Juniper Networks JUNOS® 10.4R5 for M-Series, MX-Series, T-Series Routers and EX Series Switches

Known vulnerabilities detected

Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.

CSV information

Status archived
Valid from 10.08.2012
Valid until 19.04.2018
Scheme 🇨🇦 CA
Manufacturer Juniper Networks, Inc.
Category Network and Network-Related Devices and Systems
Security level ALC_FLR.3, EAL3+

Heuristics summary

Certificate ID: 383-4-188

Certificate

certificate could not be downloaded, no link is available.

Certification report

Extracted keywords

Schemes
MAC
Protocols
SSH

Security level
EAL 3+, EAL 3, EAL3+, EAL 3 augmented
Security Assurance Requirements (SAR)
ALC_FLR.3
Certificates
383-4-188-CR

Standards
ISO/IEC 17025:2005

File metadata

Title EAL 3 Evaluation of <TOE name and version>
Author User
Creation date D:20120810083649-04'00'
Modification date D:20120810083654-04'00'
Pages 13
Creator Acrobat PDFMaker 9.0 for Word
Producer Acrobat Distiller 9.0.0 (Windows)

Frontpage

Certificate ID 383-4-188-CR
Certification lab CANADA

Security target

Extracted keywords

Protocols
SSH, SSL

Security level
EAL3, EAL3 augmented
Claims
O.FLOW, O.PROTECT, O.EADMIN, O.ACCESS, O.ROLBAK, O.AUDIT, O.CONN, T.ROUTE, T.PRIVIL, T.OPS, T.MANDAT, T.CONFLOSS, T.NOAUDIT, A.LOCATE, A.NOEVIL, A.EAUTH, A.TIME, A.CRYPTO, A.NWCOMP, OE.EAUTH, OE.TIME, OE.CRYPTO, OE.PHYSICAL, OE.ADMIN, OE.NWCOMP
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_ARP.1, FAU_SAR.1, FAU_GEN.2, FAU_SAA.1, FAU_STG.1, FAU_ARP.1.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FDP_IFC.1, FDP_IFF.1, FDP_ROL.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ROL.1.1, FDP_ROL.1.2, FIA_ATD.1, FIA_SOS.1, FIA_UAU.2, FIA_UAU.5, FIA_UID.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UAU.1, FIA_UID.2.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.1, FMT_SMF.1, FMT_MSA.3, FMT_MTD.1, FMT_MOF, FMT_MTD, FMT_SMR.1, FMT_MOF.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.1, FPT_STM.1, FPT_STM.1.1, FTA_TSE.1, FTA_TSE.1.1

Certification process
out of scope, which are out of scope), and SSH (which is provided by the operational environment, This covers all services used to exchange information, including telnet and SSL (which are out of scope), and SSH (which is provided by the operational environment). Authentication services can be, accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: All

Standards
CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Title JUNOS 10.4 M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches
Subject EAL3 Security Target
Author Juniper
Creation date D:20120725095220-04'00'
Modification date D:20120725095220-04'00'
Pages 39
Creator Microsoft® Word 2010
Producer Microsoft® Word 2010

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

383-4-188

Extracted SARs

ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_FLR.3, ALC_LCD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2004-0230
C N
MEDIUM 5.0 2.9 18.08.2004
CVE-2004-0468
C N
MEDIUM 5.0 2.9 06.12.2004
CVE-2013-4686
C N
HIGH 7.1 6.9 11.07.2013
CVE-2013-4689
C N
MEDIUM 5.1 6.4 17.10.2013
CVE-2013-6014
C N
CRITICAL 9.3 5.8 28.10.2013
CVE-2013-6170
C N
MEDIUM 4.3 2.9 17.10.2013
CVE-2013-6618
C N
HIGH 9.0 10.0 05.11.2013
CVE-2013-7313
C N
MEDIUM 5.4 6.4 23.01.2014
CVE-2014-0613
C N
HIGH 7.1 6.9 15.01.2014
CVE-2014-0615
C N
HIGH 7.2 10.0 15.01.2014
CVE-2014-0616
C N
HIGH 7.1 6.9 15.01.2014
CVE-2014-2712
C N
MEDIUM 4.3 2.9 14.04.2014
CVE-2014-2714
C N
HIGH 7.1 6.9 14.04.2014
CVE-2014-3818
C N
HIGH 7.8 6.9 14.10.2014
CVE-2019-0036
C N
CRITICAL 9.8 5.9 10.04.2019
CVE-2021-31362
C N
LOW 3.3 2.9 19.10.2021
CVE-2021-31372
C N
HIGH 9.0 10.0 19.10.2021
CVE-2022-22156
C N
HIGH 7.4 5.2 19.01.2022
CVE-2022-22162
C N
HIGH 7.8 5.9 19.01.2022
CVE-2022-22163
C N
MEDIUM 6.5 3.6 19.01.2022
CVE-2022-22173
C N
HIGH 7.5 3.6 19.01.2022
CVE-2022-22181
C N
MEDIUM 5.4 2.7 14.04.2022
CVE-2022-22197
C N
HIGH 7.5 3.6 14.04.2022
CVE-2022-22208
C N
MEDIUM 5.9 3.6 18.10.2022
CVE-2022-22214
C N
MEDIUM 6.5 3.6 20.07.2022
CVE-2022-22215
C N
MEDIUM 5.5 3.6 20.07.2022
CVE-2022-22220
C N
MEDIUM 5.9 3.6 18.10.2022
CVE-2022-22224
C N
MEDIUM 6.5 3.6 18.10.2022
CVE-2022-22238
C N
MEDIUM 6.5 3.6 18.10.2022
CVE-2022-22241
C N
CRITICAL 9.8 5.9 18.10.2022
CVE-2022-22242
C N
MEDIUM 6.1 2.7 18.10.2022
CVE-2022-22243
C N
MEDIUM 4.3 1.4 18.10.2022
CVE-2022-22244
C N
MEDIUM 5.3 1.4 18.10.2022
CVE-2022-22245
C N
MEDIUM 4.3 1.4 18.10.2022
CVE-2022-22246
C N
HIGH 8.8 5.9 18.10.2022
CVE-2023-22391
C N
HIGH 7.5 3.6 13.01.2023
CVE-2023-22395
C N
MEDIUM 6.5 3.6 13.01.2023
CVE-2023-22406
C N
MEDIUM 6.5 3.6 13.01.2023
CVE-2023-22407
C N
MEDIUM 6.5 3.6 13.01.2023
CVE-2023-28962
C N
CRITICAL 9.8 5.9 17.04.2023
CVE-2023-28963
C N
MEDIUM 5.3 1.4 17.04.2023
CVE-2023-28964
C N
HIGH 7.5 3.6 17.04.2023
CVE-2023-28975
C N
MEDIUM 4.6 3.6 17.04.2023
CVE-2023-28979
C N
MEDIUM 4.7 1.4 17.04.2023
CVE-2023-36839
C N
MEDIUM 6.5 3.6 12.10.2023
CVE-2023-36840
C N
MEDIUM 5.5 3.6 14.07.2023
CVE-2023-36841
C N
HIGH 7.5 3.6 12.10.2023
CVE-2023-36842
C N
MEDIUM 6.5 3.6 12.01.2024
CVE-2023-36843
C N
HIGH 7.5 3.6 12.10.2023
CVE-2023-44175
C N
HIGH 7.5 3.6 12.10.2023
CVE-2023-44176
C N
MEDIUM 5.5 3.6 13.10.2023
CVE-2023-44177
C N
MEDIUM 5.5 3.6 13.10.2023
CVE-2023-44178
C N
MEDIUM 5.5 3.6 13.10.2023
CVE-2023-44182
C N
HIGH 8.8 5.9 13.10.2023
CVE-2023-44184
C N
MEDIUM 6.5 3.6 13.10.2023
CVE-2023-44185
C N
HIGH 7.5 3.6 13.10.2023
CVE-2023-44186
C N
HIGH 7.5 3.6 11.10.2023
CVE-2023-44194
C N
HIGH 7.8 5.9 13.10.2023
CVE-2023-44197
C N
HIGH 7.5 3.6 13.10.2023
CVE-2023-44201
C N
MEDIUM 5.5 3.6 13.10.2023
CVE-2023-4481
C N
HIGH 7.5 3.6 01.09.2023
CVE-2024-21591
C N
CRITICAL 9.8 5.9 12.01.2024
CVE-2024-21594
C N
MEDIUM 5.5 3.6 12.01.2024
CVE-2024-30380
C N
MEDIUM 6.5 3.6 16.04.2024
CVE-2024-30397
C N
HIGH 7.5 3.6 12.04.2024
CVE-2024-39511
C N
MEDIUM 5.5 3.6 10.07.2024
CVE-2024-39514
C N
MEDIUM 6.5 3.6 10.07.2024
CVE-2024-39517
C N
MEDIUM 6.5 3.6 10.07.2024
CVE-2024-39528
C N
MEDIUM 5.7 3.6 11.07.2024
CVE-2024-39549
C N
HIGH 7.5 3.6 11.07.2024
CVE-2024-39555
C N
HIGH 7.5 3.6 10.07.2024
CVE-2024-39556
C N
HIGH 7.0 5.9 10.07.2024
CVE-2024-39558
C N
MEDIUM 6.5 3.6 10.07.2024
Showing 5 out of 73.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": null,
  "dgst": "8e96ae99530fca1d",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "383-4-188",
    "cert_lab": [
      "CANADA"
    ],
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:o:juniper:junos:10.4:*:*:*:*:*:*:*",
        "cpe:2.3:o:juniper:junos:10.4s:*:*:*:*:*:*:*",
        "cpe:2.3:o:juniper:junos:10.4r:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "eal": "EAL3+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "10.4"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2021-31362",
        "CVE-2023-28963",
        "CVE-2023-4481",
        "CVE-2022-22208",
        "CVE-2022-22246",
        "CVE-2023-44197",
        "CVE-2023-28962",
        "CVE-2013-6170",
        "CVE-2014-2712",
        "CVE-2014-0615",
        "CVE-2024-39528",
        "CVE-2023-28975",
        "CVE-2023-44176",
        "CVE-2024-30397",
        "CVE-2022-22162",
        "CVE-2022-22214",
        "CVE-2024-30380",
        "CVE-2023-44201",
        "CVE-2022-22245",
        "CVE-2022-22241",
        "CVE-2013-4689",
        "CVE-2013-7313",
        "CVE-2013-6618",
        "CVE-2023-44182",
        "CVE-2014-2714",
        "CVE-2021-31372",
        "CVE-2023-44177",
        "CVE-2022-22224",
        "CVE-2024-21591",
        "CVE-2024-39558",
        "CVE-2022-22181",
        "CVE-2022-22220",
        "CVE-2022-22244",
        "CVE-2024-39511",
        "CVE-2023-22406",
        "CVE-2023-28964",
        "CVE-2024-39514",
        "CVE-2022-22156",
        "CVE-2023-22407",
        "CVE-2022-22243",
        "CVE-2024-21594",
        "CVE-2023-22391",
        "CVE-2023-44178",
        "CVE-2023-36841",
        "CVE-2019-0036",
        "CVE-2023-36843",
        "CVE-2024-39549",
        "CVE-2023-36840",
        "CVE-2024-39517",
        "CVE-2022-22215",
        "CVE-2022-22238",
        "CVE-2022-22242",
        "CVE-2023-44184",
        "CVE-2023-44186",
        "CVE-2023-22395",
        "CVE-2023-44185",
        "CVE-2004-0230",
        "CVE-2023-36842",
        "CVE-2022-22197",
        "CVE-2023-44175",
        "CVE-2024-39555",
        "CVE-2022-22173",
        "CVE-2023-44194",
        "CVE-2023-36839",
        "CVE-2014-0613",
        "CVE-2004-0468",
        "CVE-2013-4686",
        "CVE-2013-6014",
        "CVE-2022-22163",
        "CVE-2024-39556",
        "CVE-2023-28979",
        "CVE-2014-0616",
        "CVE-2014-3818"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Juniper Networks, Inc.",
  "manufacturer_web": "https://www.juniper.net/",
  "name": "Juniper Networks JUNOS\u00ae 10.4R5 for M-Series, MX-Series, T-Series Routers and EX Series Switches",
  "not_valid_after": "2018-04-19",
  "not_valid_before": "2012-08-10",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "383-4-188 CR v1.0e.pdf",
    "report_frontpage": {
      "CA": {
        "cert_id": "383-4-188-CR",
        "cert_lab": "CANADA"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "CA": {
          "383-4-188-CR": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.3": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 3": 4,
          "EAL 3 augmented": 2,
          "EAL 3+": 2,
          "EAL3+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 3
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 17025:2005": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "User",
      "/CCEF": "CGI IT Security Evaluation \u0026 Test Facility",
      "/CR date": "10 August 2012",
      "/CR version": "1.0",
      "/Certificate date": "10 August 2012",
      "/CreationDate": "D:20120810083649-04\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 9.0 for Word",
      "/Developer name": "Juniper Networks, Inc.",
      "/Document number": "383-4-188-CR",
      "/ETR title, version, date": "Juniper Networks M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches running JUNOS 10.4R5 Common Criteria EAL3+ Evaluation Technical Report (ETR), Document Version 1.2,",
      "/Evaluation completion date": "30 July 2012",
      "/ModDate": "D:20120810083654-04\u002700\u0027",
      "/Producer": "Acrobat Distiller 9.0.0 (Windows)",
      "/ST Title": "Juniper Networks Security Target for Juniper Networks M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches running JUNOS 10.4R5",
      "/ST date": "11 July 2012",
      "/ST version": "Version 2.2",
      "/SourceModified": "D:20120809122721",
      "/Sponsor": "Juniper Networks, Inc.",
      "/TOE Version": "5.0",
      "/TOE name and version": "Juniper Networks JUNOS\u00ae 10.4R5 for M-Series, MX-Series, T-Series Routers and EX Series Switches",
      "/TOE short name": "JUNOS\u00ae 10.4R5 ",
      "/Title": "EAL 3 Evaluation of \u003cTOE name and version\u003e",
      "pdf_file_size_bytes": 64990,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 13
    },
    "st_filename": "383-4-188 ST v2.2.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CRYPTO": 4,
          "A.EAUTH": 2,
          "A.LOCATE": 4,
          "A.NOEVIL": 3,
          "A.NWCOMP": 2,
          "A.TIME": 4
        },
        "O": {
          "O.ACCESS": 14,
          "O.AUDIT": 13,
          "O.CONN": 6,
          "O.EADMIN": 8,
          "O.FLOW": 11,
          "O.PROTECT": 15,
          "O.ROLBAK": 6
        },
        "OE": {
          "OE.ADMIN": 3,
          "OE.CRYPTO": 3,
          "OE.EAUTH": 3,
          "OE.NWCOMP": 3,
          "OE.PHYSICAL": 3,
          "OE.TIME": 3
        },
        "T": {
          "T.CONFLOSS": 5,
          "T.MANDAT": 3,
          "T.NOAUDIT": 2,
          "T.OPS": 8,
          "T.PRIVIL": 7,
          "T.ROUTE": 9
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.3": 1,
          "ADV_TDS.2": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.3": 1,
          "ALC_CMS.3": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR.3": 7,
          "ALC_LCD.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 5,
          "EAL3 augmented": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 6,
          "FAU_ARP.1.1": 1,
          "FAU_GEN.1": 6,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 5,
          "FAU_GEN.2.1": 1,
          "FAU_SAA.1": 5,
          "FAU_SAA.1.1": 1,
          "FAU_SAA.1.2": 1,
          "FAU_SAR.1": 5,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_STG.1": 5,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1
        },
        "FDP": {
          "FDP_IFC.1": 5,
          "FDP_IFC.1.1": 1,
          "FDP_IFF.1": 6,
          "FDP_IFF.1.1": 1,
          "FDP_IFF.1.2": 1,
          "FDP_IFF.1.3": 1,
          "FDP_IFF.1.4": 1,
          "FDP_IFF.1.5": 1,
          "FDP_ROL.1": 5,
          "FDP_ROL.1.1": 1,
          "FDP_ROL.1.2": 1
        },
        "FIA": {
          "FIA_ATD.1": 5,
          "FIA_ATD.1.1": 1,
          "FIA_SOS.1": 5,
          "FIA_SOS.1.1": 1,
          "FIA_UAU.1": 2,
          "FIA_UAU.2": 8,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.5": 5,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UID.1": 1,
          "FIA_UID.2": 7,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF": 10,
          "FMT_MOF.1": 2,
          "FMT_MSA.1": 3,
          "FMT_MSA.3": 10,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD": 32,
          "FMT_MTD.1": 7,
          "FMT_SMF.1": 7,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 5,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_STM.1": 5,
          "FPT_STM.1.1": 1
        },
        "FTA": {
          "FTA_TSE.1": 5,
          "FTA_TSE.1.1": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "This covers all services used to exchange information, including telnet and SSL (which are out of scope), and SSH (which is provided by the operational environment). Authentication services can be": 1,
          "accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items:  All": 1,
          "out of scope": 2,
          "which are out of scope), and SSH (which is provided by the operational environment": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 13
        },
        "TLS": {
          "SSL": {
            "SSL": 2
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2009-07-002": 1,
          "CCMB-2009-07-003": 1,
          "CCMB-2009-07-004": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Juniper",
      "/CreationDate": "D:20120725095220-04\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20120725095220-04\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "/Subject": "EAL3 Security Target",
      "/Title": "JUNOS 10.4 M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches",
      "pdf_file_size_bytes": 817354,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 39
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-188%20CR%20v1.0e.pdf",
  "scheme": "CA",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3+",
      "ALC_FLR.3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-188%20ST%20v2.2.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "9c6dae203d11062a123ce73a602e77a238100532c4de58d8c92aab57caaf17e8",
      "txt_hash": "050a2ce508f42fc934a825f4bc666b440b35baf1f6794c567182b30e29178252"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "f78145d5d79856030397a11292bbea924c27cd38a3e8ce8764bb2fe7e604b861",
      "txt_hash": "2f40d00f6037d7d4bbdea95d84640a4865d4f681d67f0d29ae39db856a3bd3f5"
    }
  },
  "status": "archived"
}