT.1, FCS_SSHS_EXT.1, FCS_NTP_EXT.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP.1, FCS_NTP_EXT.1.1, FCS_NTP_EXT.1.2, FCS_NTP_EXT.1.3, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_SSHC_EXT, FCS_SSHS_EXT, FCS_SSHC_EXT.1.1, FCS_SSHC_EXT.1.2, FCS_SSHC_EXT.1.3, FCS_SSHC_EXT.1.4, FCS_SSHC_EXT.1.5, FCS_SSHC_EXT.1.6, FCS_SSHC_EXT.1.7, FCS_SSHC_EXT.1.8, FCS_SSHC_EXT.1.9, FCS_SSHS_EXT.1.1, FCS_SSHS_EXT.1.2, FCS_SSHS_EXT.1.3, FCS_SSHS_EXT.1.4, FCS_SSHS_EXT.1.5, FCS_SSHS_EXT.1.6, FCS_SSHS_EXT.1.7, FCS_SSHS_EXT.1.8, FDP_RIP, FDP_RIP.2, FDP_RIP.2.1, FIA_AFL, FIA_PMG_EXT, FIA_PSK_EXT, FIA_UAU, FIA_UIA_EXT, FIA_PMG_EXT.1, FIA_AFL.1, FIA_PSK_EXT.3, FIA_UAU.7, FIA_UAU_EXT.2, FIA_UIA_EXT.1, FIA_PSK_EXT.1, FIA_PSK_EXT.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_PMG_EXT.1.1, FIA_PSK_EXT.1.1, FIA_PSK_EXT.1.2, FIA_PSK_EXT.2.1, FIA_UAU.7.1, FIA_UAU_EXT, FIA_UAU_EXT.2.1, FIA_UIA_EXT.1.1, FIA_UIA_EXT.1.2, FMT_MOF, FMT_MTD, FMT_SMF, FMT_SMR, FMT_SMF.1, FMT_SMR.2, FMT_MOF.1, FMT_MTD.1, FMT_SMF.1.1, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FPT_APW_EXT, FPT_FLS.1, FPT_SKP_EXT, FPT_STM_EXT, FPT_TST_EXT, FPT_TUD_EXT, FPT_APW_EXT.1, FPT_SKP_EXT.1, FPT_STM_EXT.1, FPT_TST_EXT.1, FPT_TUD_EXT.1, FPT_FLS, FPT_TST_EXT.3, FPT_APW_EXT.1.1, FPT_APW_EXT.1.2, FPT_FLS.1.1, FPT_SKP_EXT.1.1, FPT_STM_EXT.1.1, FPT_STM_EXT.1.2, FPT_TST_EXT.3.1, FPT_TST_EXT.3.2, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FTA_SSL, FTA_SSL_EXT, FTA_TAB, FTA_SSL.3, FTA_SSL.4, FTA_SSL_EXT.1, FTA_TAB.1, FTA_SSL_EXT.1.1, FTP_ITC, FTP_TRP, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1Evaluation facilities
Teron LabsSide-channel analysis
DFAStandards
FIPS PUB 186-4, PKCS #1, RFC 5077, RFC 3526, RFC 4301, RFC 4303, RFC 3602, RFC 4106, RFC 5996, RFC 4868, RFC 5282, RFC 5114, RFC 4945, RFC 8784, RFC 1305, RFC 5905, RFC 4253, RFC 4251, RFC 5735, RFC 3513, RFC 5280, RFC 2986, RFC 791, RFC 8200, RFC 793, RFC 768, RFC 2460, RFC 792, RFC 2463, RFC 4443, RFC 959, RFC 8603, RFC 4252, RFC 4254, RFC5656, RFC6668, RFC 8308, RFC 8332, ISO/IEC 9796-2, ISO/IEC 14888-3, ISO/IEC 18031:2011, X.509, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
Title | Juniper Junos OS 23.4R1 for SRX1600 |
---|---|
Author | Teron Labs |
Creation date | D:20250314001707+00'00' |
Modification date | D:20250314001707+00'00' |
Pages | 96 |
Creator | Microsoft Word |
Heuristics ?
Extracted SARs
AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1, ATE_IND.1, AVA_VAN.1CPE matches
Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-2004-0230 | MEDIUM | 5.0 | 2.9 | 18.08.2004 04:00 | ||
CVE-2004-0468 | MEDIUM | 5.0 | 2.9 | 06.12.2004 05:00 | ||
CVE-2024-39517 | MEDIUM | 6.5 | 3.6 | 10.07.2024 23:15 | ||
CVE-2024-39549 | HIGH | 7.5 | 3.6 | 11.07.2024 17:15 | ||
CVE-2024-39555 | HIGH | 7.5 | 3.6 | 10.07.2024 23:15 | ||
CVE-2024-39556 | HIGH | 7.0 | 5.9 | 10.07.2024 23:15 | ||
CVE-2025-21590 | MEDIUM | 4.4 | 3.6 | 12.03.2025 14:15 |
Showing 5 out of 7.
References ?
No references are available for this certificate as its ID was not successfully extracted.
Updates ?
-
03.04.2025 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Juniper Junos OS 23.4R1 for SRX1600 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": null,
"dgst": "7b49758e815c370d",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": null,
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:juniper:junos:23.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:23.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:23.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:23.4:r2:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"eal": "EAL1",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"23.4"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"e2ad7e4a892e3703",
"89f2a255423f4a20",
"6448a1802bb874d8",
"bde3d7587cf42e78"
]
},
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2024-39549",
"CVE-2004-0468",
"CVE-2024-39555",
"CVE-2024-39517",
"CVE-2025-21590",
"CVE-2004-0230",
"CVE-2024-39556"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Juniper Networks, Inc.",
"manufacturer_web": "https://www.juniper.net/",
"name": "Juniper Junos OS 23.4R1 for SRX1600",
"not_valid_after": "2030-03-18",
"not_valid_before": "2025-03-18",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "AISEP-CC-CR-2025-EFT-T046-CR-V1.0.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 1
},
"IPsec": {
"IPsec": 9
},
"SSH": {
"SSH": 4,
"SSHv2": 2
},
"TLS": {
"SSL": {
"SSL": 2
},
"TLS": {
"TLS": 2
}
},
"VPN": {
"VPN": 10
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Teron": {
"Teron Labs": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20250318233218+05\u002730\u0027",
"/ModDate": "D:20250318233218+05\u002730\u0027",
"pdf_file_size_bytes": 1261815,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.cyber.gov.au/sites/default/files/2019-03/AISEP_Policy_Manual.pdf",
"https://www.commoncriteriaportal.org/",
"https://www.juniper.net/customers/csc/management",
"https://www.juniper.net/",
"https://www.juniper.net/documentation",
"https://www.cyber.gov.au/ism"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 19
},
"st_filename": "Juniper SRX1600 Junos OS 23.4R1 v1.0.1.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 5
},
"ECDH": {
"ECDH": 5
},
"ECDSA": {
"ECDSA": 16
}
},
"FF": {
"DH": {
"DH": 12,
"Diffie-Hellman": 2
},
"DSA": {
"DSA": 1
}
},
"RSA": {
"RSA 2048": 1
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN_CREDENTIALS_": 1,
"A.CONNECTIONS": 2,
"A.LIMITED_": 1,
"A.NO_THRU_TRAFFIC_": 1,
"A.PHYSICAL_PROTECTION": 1,
"A.REGULAR_UPDATES": 1,
"A.RESIDUAL_INFORMATION": 1,
"A.TRUSTED_": 1
},
"O": {
"O.AUTHENTICATION": 1,
"O.CRYPTOGRAPHIC_": 1,
"O.FAIL_SECURE": 1,
"O.IPS_ANALYZE": 1,
"O.IPS_REACT": 1,
"O.PORT_FILTERING": 1,
"O.STATEFUL_TRAFFIC": 1,
"O.SYSTEM_MONITORING": 2,
"O.TOE_ADMINISTRATION": 2
},
"OE": {
"OE.ADMIN_CREDENTIALS_": 1,
"OE.CONNECTIONS": 2,
"OE.NO_GENERAL_": 1,
"OE.NO_THRU_TRAFFIC_": 1,
"OE.PHYSICAL": 1,
"OE.RESDUAL_": 1,
"OE.TRUSTED_ADMIN": 1,
"OE.UPDATES": 1
},
"T": {
"T.DATA_INTEGRITY": 1,
"T.MALICIOUS_TRAFFIC": 1,
"T.NETWORK_ACCESS": 3,
"T.NETWORK_DISCLOSURE": 3,
"T.NETWORK_DOS": 1,
"T.NETWORK_MISUSE": 3,
"T.PASSWORD_CRACKING": 1,
"T.REPLAY_ATTACK": 1,
"T.SECURITY_FUNCTIONALITY_": 2,
"T.UNAUTHORIZED_": 1,
"T.UNDETECTED_ACTIVITY": 1,
"T.UNTRUSTED_": 1,
"T.UPDATE_COMPROMISE": 1,
"T.WEAK_AUTHENTICATION_": 1,
"T.WEAK_CRYPTOGRAPHY": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.1": 1,
"ALC_CMS.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_REQ.1": 1,
"ASE_SPD.1": 1
},
"ATE": {
"ATE_IND.1": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.1": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 11,
"FAU_GEN.1": 14,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 2,
"FAU_GEN.2": 4,
"FAU_GEN.2.1": 1,
"FAU_STG_EXT": 3,
"FAU_STG_EXT.1": 6,
"FAU_STG_EXT.1.1": 1,
"FAU_STG_EXT.1.2": 1,
"FAU_STG_EXT.1.3": 1
},
"FCS": {
"FCS_CKM": 6,
"FCS_CKM.1": 7,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 7,
"FCS_CKM.2.1": 1,
"FCS_CKM.4": 5,
"FCS_CKM.4.1": 1,
"FCS_COP": 24,
"FCS_COP.1": 5,
"FCS_NTP_EXT": 2,
"FCS_NTP_EXT.1": 5,
"FCS_NTP_EXT.1.1": 1,
"FCS_NTP_EXT.1.2": 1,
"FCS_NTP_EXT.1.3": 1,
"FCS_NTP_EXT.1.4": 2,
"FCS_RBG_EXT": 3,
"FCS_RBG_EXT.1": 7,
"FCS_RBG_EXT.1.1": 1,
"FCS_RBG_EXT.1.2": 1,
"FCS_SSHC_EXT": 1,
"FCS_SSHC_EXT.1": 15,
"FCS_SSHC_EXT.1.1": 1,
"FCS_SSHC_EXT.1.2": 1,
"FCS_SSHC_EXT.1.3": 1,
"FCS_SSHC_EXT.1.4": 1,
"FCS_SSHC_EXT.1.5": 1,
"FCS_SSHC_EXT.1.6": 1,
"FCS_SSHC_EXT.1.7": 1,
"FCS_SSHC_EXT.1.8": 1,
"FCS_SSHC_EXT.1.9": 1,
"FCS_SSHS_EXT": 1,
"FCS_SSHS_EXT.1": 10,
"FCS_SSHS_EXT.1.1": 1,
"FCS_SSHS_EXT.1.2": 1,
"FCS_SSHS_EXT.1.3": 1,
"FCS_SSHS_EXT.1.4": 1,
"FCS_SSHS_EXT.1.5": 1,
"FCS_SSHS_EXT.1.6": 1,
"FCS_SSHS_EXT.1.7": 1,
"FCS_SSHS_EXT.1.8": 1,
"FCS_TLSC_EXT.2.3": 1
},
"FDP": {
"FDP_RIP": 4,
"FDP_RIP.2": 3,
"FDP_RIP.2.1": 1
},
"FIA": {
"FIA_AFL": 2,
"FIA_AFL.1": 8,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_PMG_EXT": 2,
"FIA_PMG_EXT.1": 6,
"FIA_PMG_EXT.1.1": 1,
"FIA_PSK_EXT": 2,
"FIA_PSK_EXT.1": 4,
"FIA_PSK_EXT.1.1": 1,
"FIA_PSK_EXT.1.2": 1,
"FIA_PSK_EXT.2": 3,
"FIA_PSK_EXT.2.1": 1,
"FIA_PSK_EXT.3": 4,
"FIA_UAU": 3,
"FIA_UAU.7": 5,
"FIA_UAU.7.1": 1,
"FIA_UAU_EXT": 1,
"FIA_UAU_EXT.2": 4,
"FIA_UAU_EXT.2.1": 1,
"FIA_UIA_EXT": 2,
"FIA_UIA_EXT.1": 5,
"FIA_UIA_EXT.1.1": 1,
"FIA_UIA_EXT.1.2": 1
},
"FMT": {
"FMT_MOF": 17,
"FMT_MOF.1": 3,
"FMT_MTD": 13,
"FMT_MTD.1": 2,
"FMT_SMF": 20,
"FMT_SMF.1": 11,
"FMT_SMF.1.1": 1,
"FMT_SMR": 2,
"FMT_SMR.2": 5,
"FMT_SMR.2.1": 1,
"FMT_SMR.2.2": 1,
"FMT_SMR.2.3": 1
},
"FPT": {
"FPT_APW_EXT": 2,
"FPT_APW_EXT.1": 5,
"FPT_APW_EXT.1.1": 1,
"FPT_APW_EXT.1.2": 1,
"FPT_FLS": 4,
"FPT_FLS.1": 2,
"FPT_FLS.1.1": 1,
"FPT_SKP_EXT": 2,
"FPT_SKP_EXT.1": 5,
"FPT_SKP_EXT.1.1": 1,
"FPT_STM_EXT": 2,
"FPT_STM_EXT.1": 6,
"FPT_STM_EXT.1.1": 1,
"FPT_STM_EXT.1.2": 1,
"FPT_TST_EXT": 2,
"FPT_TST_EXT.1": 7,
"FPT_TST_EXT.3": 4,
"FPT_TST_EXT.3.1": 1,
"FPT_TST_EXT.3.2": 1,
"FPT_TUD_EXT": 2,
"FPT_TUD_EXT.1": 8,
"FPT_TUD_EXT.1.1": 1,
"FPT_TUD_EXT.1.2": 1,
"FPT_TUD_EXT.1.3": 1
},
"FTA": {
"FTA_SSL": 2,
"FTA_SSL.3": 6,
"FTA_SSL.4": 6,
"FTA_SSL_EXT": 2,
"FTA_SSL_EXT.1": 4,
"FTA_SSL_EXT.1.1": 1,
"FTA_TAB": 2,
"FTA_TAB.1": 7
},
"FTP": {
"FTP_ITC": 5,
"FTP_ITC.1": 10,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP": 7,
"FTP_TRP.1": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 11
},
"CTR": {
"CTR": 5
},
"GCM": {
"GCM": 8
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 5
}
},
"crypto_protocol": {
"IKE": {
"IKE": 25,
"IKEv2": 20
},
"IPsec": {
"IPsec": 63
},
"SSH": {
"SSH": 125,
"SSHv2": 20
},
"TLS": {
"DTLS": {
"DTLS": 4
},
"SSL": {
"SSL": 5
},
"TLS": {
"TLS": 10
}
},
"VPN": {
"VPN": 42
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 3
},
"KEX": {
"Key Exchange": 4
},
"MAC": {
"MAC": 6
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 32,
"P-384": 28,
"P-521": 22
}
},
"eval_facility": {
"Teron": {
"Teron Labs": 2
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 10
},
"SHA2": {
"SHA-2": 1,
"SHA-256": 21,
"SHA-384": 6,
"SHA-512": 14,
"SHA256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 2
},
"RNG": {
"RBG": 3,
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
},
"FIPS": {
"FIPS PUB 186-4": 9
},
"ISO": {
"ISO/IEC 14888-3": 1,
"ISO/IEC 18031:2011": 2,
"ISO/IEC 9796-2": 1
},
"PKCS": {
"PKCS #1": 1
},
"RFC": {
"RFC 1305": 1,
"RFC 2460": 2,
"RFC 2463": 1,
"RFC 2986": 2,
"RFC 3513": 2,
"RFC 3526": 6,
"RFC 3602": 3,
"RFC 4106": 2,
"RFC 4251": 3,
"RFC 4252": 1,
"RFC 4253": 3,
"RFC 4254": 1,
"RFC 4301": 2,
"RFC 4303": 1,
"RFC 4443": 1,
"RFC 4868": 2,
"RFC 4945": 2,
"RFC 5077": 1,
"RFC 5114": 2,
"RFC 5280": 5,
"RFC 5282": 1,
"RFC 5735": 2,
"RFC 5905": 1,
"RFC 5996": 2,
"RFC 768": 3,
"RFC 791": 3,
"RFC 792": 2,
"RFC 793": 3,
"RFC 8200": 1,
"RFC 8308": 1,
"RFC 8332": 1,
"RFC 8603": 2,
"RFC 8784": 1,
"RFC 959": 1,
"RFC5656": 1,
"RFC6668": 1
},
"X509": {
"X.509": 17
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 22
}
},
"constructions": {
"MAC": {
"HMAC": 6,
"HMAC-SHA-256": 8,
"HMAC-SHA-384": 5,
"HMAC-SHA-512": 6
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Teron Labs",
"/CreationDate": "D:20250314001707+00\u002700\u0027",
"/Creator": "Microsoft Word",
"/ModDate": "D:20250314001707+00\u002700\u0027",
"/Title": "Juniper Junos OS 23.4R1 for SRX1600",
"pdf_file_size_bytes": 1473889,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=38055",
"http://www.teronlabs.com/",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37945",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37718",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=38243",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37717"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 96
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_IPS_v1.0.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_CPP_FW_v1.4e.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_VPNGW_v1.3.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP-CC-CR-2025-EFT-T046-CR-V1.0.pdf",
"scheme": "AU",
"security_level": {
"_type": "Set",
"elements": []
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper%20SRX1600%20Junos%20OS%2023.4R1%20v1.0.1.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "8d0c6aace8b275e34833d7266622c422b67b18e4492c934055fb5a804429e797",
"txt_hash": "b18c05b3c62bf1da73353743ada3e6ed38b3e5c3f7ad79b9b0fbf5b1b8a0c7f2"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "8fc47236b07c0ba162ec8e80088e84ee52088bf36a5ec78064f4b21d424b8101",
"txt_hash": "4715bf79618110d621c6a0528dafbbdedf398e2753f8b88fd358d2cc9ce218ed"
}
},
"status": "active"
}