This page was not yet optimized for use on mobile
devices.
Juniper EX4600 and QFX5100 with JUNOS 14.1X53d30
Known vulnerabilities detected
Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.CSV information
| Status | archived |
|---|---|
| Valid from | 28.12.2015 |
| Valid until | 28.02.2018 |
| Scheme | 🇺🇸 US |
| Manufacturer | Juniper Networks, Inc. |
| Category | Network and Network-Related Devices and Systems |
| Security level | |
| Protection profiles |
Heuristics summary
Certificate ID: CCEVS-VR-VID-10681-2015
Certificate
Extracted keywords
Certificates
CCEVS-VR-VID10681-2015File metadata
| Creation date | D:20151231084801-05'00' |
|---|---|
| Modification date | D:20151231084817-05'00' |
| Pages | 1 |
| Producer | iText 2.1.0 (by lowagie.com) |
Certification report
Extracted keywords
Asymmetric Algorithms
ECDSAHash functions
SHA1, SHA-256Protocols
SSHv2, SSH, SSLRandomness
RNG, RBGElliptic Curves
P-256Claims
T.ADMIN_ERROR, T.TSF_FAILURE, T.UNDETECTED_ACTIONS, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_UPDATE, T.USER_DATA_REUSE, A.NO_GENERAL_PURPOSE, A.PHYSICAL, A.TRUSTED_ADMINCertificates
CCEVS-VR-VID10681-2015Vulnerabilities
CVE-2014-3817, CVE-2014-3815, CVE-2014-2714, CVE-2014-2713, CVE-2014-0618, CVE-2014-0616, CVE-2014-0614, CVE-2014-0613, CVE-2014-0612, CVE-2013-6170, CVE-2013-4688, CVE-2013-4687, CVE-2013-4686, CVE-2013-4684, CVE-2007-6372, CVE-2006-3529, CVE-2004-0468Certification process
out of scope, SSH). Telnet, File Transfer Protocol (FTP), and Secure Socket Layer (SSL) are out of scope and are not used in the evaluated configuration, Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), and Secure Socket Layer (SSL) are out of scope and are not used in the evaluated configuration. 8 4.5 Security Management The TOE provides anStandards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
| Creation date | D:20151230090420-05'00' |
|---|---|
| Modification date | D:20151230090420-05'00' |
| Pages | 15 |
Frontpage
| Certificate ID | CCEVS-VR-VID10681-2015 |
|---|---|
| Certified item | Juniper Networks, Inc. Juniper Networks EX4600 and QFX5100 Switches Running Junos OS 14.1X53-D30 |
| Certification lab | US NIAP |
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, HMACAsymmetric Algorithms
ECDH, ECDSA, ECC, DH, DSAHash functions
SHA-1, SHA1, SHA256, SHA-256, SHA-512, SHA-2Schemes
MAC, Key exchange, Key ExchangeProtocols
SSH, SSHv2, SSL, TLS, IKE, IPsecRandomness
DRBG, RNG, RBGLibraries
OpenSSLElliptic Curves
P-384, P-521, P-256Block cipher modes
CBCClaims
O.PROTECTED_COMMUNICATIONS, O.VERIFIABLE_UPDATES, O.SYSTEM_MONITORING, O.DISPLAY_BANNER, O.TOE_ADMINISTRATION, O.RESIDUAL_INFORMATION_CLEARING, O.SESSION_LOCK, O.TSF_SELF_TEST, T.ADMIN_ERROR, T.TSF_FAILURE, T.UNDETECTED_ACTIONS, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_UPDATE, T.USER_DATA_REUSE, A.NO_GENERAL_PURPOSE, A.PHYSICAL, A.TRUSTED_ADMIN, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.TRUSTED_ADMINSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1, ASE_INT.1, ASE_CCL.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1Security Functional Requirements (SFR)
FAU_STG_EXT.1, FAU_STG.1, FAU_STG, FAU_GEN.1, FAU_STG_EXT.1.1, FAU_GEN, FAU_GEN.2, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FCS_CKM_EXT.4, FCS_RBG_EXT.1, FCS_SSH_EXT.1, FCS_TLS_EXT.1, FCS_CKM.4, FCS_CKM, FCS_CKM_EXT, FCS_CKM.1, FCS_CKM_EXT.4.1, FCS_COP.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_SSH_EXT.1.1, FCS_SSH_EXT.1.2, FCS_SSH_EXT.1.3, FCS_SSH_EXT.1.4, FCS_SSH_EXT.1.5, FCS_SSH_EXT.1.6, FCS_SSH_EXT.1.7, FCS_CKM.1.1, FCS_COP.1.1, FCS_CKM.2, FDP_ITC.1, FDP_ITC.2, FDP_RIP.2, FDP_RIP.2.1, FIA_PMG_EXT.1, FIA_UAU_EXT.2, FIA_UIA_EXT.1, FIA_PSK_EXT.1, FIA_PMG_EXT.1.1, FIA_UAU, FIA_UAU_EXT.2.1, FIA_UAU.1, FIA_UID.1, FIA_UIA_EXT.1.1, FIA_UIA_EXT.1.2, FIA_UAU.7, FIA_UAU.7.1, FMT_MTD.1, FMT_SMF.1, FMT_SMR.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FPT_APW_EXT.1, FPT_SKP_EXT.1, FPT_TST_EXT.1, FPT_TUD_EXT.1, FPT_SSP.2, FPT_APW_EXT.1.1, FPT_APW_EXT.1.2, FPT_SSP.1, FPT_SKP_EXT.1.1, FPT_TST.1, FPT_TST_EXT.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_STM.1, FPT_STM.1.1, FPT_TRP.1, FTA_SSL_EXT.1, FTA_TAB.1, FTA_SSL, FTA_SSL_EXT.1.1, FTA_EXT_SSL.1, FTA_SSL.3, FTA_SSL.4, FTA_SSL.3.1, FTA_SSL_EXT.4, FTA_SSL.4.1, FTA_TAB.1.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Certification process
out of scope, SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT, i.e. it is not bound to port 80). Although use of this application is out of scope of the evaluation, the daemon supporting the service cannot be disabled, including Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT) The TOE provides an Authorized Administrator role that is responsible, the HTTP traffic arrives (i.e. it is not bound to port 80). Although use of this application is out of scope of the evaluation, the daemon supporting the service cannot be disabled. This service can onlyStandards
FIPS PUB 186-3, FIPS PUB 197, FIPS140, FIPS197, NIST SP 800-38A, NIST SP 800-38D, RFC 4253, RFC 4741, RFC4253, RFC6668, RFC5656, RFC 4251, RFC 4252, RFC 4254, RFC 6668, RFC4251, RFC4252, RFC4254, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
| Title | Security Target |
|---|---|
| Subject | Junos OS 13.3R1.8, Junos OS 13.2X50-D19 and Junos OS 13.2X51-D20 |
| Author | Denise Cater |
| Creation date | D:20151210100023Z |
| Modification date | D:20151228094136-05'00' |
| Pages | 58 |
| Creator | Microsoft® Word 2010 |
| Producer | Microsoft® Word 2010 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
CCEVS-VR-VID-10681-2015Extracted SARs
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_TSS.1, ATE_IND.1, AVA_VAN.1CPE matches
- cpe:2.3:o:juniper:junos:14.1:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1:r4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1:r5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1:r6:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1:r7:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1:r8-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1:r8:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1:r9:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1r7:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x50:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x50:d60:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x51:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x51:d60:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53-d10:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53-d15:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53-d25:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53-d26:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53-d27:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53-d30:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53-d35:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:d107:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:d10:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:d121:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:d15:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:d16:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:d20:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:d25:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:d26:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:d27:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:d30:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:d34:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:d35:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:d38:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:d40:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:d42:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:d43:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:d44:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:d45:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:d46:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:d47:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:d48:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:d49:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:d50:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:d51:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:d52:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:d53:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:d54:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x53:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x55:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x55:d16:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x55:d20:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x55:d25:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x55:d30:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.1x55:d35:*:*:*:*:*:*
Related CVEs
| ID | Links | Severity | CVSS Score | Published on | ||
|---|---|---|---|---|---|---|
| Base | Exploitability | Impact | ||||
| CVE-2004-0468 | MEDIUM | 5.0 | 2.9 | 06.12.2004 | ||
| CVE-2014-3816 | HIGH | 9.0 | 10.0 | 11.07.2014 | ||
| CVE-2014-3818 | HIGH | 7.8 | 6.9 | 14.10.2014 | ||
| CVE-2014-3819 | HIGH | 7.8 | 6.9 | 11.07.2014 | ||
| CVE-2014-6378 | HIGH | 7.8 | 6.9 | 14.10.2014 | ||
| CVE-2014-6379 | HIGH | 7.5 | 6.4 | 14.10.2014 | ||
| CVE-2014-6383 | MEDIUM | 5.0 | 2.9 | 16.01.2015 | ||
| CVE-2014-6384 | MEDIUM | 6.9 | 10.0 | 16.01.2015 | ||
| CVE-2014-6385 | MEDIUM | 6.1 | 6.9 | 16.01.2015 | ||
| CVE-2014-6447 | HIGH | 7.1 | 3.7 | 11.02.2020 | ||
| CVE-2014-6449 | MEDIUM | 5.0 | 2.9 | 16.10.2015 | ||
| CVE-2014-6450 | HIGH | 7.8 | 6.9 | 16.10.2015 | ||
| CVE-2015-3003 | HIGH | 7.2 | 10.0 | 10.04.2015 | ||
| CVE-2015-3004 | MEDIUM | 4.3 | 2.9 | 10.04.2015 | ||
| CVE-2015-5358 | HIGH | 7.1 | 6.9 | 14.07.2015 | ||
| CVE-2015-5359 | HIGH | 7.1 | 6.9 | 14.07.2015 | ||
| CVE-2015-5360 | MEDIUM | 5.0 | 2.9 | 16.07.2015 | ||
| CVE-2015-5362 | HIGH | 9.3 | 10.0 | 14.07.2015 | ||
| CVE-2015-7748 | MEDIUM | 5.0 | 2.9 | 19.10.2015 | ||
| CVE-2015-7749 | HIGH | 7.8 | 6.9 | 19.10.2015 | ||
| CVE-2015-7751 | MEDIUM | 6.9 | 10.0 | 19.10.2015 | ||
| CVE-2015-7752 | HIGH | 7.8 | 6.9 | 19.10.2015 | ||
| CVE-2016-1256 | MEDIUM | 5.3 | 1.4 | 15.01.2016 | ||
| CVE-2016-1257 | MEDIUM | 5.9 | 3.6 | 15.01.2016 | ||
| CVE-2016-1258 | MEDIUM | 5.3 | 1.4 | 15.01.2016 | ||
| CVE-2016-1260 | MEDIUM | 5.3 | 1.4 | 15.01.2016 | ||
| CVE-2016-1261 | HIGH | 8.8 | 5.9 | 13.10.2017 | ||
| CVE-2016-1263 | HIGH | 7.5 | 3.6 | 09.09.2016 | ||
| CVE-2016-1264 | HIGH | 8.8 | 5.9 | 15.04.2016 | ||
| CVE-2016-1267 | MEDIUM | 6.7 | 5.9 | 15.04.2016 | ||
| CVE-2016-1269 | HIGH | 7.5 | 3.6 | 15.04.2016 | ||
| CVE-2016-1270 | HIGH | 7.5 | 3.6 | 15.04.2016 | ||
| CVE-2016-1271 | HIGH | 7.8 | 5.9 | 15.04.2016 | ||
| CVE-2016-1275 | MEDIUM | 6.5 | 3.6 | 09.09.2016 | ||
| CVE-2016-1277 | MEDIUM | 5.9 | 3.6 | 09.09.2016 | ||
| CVE-2016-1279 | CRITICAL | 9.8 | 5.9 | 09.09.2016 | ||
| CVE-2016-1280 | MEDIUM | 6.5 | 2.5 | 09.09.2016 | ||
| CVE-2016-4921 | HIGH | 7.5 | 3.6 | 13.10.2017 | ||
| CVE-2016-4922 | HIGH | 7.8 | 5.9 | 13.10.2017 | ||
| CVE-2016-4923 | MEDIUM | 6.1 | 2.7 | 13.10.2017 | ||
| CVE-2016-4924 | MEDIUM | 5.5 | 3.6 | 13.10.2017 | ||
| CVE-2017-10601 | CRITICAL | 9.8 | 5.9 | 17.07.2017 | ||
| CVE-2017-10602 | HIGH | 7.8 | 5.9 | 17.07.2017 | ||
| CVE-2017-10613 | MEDIUM | 5.5 | 3.6 | 13.10.2017 | ||
| CVE-2017-10614 | HIGH | 7.5 | 3.6 | 13.10.2017 | ||
| CVE-2017-10615 | CRITICAL | 9.8 | 5.9 | 13.10.2017 | ||
| CVE-2017-10618 | MEDIUM | 5.9 | 3.6 | 13.10.2017 | ||
| CVE-2017-10621 | MEDIUM | 5.3 | 1.4 | 13.10.2017 | ||
| CVE-2017-2301 | HIGH | 7.5 | 3.6 | 30.05.2017 | ||
| CVE-2017-2302 | HIGH | 7.5 | 3.6 | 30.05.2017 | ||
| CVE-2017-2303 | HIGH | 7.5 | 3.6 | 30.05.2017 | ||
| CVE-2017-2312 | MEDIUM | 6.5 | 3.6 | 24.04.2017 | ||
| CVE-2017-2314 | HIGH | 7.5 | 3.6 | 17.07.2017 | ||
| CVE-2017-2315 | HIGH | 7.5 | 3.6 | 24.04.2017 | ||
| CVE-2017-2344 | HIGH | 7.8 | 5.9 | 17.07.2017 | ||
| CVE-2017-2345 | CRITICAL | 9.8 | 5.9 | 17.07.2017 | ||
| CVE-2017-2347 | HIGH | 7.5 | 3.6 | 17.07.2017 | ||
| CVE-2017-2348 | HIGH | 7.5 | 3.6 | 17.07.2017 | ||
| CVE-2018-0001 | CRITICAL | 9.8 | 5.9 | 10.01.2018 | ||
| CVE-2018-0003 | MEDIUM | 6.5 | 3.6 | 10.01.2018 | ||
| CVE-2018-0004 | MEDIUM | 6.5 | 3.6 | 10.01.2018 | ||
| CVE-2018-0007 | CRITICAL | 9.8 | 5.9 | 10.01.2018 | ||
| CVE-2018-0008 | MEDIUM | 6.2 | 5.9 | 10.01.2018 | ||
| CVE-2018-0019 | MEDIUM | 5.9 | 3.6 | 11.04.2018 | ||
| CVE-2018-0020 | HIGH | 7.5 | 3.6 | 11.04.2018 | ||
| CVE-2018-0021 | HIGH | 8.8 | 5.9 | 11.04.2018 | ||
| CVE-2018-0022 | HIGH | 7.5 | 3.6 | 11.04.2018 | ||
| CVE-2018-0031 | MEDIUM | 5.9 | 3.6 | 11.07.2018 | ||
| CVE-2018-0050 | MEDIUM | 5.9 | 3.6 | 10.10.2018 | ||
| CVE-2018-0052 | HIGH | 8.1 | 5.9 | 10.10.2018 | ||
| CVE-2019-0012 | HIGH | 7.5 | 3.6 | 15.01.2019 | ||
| CVE-2019-0036 | CRITICAL | 9.8 | 5.9 | 10.04.2019 | ||
| CVE-2019-0039 | HIGH | 8.1 | 5.9 | 10.04.2019 | ||
| CVE-2019-0047 | HIGH | 8.8 | 5.9 | 09.10.2019 | ||
| CVE-2019-0053 | HIGH | 7.8 | 5.9 | 11.07.2019 | ||
| CVE-2019-0062 | HIGH | 8.8 | 5.9 | 09.10.2019 | ||
| CVE-2020-1606 | HIGH | 8.1 | 5.2 | 15.01.2020 | ||
| CVE-2020-1630 | MEDIUM | 5.5 | 3.6 | 08.04.2020 | ||
| CVE-2020-1631 | CRITICAL | 9.8 | 5.9 | 04.05.2020 | ||
| CVE-2020-1639 | HIGH | 7.5 | 3.6 | 08.04.2020 | ||
| CVE-2020-1643 | MEDIUM | 5.5 | 3.6 | 17.07.2020 | ||
| CVE-2020-1656 | MEDIUM | 5.8 | 6.4 | 16.10.2020 | ||
| CVE-2021-0215 | LOW | 2.9 | 2.9 | 15.01.2021 | ||
| CVE-2021-31362 | LOW | 3.3 | 2.9 | 19.10.2021 | ||
| CVE-2021-31372 | HIGH | 9.0 | 10.0 | 19.10.2021 | ||
| CVE-2022-22156 | HIGH | 7.4 | 5.2 | 19.01.2022 | ||
| CVE-2022-22162 | HIGH | 7.8 | 5.9 | 19.01.2022 | ||
| CVE-2022-22163 | MEDIUM | 6.5 | 3.6 | 19.01.2022 | ||
| CVE-2022-22173 | HIGH | 7.5 | 3.6 | 19.01.2022 | ||
| CVE-2022-22176 | MEDIUM | 6.5 | 3.6 | 19.01.2022 | ||
| CVE-2022-22181 | MEDIUM | 5.4 | 2.7 | 14.04.2022 | ||
| CVE-2022-22197 | HIGH | 7.5 | 3.6 | 14.04.2022 | ||
| CVE-2022-22208 | MEDIUM | 5.9 | 3.6 | 18.10.2022 | ||
| CVE-2022-22215 | MEDIUM | 5.5 | 3.6 | 20.07.2022 | ||
| CVE-2022-22220 | MEDIUM | 5.9 | 3.6 | 18.10.2022 | ||
| CVE-2022-22224 | MEDIUM | 6.5 | 3.6 | 18.10.2022 | ||
| CVE-2022-22238 | MEDIUM | 6.5 | 3.6 | 18.10.2022 | ||
| CVE-2022-22241 | CRITICAL | 9.8 | 5.9 | 18.10.2022 | ||
| CVE-2022-22242 | MEDIUM | 6.1 | 2.7 | 18.10.2022 | ||
| CVE-2022-22243 | MEDIUM | 4.3 | 1.4 | 18.10.2022 | ||
| CVE-2022-22244 | MEDIUM | 5.3 | 1.4 | 18.10.2022 | ||
| CVE-2022-22245 | MEDIUM | 4.3 | 1.4 | 18.10.2022 | ||
| CVE-2022-22246 | HIGH | 8.8 | 5.9 | 18.10.2022 | ||
| CVE-2023-22391 | HIGH | 7.5 | 3.6 | 13.01.2023 | ||
| CVE-2023-22395 | MEDIUM | 6.5 | 3.6 | 13.01.2023 | ||
| CVE-2023-22406 | MEDIUM | 6.5 | 3.6 | 13.01.2023 | ||
| CVE-2023-22407 | MEDIUM | 6.5 | 3.6 | 13.01.2023 | ||
| CVE-2023-28962 | CRITICAL | 9.8 | 5.9 | 17.04.2023 | ||
| CVE-2023-28963 | MEDIUM | 5.3 | 1.4 | 17.04.2023 | ||
| CVE-2023-28964 | HIGH | 7.5 | 3.6 | 17.04.2023 | ||
| CVE-2023-28975 | MEDIUM | 4.6 | 3.6 | 17.04.2023 | ||
| CVE-2023-28979 | MEDIUM | 4.7 | 1.4 | 17.04.2023 | ||
| CVE-2023-36839 | MEDIUM | 6.5 | 3.6 | 12.10.2023 | ||
| CVE-2023-36840 | MEDIUM | 5.5 | 3.6 | 14.07.2023 | ||
| CVE-2023-36841 | HIGH | 7.5 | 3.6 | 12.10.2023 | ||
| CVE-2023-36842 | MEDIUM | 6.5 | 3.6 | 12.01.2024 | ||
| CVE-2023-36843 | HIGH | 7.5 | 3.6 | 12.10.2023 | ||
| CVE-2023-44175 | HIGH | 7.5 | 3.6 | 12.10.2023 | ||
| CVE-2023-44176 | MEDIUM | 5.5 | 3.6 | 13.10.2023 | ||
| CVE-2023-44177 | MEDIUM | 5.5 | 3.6 | 13.10.2023 | ||
| CVE-2023-44178 | MEDIUM | 5.5 | 3.6 | 13.10.2023 | ||
| CVE-2023-44182 | HIGH | 8.8 | 5.9 | 13.10.2023 | ||
| CVE-2023-44184 | MEDIUM | 6.5 | 3.6 | 13.10.2023 | ||
| CVE-2023-44185 | HIGH | 7.5 | 3.6 | 13.10.2023 | ||
| CVE-2023-44186 | HIGH | 7.5 | 3.6 | 11.10.2023 | ||
| CVE-2023-44194 | HIGH | 7.8 | 5.9 | 13.10.2023 | ||
| CVE-2023-44197 | HIGH | 7.5 | 3.6 | 13.10.2023 | ||
| CVE-2023-44201 | MEDIUM | 5.5 | 3.6 | 13.10.2023 | ||
| CVE-2023-4481 | HIGH | 7.5 | 3.6 | 01.09.2023 | ||
| CVE-2024-21591 | CRITICAL | 9.8 | 5.9 | 12.01.2024 | ||
| CVE-2024-21594 | MEDIUM | 5.5 | 3.6 | 12.01.2024 | ||
| CVE-2024-30380 | MEDIUM | 6.5 | 3.6 | 16.04.2024 | ||
| CVE-2024-30397 | HIGH | 7.5 | 3.6 | 12.04.2024 | ||
| CVE-2024-39511 | MEDIUM | 5.5 | 3.6 | 10.07.2024 | ||
| CVE-2024-39514 | MEDIUM | 6.5 | 3.6 | 10.07.2024 | ||
| CVE-2024-39517 | MEDIUM | 6.5 | 3.6 | 10.07.2024 | ||
| CVE-2024-39528 | MEDIUM | 5.7 | 3.6 | 11.07.2024 | ||
| CVE-2024-39549 | HIGH | 7.5 | 3.6 | 11.07.2024 | ||
| CVE-2024-39555 | HIGH | 7.5 | 3.6 | 10.07.2024 | ||
| CVE-2024-39556 | HIGH | 7.0 | 5.9 | 10.07.2024 | ||
| CVE-2024-39558 | MEDIUM | 6.5 | 3.6 | 10.07.2024 | ||
| CVE-2025-21590 | MEDIUM | 4.4 | 3.6 | 12.03.2025 | ||
Showing 5 out of 142.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10681-ci.pdf",
"dgst": "af3038487cee6710",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CCEVS-VR-VID-10681-2015",
"cert_lab": [
"US"
],
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:juniper:junos:14.1x51:d60:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d16:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d50:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x55:d20:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x51:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d44:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d38:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r8-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d45:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53-d30:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53-d35:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d15:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d42:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x55:d25:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53-d26:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1r7:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d49:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53-d10:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d54:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d25:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d26:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d35:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d48:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d53:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x55:d16:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x50:d60:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d43:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x55:d35:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d27:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53-d25:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53-d15:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d52:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53-d27:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d30:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d46:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x50:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d40:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d107:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x55:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d20:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d121:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d47:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d34:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:d51:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x55:d30:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r8:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"eal": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"14.1"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"ac9abe3d5c5a31f0"
]
},
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2023-44197",
"CVE-2015-5358",
"CVE-2024-30397",
"CVE-2022-22245",
"CVE-2016-1277",
"CVE-2016-1279",
"CVE-2015-7748",
"CVE-2022-22224",
"CVE-2014-6383",
"CVE-2016-1275",
"CVE-2022-22181",
"CVE-2022-22220",
"CVE-2022-22244",
"CVE-2023-22406",
"CVE-2023-22407",
"CVE-2022-22243",
"CVE-2024-21594",
"CVE-2019-0039",
"CVE-2016-1258",
"CVE-2020-1639",
"CVE-2015-5360",
"CVE-2022-22242",
"CVE-2019-0012",
"CVE-2023-22395",
"CVE-2022-22197",
"CVE-2023-44175",
"CVE-2014-6379",
"CVE-2024-39555",
"CVE-2016-4922",
"CVE-2021-0215",
"CVE-2017-10621",
"CVE-2018-0003",
"CVE-2023-28963",
"CVE-2016-1260",
"CVE-2017-10613",
"CVE-2017-2303",
"CVE-2016-1280",
"CVE-2022-22246",
"CVE-2023-28975",
"CVE-2018-0022",
"CVE-2020-1630",
"CVE-2022-22241",
"CVE-2014-6384",
"CVE-2014-6385",
"CVE-2025-21590",
"CVE-2023-44177",
"CVE-2017-10614",
"CVE-2018-0031",
"CVE-2023-28964",
"CVE-2024-39514",
"CVE-2018-0050",
"CVE-2020-1606",
"CVE-2017-10615",
"CVE-2015-5362",
"CVE-2023-22391",
"CVE-2017-2312",
"CVE-2023-44178",
"CVE-2023-36841",
"CVE-2018-0007",
"CVE-2016-4924",
"CVE-2024-39549",
"CVE-2023-36840",
"CVE-2014-6449",
"CVE-2014-3819",
"CVE-2016-1263",
"CVE-2018-0021",
"CVE-2015-3004",
"CVE-2018-0019",
"CVE-2015-5359",
"CVE-2023-36842",
"CVE-2014-6450",
"CVE-2020-1643",
"CVE-2004-0468",
"CVE-2022-22163",
"CVE-2017-2345",
"CVE-2016-1271",
"CVE-2021-31362",
"CVE-2017-10601",
"CVE-2023-4481",
"CVE-2023-28962",
"CVE-2024-39528",
"CVE-2017-2302",
"CVE-2023-44176",
"CVE-2024-30380",
"CVE-2023-44201",
"CVE-2020-1656",
"CVE-2020-1631",
"CVE-2015-3003",
"CVE-2016-1256",
"CVE-2022-22176",
"CVE-2024-39511",
"CVE-2015-7752",
"CVE-2018-0001",
"CVE-2017-2347",
"CVE-2022-22156",
"CVE-2015-7749",
"CVE-2015-7751",
"CVE-2016-4921",
"CVE-2019-0036",
"CVE-2018-0052",
"CVE-2017-2344",
"CVE-2017-2314",
"CVE-2016-1270",
"CVE-2023-44186",
"CVE-2019-0062",
"CVE-2022-22173",
"CVE-2017-10618",
"CVE-2024-39556",
"CVE-2014-3818",
"CVE-2018-0020",
"CVE-2017-2301",
"CVE-2022-22208",
"CVE-2022-22162",
"CVE-2014-6447",
"CVE-2023-44182",
"CVE-2021-31372",
"CVE-2016-1261",
"CVE-2016-1257",
"CVE-2024-21591",
"CVE-2016-4923",
"CVE-2016-1264",
"CVE-2024-39558",
"CVE-2016-1269",
"CVE-2016-1267",
"CVE-2023-36843",
"CVE-2024-39517",
"CVE-2019-0047",
"CVE-2022-22215",
"CVE-2022-22238",
"CVE-2023-44184",
"CVE-2019-0053",
"CVE-2023-44185",
"CVE-2018-0004",
"CVE-2014-6378",
"CVE-2017-2348",
"CVE-2018-0008",
"CVE-2023-44194",
"CVE-2023-36839",
"CVE-2023-28979",
"CVE-2014-3816",
"CVE-2017-2315",
"CVE-2017-10602"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Juniper Networks, Inc.",
"manufacturer_web": "https://www.juniper.net/",
"name": "Juniper EX4600 and QFX5100 with JUNOS 14.1X53d30",
"not_valid_after": "2018-02-28",
"not_valid_before": "2015-12-28",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "st_vid10681-ci.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"US": {
"CCEVS-VR-VID10681-2015": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20151231084801-05\u002700\u0027",
"/ModDate": "D:20151231084817-05\u002700\u0027",
"/Producer": "iText 2.1.0 (by lowagie.com)",
"pdf_file_size_bytes": 179001,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "st_vid10681-vr.pdf",
"report_frontpage": {
"US": {
"cert_id": "CCEVS-VR-VID10681-2015",
"cert_item": "Juniper Networks, Inc. Juniper Networks EX4600 and QFX5100 Switches Running Junos OS 14.1X53-D30",
"cert_lab": "US NIAP"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 1
}
}
},
"cc_cert_id": {
"US": {
"CCEVS-VR-VID10681-2015": 1
}
},
"cc_claims": {
"A": {
"A.NO_GENERAL_PURPOSE": 1,
"A.PHYSICAL": 1,
"A.TRUSTED_ADMIN": 1
},
"T": {
"T.ADMIN_ERROR": 1,
"T.TSF_FAILURE": 1,
"T.UNAUTHORIZED_ACCESS": 1,
"T.UNAUTHORIZED_UPDATE": 1,
"T.UNDETECTED_ACTIONS": 1,
"T.USER_DATA_REUSE": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {
"OutOfScope": {
"SSH). Telnet, File Transfer Protocol (FTP), and Secure Socket Layer (SSL) are out of scope and are not used in the evaluated configuration": 1,
"Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), and Secure Socket Layer (SSL) are out of scope and are not used in the evaluated configuration. 8 4.5 Security Management The TOE provides an": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 9,
"SSHv2": 3
},
"TLS": {
"SSL": {
"SSL": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 2
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA1": 1
},
"SHA2": {
"SHA-256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RBG": 1,
"RNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1,
"CCMB-2009-07-004": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {
"CVE": {
"CVE-2004-0468": 1,
"CVE-2006-3529": 1,
"CVE-2007-6372": 1,
"CVE-2013-4684": 1,
"CVE-2013-4686": 1,
"CVE-2013-4687": 1,
"CVE-2013-4688": 1,
"CVE-2013-6170": 1,
"CVE-2014-0612": 1,
"CVE-2014-0613": 1,
"CVE-2014-0614": 1,
"CVE-2014-0616": 1,
"CVE-2014-0618": 1,
"CVE-2014-2713": 1,
"CVE-2014-2714": 1,
"CVE-2014-3815": 1,
"CVE-2014-3817": 1
}
}
},
"report_metadata": {
"/CreationDate": "D:20151230090420-05\u002700\u0027",
"/ModDate": "D:20151230090420-05\u002700\u0027",
"pdf_file_size_bytes": 537054,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.cvedetails.com/vulnerability-list/vendor_id-97/product_id-585/version_id-159252/Openbsd-Openssh-6.4.html"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 15
},
"st_filename": "st_vid10681-st.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 3
},
"ECDH": {
"ECDH": 2
},
"ECDSA": {
"ECDSA": 11
}
},
"FF": {
"DH": {
"DH": 2
},
"DSA": {
"DSA": 2
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NO_GENERAL_PURPOSE": 1,
"A.PHYSICAL": 1,
"A.TRUSTED_ADMIN": 1
},
"O": {
"O.DISPLAY_BANNER": 1,
"O.PROTECTED_COMMUNICATIONS": 1,
"O.RESIDUAL_INFORMATION_CLEARING": 1,
"O.SESSION_LOCK": 1,
"O.SYSTEM_MONITORING": 1,
"O.TOE_ADMINISTRATION": 1,
"O.TSF_SELF_TEST": 1,
"O.VERIFIABLE_UPDATES": 1
},
"OE": {
"OE.NO_GENERAL_PURPOSE": 1,
"OE.PHYSICAL": 1,
"OE.TRUSTED_ADMIN": 1
},
"T": {
"T.ADMIN_ERROR": 1,
"T.TSF_FAILURE": 1,
"T.UNAUTHORIZED_ACCESS": 1,
"T.UNAUTHORIZED_UPDATE": 1,
"T.UNDETECTED_ACTIONS": 1,
"T.USER_DATA_REUSE": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.1": 1,
"ALC_CMS.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_IND.1": 1
},
"AVA": {
"AVA_VAN.1": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 5,
"FAU_GEN.1": 7,
"FAU_GEN.1.1": 2,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 5,
"FAU_GEN.2.1": 1,
"FAU_STG": 1,
"FAU_STG.1": 1,
"FAU_STG_EXT.1": 11,
"FAU_STG_EXT.1.1": 2
},
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 19,
"FCS_CKM.1.1": 2,
"FCS_CKM.2": 1,
"FCS_CKM.4": 7,
"FCS_CKM_EXT": 1,
"FCS_CKM_EXT.4": 20,
"FCS_CKM_EXT.4.1": 1,
"FCS_COP.1": 46,
"FCS_COP.1.1": 4,
"FCS_RBG_EXT.1": 15,
"FCS_RBG_EXT.1.1": 2,
"FCS_RBG_EXT.1.2": 2,
"FCS_SSH_EXT.1": 14,
"FCS_SSH_EXT.1.1": 2,
"FCS_SSH_EXT.1.2": 2,
"FCS_SSH_EXT.1.3": 2,
"FCS_SSH_EXT.1.4": 2,
"FCS_SSH_EXT.1.5": 2,
"FCS_SSH_EXT.1.6": 2,
"FCS_SSH_EXT.1.7": 2,
"FCS_TLS_EXT.1": 2
},
"FDP": {
"FDP_ITC.1": 6,
"FDP_ITC.2": 6,
"FDP_RIP.2": 5,
"FDP_RIP.2.1": 1
},
"FIA": {
"FIA_PMG_EXT.1": 11,
"FIA_PMG_EXT.1.1": 2,
"FIA_PSK_EXT.1": 1,
"FIA_UAU": 1,
"FIA_UAU.1": 3,
"FIA_UAU.7": 5,
"FIA_UAU.7.1": 1,
"FIA_UAU_EXT.2": 11,
"FIA_UAU_EXT.2.1": 2,
"FIA_UIA_EXT.1": 17,
"FIA_UIA_EXT.1.1": 2,
"FIA_UIA_EXT.1.2": 2,
"FIA_UID.1": 5
},
"FMT": {
"FMT_MTD.1": 5,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 7,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 2,
"FMT_SMR.2": 5,
"FMT_SMR.2.1": 1,
"FMT_SMR.2.2": 1,
"FMT_SMR.2.3": 1
},
"FPT": {
"FPT_APW_EXT.1": 9,
"FPT_APW_EXT.1.1": 4,
"FPT_APW_EXT.1.2": 2,
"FPT_SKP_EXT.1": 11,
"FPT_SKP_EXT.1.1": 2,
"FPT_SSP.1": 1,
"FPT_SSP.2": 1,
"FPT_STM.1": 7,
"FPT_STM.1.1": 1,
"FPT_TRP.1": 1,
"FPT_TST.1": 1,
"FPT_TST_EXT.1": 11,
"FPT_TST_EXT.1.1": 2,
"FPT_TUD_EXT.1": 11,
"FPT_TUD_EXT.1.1": 2,
"FPT_TUD_EXT.1.2": 2,
"FPT_TUD_EXT.1.3": 2
},
"FTA": {
"FTA_EXT_SSL.1": 1,
"FTA_SSL": 1,
"FTA_SSL.3": 5,
"FTA_SSL.3.1": 1,
"FTA_SSL.4": 4,
"FTA_SSL.4.1": 1,
"FTA_SSL_EXT.1": 9,
"FTA_SSL_EXT.1.1": 3,
"FTA_SSL_EXT.4": 1,
"FTA_TAB.1": 7,
"FTA_TAB.1.1": 1
},
"FTP": {
"FTP_ITC.1": 8,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 4,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {
"OutOfScope": {
"SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT": 1,
"i.e. it is not bound to port 80). Although use of this application is out of scope of the evaluation, the daemon supporting the service cannot be disabled": 1,
"including Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Security Management (FMT) The TOE provides an Authorized Administrator role that is responsible": 1,
"out of scope": 2,
"the HTTP traffic arrives (i.e. it is not bound to port 80). Although use of this application is out of scope of the evaluation, the daemon supporting the service cannot be disabled. This service can only": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 3
}
},
"crypto_protocol": {
"IKE": {
"IKE": 1
},
"IPsec": {
"IPsec": 2
},
"SSH": {
"SSH": 73,
"SSHv2": 10
},
"TLS": {
"SSL": {
"SSL": 3
},
"TLS": {
"TLS": 3
}
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 2,
"Key exchange": 1
},
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 6,
"P-384": 4,
"P-521": 4
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 2,
"SHA1": 2
},
"SHA2": {
"SHA-2": 5,
"SHA-256": 5,
"SHA-512": 2,
"SHA256": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 3
},
"RNG": {
"RBG": 4,
"RNG": 6
}
},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1,
"CCMB-2009-07-004": 1
},
"FIPS": {
"FIPS PUB 186-3": 3,
"FIPS PUB 197": 1,
"FIPS140": 1,
"FIPS197": 1
},
"NIST": {
"NIST SP 800-38A": 1,
"NIST SP 800-38D": 1
},
"RFC": {
"RFC 4251": 2,
"RFC 4252": 1,
"RFC 4253": 3,
"RFC 4254": 1,
"RFC 4741": 1,
"RFC 6668": 1,
"RFC4251": 1,
"RFC4252": 1,
"RFC4253": 3,
"RFC4254": 1,
"RFC5656": 3,
"RFC6668": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 7
}
},
"DES": {
"DES": {
"DES": 1
}
},
"constructions": {
"MAC": {
"HMAC": 6
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Denise Cater",
"/CreationDate": "D:20151210100023Z",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20151228094136-05\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Subject": "Junos OS 13.3R1.8, Junos OS 13.2X50-D19 and Junos OS 13.2X51-D20",
"/Title": "Security Target",
"pdf_file_size_bytes": 1293501,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.juniper.net/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 58
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10681-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": []
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10681-st.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "57411c9d76a3cc41573f7a776ae31ea2bdc65df12e45ccc9d193ffc2af4c3348",
"txt_hash": "8f5152685236880b06681fe905fab8046fd9e6897c4f2095c635df35feb33f88"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "6a40feb19e770fe6347212872061a853a56b52dfb8d1c9fd9dd2a1f78ee2d2c4",
"txt_hash": "d773e49ce7ac57a15b9e4442c675725f97950a5bfabda8ddc5bd702e353cc63a"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "c4ad4bb4e32b186900335e59daa36f83acb62702fe9a06e9240771e8c52ff7b0",
"txt_hash": "948124f9d5360af60df8ab1b66d10226246e5816f28c317a931806ae86d0e590"
}
},
"status": "archived"
}