This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Dell EMC PowerStore 3.5 CSEC2023010 |
Juniper Networks, Inc. JUNOS 12.1 X44 D15.5 for SRX Series Platforms Components: Software JUNOS US/Canada Version 12.1X44 JUNOS-FIPS Version 12.1 X44 Hardware SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650, SRX1400, SRX3400, SRX3600; SRX5600 and SRX5800 with SPC-2-10-40; and SRX5600 and SRX5800 with SPC-4-15-320. Certificate Number: 2013/85 |
|
---|---|---|
name | Dell EMC PowerStore 3.5 | Juniper Networks, Inc. JUNOS 12.1 X44 D15.5 for SRX Series Platforms Components: Software JUNOS US/Canada Version 12.1X44 JUNOS-FIPS Version 12.1 X44 Hardware SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650, SRX1400, SRX3400, SRX3600; SRX5600 and SRX5800 with SPC-2-10-40; and SRX5600 and SRX5800 with SPC-4-15-320. |
category | Other Devices and Systems | Network and Network-Related Devices and Systems |
scheme | SE | AU |
status | active | archived |
not_valid_after | 14.03.2029 | 01.09.2019 |
not_valid_before | 14.03.2024 | 06.09.2013 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CCRAcertificate%20Dell%20EMC%20PowerStore%203.5.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20Dell%20EMC%20PowerStore%203.5.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JUNOS_CR.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Dell%20EMC%20PowerStore_EAL2_ST_0.31.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JUNOS_ST.pdf |
manufacturer | Dell EMC | Juniper Networks, Inc. |
manufacturer_web | https://www.dellemc.com/en-ca/index.htm | https://www.juniper.net/ |
security_level | EAL2+, ALC_FLR.2 | {} |
dgst | b5f733a6f8700111 | 190a0e55abcc41f1 |
heuristics/cert_id | CSEC2023010 | Certificate Number: 2013/85 |
heuristics/cpe_matches | {} | cpe:2.3:o:juniper:junos:12.1x44:-:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:12.1x44:d15:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:12.1:-:*:*:*:*:*:* |
heuristics/related_cves | {} | CVE-2014-6447, CVE-2023-36840, CVE-2014-3818, CVE-2019-0036, CVE-2014-6450, CVE-2023-36841, CVE-2023-36839, CVE-2022-22238, CVE-2014-2712, CVE-2022-22181, CVE-2023-28963, CVE-2023-44197, CVE-2023-44201, CVE-2013-6014, CVE-2024-21594, CVE-2014-3821, CVE-2014-2714, CVE-2022-22244, CVE-2024-39549, CVE-2014-6378, CVE-2014-6384, CVE-2023-28962, CVE-2024-39514, CVE-2013-6618, CVE-2023-28979, CVE-2022-22241, CVE-2014-0615, CVE-2022-22243, CVE-2023-44186, CVE-2023-36842, CVE-2004-0468, CVE-2023-44194, CVE-2024-21591, CVE-2014-2713, CVE-2025-21590, CVE-2014-3819, CVE-2014-3816, CVE-2015-7752, CVE-2023-44185, CVE-2024-39528, CVE-2022-22215, CVE-2023-28975, CVE-2022-22242, CVE-2014-6449, CVE-2015-5362, CVE-2021-31372, CVE-2015-5359, CVE-2024-39558, CVE-2023-44182, CVE-2016-1261, CVE-2014-0613, CVE-2023-44184, CVE-2022-22224, CVE-2024-39556, CVE-2022-22220, CVE-2014-0616, CVE-2013-7313, CVE-2023-4481, CVE-2015-3004, CVE-2014-2711, CVE-2022-22245, CVE-2022-22197, CVE-2023-44178, CVE-2024-30397, CVE-2023-22395, CVE-2022-22246, CVE-2015-5360, CVE-2014-6380, CVE-2013-4686, CVE-2023-44176, CVE-2023-22407, CVE-2013-4689, CVE-2024-39555, CVE-2015-3003, CVE-2022-22214, CVE-2024-30380, CVE-2022-22208, CVE-2016-4923, CVE-2024-39511, CVE-2023-44175, CVE-2023-22406, CVE-2016-1258, CVE-2022-22163, CVE-2023-28964, CVE-2014-6386, CVE-2023-44177, CVE-2022-22162, CVE-2015-5358, CVE-2004-0230, CVE-2014-6385, CVE-2024-39517, CVE-2022-22156, CVE-2016-1256, CVE-2013-6012, CVE-2021-31362, CVE-2017-2349, CVE-2022-22173, CVE-2023-36843, CVE-2023-22391, CVE-2014-6379 |
heuristics/extracted_sars | ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 | ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 |
heuristics/extracted_versions | 3.5 | 15.5, 12.1 |
heuristics/protection_profiles | {} | d7508f508083d040, ac9abe3d5c5a31f0 |
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_ND_TFFWEP_V1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
pdf_data/cert_filename | CCRAcertificate Dell EMC PowerStore 3.5.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | Certification Report Dell EMC PowerStore 3.5.pdf | JUNOS_CR.pdf |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | Dell EMC PowerStore_EAL2_ST_0.31.pdf | JUNOS_ST.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |