Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Juniper Networks M & T-Series Family of Internet Routers running JUNOS 6.0r1, Model numbers M5, M10, M20, M40e, M7i, M160, T320, T640
CCEVS-VR-0055-2004
Juniper Networks JUNOS® 10.4R5 for M-Series, MX-Series, T-Series Routers and EX Series Switches
383-4-188
name Juniper Networks M & T-Series Family of Internet Routers running JUNOS 6.0r1, Model numbers M5, M10, M20, M40e, M7i, M160, T320, T640 Juniper Networks JUNOS® 10.4R5 for M-Series, MX-Series, T-Series Routers and EX Series Switches
not_valid_before 2004-01-01 2012-08-10
not_valid_after 2012-09-06 2018-04-19
scheme US CA
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4021-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-188%20ST%20v2.2.pdf
security_level EAL2 EAL3+, ALC_FLR.3
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4021-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-188%20CR%20v1.0e.pdf
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2004, 6, 24), 'maintenance_title': 'Models M10i M320 Running JUNOS 6.3r1', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4021-add1.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2005, 12, 14), 'maintenance_title': 'Previous Model Running JUNOS 7.4.r1', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4021-add2.pdf', 'maintenance_st_link': None})
state/report/pdf_hash 89ba77f4e3630b0500b1a5055c298cf8560f8daa91902d39127f52f592fbc8e8 9c6dae203d11062a123ce73a602e77a238100532c4de58d8c92aab57caaf17e8
state/report/txt_hash ca839cbc5b4c8eb958407fe440ee45b2ff7d47b178089f3ff0103115a4be5ecd 050a2ce508f42fc934a825f4bc666b440b35baf1f6794c567182b30e29178252
state/st/pdf_hash e005c0d291dd73150327fd73f393896b15cf4d73a1c98cc95c97b4c071eaaf7a f78145d5d79856030397a11292bbea924c27cd38a3e8ce8764bb2fe7e604b861
state/st/txt_hash 7602dbfa626d63e7977d93f1367107e7c96892cf83a3c579d40bdcca03c8eb6e 2f40d00f6037d7d4bbdea95d84640a4865d4f681d67f0d29ae39db856a3bd3f5
heuristics/cert_id CCEVS-VR-0055-2004 383-4-188
heuristics/cert_lab US CANADA
heuristics/cpe_matches None cpe:2.3:o:juniper:junos:10.4:*:*:*:*:*:*:*
heuristics/extracted_versions 6.0 10.4
heuristics/related_cves None CVE-2022-22156, CVE-2023-44177, CVE-2023-44201, CVE-2023-44178, CVE-2024-21591, CVE-2022-22215, CVE-2022-22208, CVE-2023-36843, CVE-2024-39549, CVE-2023-36841, CVE-2022-22242, CVE-2014-3818, CVE-2014-2712, CVE-2023-28964, CVE-2022-22181, CVE-2023-44197, CVE-2022-22224, CVE-2004-0468, CVE-2013-4686, CVE-2021-31372, CVE-2023-44184, CVE-2022-22220, CVE-2014-0616, CVE-2022-22245, CVE-2023-22406, CVE-2013-7313, CVE-2024-39528, CVE-2021-31362, CVE-2023-28962, CVE-2023-28979, CVE-2022-22246, CVE-2022-22244, CVE-2023-44194, CVE-2013-4689, CVE-2022-22241, CVE-2014-2714, CVE-2022-22238, CVE-2022-22162, CVE-2023-44186, CVE-2014-0615, CVE-2024-21594, CVE-2013-6618, CVE-2022-22197, CVE-2023-36842, CVE-2023-28963, CVE-2013-6170, CVE-2022-22243, CVE-2023-44182, CVE-2004-0230, CVE-2022-22163, CVE-2023-22395, CVE-2023-44185, CVE-2023-36839, CVE-2023-36840, CVE-2023-44176, CVE-2019-0036, CVE-2014-0613, CVE-2022-22214, CVE-2023-44175, CVE-2023-4481, CVE-2022-22173, CVE-2023-22407, CVE-2023-28975, CVE-2013-6014, CVE-2023-22391
heuristics/scheme_data
  • product: Juniper Networks M&T-Series
  • id: CCEVS-VR-VID4021
  • url: https://www.niap-ccevs.org/product/4021
  • certification_date: 2004-01-23T00:01:00Z
  • expiration_date: None
  • category: Router
  • vendor: Juniper Networks, Inc.
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • scheme: US
None
pdf_data/report_filename st_vid4021-vr.pdf 383-4-188 CR v1.0e.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-04-0055
    • cert_item: Juniper Networks M & T-Series Family of Internet Routers running JUNOS 6.0r1
    • cert_lab: US NIAP
  • CA:
    • cert_id: 383-4-188-CR
    • cert_lab: CANADA
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-04-0055: 1
  • CA:
    • 383-4-188-CR: 1
pdf_data/report_keywords/cc_claims
  • T:
    • T.PRIVIL: 1
    • T.OPS: 1
  • A:
    • A.LOCATE: 1
    • A.NOEVIL: 1
    • A.EAUTH: 1
pdf_data/report_keywords/cc_sar
  • ADO:
    • ADO_IGS.1: 1
  • AVA:
    • AVA_VLA: 1
  • ASE:
    • ASE_DES.1: 1
    • ASE_OBJ.1: 2
    • ASE_REQ: 2
    • ASE_REQ.1: 1
  • ALC:
    • ALC_FLR.3: 2
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 2: 3
  • EAL 3+: 2
  • EAL 3: 4
  • EAL3+: 1
  • EAL 3 augmented: 2
pdf_data/report_keywords/cc_sfr
  • FMT:
    • FMT_SMF: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 3
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025:2005: 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 199685
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 10
  • /Producer: Acrobat Distiller 5.0.5 (Windows)
  • /Author: .
  • /Creator: Acrobat PDFMaker 5.0 for Word
  • /ModDate: D:20040218070530-05'00'
  • /Title: National Information Assurance Partnership
  • /CreationDate: D:20040218070336-05'00'
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 64990
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
  • /Author: User
  • /CCEF: CGI IT Security Evaluation & Test Facility
  • /CR date: 10 August 2012
  • /CR version: 1.0
  • /Certificate date: 10 August 2012
  • /CreationDate: D:20120810083649-04'00'
  • /Creator: Acrobat PDFMaker 9.0 for Word
  • /Developer name: Juniper Networks, Inc.
  • /Document number: 383-4-188-CR
  • /ETR title, version, date: Juniper Networks M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches running JUNOS 10.4R5 Common Criteria EAL3+ Evaluation Technical Report (ETR), Document Version 1.2,
  • /Evaluation completion date: 30 July 2012
  • /ModDate: D:20120810083654-04'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /ST Title: Juniper Networks Security Target for Juniper Networks M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches running JUNOS 10.4R5
  • /ST date: 11 July 2012
  • /ST version: Version 2.2
  • /SourceModified: D:20120809122721
  • /Sponsor: Juniper Networks, Inc.
  • /TOE Version: 5.0
  • /TOE name and version: Juniper Networks JUNOS® 10.4R5 for M-Series, MX-Series, T-Series Routers and EX Series Switches
  • /TOE short name: JUNOS® 10.4R5
  • /Title: EAL 3 Evaluation of <TOE name and version>
  • pdf_hyperlinks:
pdf_data/report_metadata//Author . User
pdf_data/report_metadata//CreationDate D:20040218070336-05'00' D:20120810083649-04'00'
pdf_data/report_metadata//Creator Acrobat PDFMaker 5.0 for Word Acrobat PDFMaker 9.0 for Word
pdf_data/report_metadata//ModDate D:20040218070530-05'00' D:20120810083654-04'00'
pdf_data/report_metadata//Producer Acrobat Distiller 5.0.5 (Windows) Acrobat Distiller 9.0.0 (Windows)
pdf_data/report_metadata//Title National Information Assurance Partnership EAL 3 Evaluation of <TOE name and version>
pdf_data/report_metadata/pdf_file_size_bytes 199685 64990
pdf_data/report_metadata/pdf_number_of_pages 10 13
pdf_data/st_filename st_vid4021-st.pdf 383-4-188 ST v2.2.pdf
pdf_data/st_keywords/cc_claims/A
  • A.LOCATE: 3
  • A.NOEVIL: 3
  • A.EAUTH: 3
  • A.LOCATE: 4
  • A.NOEVIL: 3
  • A.EAUTH: 2
  • A.TIME: 4
  • A.CRYPTO: 4
  • A.NWCOMP: 2
pdf_data/st_keywords/cc_claims/A/A.EAUTH 3 2
pdf_data/st_keywords/cc_claims/A/A.LOCATE 3 4
pdf_data/st_keywords/cc_claims/O
  • O.PROTECT: 7
  • O.EADMIN: 3
  • O.ACCESS: 8
  • O.PHYCAL: 2
  • O.MANAGE: 3
  • O.FLOW: 11
  • O.PROTECT: 15
  • O.EADMIN: 8
  • O.ACCESS: 14
  • O.ROLBAK: 6
  • O.AUDIT: 13
  • O.CONN: 6
pdf_data/st_keywords/cc_claims/O/O.ACCESS 8 14
pdf_data/st_keywords/cc_claims/O/O.EADMIN 3 8
pdf_data/st_keywords/cc_claims/O/O.PROTECT 7 15
pdf_data/st_keywords/cc_claims/OE
  • OE.EAUTH: 5
  • OE.EAUTH: 3
  • OE.TIME: 3
  • OE.CRYPTO: 3
  • OE.PHYSICAL: 3
  • OE.ADMIN: 3
  • OE.NWCOMP: 3
pdf_data/st_keywords/cc_claims/OE/OE.EAUTH 5 3
pdf_data/st_keywords/cc_claims/T
  • T.PRIVIL: 3
  • T.OPS: 3
  • T.ROUTE: 9
  • T.PRIVIL: 7
  • T.OPS: 8
  • T.MANDAT: 3
  • T.CONFLOSS: 5
  • T.NOAUDIT: 2
pdf_data/st_keywords/cc_claims/T/T.OPS 3 8
pdf_data/st_keywords/cc_claims/T/T.PRIVIL 3 7
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.2: 13
  • ADO:
    • ADO_DEL.1: 7
    • ADO_IGS.1: 7
  • ADV:
    • ADV_FSP.1: 10
    • ADV_HLD.1: 13
    • ADV_RCR.1: 6
  • AGD:
    • AGD_ADM.1: 13
    • AGD_USR.1: 11
  • ATE:
    • ATE_COV.1: 6
    • ATE_FUN.1: 11
    • ATE_IND.2: 9
  • AVA:
    • AVA_SOF.1: 8
    • AVA_VLA.1: 10
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_FLR.3: 7
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ASE:
    • ASE_INT.1: 1
    • ASE_CCL.1: 1
    • ASE_SPD.1: 1
    • ASE_OBJ.2: 1
    • ASE_ECD.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_FSP.1: 10
  • ADV_HLD.1: 13
  • ADV_RCR.1: 6
  • ADV_ARC.1: 1
  • ADV_FSP.3: 1
  • ADV_TDS.2: 1
pdf_data/st_keywords/cc_sar/AGD
  • AGD_ADM.1: 13
  • AGD_USR.1: 11
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.1: 6
  • ATE_FUN.1: 11
  • ATE_IND.2: 9
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 11 1
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 9 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_SOF.1: 8
  • AVA_VLA.1: 10
  • AVA_VAN.2: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL2: 8
  • EAL 2: 1
  • EAL3: 5
  • EAL3 augmented: 4
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 3
  • FIA:
    • FIA_ATD.1: 7
    • FIA_UAU.1: 9
    • FIA_UID.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_ATD.1.1: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UAU.5: 4
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MTD: 14
    • FMT_SMF.1: 9
    • FMT_SMR.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MTD.1: 2
  • FPT:
    • FPT_SEP.1: 6
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FAU:
    • FAU_GEN.1: 6
    • FAU_ARP.1: 6
    • FAU_SAR.1: 5
    • FAU_GEN.2: 5
    • FAU_SAA.1: 5
    • FAU_STG.1: 5
    • FAU_ARP.1.1: 1
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2.1: 1
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FDP:
    • FDP_IFC.1: 5
    • FDP_IFF.1: 6
    • FDP_ROL.1: 5
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ROL.1.1: 1
    • FDP_ROL.1.2: 1
  • FIA:
    • FIA_ATD.1: 5
    • FIA_SOS.1: 5
    • FIA_UAU.2: 8
    • FIA_UAU.5: 5
    • FIA_UID.2: 7
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.2.1: 1
    • FIA_UAU.1: 2
    • FIA_UID.2.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 1
  • FMT:
    • FMT_SMF.1: 7
    • FMT_MSA.3: 10
    • FMT_MTD.1: 7
    • FMT_MOF: 10
    • FMT_MTD: 32
    • FMT_SMR.1: 5
    • FMT_MOF.1: 2
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA.1: 3
  • FPT:
    • FPT_STM.1: 5
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_TSE.1: 5
    • FTA_TSE.1.1: 1
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 3
  • FDP_IFC.1: 5
  • FDP_IFF.1: 6
  • FDP_ROL.1: 5
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_ROL.1.1: 1
  • FDP_ROL.1.2: 1
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_ATD.1: 7
  • FIA_UAU.1: 9
  • FIA_UID.1: 8
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_ATD.1.1: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_UAU.5: 4
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_ATD.1: 5
  • FIA_SOS.1: 5
  • FIA_UAU.2: 8
  • FIA_UAU.5: 5
  • FIA_UID.2: 7
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.2.1: 1
  • FIA_UAU.1: 2
  • FIA_UID.2.1: 1
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UID.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 7 5
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 9 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5 4 5
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 8 1
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MTD: 14
  • FMT_SMF.1: 9
  • FMT_SMR.1: 8
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MTD.1: 2
  • FMT_SMF.1: 7
  • FMT_MSA.3: 10
  • FMT_MTD.1: 7
  • FMT_MOF: 10
  • FMT_MTD: 32
  • FMT_SMR.1: 5
  • FMT_MOF.1: 2
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.1: 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 14 32
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 2 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 9 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 8 5
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_SEP.1: 6
  • FPT_SEP.1.1: 1
  • FPT_SEP.1.2: 1
  • FPT_STM.1: 5
  • FPT_STM.1.1: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • which are out of scope), and SSH (which is provided by the operational environment: 1
    • This covers all services used to exchange information, including telnet and SSL (which are out of scope), and SSH (which is provided by the operational environment). Authentication services can be: 1
    • accidental or deliberate corruption via use of digitally signed binaries. 1.5.1.3 Summary of items out of scope of the TOE There are no security functionality claims relating to the following items: All: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 13
  • TLS:
    • SSL:
      • SSL: 2
pdf_data/st_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
  • CC:
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 436054
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 32
  • /Producer: Acrobat Distiller 5.0.5 (Windows)
  • /Author: RMGalan
  • /Creator: Acrobat PDFMaker 5.0 for Word
  • /ModDate: D:20040210103652-05'00'
  • /Title: Juniper Security Target
  • /CreationDate: D:20040210103041-05'00'
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 817354
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 39
  • /Title: JUNOS 10.4 M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches
  • /Author: Juniper
  • /Subject: EAL3 Security Target
  • /Creator: Microsoft® Word 2010
  • /CreationDate: D:20120725095220-04'00'
  • /ModDate: D:20120725095220-04'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
pdf_data/st_metadata//Author RMGalan Juniper
pdf_data/st_metadata//CreationDate D:20040210103041-05'00' D:20120725095220-04'00'
pdf_data/st_metadata//Creator Acrobat PDFMaker 5.0 for Word Microsoft® Word 2010
pdf_data/st_metadata//ModDate D:20040210103652-05'00' D:20120725095220-04'00'
pdf_data/st_metadata//Producer Acrobat Distiller 5.0.5 (Windows) Microsoft® Word 2010
pdf_data/st_metadata//Title Juniper Security Target JUNOS 10.4 M-Series Multiservice Edge Routers, MX-Series Ethernet Services Routers, T-Series Core Routers and EX Series Ethernet Switches
pdf_data/st_metadata/pdf_file_size_bytes 436054 817354
pdf_data/st_metadata/pdf_number_of_pages 32 39
dgst ccd1b225da050a4e 8e96ae99530fca1d