This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Juniper Networks, Inc. JUNOS 12.1 X44 D15.5 for SRX Series Platforms Components: Software JUNOS US/Canada Version 12.1X44 JUNOS-FIPS Version 12.1 X44 Hardware SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650, SRX1400, SRX3400, SRX3600; SRX5600 and SRX5800 with SPC-2-10-40; and SRX5600 and SRX5800 with SPC-4-15-320. Certificate Number: 2013/85 |
Ricoh Aficio MP C4501A/C4501AG/C5501A/C5501AG, Savin C9145A/C9145AG/C9155A/C9155AG, Lanier LD645CA/LD645CAG/LD655CA/LD655CAG, Lanier MP C4501A/C5501A, nashuatec MP C4501A/C5501A, Rex-Rotary MP C4501A/C5501A, Gestetner MP C4501A/C5501A, infotec MP C4501A/C5501A all of above with Fax Option Type C5501 Version: - Software version: System/Copy 2.02, Network Support 10.54, Scanner 01.11.1, Printer 1.01, Fax 02.01.00, RemoteFax 01.00.00, Web Support 1.06, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, PCL 1.02, OptionPCLFont 1.02, Engine 1.03:03, OpePanel 1.06, LANG0 1.06, LANG1 1.06, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 JISEC-CC-CRP-C0326 |
|
---|---|---|
name | Juniper Networks, Inc. JUNOS 12.1 X44 D15.5 for SRX Series Platforms Components: Software JUNOS US/Canada Version 12.1X44 JUNOS-FIPS Version 12.1 X44 Hardware SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650, SRX1400, SRX3400, SRX3600; SRX5600 and SRX5800 with SPC-2-10-40; and SRX5600 and SRX5800 with SPC-4-15-320. | Ricoh Aficio MP C4501A/C4501AG/C5501A/C5501AG, Savin C9145A/C9145AG/C9155A/C9155AG, Lanier LD645CA/LD645CAG/LD655CA/LD655CAG, Lanier MP C4501A/C5501A, nashuatec MP C4501A/C5501A, Rex-Rotary MP C4501A/C5501A, Gestetner MP C4501A/C5501A, infotec MP C4501A/C5501A all of above with Fax Option Type C5501 Version: - Software version: System/Copy 2.02, Network Support 10.54, Scanner 01.11.1, Printer 1.01, Fax 02.01.00, RemoteFax 01.00.00, Web Support 1.06, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, PCL 1.02, OptionPCLFont 1.02, Engine 1.03:03, OpePanel 1.06, LANG0 1.06, LANG1 1.06, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 |
category | Network and Network-Related Devices and Systems | Multi-Function Devices |
scheme | AU | JP |
not_valid_after | 01.09.2019 | 02.11.2016 |
not_valid_before | 06.09.2013 | 14.10.2011 |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JUNOS_CR.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0326_erpt.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JUNOS_ST.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0326_est.pdf |
manufacturer | Juniper Networks, Inc. | Ricoh Company, Ltd. |
manufacturer_web | https://www.juniper.net/ | https://www.ricoh.com/ |
security_level | {} | EAL3+, ALC_FLR.2 |
dgst | 190a0e55abcc41f1 | a8a1386e8eb00467 |
heuristics/cert_id | Certificate Number: 2013/85 | JISEC-CC-CRP-C0326 |
heuristics/cpe_matches | cpe:2.3:o:juniper:junos:12.1:-:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:12.1x44:-:*:*:*:*:*:* | {} |
heuristics/related_cves | CVE-2013-4689, CVE-2023-36840, CVE-2014-0615, CVE-2004-0230, CVE-2014-0613, CVE-2022-22220, CVE-2014-6449, CVE-2017-2349, CVE-2024-39511, CVE-2015-3004, CVE-2014-6378, CVE-2014-6450, CVE-2023-44177, CVE-2004-0468, CVE-2023-44176, CVE-2013-4686, CVE-2023-4481, CVE-2023-44178, CVE-2023-44182, CVE-2014-2712, CVE-2014-3818, CVE-2014-3821, CVE-2023-28962, CVE-2024-39514, CVE-2023-44197, CVE-2024-39555, CVE-2022-22245, CVE-2013-7313, CVE-2023-22406, CVE-2025-21590, CVE-2024-30380, CVE-2014-3816, CVE-2015-5358, CVE-2023-22391, CVE-2024-39549, CVE-2015-5359, CVE-2023-44186, CVE-2013-6618, CVE-2016-1261, CVE-2023-44194, CVE-2023-36841, CVE-2022-22156, CVE-2023-36842, CVE-2015-3003, CVE-2022-22181, CVE-2014-2711, CVE-2023-22395, CVE-2022-22246, CVE-2022-22241, CVE-2014-2713, CVE-2024-21591, CVE-2021-31372, CVE-2023-28964, CVE-2021-31362, CVE-2013-6014, CVE-2014-0616, CVE-2022-22244, CVE-2023-28975, CVE-2023-44201, CVE-2014-6379, CVE-2015-7752, CVE-2022-22208, CVE-2023-28963, CVE-2024-39556, CVE-2014-3819, CVE-2016-1258, CVE-2023-44175, CVE-2015-5360, CVE-2014-6447, CVE-2023-36839, CVE-2022-22238, CVE-2024-39517, CVE-2022-22163, CVE-2016-1256, CVE-2022-22243, CVE-2024-30397, CVE-2023-36843, CVE-2014-6384, CVE-2022-22224, CVE-2022-22197, CVE-2024-39528, CVE-2022-22215, CVE-2019-0036, CVE-2023-44184, CVE-2016-4923, CVE-2015-5362, CVE-2013-6012, CVE-2023-22407, CVE-2022-22173, CVE-2022-22214, CVE-2023-28979, CVE-2024-39558, CVE-2024-21594, CVE-2014-6385, CVE-2022-22242, CVE-2014-6380, CVE-2014-2714, CVE-2022-22162, CVE-2023-44185, CVE-2014-6386 | {} |
heuristics/extracted_sars | ATE_IND.1, ALC_CMC.1, AGD_PRE.1, AVA_VAN.1, ADV_FSP.1, ALC_CMS.1, AGD_OPE.1 | ALC_CMC.3, ALC_DEL.1, ADV_TDS.2, AGD_OPE.1, ADV_FSP.3, ALC_CMS.3, ATE_DPT.1, ATE_FUN.1, ASE_CCL.1, ALC_LCD.1, ASE_REQ.2, AGD_PRE.1, ASE_TSS.1, ASE_SPD.1, ASE_ECD.1, ALC_DVS.1, ALC_FLR.2, ATE_IND.2, AVA_VAN.2, ATE_COV.2, ADV_ARC.1, ASE_INT.1, ASE_OBJ.2 |
heuristics/extracted_versions | 12.1, 15.5 | 1.01, 2.02, 01.11.1, 01.00.00, 1.02, 1.03, 1.00, 03.00.00, 10.54, 1.06, 02.01.00 |
heuristics/protection_profiles | d7508f508083d040, ac9abe3d5c5a31f0 | 32475ccb695b1644 |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_ND_TFFWEP_V1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf |
pdf_data/report_filename | JUNOS_CR.pdf | c0326_erpt.pdf |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | JUNOS_ST.pdf | c0326_est.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |