This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Juniper Networks, Inc. JUNOS 12.1 X44 D15.5 for SRX Series Platforms Components: Software JUNOS US/Canada Version 12.1X44 JUNOS-FIPS Version 12.1 X44 Hardware SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650, SRX1400, SRX3400, SRX3600; SRX5600 and SRX5800 with SPC-2-10-40; and SRX5600 and SRX5800 with SPC-4-15-320. Certificate Number: 2013/85 |
Ricoh Aficio MP C3001/C3001G/C3501/C3501G, Savin C9130/C9130G/C9135/C9135G, Lanier LD630C/LD630CG/LD635C/LD635CG, Lanier MP C3001/C3501, nashuatec MP C3001/C3501, Rex-Rotary MP C3001/C3501, Gestetner MP C3001/C3501, infotec MP C3001/C3501 all of above with Fax Option Type C5501 Version: - Software version: System/Copy 1.03, Network Support 10.54, Scanner 01.05, Printer 1.02, Fax 02.00.00, RemoteFax 01.00.00, Web Support 1.05, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, PCL 1.02, OptionPCLFont 1.02, Engine 1.03:04, OpePanel 1.04, LANG0 1.04, LANG1 1.04, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 JISEC-CC-CRP-C0300 |
|
---|---|---|
name | Juniper Networks, Inc. JUNOS 12.1 X44 D15.5 for SRX Series Platforms Components: Software JUNOS US/Canada Version 12.1X44 JUNOS-FIPS Version 12.1 X44 Hardware SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650, SRX1400, SRX3400, SRX3600; SRX5600 and SRX5800 with SPC-2-10-40; and SRX5600 and SRX5800 with SPC-4-15-320. | Ricoh Aficio MP C3001/C3001G/C3501/C3501G, Savin C9130/C9130G/C9135/C9135G, Lanier LD630C/LD630CG/LD635C/LD635CG, Lanier MP C3001/C3501, nashuatec MP C3001/C3501, Rex-Rotary MP C3001/C3501, Gestetner MP C3001/C3501, infotec MP C3001/C3501 all of above with Fax Option Type C5501 Version: - Software version: System/Copy 1.03, Network Support 10.54, Scanner 01.05, Printer 1.02, Fax 02.00.00, RemoteFax 01.00.00, Web Support 1.05, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, PCL 1.02, OptionPCLFont 1.02, Engine 1.03:04, OpePanel 1.04, LANG0 1.04, LANG1 1.04, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 |
category | Network and Network-Related Devices and Systems | Multi-Function Devices |
scheme | AU | JP |
not_valid_after | 01.09.2019 | 01.08.2016 |
not_valid_before | 06.09.2013 | 27.07.2011 |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JUNOS_CR.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0300_erpt.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JUNOS_ST.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0300_est.pdf |
manufacturer | Juniper Networks, Inc. | Ricoh Company, Ltd. |
manufacturer_web | https://www.juniper.net/ | https://www.ricoh.com/ |
security_level | {} | EAL3+, ALC_FLR.2 |
dgst | 190a0e55abcc41f1 | 923cda3af7b26548 |
heuristics/cert_id | Certificate Number: 2013/85 | JISEC-CC-CRP-C0300 |
heuristics/cpe_matches | cpe:2.3:o:juniper:junos:12.1:-:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:12.1x44:-:*:*:*:*:*:* | {} |
heuristics/related_cves | CVE-2013-4689, CVE-2023-36840, CVE-2014-0615, CVE-2004-0230, CVE-2014-0613, CVE-2022-22220, CVE-2014-6449, CVE-2017-2349, CVE-2024-39511, CVE-2015-3004, CVE-2014-6378, CVE-2014-6450, CVE-2023-44177, CVE-2004-0468, CVE-2023-44176, CVE-2013-4686, CVE-2023-4481, CVE-2023-44178, CVE-2023-44182, CVE-2014-2712, CVE-2014-3818, CVE-2014-3821, CVE-2023-28962, CVE-2024-39514, CVE-2023-44197, CVE-2024-39555, CVE-2022-22245, CVE-2013-7313, CVE-2023-22406, CVE-2025-21590, CVE-2024-30380, CVE-2014-3816, CVE-2015-5358, CVE-2023-22391, CVE-2024-39549, CVE-2015-5359, CVE-2023-44186, CVE-2013-6618, CVE-2016-1261, CVE-2023-44194, CVE-2023-36841, CVE-2022-22156, CVE-2023-36842, CVE-2015-3003, CVE-2022-22181, CVE-2014-2711, CVE-2023-22395, CVE-2022-22246, CVE-2022-22241, CVE-2014-2713, CVE-2024-21591, CVE-2021-31372, CVE-2023-28964, CVE-2021-31362, CVE-2013-6014, CVE-2014-0616, CVE-2022-22244, CVE-2023-28975, CVE-2023-44201, CVE-2014-6379, CVE-2015-7752, CVE-2022-22208, CVE-2023-28963, CVE-2024-39556, CVE-2014-3819, CVE-2016-1258, CVE-2023-44175, CVE-2015-5360, CVE-2014-6447, CVE-2023-36839, CVE-2022-22238, CVE-2024-39517, CVE-2022-22163, CVE-2016-1256, CVE-2022-22243, CVE-2024-30397, CVE-2023-36843, CVE-2014-6384, CVE-2022-22224, CVE-2022-22197, CVE-2024-39528, CVE-2022-22215, CVE-2019-0036, CVE-2023-44184, CVE-2016-4923, CVE-2015-5362, CVE-2013-6012, CVE-2023-22407, CVE-2022-22173, CVE-2022-22214, CVE-2023-28979, CVE-2024-39558, CVE-2024-21594, CVE-2014-6385, CVE-2022-22242, CVE-2014-6380, CVE-2014-2714, CVE-2022-22162, CVE-2023-44185, CVE-2014-6386 | {} |
heuristics/extracted_sars | ATE_IND.1, ALC_CMC.1, AGD_PRE.1, AVA_VAN.1, ADV_FSP.1, ALC_CMS.1, AGD_OPE.1 | ALC_CMC.3, ALC_DEL.1, ADV_TDS.2, AGD_OPE.1, ADV_FSP.3, ALC_CMS.3, ATE_DPT.1, ATE_FUN.1, ASE_CCL.1, ALC_LCD.1, ASE_REQ.2, AGD_PRE.1, ASE_TSS.1, ASE_SPD.1, ASE_ECD.1, ALC_DVS.1, ALC_FLR.2, ATE_IND.2, AVA_VAN.2, ATE_COV.2, ADV_ARC.1, ASE_INT.1, ASE_OBJ.2 |
heuristics/extracted_versions | 12.1, 15.5 | 1.01, 01.00.00, 1.05, 1.02, 1.03, 02.00.00, 01.05, 1.00, 03.00.00, 10.54, 1.04 |
heuristics/protection_profiles | d7508f508083d040, ac9abe3d5c5a31f0 | 32475ccb695b1644 |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_ND_TFFWEP_V1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf |
pdf_data/report_filename | JUNOS_CR.pdf | c0300_erpt.pdf |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | JUNOS_ST.pdf | c0300_est.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |