This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Ivanti Connect Secure 22.2 CCEVS-VR-VID-11372-2024 |
Junos OS 20.4R1 for SRX345, SRX345-DUAL-AC and SRX380 in Cluster Mode Certificate Number: 2021/136 |
|
---|---|---|
name | Ivanti Connect Secure 22.2 | Junos OS 20.4R1 for SRX345, SRX345-DUAL-AC and SRX380 in Cluster Mode |
scheme | US | AU |
not_valid_after | 23.02.2026 | 21.09.2026 |
not_valid_before | 23.02.2024 | 21.09.2021 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11372-ci.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP_Certificate_2021_136_EFT-T018%20Juniper%20Junos%20OS%2020.4R1%20for%20SRX345,%20SRX345-DUAL-AC%20AND%20SRX380%20in%20Cluster%20Mode_OS.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11372-vr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFT-T018-Certification_Report_v1.1.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11372-st.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper%20JunOS%2020.4R1%20SRX345,%20SRX345-DUAL-AC,%20SRX380%20High%20Availability%20SecurityTarget%20v1.3.pdf |
manufacturer | Ivanti, Inc. | Juniper Networks, Inc. |
manufacturer_web | https://www.ivanti.com | https://www.juniper.net/ |
dgst | d8de7620dfa8311b | afa4f621b3d8415e |
heuristics/cert_id | CCEVS-VR-VID-11372-2024 | Certificate Number: 2021/136 |
heuristics/cert_lab | US | [] |
heuristics/cpe_matches | cpe:2.3:a:ivanti:connect_secure:22.2:-:*:*:*:*:*:*, cpe:2.3:a:ivanti:connect_secure:22.2:r1:*:*:*:*:*:* | {} |
heuristics/related_cves | CVE-2024-13842, CVE-2023-39340, CVE-2024-21888, CVE-2024-47906, CVE-2024-13843, CVE-2023-41719, CVE-2024-11006, CVE-2024-13830, CVE-2024-9844, CVE-2024-22053, CVE-2025-0283, CVE-2024-9420, CVE-2024-22052, CVE-2025-22467, CVE-2024-21893, CVE-2023-46805, CVE-2024-8495, CVE-2024-22023, CVE-2024-21887, CVE-2024-11004, CVE-2024-11634, CVE-2024-47907, CVE-2025-22457, CVE-2022-35254, CVE-2024-21894, CVE-2024-47905, CVE-2024-11007, CVE-2024-11633, CVE-2024-47909, CVE-2023-41720, CVE-2024-11005, CVE-2022-35258 | {} |
heuristics/extracted_sars | ASE_TSS.1, ALC_CMS.1, ASE_REQ.1, AVA_VAN.1, ATE_IND.1, ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, ADV_FSP.1, AGD_OPE.1, ASE_SPD.1, ASE_ECD.1 | {} |
heuristics/extracted_versions | 22.2 | 20.4 |
heuristics/protection_profiles | 89f2a255423f4a20 | cf18fa171ef6e928, fa0610a54305df78 |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_VPNGW_V1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_CPP_FW_v1.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf |
pdf_data/cert_filename | st_vid11372-ci.pdf | AISEP_Certificate_2021_136_EFT-T018 Juniper Junos OS 20.4R1 for SRX345, SRX345-DUAL-AC AND SRX380 in Cluster Mode_OS.pdf |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | st_vid11372-vr.pdf | EFT-T018-Certification_Report_v1.1.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | st_vid11372-st.pdf | |
pdf_data/st_keywords/cc_cert_id | ||
pdf_data/st_keywords/cc_protection_profile_id | ||
pdf_data/st_keywords/cc_security_level | ||
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto | ||
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine | ||
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library | ||
pdf_data/st_keywords/vulnerability | ||
pdf_data/st_keywords/side_channel_analysis | ||
pdf_data/st_keywords/technical_report_id | ||
pdf_data/st_keywords/device_model | ||
pdf_data/st_keywords/tee_name | ||
pdf_data/st_keywords/os_name | ||
pdf_data/st_keywords/cplc_data | ||
pdf_data/st_keywords/ic_data_group | ||
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version | ||
pdf_data/st_keywords/javacard_api_const | ||
pdf_data/st_keywords/javacard_packages | ||
pdf_data/st_keywords/certification_process | ||
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/convert_ok | True | False |
state/st/download_ok | True | False |
state/st/extract_ok | True | False |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |