This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T-Series Core Routers and EX-Series Ethernet Switches Running Junos 12.1R3.5 CCEVS-VR-VID-10517-2014 |
Tachograph G1, G2V1, G2V2 on IFX_CCI_000039h(version 2.2.1.N) (ANSSI-CC-2022/38-R01) ANSSI-CC-2022/38-R01 |
|
---|---|---|
name | Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T-Series Core Routers and EX-Series Ethernet Switches Running Junos 12.1R3.5 | Tachograph G1, G2V1, G2V2 on IFX_CCI_000039h(version 2.2.1.N) (ANSSI-CC-2022/38-R01) |
category | Network and Network-Related Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | US | FR |
status | archived | active |
not_valid_after | 07.05.2016 | 17.03.2030 |
not_valid_before | 07.03.2014 | 17.03.2025 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2022_38-R01.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10517-vr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2022_38-R01fr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10517-st.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2022_38-R01en.pdf |
manufacturer | Juniper Networks, Inc. | THALES DIS FRANCE SA |
manufacturer_web | https://www.juniper.net/ | https://www.thalesgroup.com/en/europe/france |
security_level | {} | ALC_DVS.2, EAL4+, ATE_DPT.2, AVA_VAN.5 |
dgst | c99465e61767d10a | cbbf7da3574e6141 |
heuristics/cert_id | CCEVS-VR-VID-10517-2014 | ANSSI-CC-2022/38-R01 |
heuristics/cert_lab | US | [] |
heuristics/cpe_matches | cpe:2.3:o:juniper:junos:12.1:r11:*:*:*:*:*:* | {} |
heuristics/related_cves | CVE-2023-22407, CVE-2024-39528, CVE-2022-22215, CVE-2023-28975, CVE-2013-4689, CVE-2024-39555, CVE-2022-22242, CVE-2023-36840, CVE-2014-3818, CVE-2022-22214, CVE-2022-22244, CVE-2019-0036, CVE-2024-39549, CVE-2022-22208, CVE-2024-30380, CVE-2021-31372, CVE-2024-39511, CVE-2023-28962, CVE-2024-39558, CVE-2023-36841, CVE-2013-6618, CVE-2024-39514, CVE-2023-44182, CVE-2023-28979, CVE-2022-22241, CVE-2023-44175, CVE-2023-44184, CVE-2022-22243, CVE-2013-4686, CVE-2023-22406, CVE-2023-44186, CVE-2023-36839, CVE-2022-22224, CVE-2022-22238, CVE-2014-2712, CVE-2023-28964, CVE-2023-44177, CVE-2022-22181, CVE-2022-22163, CVE-2022-22162, CVE-2024-39556, CVE-2023-28963, CVE-2004-0230, CVE-2023-36842, CVE-2004-0468, CVE-2023-44194, CVE-2023-44197, CVE-2023-44201, CVE-2022-22220, CVE-2013-6014, CVE-2024-21591, CVE-2024-39517, CVE-2024-21594, CVE-2022-22156, CVE-2013-7313, CVE-2023-4481, CVE-2014-2713, CVE-2014-2711, CVE-2021-31362, CVE-2023-44176, CVE-2014-3819, CVE-2022-22245, CVE-2014-3816, CVE-2022-22197, CVE-2022-22173, CVE-2023-44178, CVE-2024-30397, CVE-2022-22246, CVE-2023-22395, CVE-2023-36843, CVE-2023-44185, CVE-2014-2714, CVE-2023-22391, CVE-2014-6380, CVE-2014-6379 | {} |
heuristics/extracted_sars | ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 | ALC_FLR.1, ATE_DPT.2, ATE_FUN.1, AVA_VAN.5, ALC_DEL.1, ALC_DVS.2, ADV_ARC.1, ADV_TDS.3, AGD_OPE.1 |
heuristics/extracted_versions | 12.1, 3.5 | 2.2.1 |
heuristics/scheme_data |
|
|
heuristics/protection_profiles | ac9abe3d5c5a31f0 | d9ddf0d150631fef, 366f39631e23f94e |
maintenance_updates |
|
|
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0091b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0070b_pdf.pdf |
pdf_data/cert_filename | certificat-2022_38-R01.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | st_vid10517-vr.pdf | ANSSI-CC-2022_38-R01fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | st_vid10517-st.pdf | ANSSI-cible-CC-2022_38-R01en.pdf |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |