This page was not yet optimized for use on mobile
devices.
Juniper Networks JUNOS® 10.4R5 for M-Series, MX-Series, T-Series Routers and EX Series Switches
Known vulnerabilities detected
Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.CSV information
| Status | archived |
|---|---|
| Valid from | 10.08.2012 |
| Valid until | 19.04.2018 |
| Scheme | 🇨🇦 CA |
| Manufacturer | Juniper Networks, Inc. |
| Category | Network and Network-Related Devices and Systems |
| Security level | ALC_FLR.3, EAL3+ |
Heuristics summary
Certificate ID: 383-4-188
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Schemes
MACProtocols
SSHSecurity level
EAL 3+, EAL 3, EAL3+, EAL 3 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.3Certificates
383-4-188-CRStandards
ISO/IEC 17025:2005File metadata
| Title | EAL 3 Evaluation of <TOE name and version> |
|---|---|
| Author | User |
| Creation date | D:20120810083649-04'00' |
| Modification date | D:20120810083654-04'00' |
| Pages | 13 |
| Creator | Acrobat PDFMaker 9.0 for Word |
| Producer | Acrobat Distiller 9.0.0 (Windows) |
Frontpage
| Certificate ID | 383-4-188-CR |
|---|---|
| Certification lab | CANADA |
Security target
Extracted keywords
Protocols
SSH, SSLSecurity level
EAL3, EAL3 augmentedClaims
O.FLOW, O.PROTECT, O.EADMIN, O.ACCESS, O.ROLBAK, O.AUDIT, O.CONN, T.ROUTE, T.PRIVIL, T.OPS, T.MANDAT, T.CONFLOSS, T.NOAUDIT, A.LOCATE, A.NOEVIL, A.EAUTH, A.TIME, A.CRYPTO, A.NWCOMP, OE.EAUTH, OE.TIME, OE.CRYPTO, OE.PHYSICAL, OE.ADMIN, OE.NWCOMPSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_ARP.1, FAU_SAR.1, FAU_GEN.2, FAU_SAA.1, FAU_STG.1, FAU_ARP.1.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FDP_IFC.1, FDP_IFF.1, FDP_ROL.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ROL.1.1, FDP_ROL.1.2, FIA_ATD.1, FIA_SOS.1, FIA_UAU.2, FIA_UAU.5, FIA_UID.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UAU.1, FIA_UID.2.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.1, FMT_SMF.1, FMT_MSA.3, FMT_MTD.1, FMT_MOF, FMT_MTD, FMT_SMR.1, FMT_MOF.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.1, FPT_STM.1, FPT_STM.1.1, FTA_TSE.1, FTA_TSE.1.1Certification process
out of scope, which are out of scope), and SSH (which is provided by the operational environment, This covers all services used to exchange information, including telnet and SSL (which are out of scope), and SSH (which is provided by the operational environment). Authentication services can be, accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: AllStandards
CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
| Title | JUNOS 10.4 M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches |
|---|---|
| Subject | EAL3 Security Target |
| Author | Juniper |
| Creation date | D:20120725095220-04'00' |
| Modification date | D:20120725095220-04'00' |
| Pages | 39 |
| Creator | Microsoft® Word 2010 |
| Producer | Microsoft® Word 2010 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
383-4-188Extracted SARs
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_FLR.3, ALC_LCD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2CPE matches
Related CVEs
| ID | Links | Severity | CVSS Score | Published on | ||
|---|---|---|---|---|---|---|
| Base | Exploitability | Impact | ||||
| CVE-2004-0230 | MEDIUM | 5.0 | 2.9 | 18.08.2004 | ||
| CVE-2004-0468 | MEDIUM | 5.0 | 2.9 | 06.12.2004 | ||
| CVE-2013-4686 | HIGH | 7.1 | 6.9 | 11.07.2013 | ||
| CVE-2013-4689 | MEDIUM | 5.1 | 6.4 | 17.10.2013 | ||
| CVE-2013-6014 | CRITICAL | 9.3 | 5.8 | 28.10.2013 | ||
| CVE-2013-6170 | MEDIUM | 4.3 | 2.9 | 17.10.2013 | ||
| CVE-2013-6618 | HIGH | 9.0 | 10.0 | 05.11.2013 | ||
| CVE-2013-7313 | MEDIUM | 5.4 | 6.4 | 23.01.2014 | ||
| CVE-2014-0613 | HIGH | 7.1 | 6.9 | 15.01.2014 | ||
| CVE-2014-0615 | HIGH | 7.2 | 10.0 | 15.01.2014 | ||
| CVE-2014-0616 | HIGH | 7.1 | 6.9 | 15.01.2014 | ||
| CVE-2014-2712 | MEDIUM | 4.3 | 2.9 | 14.04.2014 | ||
| CVE-2014-2714 | HIGH | 7.1 | 6.9 | 14.04.2014 | ||
| CVE-2014-3818 | HIGH | 7.8 | 6.9 | 14.10.2014 | ||
| CVE-2019-0036 | CRITICAL | 9.8 | 5.9 | 10.04.2019 | ||
| CVE-2021-31362 | LOW | 3.3 | 2.9 | 19.10.2021 | ||
| CVE-2021-31372 | HIGH | 9.0 | 10.0 | 19.10.2021 | ||
| CVE-2022-22156 | HIGH | 7.4 | 5.2 | 19.01.2022 | ||
| CVE-2022-22162 | HIGH | 7.8 | 5.9 | 19.01.2022 | ||
| CVE-2022-22163 | MEDIUM | 6.5 | 3.6 | 19.01.2022 | ||
| CVE-2022-22173 | HIGH | 7.5 | 3.6 | 19.01.2022 | ||
| CVE-2022-22181 | MEDIUM | 5.4 | 2.7 | 14.04.2022 | ||
| CVE-2022-22197 | HIGH | 7.5 | 3.6 | 14.04.2022 | ||
| CVE-2022-22208 | MEDIUM | 5.9 | 3.6 | 18.10.2022 | ||
| CVE-2022-22214 | MEDIUM | 6.5 | 3.6 | 20.07.2022 | ||
| CVE-2022-22215 | MEDIUM | 5.5 | 3.6 | 20.07.2022 | ||
| CVE-2022-22220 | MEDIUM | 5.9 | 3.6 | 18.10.2022 | ||
| CVE-2022-22224 | MEDIUM | 6.5 | 3.6 | 18.10.2022 | ||
| CVE-2022-22238 | MEDIUM | 6.5 | 3.6 | 18.10.2022 | ||
| CVE-2022-22241 | CRITICAL | 9.8 | 5.9 | 18.10.2022 | ||
| CVE-2022-22242 | MEDIUM | 6.1 | 2.7 | 18.10.2022 | ||
| CVE-2022-22243 | MEDIUM | 4.3 | 1.4 | 18.10.2022 | ||
| CVE-2022-22244 | MEDIUM | 5.3 | 1.4 | 18.10.2022 | ||
| CVE-2022-22245 | MEDIUM | 4.3 | 1.4 | 18.10.2022 | ||
| CVE-2022-22246 | HIGH | 8.8 | 5.9 | 18.10.2022 | ||
| CVE-2023-22391 | HIGH | 7.5 | 3.6 | 13.01.2023 | ||
| CVE-2023-22395 | MEDIUM | 6.5 | 3.6 | 13.01.2023 | ||
| CVE-2023-22406 | MEDIUM | 6.5 | 3.6 | 13.01.2023 | ||
| CVE-2023-22407 | MEDIUM | 6.5 | 3.6 | 13.01.2023 | ||
| CVE-2023-28962 | CRITICAL | 9.8 | 5.9 | 17.04.2023 | ||
| CVE-2023-28963 | MEDIUM | 5.3 | 1.4 | 17.04.2023 | ||
| CVE-2023-28964 | HIGH | 7.5 | 3.6 | 17.04.2023 | ||
| CVE-2023-28975 | MEDIUM | 4.6 | 3.6 | 17.04.2023 | ||
| CVE-2023-28979 | MEDIUM | 4.7 | 1.4 | 17.04.2023 | ||
| CVE-2023-36839 | MEDIUM | 6.5 | 3.6 | 12.10.2023 | ||
| CVE-2023-36840 | MEDIUM | 5.5 | 3.6 | 14.07.2023 | ||
| CVE-2023-36841 | HIGH | 7.5 | 3.6 | 12.10.2023 | ||
| CVE-2023-36842 | MEDIUM | 6.5 | 3.6 | 12.01.2024 | ||
| CVE-2023-36843 | HIGH | 7.5 | 3.6 | 12.10.2023 | ||
| CVE-2023-44175 | HIGH | 7.5 | 3.6 | 12.10.2023 | ||
| CVE-2023-44176 | MEDIUM | 5.5 | 3.6 | 13.10.2023 | ||
| CVE-2023-44177 | MEDIUM | 5.5 | 3.6 | 13.10.2023 | ||
| CVE-2023-44178 | MEDIUM | 5.5 | 3.6 | 13.10.2023 | ||
| CVE-2023-44182 | HIGH | 8.8 | 5.9 | 13.10.2023 | ||
| CVE-2023-44184 | MEDIUM | 6.5 | 3.6 | 13.10.2023 | ||
| CVE-2023-44185 | HIGH | 7.5 | 3.6 | 13.10.2023 | ||
| CVE-2023-44186 | HIGH | 7.5 | 3.6 | 11.10.2023 | ||
| CVE-2023-44194 | HIGH | 7.8 | 5.9 | 13.10.2023 | ||
| CVE-2023-44197 | HIGH | 7.5 | 3.6 | 13.10.2023 | ||
| CVE-2023-44201 | MEDIUM | 5.5 | 3.6 | 13.10.2023 | ||
| CVE-2023-4481 | HIGH | 7.5 | 3.6 | 01.09.2023 | ||
| CVE-2024-21591 | CRITICAL | 9.8 | 5.9 | 12.01.2024 | ||
| CVE-2024-21594 | MEDIUM | 5.5 | 3.6 | 12.01.2024 | ||
| CVE-2024-30380 | MEDIUM | 6.5 | 3.6 | 16.04.2024 | ||
| CVE-2024-30397 | HIGH | 7.5 | 3.6 | 12.04.2024 | ||
| CVE-2024-39511 | MEDIUM | 5.5 | 3.6 | 10.07.2024 | ||
| CVE-2024-39514 | MEDIUM | 6.5 | 3.6 | 10.07.2024 | ||
| CVE-2024-39517 | MEDIUM | 6.5 | 3.6 | 10.07.2024 | ||
| CVE-2024-39528 | MEDIUM | 5.7 | 3.6 | 11.07.2024 | ||
| CVE-2024-39549 | HIGH | 7.5 | 3.6 | 11.07.2024 | ||
| CVE-2024-39555 | HIGH | 7.5 | 3.6 | 10.07.2024 | ||
| CVE-2024-39556 | HIGH | 7.0 | 5.9 | 10.07.2024 | ||
| CVE-2024-39558 | MEDIUM | 6.5 | 3.6 | 10.07.2024 | ||
Showing 5 out of 73.
Similar certificates
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": null,
"dgst": "8e96ae99530fca1d",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "383-4-188",
"cert_lab": [
"CANADA"
],
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:juniper:junos:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:10.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:10.4r:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"eal": "EAL3+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"10.4"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2021-31362",
"CVE-2023-28963",
"CVE-2023-4481",
"CVE-2022-22208",
"CVE-2022-22246",
"CVE-2023-44197",
"CVE-2023-28962",
"CVE-2013-6170",
"CVE-2014-2712",
"CVE-2014-0615",
"CVE-2024-39528",
"CVE-2023-28975",
"CVE-2023-44176",
"CVE-2024-30397",
"CVE-2022-22162",
"CVE-2022-22214",
"CVE-2024-30380",
"CVE-2023-44201",
"CVE-2022-22245",
"CVE-2022-22241",
"CVE-2013-4689",
"CVE-2013-7313",
"CVE-2013-6618",
"CVE-2023-44182",
"CVE-2014-2714",
"CVE-2021-31372",
"CVE-2023-44177",
"CVE-2022-22224",
"CVE-2024-21591",
"CVE-2024-39558",
"CVE-2022-22181",
"CVE-2022-22220",
"CVE-2022-22244",
"CVE-2024-39511",
"CVE-2023-22406",
"CVE-2023-28964",
"CVE-2024-39514",
"CVE-2022-22156",
"CVE-2023-22407",
"CVE-2022-22243",
"CVE-2024-21594",
"CVE-2023-22391",
"CVE-2023-44178",
"CVE-2023-36841",
"CVE-2019-0036",
"CVE-2023-36843",
"CVE-2024-39549",
"CVE-2023-36840",
"CVE-2024-39517",
"CVE-2022-22215",
"CVE-2022-22238",
"CVE-2022-22242",
"CVE-2023-44184",
"CVE-2023-44186",
"CVE-2023-22395",
"CVE-2023-44185",
"CVE-2004-0230",
"CVE-2023-36842",
"CVE-2022-22197",
"CVE-2023-44175",
"CVE-2024-39555",
"CVE-2022-22173",
"CVE-2023-44194",
"CVE-2023-36839",
"CVE-2014-0613",
"CVE-2004-0468",
"CVE-2013-4686",
"CVE-2013-6014",
"CVE-2022-22163",
"CVE-2024-39556",
"CVE-2023-28979",
"CVE-2014-0616",
"CVE-2014-3818"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Juniper Networks, Inc.",
"manufacturer_web": "https://www.juniper.net/",
"name": "Juniper Networks JUNOS\u00ae 10.4R5 for M-Series, MX-Series, T-Series Routers and EX Series Switches",
"not_valid_after": "2018-04-19",
"not_valid_before": "2012-08-10",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "383-4-188 CR v1.0e.pdf",
"report_frontpage": {
"CA": {
"cert_id": "383-4-188-CR",
"cert_lab": "CANADA"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"CA": {
"383-4-188-CR": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.3": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 4,
"EAL 3 augmented": 2,
"EAL 3+": 2,
"EAL3+": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 3
}
},
"crypto_scheme": {
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 17025:2005": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "User",
"/CCEF": "CGI IT Security Evaluation \u0026 Test Facility",
"/CR date": "10 August 2012",
"/CR version": "1.0",
"/Certificate date": "10 August 2012",
"/CreationDate": "D:20120810083649-04\u002700\u0027",
"/Creator": "Acrobat PDFMaker 9.0 for Word",
"/Developer name": "Juniper Networks, Inc.",
"/Document number": "383-4-188-CR",
"/ETR title, version, date": "Juniper Networks M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches running JUNOS 10.4R5 Common Criteria EAL3+ Evaluation Technical Report (ETR), Document Version 1.2,",
"/Evaluation completion date": "30 July 2012",
"/ModDate": "D:20120810083654-04\u002700\u0027",
"/Producer": "Acrobat Distiller 9.0.0 (Windows)",
"/ST Title": "Juniper Networks Security Target for Juniper Networks M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches running JUNOS 10.4R5",
"/ST date": "11 July 2012",
"/ST version": "Version 2.2",
"/SourceModified": "D:20120809122721",
"/Sponsor": "Juniper Networks, Inc.",
"/TOE Version": "5.0",
"/TOE name and version": "Juniper Networks JUNOS\u00ae 10.4R5 for M-Series, MX-Series, T-Series Routers and EX Series Switches",
"/TOE short name": "JUNOS\u00ae 10.4R5 ",
"/Title": "EAL 3 Evaluation of \u003cTOE name and version\u003e",
"pdf_file_size_bytes": 64990,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 13
},
"st_filename": "383-4-188 ST v2.2.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CRYPTO": 4,
"A.EAUTH": 2,
"A.LOCATE": 4,
"A.NOEVIL": 3,
"A.NWCOMP": 2,
"A.TIME": 4
},
"O": {
"O.ACCESS": 14,
"O.AUDIT": 13,
"O.CONN": 6,
"O.EADMIN": 8,
"O.FLOW": 11,
"O.PROTECT": 15,
"O.ROLBAK": 6
},
"OE": {
"OE.ADMIN": 3,
"OE.CRYPTO": 3,
"OE.EAUTH": 3,
"OE.NWCOMP": 3,
"OE.PHYSICAL": 3,
"OE.TIME": 3
},
"T": {
"T.CONFLOSS": 5,
"T.MANDAT": 3,
"T.NOAUDIT": 2,
"T.OPS": 8,
"T.PRIVIL": 7,
"T.ROUTE": 9
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.3": 1,
"ADV_TDS.2": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.3": 1,
"ALC_CMS.3": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR.3": 7,
"ALC_LCD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL3": 5,
"EAL3 augmented": 4
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 6,
"FAU_ARP.1.1": 1,
"FAU_GEN.1": 6,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 5,
"FAU_GEN.2.1": 1,
"FAU_SAA.1": 5,
"FAU_SAA.1.1": 1,
"FAU_SAA.1.2": 1,
"FAU_SAR.1": 5,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_STG.1": 5,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1
},
"FDP": {
"FDP_IFC.1": 5,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 6,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1,
"FDP_ROL.1": 5,
"FDP_ROL.1.1": 1,
"FDP_ROL.1.2": 1
},
"FIA": {
"FIA_ATD.1": 5,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 5,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 2,
"FIA_UAU.2": 8,
"FIA_UAU.2.1": 1,
"FIA_UAU.5": 5,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UID.1": 1,
"FIA_UID.2": 7,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF": 10,
"FMT_MOF.1": 2,
"FMT_MSA.1": 3,
"FMT_MSA.3": 10,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 32,
"FMT_MTD.1": 7,
"FMT_SMF.1": 7,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 5,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM.1": 5,
"FPT_STM.1.1": 1
},
"FTA": {
"FTA_TSE.1": 5,
"FTA_TSE.1.1": 1
}
},
"certification_process": {
"OutOfScope": {
"This covers all services used to exchange information, including telnet and SSL (which are out of scope), and SSH (which is provided by the operational environment). Authentication services can be": 1,
"accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: All": 1,
"out of scope": 2,
"which are out of scope), and SSH (which is provided by the operational environment": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 13
},
"TLS": {
"SSL": {
"SSL": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1,
"CCMB-2009-07-004": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Juniper",
"/CreationDate": "D:20120725095220-04\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20120725095220-04\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Subject": "EAL3 Security Target",
"/Title": "JUNOS 10.4 M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches",
"pdf_file_size_bytes": 817354,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 39
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-188%20CR%20v1.0e.pdf",
"scheme": "CA",
"security_level": {
"_type": "Set",
"elements": [
"EAL3+",
"ALC_FLR.3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-188%20ST%20v2.2.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "9c6dae203d11062a123ce73a602e77a238100532c4de58d8c92aab57caaf17e8",
"txt_hash": "050a2ce508f42fc934a825f4bc666b440b35baf1f6794c567182b30e29178252"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f78145d5d79856030397a11292bbea924c27cd38a3e8ce8764bb2fe7e604b861",
"txt_hash": "2f40d00f6037d7d4bbdea95d84640a4865d4f681d67f0d29ae39db856a3bd3f5"
}
},
"status": "archived"
}