This page was not yet optimized for use on mobile devices.
Juniper Junos OS 23.4R1 for SRX1600
This certificate has known related CVEs, which means that
the certified
product might be vulnerable.
CSV information
Status | active |
---|---|
Valid from | 18.03.2025 |
Valid until | 18.03.2030 |
Scheme | 🇦🇺 AU |
Manufacturer | Juniper Networks, Inc. |
Category | Network and Network-Related Devices and Systems |
Security level | |
Protection profiles |
Heuristics summary
Certificate ID: Certificate Number: 2025/157
Certificate
Extracted keywords
Protocols
VPNCertificates
Certificate Number: 2025/157File metadata
Creation date | D:20250428140400+10'00' |
---|---|
Modification date | D:20250428140400+10'00' |
Pages | 1 |
Certification report
Extracted keywords
Schemes
Key ExchangeProtocols
SSH, SSHv2, SSL, TLS, IKE, IPsec, VPNEvaluation facilities
Teron LabsFile metadata
Creation date | D:20250318233218+05'30' |
---|---|
Modification date | D:20250318233218+05'30' |
Pages | 19 |
Security target
Extracted keywords
Symmetric Algorithms
AES, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512Asymmetric Algorithms
RSA 2048, ECDH, ECDSA, ECC, Diffie-Hellman, DH, DSAHash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA256, SHA-2Schemes
MAC, Key Exchange, Key AgreementProtocols
SSH, SSHv2, SSL, TLS, DTLS, IKEv2, IKE, IPsec, VPNRandomness
DRBG, RNG, RBGLibraries
OpenSSLElliptic Curves
P-256, P-384, P-521Block cipher modes
CBC, CTR, GCMClaims
O.AUTHENTICATION, O.CRYPTOGRAPHIC_, O.FAIL_SECURE, O.PORT_FILTERING, O.SYSTEM_MONITORING, O.TOE_ADMINISTRATION, O.STATEFUL_TRAFFIC, O.IPS_ANALYZE, O.IPS_REACT, T.UNAUTHORIZED_, T.WEAK_CRYPTOGRAPHY, T.UNTRUSTED_, T.WEAK_AUTHENTICATION_, T.UPDATE_COMPROMISE, T.UNDETECTED_ACTIVITY, T.SECURITY_FUNCTIONALITY_, T.PASSWORD_CRACKING, T.DATA_INTEGRITY, T.NETWORK_ACCESS, T.NETWORK_DISCLOSURE, T.NETWORK_MISUSE, T.REPLAY_ATTACK, T.MALICIOUS_TRAFFIC, T.NETWORK_DOS, A.PHYSICAL_PROTECTION, A.LIMITED_, A.NO_THRU_TRAFFIC_, A.TRUSTED_, A.REGULAR_UPDATES, A.ADMIN_CREDENTIALS_, A.RESIDUAL_INFORMATION, A.CONNECTIONS, OE.PHYSICAL, OE.NO_GENERAL_, OE.NO_THRU_TRAFFIC_, OE.TRUSTED_ADMIN, OE.UPDATES, OE.ADMIN_CREDENTIALS_, OE.RESDUAL_, OE.CONNECTIONSSecurity Assurance Requirements (SAR)
ADV_FSP, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN, AVA_VAN.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1Security Functional Requirements (SFR)
FAU_GEN, FAU_STG_EXT, FAU_GEN.1, FAU_GEN.2, FAU_STG_EXT.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_STG_EXT.1.1, FAU_STG_EXT.1.2, FAU_STG_EXT.1.3, FCS_CKM, FCS_COP, FCS_NTP_EXT, FCS_RBG_EXT, FCS_TLSC_EXT.2.3, FCS_NTP_EXT.1.4, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_RBG_EXT.1, FCS_SSHC_EXT.1, FCS_SSHS_EXT.1, FCS_NTP_EXT.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP.1, FCS_NTP_EXT.1.1, FCS_NTP_EXT.1.2, FCS_NTP_EXT.1.3, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_SSHC_EXT, FCS_SSHS_EXT, FCS_SSHC_EXT.1.1, FCS_SSHC_EXT.1.2, FCS_SSHC_EXT.1.3, FCS_SSHC_EXT.1.4, FCS_SSHC_EXT.1.5, FCS_SSHC_EXT.1.6, FCS_SSHC_EXT.1.7, FCS_SSHC_EXT.1.8, FCS_SSHC_EXT.1.9, FCS_SSHS_EXT.1.1, FCS_SSHS_EXT.1.2, FCS_SSHS_EXT.1.3, FCS_SSHS_EXT.1.4, FCS_SSHS_EXT.1.5, FCS_SSHS_EXT.1.6, FCS_SSHS_EXT.1.7, FCS_SSHS_EXT.1.8, FDP_RIP, FDP_RIP.2, FDP_RIP.2.1, FIA_AFL, FIA_PMG_EXT, FIA_PSK_EXT, FIA_UAU, FIA_UIA_EXT, FIA_PMG_EXT.1, FIA_AFL.1, FIA_PSK_EXT.3, FIA_UAU.7, FIA_UAU_EXT.2, FIA_UIA_EXT.1, FIA_PSK_EXT.1, FIA_PSK_EXT.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_PMG_EXT.1.1, FIA_PSK_EXT.1.1, FIA_PSK_EXT.1.2, FIA_PSK_EXT.2.1, FIA_UAU.7.1, FIA_UAU_EXT, FIA_UAU_EXT.2.1, FIA_UIA_EXT.1.1, FIA_UIA_EXT.1.2, FMT_MOF, FMT_MTD, FMT_SMF, FMT_SMR, FMT_SMF.1, FMT_SMR.2, FMT_MOF.1, FMT_MTD.1, FMT_SMF.1.1, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FPT_APW_EXT, FPT_FLS.1, FPT_SKP_EXT, FPT_STM_EXT, FPT_TST_EXT, FPT_TUD_EXT, FPT_APW_EXT.1, FPT_SKP_EXT.1, FPT_STM_EXT.1, FPT_TST_EXT.1, FPT_TUD_EXT.1, FPT_FLS, FPT_TST_EXT.3, FPT_APW_EXT.1.1, FPT_APW_EXT.1.2, FPT_FLS.1.1, FPT_SKP_EXT.1.1, FPT_STM_EXT.1.1, FPT_STM_EXT.1.2, FPT_TST_EXT.3.1, FPT_TST_EXT.3.2, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FTA_SSL, FTA_SSL_EXT, FTA_TAB, FTA_SSL.3, FTA_SSL.4, FTA_SSL_EXT.1, FTA_TAB.1, FTA_SSL_EXT.1.1, FTP_ITC, FTP_TRP, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1Evaluation facilities
Teron LabsSide-channel analysis
DFAStandards
FIPS PUB 186-4, PKCS #1, RFC 5077, RFC 3526, RFC 4301, RFC 4303, RFC 3602, RFC 4106, RFC 5996, RFC 4868, RFC 5282, RFC 5114, RFC 4945, RFC 8784, RFC 1305, RFC 5905, RFC 4253, RFC 4251, RFC 5735, RFC 3513, RFC 5280, RFC 2986, RFC 791, RFC 8200, RFC 793, RFC 768, RFC 2460, RFC 792, RFC 2463, RFC 4443, RFC 959, RFC 8603, RFC 4252, RFC 4254, RFC5656, RFC6668, RFC 8308, RFC 8332, ISO/IEC 9796-2, ISO/IEC 14888-3, ISO/IEC 18031:2011, X.509, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
Title | Juniper Junos OS 23.4R1 for SRX1600 |
---|---|
Author | Teron Labs |
Creation date | D:20250314001707+00'00' |
Modification date | D:20250314001707+00'00' |
Pages | 96 |
Creator | Microsoft Word |
Heuristics
Certificate ID: Certificate Number: 2025/157
Extracted SARs
AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_SPD.1, ATE_IND.1, AVA_VAN.1CPE matches
- cpe:2.3:o:juniper:junos:23.4:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.4:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.4:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.4:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.4:r2-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:23.4:r2:*:*:*:*:*:*
Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-2004-0468 | MEDIUM | 5.0 | 2.9 | 06.12.2004 05:00 | ||
CVE-2024-39517 | MEDIUM | 6.5 | 3.6 | 10.07.2024 23:15 | ||
CVE-2024-39549 | HIGH | 7.5 | 3.6 | 11.07.2024 17:15 | ||
CVE-2024-39555 | HIGH | 7.5 | 3.6 | 10.07.2024 23:15 | ||
CVE-2024-39556 | HIGH | 7.0 | 5.9 | 10.07.2024 23:15 | ||
CVE-2025-21590 | MEDIUM | 4.4 | 3.6 | 12.03.2025 14:15 |
Showing 5 out of 6.
References
No references are available for this certificate.
Updates
-
05.05.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2004-0230']}
values discarded.
- The related_cves property was updated, with the
-
28.04.2025 The certificate data changed.
Certificate changed
The cert_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP_Certificate_2025_157_EFT-T046_Junos%20OS%2023.4R1%20for%20SRX1600_os.pdf
.
The state of the certificate object was updated.
- The cert property was updated, with the
{'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '30bb78329c563a3fca00512998a3666145e3de6f86b2367c0a5047f6ac3a4e25', 'txt_hash': '586ed35fb5549c367b972c0c5821a5967740a16de14a848fc6d4c9f8020bff29'}
data.
The PDF extraction data was updated.
- The cert_metadata property was set to
{'pdf_file_size_bytes': 146808, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/CreationDate': "D:20250428140400+10'00'", '/ModDate': "D:20250428140400+10'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_keywords property was set to
{'cc_cert_id': {'AU': {'Certificate Number: 2025/157': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'VPN': {'VPN': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The cert_filename property was set to
AISEP_Certificate_2025_157_EFT-T046_Junos OS 23.4R1 for SRX1600_os.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
Certificate Number: 2025/157
.
- The new value is
-
07.04.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
{'_type': 'Set', 'elements': ['cpe:2.3:o:juniper:junos:23.4:r2-s1:*:*:*:*:*:*', 'cpe:2.3:o:juniper:junos:23.4:r2-s2:*:*:*:*:*:*', 'cpe:2.3:o:juniper:junos:23.4:r2-s3:*:*:*:*:*:*']}
values added.
- The cpe_matches property was updated, with the
-
03.04.2025 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Juniper Junos OS 23.4R1 for SRX1600 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP_Certificate_2025_157_EFT-T046_Junos%20OS%2023.4R1%20for%20SRX1600_os.pdf",
"dgst": "7b49758e815c370d",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "Certificate Number: 2025/157",
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:juniper:junos:23.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:23.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:23.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:23.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:23.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:23.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:23.4:r2-s3:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"eal": "EAL1",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"23.4"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"6448a1802bb874d8",
"89f2a255423f4a20",
"e2ad7e4a892e3703",
"bde3d7587cf42e78"
]
},
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2024-39549",
"CVE-2025-21590",
"CVE-2004-0468",
"CVE-2024-39517",
"CVE-2024-39556",
"CVE-2024-39555"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Juniper Networks, Inc.",
"manufacturer_web": "https://www.juniper.net/",
"name": "Juniper Junos OS 23.4R1 for SRX1600",
"not_valid_after": "2030-03-18",
"not_valid_before": "2025-03-18",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "AISEP_Certificate_2025_157_EFT-T046_Junos OS 23.4R1 for SRX1600_os.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"AU": {
"Certificate Number: 2025/157": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20250428140400+10\u002700\u0027",
"/ModDate": "D:20250428140400+10\u002700\u0027",
"pdf_file_size_bytes": 146808,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "AISEP-CC-CR-2025-EFT-T046-CR-V1.0.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 1
},
"IPsec": {
"IPsec": 9
},
"SSH": {
"SSH": 4,
"SSHv2": 2
},
"TLS": {
"SSL": {
"SSL": 2
},
"TLS": {
"TLS": 2
}
},
"VPN": {
"VPN": 10
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Teron": {
"Teron Labs": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20250318233218+05\u002730\u0027",
"/ModDate": "D:20250318233218+05\u002730\u0027",
"pdf_file_size_bytes": 1261815,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.cyber.gov.au/ism",
"https://www.cyber.gov.au/sites/default/files/2019-03/AISEP_Policy_Manual.pdf",
"https://www.juniper.net/documentation",
"https://www.juniper.net/customers/csc/management",
"https://www.juniper.net/",
"https://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 19
},
"st_filename": "Juniper SRX1600 Junos OS 23.4R1 v1.0.1.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 5
},
"ECDH": {
"ECDH": 5
},
"ECDSA": {
"ECDSA": 16
}
},
"FF": {
"DH": {
"DH": 12,
"Diffie-Hellman": 2
},
"DSA": {
"DSA": 1
}
},
"RSA": {
"RSA 2048": 1
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN_CREDENTIALS_": 1,
"A.CONNECTIONS": 2,
"A.LIMITED_": 1,
"A.NO_THRU_TRAFFIC_": 1,
"A.PHYSICAL_PROTECTION": 1,
"A.REGULAR_UPDATES": 1,
"A.RESIDUAL_INFORMATION": 1,
"A.TRUSTED_": 1
},
"O": {
"O.AUTHENTICATION": 1,
"O.CRYPTOGRAPHIC_": 1,
"O.FAIL_SECURE": 1,
"O.IPS_ANALYZE": 1,
"O.IPS_REACT": 1,
"O.PORT_FILTERING": 1,
"O.STATEFUL_TRAFFIC": 1,
"O.SYSTEM_MONITORING": 2,
"O.TOE_ADMINISTRATION": 2
},
"OE": {
"OE.ADMIN_CREDENTIALS_": 1,
"OE.CONNECTIONS": 2,
"OE.NO_GENERAL_": 1,
"OE.NO_THRU_TRAFFIC_": 1,
"OE.PHYSICAL": 1,
"OE.RESDUAL_": 1,
"OE.TRUSTED_ADMIN": 1,
"OE.UPDATES": 1
},
"T": {
"T.DATA_INTEGRITY": 1,
"T.MALICIOUS_TRAFFIC": 1,
"T.NETWORK_ACCESS": 3,
"T.NETWORK_DISCLOSURE": 3,
"T.NETWORK_DOS": 1,
"T.NETWORK_MISUSE": 3,
"T.PASSWORD_CRACKING": 1,
"T.REPLAY_ATTACK": 1,
"T.SECURITY_FUNCTIONALITY_": 2,
"T.UNAUTHORIZED_": 1,
"T.UNDETECTED_ACTIVITY": 1,
"T.UNTRUSTED_": 1,
"T.UPDATE_COMPROMISE": 1,
"T.WEAK_AUTHENTICATION_": 1,
"T.WEAK_CRYPTOGRAPHY": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.1": 1,
"ALC_CMS.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_REQ.1": 1,
"ASE_SPD.1": 1
},
"ATE": {
"ATE_IND.1": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.1": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 11,
"FAU_GEN.1": 14,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 2,
"FAU_GEN.2": 4,
"FAU_GEN.2.1": 1,
"FAU_STG_EXT": 3,
"FAU_STG_EXT.1": 6,
"FAU_STG_EXT.1.1": 1,
"FAU_STG_EXT.1.2": 1,
"FAU_STG_EXT.1.3": 1
},
"FCS": {
"FCS_CKM": 6,
"FCS_CKM.1": 7,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 7,
"FCS_CKM.2.1": 1,
"FCS_CKM.4": 5,
"FCS_CKM.4.1": 1,
"FCS_COP": 24,
"FCS_COP.1": 5,
"FCS_NTP_EXT": 2,
"FCS_NTP_EXT.1": 5,
"FCS_NTP_EXT.1.1": 1,
"FCS_NTP_EXT.1.2": 1,
"FCS_NTP_EXT.1.3": 1,
"FCS_NTP_EXT.1.4": 2,
"FCS_RBG_EXT": 3,
"FCS_RBG_EXT.1": 7,
"FCS_RBG_EXT.1.1": 1,
"FCS_RBG_EXT.1.2": 1,
"FCS_SSHC_EXT": 1,
"FCS_SSHC_EXT.1": 15,
"FCS_SSHC_EXT.1.1": 1,
"FCS_SSHC_EXT.1.2": 1,
"FCS_SSHC_EXT.1.3": 1,
"FCS_SSHC_EXT.1.4": 1,
"FCS_SSHC_EXT.1.5": 1,
"FCS_SSHC_EXT.1.6": 1,
"FCS_SSHC_EXT.1.7": 1,
"FCS_SSHC_EXT.1.8": 1,
"FCS_SSHC_EXT.1.9": 1,
"FCS_SSHS_EXT": 1,
"FCS_SSHS_EXT.1": 10,
"FCS_SSHS_EXT.1.1": 1,
"FCS_SSHS_EXT.1.2": 1,
"FCS_SSHS_EXT.1.3": 1,
"FCS_SSHS_EXT.1.4": 1,
"FCS_SSHS_EXT.1.5": 1,
"FCS_SSHS_EXT.1.6": 1,
"FCS_SSHS_EXT.1.7": 1,
"FCS_SSHS_EXT.1.8": 1,
"FCS_TLSC_EXT.2.3": 1
},
"FDP": {
"FDP_RIP": 4,
"FDP_RIP.2": 3,
"FDP_RIP.2.1": 1
},
"FIA": {
"FIA_AFL": 2,
"FIA_AFL.1": 8,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_PMG_EXT": 2,
"FIA_PMG_EXT.1": 6,
"FIA_PMG_EXT.1.1": 1,
"FIA_PSK_EXT": 2,
"FIA_PSK_EXT.1": 4,
"FIA_PSK_EXT.1.1": 1,
"FIA_PSK_EXT.1.2": 1,
"FIA_PSK_EXT.2": 3,
"FIA_PSK_EXT.2.1": 1,
"FIA_PSK_EXT.3": 4,
"FIA_UAU": 3,
"FIA_UAU.7": 5,
"FIA_UAU.7.1": 1,
"FIA_UAU_EXT": 1,
"FIA_UAU_EXT.2": 4,
"FIA_UAU_EXT.2.1": 1,
"FIA_UIA_EXT": 2,
"FIA_UIA_EXT.1": 5,
"FIA_UIA_EXT.1.1": 1,
"FIA_UIA_EXT.1.2": 1
},
"FMT": {
"FMT_MOF": 17,
"FMT_MOF.1": 3,
"FMT_MTD": 13,
"FMT_MTD.1": 2,
"FMT_SMF": 20,
"FMT_SMF.1": 11,
"FMT_SMF.1.1": 1,
"FMT_SMR": 2,
"FMT_SMR.2": 5,
"FMT_SMR.2.1": 1,
"FMT_SMR.2.2": 1,
"FMT_SMR.2.3": 1
},
"FPT": {
"FPT_APW_EXT": 2,
"FPT_APW_EXT.1": 5,
"FPT_APW_EXT.1.1": 1,
"FPT_APW_EXT.1.2": 1,
"FPT_FLS": 4,
"FPT_FLS.1": 2,
"FPT_FLS.1.1": 1,
"FPT_SKP_EXT": 2,
"FPT_SKP_EXT.1": 5,
"FPT_SKP_EXT.1.1": 1,
"FPT_STM_EXT": 2,
"FPT_STM_EXT.1": 6,
"FPT_STM_EXT.1.1": 1,
"FPT_STM_EXT.1.2": 1,
"FPT_TST_EXT": 2,
"FPT_TST_EXT.1": 7,
"FPT_TST_EXT.3": 4,
"FPT_TST_EXT.3.1": 1,
"FPT_TST_EXT.3.2": 1,
"FPT_TUD_EXT": 2,
"FPT_TUD_EXT.1": 8,
"FPT_TUD_EXT.1.1": 1,
"FPT_TUD_EXT.1.2": 1,
"FPT_TUD_EXT.1.3": 1
},
"FTA": {
"FTA_SSL": 2,
"FTA_SSL.3": 6,
"FTA_SSL.4": 6,
"FTA_SSL_EXT": 2,
"FTA_SSL_EXT.1": 4,
"FTA_SSL_EXT.1.1": 1,
"FTA_TAB": 2,
"FTA_TAB.1": 7
},
"FTP": {
"FTP_ITC": 5,
"FTP_ITC.1": 10,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP": 7,
"FTP_TRP.1": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 11
},
"CTR": {
"CTR": 5
},
"GCM": {
"GCM": 8
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 5
}
},
"crypto_protocol": {
"IKE": {
"IKE": 25,
"IKEv2": 20
},
"IPsec": {
"IPsec": 63
},
"SSH": {
"SSH": 125,
"SSHv2": 20
},
"TLS": {
"DTLS": {
"DTLS": 4
},
"SSL": {
"SSL": 5
},
"TLS": {
"TLS": 10
}
},
"VPN": {
"VPN": 42
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 3
},
"KEX": {
"Key Exchange": 4
},
"MAC": {
"MAC": 6
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 32,
"P-384": 28,
"P-521": 22
}
},
"eval_facility": {
"Teron": {
"Teron Labs": 2
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 10
},
"SHA2": {
"SHA-2": 1,
"SHA-256": 21,
"SHA-384": 6,
"SHA-512": 14,
"SHA256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 2
},
"RNG": {
"RBG": 3,
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
},
"FIPS": {
"FIPS PUB 186-4": 9
},
"ISO": {
"ISO/IEC 14888-3": 1,
"ISO/IEC 18031:2011": 2,
"ISO/IEC 9796-2": 1
},
"PKCS": {
"PKCS #1": 1
},
"RFC": {
"RFC 1305": 1,
"RFC 2460": 2,
"RFC 2463": 1,
"RFC 2986": 2,
"RFC 3513": 2,
"RFC 3526": 6,
"RFC 3602": 3,
"RFC 4106": 2,
"RFC 4251": 3,
"RFC 4252": 1,
"RFC 4253": 3,
"RFC 4254": 1,
"RFC 4301": 2,
"RFC 4303": 1,
"RFC 4443": 1,
"RFC 4868": 2,
"RFC 4945": 2,
"RFC 5077": 1,
"RFC 5114": 2,
"RFC 5280": 5,
"RFC 5282": 1,
"RFC 5735": 2,
"RFC 5905": 1,
"RFC 5996": 2,
"RFC 768": 3,
"RFC 791": 3,
"RFC 792": 2,
"RFC 793": 3,
"RFC 8200": 1,
"RFC 8308": 1,
"RFC 8332": 1,
"RFC 8603": 2,
"RFC 8784": 1,
"RFC 959": 1,
"RFC5656": 1,
"RFC6668": 1
},
"X509": {
"X.509": 17
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 22
}
},
"constructions": {
"MAC": {
"HMAC": 6,
"HMAC-SHA-256": 8,
"HMAC-SHA-384": 5,
"HMAC-SHA-512": 6
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Teron Labs",
"/CreationDate": "D:20250314001707+00\u002700\u0027",
"/Creator": "Microsoft Word",
"/ModDate": "D:20250314001707+00\u002700\u0027",
"/Title": "Juniper Junos OS 23.4R1 for SRX1600",
"pdf_file_size_bytes": 1473889,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=38055",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=38243",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37945",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37718",
"http://www.teronlabs.com/",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37717"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 96
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_IPS_v1.0.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_VPNGW_v1.3.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_CPP_FW_v1.4e.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP-CC-CR-2025-EFT-T046-CR-V1.0.pdf",
"scheme": "AU",
"security_level": {
"_type": "Set",
"elements": []
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper%20SRX1600%20Junos%20OS%2023.4R1%20v1.0.1.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "30bb78329c563a3fca00512998a3666145e3de6f86b2367c0a5047f6ac3a4e25",
"txt_hash": "586ed35fb5549c367b972c0c5821a5967740a16de14a848fc6d4c9f8020bff29"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "8d0c6aace8b275e34833d7266622c422b67b18e4492c934055fb5a804429e797",
"txt_hash": "b18c05b3c62bf1da73353743ada3e6ed38b3e5c3f7ad79b9b0fbf5b1b8a0c7f2"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "8fc47236b07c0ba162ec8e80088e84ee52088bf36a5ec78064f4b21d424b8101",
"txt_hash": "4715bf79618110d621c6a0528dafbbdedf398e2753f8b88fd358d2cc9ce218ed"
}
},
"status": "active"
}