This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Juniper Junos OS 22.4R2 for MX304, EX4100-48MP, EX4100-24MP, EX4100-24P, EX4100-24T, EX4100-48P, EX4100-48T Certificate Number: 2024/146 |
Microcontrôleur sécurisé ST33G1M2 révision F, Firmware révision 9, incluant optionnellement la bibliothèque cryptographique Neslib 4.1 et la bibliothèque MIFARE® DESFire® EV1 révision 3.7 ou 3.8 ANSSI-CC-2014/46 |
|
---|---|---|
name | Juniper Junos OS 22.4R2 for MX304, EX4100-48MP, EX4100-24MP, EX4100-24P, EX4100-24T, EX4100-48P, EX4100-48T | Microcontrôleur sécurisé ST33G1M2 révision F, Firmware révision 9, incluant optionnellement la bibliothèque cryptographique Neslib 4.1 et la bibliothèque MIFARE® DESFire® EV1 révision 3.7 ou 3.8 |
category | Network and Network-Related Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | AU | FR |
status | active | archived |
not_valid_after | 02.04.2029 | 01.09.2019 |
not_valid_before | 02.04.2024 | 21.07.2014 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP_Certificate_2024_146_EFT-T040_Junos%20OS%2022.4R2%20for%20MX304%20and%20EX4100x_os.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP-CC-CR-2024-EFT-T040-CR-V1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014-46%20-%20OriginalSigné.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper%20Junos%20OS%2022.4R2%20MX304,%20EX4100%20Line%20Security%20Target%20v1.1%201.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2014-46en.pdf |
manufacturer | Juniper Networks, Inc. | STMicroelectronics |
manufacturer_web | https://www.juniper.net/ | https://www.st.com/ |
security_level | {} | ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst | 2a2dae0690e9db5a | 911af0b28d2e5f4e |
heuristics/cert_id | Certificate Number: 2024/146 | ANSSI-CC-2014/46 |
heuristics/cert_lab | [] | THALES |
heuristics/cpe_matches | cpe:2.3:o:juniper:junos:22.4:r3-s2:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:22.4:r3-s3:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:22.4:r3:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:22.4:r3-s4:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:22.4:r3-s5:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:22.4:r3-s1:*:*:*:*:*:* | {} |
heuristics/related_cves | CVE-2024-39514, CVE-2023-36843, CVE-2024-39528, CVE-2023-44175, CVE-2024-39549, CVE-2023-36842, CVE-2023-0026, CVE-2024-21601, CVE-2024-30380, CVE-2025-21590, CVE-2024-21616, CVE-2023-4481, CVE-2023-44188, CVE-2024-39555, CVE-2004-0468, CVE-2024-21596, CVE-2023-44204, CVE-2024-21585, CVE-2023-44186, CVE-2024-39511, CVE-2024-39554, CVE-2024-39556, CVE-2024-30397, CVE-2024-21591, CVE-2024-39517 | {} |
heuristics/extracted_sars | AVA_VAN.1, ASE_TSS.1, ASE_REQ.1, ASE_CCL.1, ADV_FSP.1, ATE_IND.1, AGD_OPE.1, ASE_INT.1, ASE_OBJ.1, AGD_PRE.1, ASE_ECD.1, ALC_CMS.1, ASE_SPD.1, ALC_CMC.1 | ADV_FSP.5, ADV_INT.2, ATE_IND.2, AGD_OPE.1, ADV_ARC.1, ATE_COV.2, AGD_PRE.1, ALC_DVS.2, ATE_DPT.3, ADV_TDS.4, ALC_CMS.5, ALC_CMC.4, ALC_LCD.1, ATE_FUN.1, ADV_IMP.1, ALC_TAT.2, AVA_VAN.5, ALC_DEL.1 |
heuristics/extracted_versions | 22.4 | 3.8, 3.7, 4.1 |
heuristics/report_references/directly_referenced_by | {} | CRP280, ANSSI-CC-2017/02, ANSSI-CC-2016/22 |
heuristics/report_references/indirectly_referenced_by | {} | ANSSI-CC-2016/22, BSI-DSZ-CC-1070-2018, ANSSI-CC-2017/02, ANSSI-CC-2017/73, ANSSI-CC-2016/31, BSI-DSZ-CC-1111-2019, CRP280, BSI-DSZ-CC-1131-2020, BSI-DSZ-CC-1131-V2-2023, ANSSI-CC-2019/37 |
heuristics/st_references/directly_referenced_by | {} | CRP280, ANSSI-CC-2016/22 |
heuristics/st_references/indirectly_referenced_by | {} | CRP280, ANSSI-CC-2016/22 |
heuristics/protection_profiles | 89f2a255423f4a20, 51ed84742f89c3f7 | f6d23054061d72ba |
maintenance_updates |
|
|
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_MACSEC_V1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename | AISEP_Certificate_2024_146_EFT-T040_Junos OS 22.4R2 for MX304 and EX4100x_os.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level | ||
pdf_data/cert_keywords/cc_sar | ||
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility | ||
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | AISEP-CC-CR-2024-EFT-T040-CR-V1.0.pdf | ANSSI-CC-2014-46 - OriginalSigné.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | Juniper Junos OS 22.4R2 MX304, EX4100 Line Security Target v1.1 1.pdf | ANSSI-CC-cible_2014-46en.pdf |
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |