This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Juniper Junos OS 22.4R2 for MX304, EX4100-48MP, EX4100-24MP, EX4100-24P, EX4100-24T, EX4100-48P, EX4100-48T Certificate Number: 2024/146 |
Athena Smartcard Solutions Inc. Carte ASEPCOS-TS/CNS DI Système d'exploitation ASEPCOS avec application de signature électronique TS/CNS embarqué sur le microcontrôleur AT90SC12872RCFT ANSSI-CC-2009/41 |
|
---|---|---|
name | Juniper Junos OS 22.4R2 for MX304, EX4100-48MP, EX4100-24MP, EX4100-24P, EX4100-24T, EX4100-48P, EX4100-48T | Athena Smartcard Solutions Inc. Carte ASEPCOS-TS/CNS DI Système d'exploitation ASEPCOS avec application de signature électronique TS/CNS embarqué sur le microcontrôleur AT90SC12872RCFT |
category | Network and Network-Related Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | AU | FR |
status | active | archived |
not_valid_after | 02.04.2029 | 01.09.2019 |
not_valid_before | 02.04.2024 | 06.10.2009 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP_Certificate_2024_146_EFT-T040_Junos%20OS%2022.4R2%20for%20MX304%20and%20EX4100x_os.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP-CC-CR-2024-EFT-T040-CR-V1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc_2009-41fr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper%20Junos%20OS%2022.4R2%20MX304,%20EX4100%20Line%20Security%20Target%20v1.1%201.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-cible_2009-41en.pdf |
manufacturer | Juniper Networks, Inc. | Athena Smartcard Solutions Inc. / Inside Secure S.A. |
manufacturer_web | https://www.juniper.net/ | https://www.athena-scs.com/ |
security_level | {} | AVA_MSU.3, EAL4+, AVA_VLA.4 |
dgst | 2a2dae0690e9db5a | e47d5f28e6b9640e |
heuristics/cert_id | Certificate Number: 2024/146 | ANSSI-CC-2009/41 |
heuristics/cert_lab | [] | CEACI |
heuristics/cpe_matches | cpe:2.3:o:juniper:junos:22.4:r3-s4:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:22.4:r3-s2:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:22.4:r3-s3:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:22.4:r3-s5:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:22.4:r3:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:22.4:r3-s1:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:* | {} |
heuristics/related_cves | CVE-2024-30397, CVE-2024-39554, CVE-2024-39511, CVE-2024-39514, CVE-2023-36843, CVE-2023-44188, CVE-2025-21590, CVE-2024-39549, CVE-2024-39555, CVE-2024-39517, CVE-2024-21591, CVE-2024-21601, CVE-2023-44186, CVE-2023-44204, CVE-2024-39556, CVE-2004-0468, CVE-2024-39528, CVE-2023-4481, CVE-2023-36842, CVE-2024-30380, CVE-2023-44175, CVE-2024-21596, CVE-2024-21585, CVE-2023-0026, CVE-2024-21616 | {} |
heuristics/extracted_sars | ALC_CMS.1, ASE_CCL.1, ASE_INT.1, ADV_FSP.1, AGD_PRE.1, AVA_VAN.1, ASE_ECD.1, ASE_SPD.1, ASE_OBJ.1, ATE_IND.1, ASE_REQ.1, ASE_TSS.1, ALC_CMC.1, AGD_OPE.1 | ATE_IND.2, ALC_DVS.1, AVA_VLA.4, ADV_FSP.2, ADV_RCR.1, ADV_IMP.1, AGD_USR.1, ADV_SPM.1, ATE_FUN.1, ATE_COV.2, AGD_ADM.1, ALC_TAT.1, ADV_HLD.2, ALC_LCD.1, AVA_MSU.3, ATE_DPT.1, AVA_SOF.1, ADV_LLD.1 |
heuristics/extracted_versions | 22.4 | - |
heuristics/report_references/directly_referenced_by | {} | ANSSI-CC-2009/59 |
heuristics/report_references/directly_referencing | {} | ANSSI-CC-2008/05, ANSSI-CC-2009/11, ANSSI-CC-2009/04 |
heuristics/report_references/indirectly_referenced_by | {} | ANSSI-CC-2009/59, ANSSI-CC-2010/60, ANSSI-CC-2010/05 |
heuristics/report_references/indirectly_referencing | {} | ANSSI-CC-2007/04, ANSSI-CC-2008/22, ANSSI-CC-2007/22, ANSSI-CC-2008/05, ANSSI-CC-2009/11, ANSSI-CC-2009/04, ANSSI-CC-2008/03 |
heuristics/st_references/directly_referencing | {} | ANSSI-CC-2008/05 |
heuristics/st_references/indirectly_referencing | {} | ANSSI-CC-2008/05 |
heuristics/protection_profiles | 89f2a255423f4a20, 51ed84742f89c3f7 | 40002c3611fc465f, 9863a376f3bb4175 |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_MACSEC_V1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0005b.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0006b.pdf |
pdf_data/cert_filename | AISEP_Certificate_2024_146_EFT-T040_Junos OS 22.4R2 for MX304 and EX4100x_os.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level | ||
pdf_data/cert_keywords/cc_sar | ||
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility | ||
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | AISEP-CC-CR-2024-EFT-T040-CR-V1.0.pdf | anssi-cc_2009-41fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | Juniper Junos OS 22.4R2 MX304, EX4100 Line Security Target v1.1 1.pdf | anssi-cc-cible_2009-41en.pdf |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |