name |
TIBCO Enterprise Message Service Version 4.3.0 |
Juniper Networks JUNOS® 10.4R5 for M-Series, MX-Series, T-Series Routers and EX Series Switches |
category |
Other Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
US |
CA |
status |
archived |
archived |
not_valid_after |
07.09.2012 |
19.04.2018 |
not_valid_before |
31.12.2006 |
10.08.2012 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10126-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-188%20CR%20v1.0e.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10126-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-188%20ST%20v2.2.pdf |
manufacturer |
TIBCO Software Inc. |
Juniper Networks, Inc. |
manufacturer_web |
https://www.tibco.com/ |
https://www.juniper.net/ |
security_level |
EAL2 |
EAL3+, ALC_FLR.3 |
dgst |
5e76b472e4ab3c79 |
8e96ae99530fca1d |
heuristics/cert_id |
CCEVS-VR-0053-2006 |
383-4-188 |
heuristics/cert_lab |
US |
CANADA |
heuristics/cpe_matches |
{} |
cpe:2.3:o:juniper:junos:10.4:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2023-22407, CVE-2024-39528, CVE-2022-22215, CVE-2013-4689, CVE-2024-39555, CVE-2023-28975, CVE-2022-22242, CVE-2023-36840, CVE-2022-22244, CVE-2014-3818, CVE-2024-30380, CVE-2019-0036, CVE-2024-39549, CVE-2022-22208, CVE-2021-31372, CVE-2022-22214, CVE-2024-39511, CVE-2023-28962, CVE-2024-39514, CVE-2023-36841, CVE-2024-39558, CVE-2013-6618, CVE-2023-44182, CVE-2023-28979, CVE-2022-22241, CVE-2014-0613, CVE-2023-44184, CVE-2023-44175, CVE-2022-22243, CVE-2013-4686, CVE-2014-0615, CVE-2023-44186, CVE-2023-22406, CVE-2023-36839, CVE-2022-22224, CVE-2022-22238, CVE-2014-2712, CVE-2023-28964, CVE-2023-44177, CVE-2024-39556, CVE-2022-22181, CVE-2022-22162, CVE-2022-22163, CVE-2023-28963, CVE-2004-0230, CVE-2023-36842, CVE-2023-44194, CVE-2004-0468, CVE-2022-22220, CVE-2023-44201, CVE-2023-44197, CVE-2014-0616, CVE-2013-6014, CVE-2024-21594, CVE-2024-39517, CVE-2024-21591, CVE-2022-22156, CVE-2013-7313, CVE-2023-4481, CVE-2013-6170, CVE-2021-31362, CVE-2022-22197, CVE-2022-22245, CVE-2022-22173, CVE-2023-44178, CVE-2024-30397, CVE-2022-22246, CVE-2023-22395, CVE-2023-36843, CVE-2023-44185, CVE-2014-2714, CVE-2023-22391, CVE-2023-44176 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1 |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ADV_TDS.2, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
heuristics/extracted_versions |
4.3.0 |
10.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Secure Messaging
- certification_date: 29.12.2006
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date:
- id: CCEVS-VR-VID10126
- product: TIBCO Enterprise Message Service Version 4.3.0
- scheme: US
- url: https://www.niap-ccevs.org/product/10126
- vendor: TIBCO Software Inc.
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
st_vid10126-vr.pdf |
383-4-188 CR v1.0e.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-06-0053
- cert_item: TIBCO Enterprise Message ServiceTM Version 4.3.0
- cert_lab: US NIAP
- CA:
|
- US:
- CA:
- cert_id: 383-4-188-CR
- cert_lab: CANADA
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 3: 4
- EAL 3 augmented: 2
- EAL 3+: 2
- EAL3+: 1
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: diazt
- /Company: MITRE and NSA
- /CreationDate: D:20070201095456-05'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /ModDate: D:20070201095547-05'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20070201145402
- /Title: Validation Report for Tibco
- pdf_file_size_bytes: 122223
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
- /Author: User
- /CCEF: CGI IT Security Evaluation & Test Facility
- /CR date: 10 August 2012
- /CR version: 1.0
- /Certificate date: 10 August 2012
- /CreationDate: D:20120810083649-04'00'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /Developer name: Juniper Networks, Inc.
- /Document number: 383-4-188-CR
- /ETR title, version, date: Juniper Networks M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches running JUNOS 10.4R5 Common Criteria EAL3+ Evaluation Technical Report (ETR), Document Version 1.2,
- /Evaluation completion date: 30 July 2012
- /ModDate: D:20120810083654-04'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /ST Title: Juniper Networks Security Target for Juniper Networks M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches running JUNOS 10.4R5
- /ST date: 11 July 2012
- /ST version: Version 2.2
- /SourceModified: D:20120809122721
- /Sponsor: Juniper Networks, Inc.
- /TOE Version: 5.0
- /TOE name and version: Juniper Networks JUNOS® 10.4R5 for M-Series, MX-Series, T-Series Routers and EX Series Switches
- /TOE short name: JUNOS® 10.4R5
- /Title: EAL 3 Evaluation of <TOE name and version>
- pdf_file_size_bytes: 64990
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
pdf_data/st_filename |
st_vid10126-st.pdf |
383-4-188 ST v2.2.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL3: 5
- EAL3 augmented: 4
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL: 1
- ADO_DEL.1: 7
- ADO_IGS: 1
- ADO_IGS.1: 7
- ADV:
- ADV_FSP: 1
- ADV_FSP.1: 20
- ADV_HLD: 1
- ADV_HLD.1: 16
- ADV_RCR: 1
- ADV_RCR.1: 8
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 18
- AGD_USR: 1
- AGD_USR.1: 15
- ATE:
- ATE_COV: 1
- ATE_COV.1: 6
- ATE_FUN: 1
- ATE_FUN.1: 14
- ATE_IND: 1
- ATE_IND.2: 9
- AVA:
- AVA_SOF: 1
- AVA_SOF.1: 8
- AVA_VLA: 1
- AVA_VLA.1: 10
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 7
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 3
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 2
- FAU_SAR.1: 3
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG: 2
- FAU_STG.1: 2
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FCS:
- FCS_CKM.1: 4
- FCS_CKM.4: 4
- FCS_COP: 28
- FDP:
- FDP_ACC: 3
- FDP_ACC.1: 4
- FDP_ACC.2: 9
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 3
- FDP_ACF.1: 4
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 4
- FIA:
- FIA_ATD: 13
- FIA_SUP_EXP: 2
- FIA_SUP_EXP.1: 3
- FIA_UAU: 1
- FIA_UAU.5: 1
- FIA_UAU_EXP: 3
- FIA_UAU_EXP.2: 6
- FIA_UID: 14
- FIA_UID.1: 1
- FIA_UID.2: 3
- FMT:
- FMT_MSA: 19
- FMT_MSA.2: 4
- FMT_MSA.3: 6
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF: 3
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR: 3
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT: 3
- FPT_ITT.1: 4
- FPT_ITT.1.1: 1
- FPT_RVM: 3
- FPT_RVM.1: 4
- FPT_RVM.1.1: 1
- FPT_SEP: 2
- FPT_SEP.1: 3
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM: 3
- FPT_STM.1: 4
- FPT_STM.1.1: 1
|
- FAU:
- FAU_ARP.1: 6
- FAU_ARP.1.1: 1
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_SAA.1: 5
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FDP:
- FDP_IFC.1: 5
- FDP_IFC.1.1: 1
- FDP_IFF.1: 6
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ROL.1: 5
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FIA:
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_SOS.1: 5
- FIA_SOS.1.1: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UAU.5: 5
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 1
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 10
- FMT_MOF.1: 2
- FMT_MSA.1: 3
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 32
- FMT_MTD.1: 7
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 5
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 5
- FPT_STM.1.1: 1
- FTA:
- FTA_TSE.1: 5
- FTA_TSE.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- O:
- O.ACCESS: 4
- O.AUDIT_GENERATION: 2
- O.MANAGE: 4
- O.PROTECT: 2
- O.USER_AUTHENTICATION: 4
- O.USER_IDENTIFICATION: 2
- OE:
- OE.AUDIT_PROTECTION: 4
- OE.AUDIT_REVIEW: 2
- OE.CONFIG: 1
- OE.PHYCAL: 2
- OE.PROTECT: 4
- OE.TIME: 2
- OE.USER_AUTHENTICATION: 4
- OE.USER_IDENTIFICATION: 2
- T:
- T.ACCOUNTABILITY: 2
- T.ADMIN_ERROR: 2
- T.MASQERADE: 1
- T.MASQUERADE: 1
- T.UNAUTH_ACCESS: 2
|
- A:
- A.CRYPTO: 4
- A.EAUTH: 2
- A.LOCATE: 4
- A.NOEVIL: 3
- A.NWCOMP: 2
- A.TIME: 4
- O:
- O.ACCESS: 14
- O.AUDIT: 13
- O.CONN: 6
- O.EADMIN: 8
- O.FLOW: 11
- O.PROTECT: 15
- O.ROLBAK: 6
- OE:
- OE.ADMIN: 3
- OE.CRYPTO: 3
- OE.EAUTH: 3
- OE.NWCOMP: 3
- OE.PHYSICAL: 3
- OE.TIME: 3
- T:
- T.CONFLOSS: 5
- T.MANDAT: 3
- T.NOAUDIT: 2
- T.OPS: 8
- T.PRIVIL: 7
- T.ROUTE: 9
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- This covers all services used to exchange information, including telnet and SSL (which are out of scope), and SSH (which is provided by the operational environment). Authentication services can be: 1
- accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: All: 1
- out of scope: 2
- which are out of scope), and SSH (which is provided by the operational environment: 1
|
pdf_data/st_metadata |
- /Author: SAIC CCTL IA Team
- /Company: TIBCO Software Inc.
- /CreationDate: D:20070201103852-05'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /Manager: Julie Taylor
- /ModDate: D:20070201104032-05'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20070201153700
- /Subject: Security Target
- /Title: TIBCO Software Inc. Enterprise Message Service (EMS) Security Target
- pdf_file_size_bytes: 397976
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
- /Author: Juniper
- /CreationDate: D:20120725095220-04'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20120725095220-04'00'
- /Producer: Microsoft® Word 2010
- /Subject: EAL3 Security Target
- /Title: JUNOS 10.4 M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches
- pdf_file_size_bytes: 817354
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 39
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |