This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Juniper Junos OS 22.4R2 for MX304, EX4100-48MP, EX4100-24MP, EX4100-24P, EX4100-24T, EX4100-48P, EX4100-48T Certificate Number: 2024/146 |
Application eTravel EAC v2.0 sur la carte à pucefermée MultiApp V3 masquée sur le composantM7820 A11(Version du patch : 5.0) ANSSI-CC-2014/61 |
|
---|---|---|
name | Juniper Junos OS 22.4R2 for MX304, EX4100-48MP, EX4100-24MP, EX4100-24P, EX4100-24T, EX4100-48P, EX4100-48T | Application eTravel EAC v2.0 sur la carte à pucefermée MultiApp V3 masquée sur le composantM7820 A11(Version du patch : 5.0) |
category | Network and Network-Related Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | AU | FR |
status | active | archived |
not_valid_after | 02.04.2029 | 16.09.2019 |
not_valid_before | 02.04.2024 | 16.09.2014 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP_Certificate_2024_146_EFT-T040_Junos%20OS%2022.4R2%20for%20MX304%20and%20EX4100x_os.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP-CC-CR-2024-EFT-T040-CR-V1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Rapport%20ANSSI-CC-2014_61fr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper%20Junos%20OS%2022.4R2%20MX304,%20EX4100%20Line%20Security%20Target%20v1.1%201.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2014-61en.pdf |
manufacturer | Juniper Networks, Inc. | Gemalto - Infineon Technologies AG |
manufacturer_web | https://www.juniper.net/ | https://www.gemalto.com/ |
security_level | {} | ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst | 2a2dae0690e9db5a | 58ad0c9a39f6504c |
heuristics/cert_id | Certificate Number: 2024/146 | ANSSI-CC-2014/61 |
heuristics/cert_lab | [] | SERMA |
heuristics/cpe_matches | cpe:2.3:o:juniper:junos:22.4:r3:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:22.4:r3-s2:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:22.4:r3-s5:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:22.4:r3-s1:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:22.4:r3-s4:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:22.4:r3-s3:*:*:*:*:*:* | {} |
heuristics/related_cves | CVE-2023-44204, CVE-2024-21616, CVE-2023-44188, CVE-2024-39517, CVE-2024-30380, CVE-2024-30397, CVE-2023-36843, CVE-2024-39528, CVE-2023-44175, CVE-2004-0468, CVE-2023-36842, CVE-2025-21590, CVE-2023-44186, CVE-2023-4481, CVE-2024-21591, CVE-2024-39554, CVE-2023-0026, CVE-2024-39556, CVE-2024-39514, CVE-2024-21585, CVE-2024-39511, CVE-2024-21596, CVE-2024-39555, CVE-2024-39549, CVE-2024-21601 | {} |
heuristics/extracted_sars | ASE_SPD.1, AGD_OPE.1, ASE_TSS.1, ASE_OBJ.1, ADV_FSP.1, AGD_PRE.1, ALC_CMC.1, ASE_CCL.1, AVA_VAN.1, ALC_CMS.1, ATE_IND.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1 | AVA_VAN.5, ADV_ARC.1, ALC_DVS.2 |
heuristics/extracted_versions | 22.4 | 5.0, 2.0 |
heuristics/report_references/directly_referenced_by | {} | ANSSI-CC-2016/73 |
heuristics/report_references/directly_referencing | {} | BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/07, ANSSI-CC-2014/06 |
heuristics/report_references/indirectly_referenced_by | {} | ANSSI-CC-2016/73 |
heuristics/report_references/indirectly_referencing | {} | ANSSI-CC-2013/32, ANSSI-CC-2014/07, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0829-2012, ANSSI-CC-2013/33, BSI-DSZ-CC-0728-2011, ANSSI-CC-2014/06 |
heuristics/st_references/directly_referencing | {} | BSI-DSZ-CC-0829-2012 |
heuristics/st_references/indirectly_referencing | {} | BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0728-2011 |
heuristics/protection_profiles | 89f2a255423f4a20, 51ed84742f89c3f7 | a33327d40f253f46 |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_MACSEC_V1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf |
pdf_data/cert_filename | AISEP_Certificate_2024_146_EFT-T040_Junos OS 22.4R2 for MX304 and EX4100x_os.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level | ||
pdf_data/cert_keywords/cc_sar | ||
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility | ||
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | AISEP-CC-CR-2024-EFT-T040-CR-V1.0.pdf | Rapport ANSSI-CC-2014_61fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | Juniper Junos OS 22.4R2 MX304, EX4100 Line Security Target v1.1 1.pdf | ANSSI-CC-cible_2014-61en.pdf |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |