This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Dell MX7000 Modular Chassis with Management Module v1.00.10 383-4-484 |
JUNOS 9.3R1 M/MX/T & EX family of routers and switches CRP248 |
|
---|---|---|
name | Dell MX7000 Modular Chassis with Management Module v1.00.10 | JUNOS 9.3R1 M/MX/T & EX family of routers and switches |
scheme | CA | UK |
not_valid_after | 07.01.2025 | 03.02.2014 |
not_valid_before | 07.01.2020 | 03.02.2009 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-484%20CT%20v1.0.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-484%20CR%20v1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CRP248]%20JUNOS%209.3R1.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-484%20ST%20v1.5.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JUNOS%209.3R1.pdf |
manufacturer | Dell Technologies | Juniper Networks, Inc. |
manufacturer_web | https://delltechnologies.com/ | https://www.juniper.net/ |
security_level | EAL2+, ALC_FLR.2 | EAL3+, ALC_FLR.3 |
dgst | 1206564ac8be86a9 | 1905aafb7b17e82d |
heuristics/cert_id | 383-4-484 | CRP248 |
heuristics/direct_transitive_cves | {} | CVE-2023-22407, CVE-2024-39528, CVE-2022-22215, CVE-2013-4689, CVE-2024-39555, CVE-2023-28975, CVE-2022-22242, CVE-2023-36840, CVE-2022-22244, CVE-2014-3818, CVE-2024-30380, CVE-2019-0036, CVE-2024-39549, CVE-2022-22208, CVE-2021-31372, CVE-2022-22214, CVE-2024-39511, CVE-2023-28962, CVE-2024-39514, CVE-2023-36841, CVE-2024-39558, CVE-2013-6618, CVE-2023-44182, CVE-2023-28979, CVE-2022-22241, CVE-2014-0613, CVE-2023-44184, CVE-2023-44175, CVE-2022-22243, CVE-2013-4686, CVE-2014-0615, CVE-2023-44186, CVE-2023-22406, CVE-2023-36839, CVE-2022-22224, CVE-2022-22238, CVE-2014-2712, CVE-2023-28964, CVE-2023-44177, CVE-2024-39556, CVE-2022-22181, CVE-2022-22162, CVE-2022-22163, CVE-2023-28963, CVE-2004-0230, CVE-2023-36842, CVE-2023-44194, CVE-2004-0468, CVE-2022-22220, CVE-2023-44201, CVE-2023-44197, CVE-2014-0616, CVE-2013-6014, CVE-2024-21594, CVE-2024-39517, CVE-2024-21591, CVE-2022-22156, CVE-2013-7313, CVE-2023-4481, CVE-2013-6170, CVE-2021-31362, CVE-2022-22197, CVE-2022-22245, CVE-2022-22173, CVE-2023-44178, CVE-2024-30397, CVE-2022-22246, CVE-2023-22395, CVE-2023-36843, CVE-2023-44185, CVE-2014-2714, CVE-2023-22391, CVE-2023-44176 |
heuristics/indirect_transitive_cves | {} | CVE-2023-22407, CVE-2024-39528, CVE-2022-22215, CVE-2013-4689, CVE-2024-39555, CVE-2023-28975, CVE-2022-22242, CVE-2023-36840, CVE-2022-22244, CVE-2014-3818, CVE-2024-30380, CVE-2019-0036, CVE-2024-39549, CVE-2022-22208, CVE-2021-31372, CVE-2022-22214, CVE-2024-39511, CVE-2023-28962, CVE-2024-39514, CVE-2023-36841, CVE-2024-39558, CVE-2013-6618, CVE-2023-44182, CVE-2023-28979, CVE-2022-22241, CVE-2014-0613, CVE-2023-44184, CVE-2023-44175, CVE-2022-22243, CVE-2013-4686, CVE-2014-0615, CVE-2023-44186, CVE-2023-22406, CVE-2023-36839, CVE-2022-22224, CVE-2022-22238, CVE-2014-2712, CVE-2023-28964, CVE-2023-44177, CVE-2024-39556, CVE-2022-22181, CVE-2022-22162, CVE-2022-22163, CVE-2023-28963, CVE-2004-0230, CVE-2023-36842, CVE-2023-44194, CVE-2004-0468, CVE-2022-22220, CVE-2023-44201, CVE-2023-44197, CVE-2014-0616, CVE-2013-6014, CVE-2024-21594, CVE-2024-39517, CVE-2024-21591, CVE-2022-22156, CVE-2013-7313, CVE-2023-4481, CVE-2013-6170, CVE-2021-31362, CVE-2022-22197, CVE-2022-22245, CVE-2022-22173, CVE-2023-44178, CVE-2024-30397, CVE-2022-22246, CVE-2023-22395, CVE-2023-36843, CVE-2023-44185, CVE-2014-2714, CVE-2023-22391, CVE-2023-44176 |
heuristics/extracted_sars | ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 | ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ADV_TDS.2, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
heuristics/extracted_versions | 1.00.10 | 9.3 |
heuristics/report_references/directly_referenced_by | {} | CRP258 |
heuristics/report_references/directly_referencing | {} | CRP237 |
heuristics/report_references/indirectly_referenced_by | {} | CRP258 |
heuristics/report_references/indirectly_referencing | {} | CRP237 |
maintenance_updates |
|
|
pdf_data/cert_filename | 383-4-484 CT v1.0.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | 383-4-484 CR v1.0.pdf | [CRP248] JUNOS 9.3R1.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | 383-4-484 ST v1.5.pdf | JUNOS 9.3R1.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |