This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Juniper Networks, Inc. JUNOS 12.1 X44 D15.5 for SRX Series Platforms Components: Software JUNOS US/Canada Version 12.1X44 JUNOS-FIPS Version 12.1 X44 Hardware SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650, SRX1400, SRX3400, SRX3600; SRX5600 and SRX5800 with SPC-2-10-40; and SRX5600 and SRX5800 with SPC-4-15-320. Certificate Number: 2013/85 |
Ricoh Aficio MP C300/C300SR/C400/C400SR, Savin C230/C230SR/C240/C240SR, Lanier LD130C/LD130CSR/LD140C/LD140CSR, Lanier MP C300/C300SR/C400/C400SR, nashuatec MP C300/C300SR/C400/C400SR, Rex-Rotary MP C300/C300SR/C400/C400SR, Gestetner MP C300/C300SR/C400/C400SR, infotec MP C300/C300SR/C400/C400SR all of above with Facsimile Function Version: - Software: System/Copy 2.05, Network Support 10.57, Fax 02.00.00, RemoteFax 01.00.00, NetworkDocBox 1.04, Web Support 1.02, Web Uapl 1.01, animation 1.00, Scanner 01.04, Printer 1.01, PCL 1.07, OptionPCLFont 1.02, Data Erase Std 1.01x, GWFCU3-23(WW) 03.00.00, Engine 1.02:02, OpePanel 1.03, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 JISEC-CC-CRP-C0367 |
|
---|---|---|
name | Juniper Networks, Inc. JUNOS 12.1 X44 D15.5 for SRX Series Platforms Components: Software JUNOS US/Canada Version 12.1X44 JUNOS-FIPS Version 12.1 X44 Hardware SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650, SRX1400, SRX3400, SRX3600; SRX5600 and SRX5800 with SPC-2-10-40; and SRX5600 and SRX5800 with SPC-4-15-320. | Ricoh Aficio MP C300/C300SR/C400/C400SR, Savin C230/C230SR/C240/C240SR, Lanier LD130C/LD130CSR/LD140C/LD140CSR, Lanier MP C300/C300SR/C400/C400SR, nashuatec MP C300/C300SR/C400/C400SR, Rex-Rotary MP C300/C300SR/C400/C400SR, Gestetner MP C300/C300SR/C400/C400SR, infotec MP C300/C300SR/C400/C400SR all of above with Facsimile Function Version: - Software: System/Copy 2.05, Network Support 10.57, Fax 02.00.00, RemoteFax 01.00.00, NetworkDocBox 1.04, Web Support 1.02, Web Uapl 1.01, animation 1.00, Scanner 01.04, Printer 1.01, PCL 1.07, OptionPCLFont 1.02, Data Erase Std 1.01x, GWFCU3-23(WW) 03.00.00, Engine 1.02:02, OpePanel 1.03, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 |
category | Network and Network-Related Devices and Systems | Multi-Function Devices |
scheme | AU | JP |
not_valid_after | 01.09.2019 | 07.02.2017 |
not_valid_before | 06.09.2013 | 30.08.2012 |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JUNOS_CR.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0367_erpt.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JUNOS_ST.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0367_est.pdf |
manufacturer | Juniper Networks, Inc. | Ricoh Company, Ltd. |
manufacturer_web | https://www.juniper.net/ | https://www.ricoh.com/ |
security_level | {} | EAL3+, ALC_FLR.2 |
dgst | 190a0e55abcc41f1 | d6c61d1cd6e6e8e0 |
heuristics/cert_id | Certificate Number: 2013/85 | JISEC-CC-CRP-C0367 |
heuristics/cpe_matches | cpe:2.3:o:juniper:junos:12.1:-:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:12.1x44:-:*:*:*:*:*:* | {} |
heuristics/related_cves | CVE-2013-4689, CVE-2023-36840, CVE-2014-0615, CVE-2004-0230, CVE-2014-0613, CVE-2022-22220, CVE-2014-6449, CVE-2017-2349, CVE-2024-39511, CVE-2015-3004, CVE-2014-6378, CVE-2014-6450, CVE-2023-44177, CVE-2004-0468, CVE-2023-44176, CVE-2013-4686, CVE-2023-4481, CVE-2023-44178, CVE-2023-44182, CVE-2014-2712, CVE-2014-3818, CVE-2014-3821, CVE-2023-28962, CVE-2024-39514, CVE-2023-44197, CVE-2024-39555, CVE-2022-22245, CVE-2013-7313, CVE-2023-22406, CVE-2025-21590, CVE-2024-30380, CVE-2014-3816, CVE-2015-5358, CVE-2023-22391, CVE-2024-39549, CVE-2015-5359, CVE-2023-44186, CVE-2013-6618, CVE-2016-1261, CVE-2023-44194, CVE-2023-36841, CVE-2022-22156, CVE-2023-36842, CVE-2015-3003, CVE-2022-22181, CVE-2014-2711, CVE-2023-22395, CVE-2022-22246, CVE-2022-22241, CVE-2014-2713, CVE-2024-21591, CVE-2021-31372, CVE-2023-28964, CVE-2021-31362, CVE-2013-6014, CVE-2014-0616, CVE-2022-22244, CVE-2023-28975, CVE-2023-44201, CVE-2014-6379, CVE-2015-7752, CVE-2022-22208, CVE-2023-28963, CVE-2024-39556, CVE-2014-3819, CVE-2016-1258, CVE-2023-44175, CVE-2015-5360, CVE-2014-6447, CVE-2023-36839, CVE-2022-22238, CVE-2024-39517, CVE-2022-22163, CVE-2016-1256, CVE-2022-22243, CVE-2024-30397, CVE-2023-36843, CVE-2014-6384, CVE-2022-22224, CVE-2022-22197, CVE-2024-39528, CVE-2022-22215, CVE-2019-0036, CVE-2023-44184, CVE-2016-4923, CVE-2015-5362, CVE-2013-6012, CVE-2023-22407, CVE-2022-22173, CVE-2022-22214, CVE-2023-28979, CVE-2024-39558, CVE-2024-21594, CVE-2014-6385, CVE-2022-22242, CVE-2014-6380, CVE-2014-2714, CVE-2022-22162, CVE-2023-44185, CVE-2014-6386 | {} |
heuristics/extracted_sars | ATE_IND.1, ALC_CMC.1, AGD_PRE.1, AVA_VAN.1, ADV_FSP.1, ALC_CMS.1, AGD_OPE.1 | ALC_CMC.3, ALC_DEL.1, ADV_TDS.2, AGD_OPE.1, ADV_FSP.3, ALC_CMS.3, ATE_DPT.1, ATE_FUN.1, ASE_CCL.1, ALC_LCD.1, ASE_REQ.2, AGD_PRE.1, ASE_TSS.1, ASE_SPD.1, ASE_ECD.1, ALC_DVS.1, ALC_FLR.2, ATE_IND.2, AVA_VAN.2, ATE_COV.2, ADV_ARC.1, ASE_INT.1, ASE_OBJ.2 |
heuristics/extracted_versions | 12.1, 15.5 | 1.01, 01.00.00, 1.02, 1.03, 02.00.00, 2.05, 1.00, 03.00.00, 1.07, 01.04, 1.04, 10.57 |
heuristics/protection_profiles | d7508f508083d040, ac9abe3d5c5a31f0 | 32475ccb695b1644 |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_ND_TFFWEP_V1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf |
pdf_data/report_filename | JUNOS_CR.pdf | c0367_erpt.pdf |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | JUNOS_ST.pdf | c0367_est.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |