name |
Citrix NetScaler Platinum Edition Load Balancer, Version 9.3, running on MPX 9700-FIPS, MPX 10500-FIPS, MPX 12500-FIPS, MPX 15500-FIPS, MPX 5500, MPX 7500, MPX 9500, MPX 10500, MPX 11500, MPX 12500, MPX 13500, MPX 14500, MPX 15500, MPX 16500, MPX 17500, MPX 17550, MPX 18500, MPX 19500, MPX 19550, MPX 20500, MPX 20550, MPX 21500, MPX 21550, VPX 10, VPX 200, VPX 1000, VPX 3000 |
Juniper Networks Junos Pulse Access Control Service 4.2 R4 |
category |
Network and Network-Related Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
UK |
MY |
status |
archived |
archived |
not_valid_after |
04.02.2015 |
05.08.2018 |
not_valid_before |
12.03.2012 |
05.08.2013 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP267%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C039-CR-v1a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST267%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JNPR%20UAC%204.2R4%20EAL3%20ST%20v1.3.pdf |
manufacturer |
Citrix Systems, Inc. |
Juniper Networks, Inc. |
manufacturer_web |
https://www.citrix.com |
https://www.juniper.net/ |
security_level |
EAL2+, ALC_FLR.2 |
EAL3+, ALC_FLR.2 |
dgst |
eb375c5d1192d491 |
1c02d4a2e04d2b29 |
heuristics/cert_id |
CRP267 |
ISCB-5-RPT-C039-CR-v1a |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
cpe:2.3:o:juniper:junos:4.2:*:*:*:*:*:*:*, cpe:2.3:a:juniper:junos_pulse_access_control_service:4.2:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2023-22407, CVE-2024-39528, CVE-2022-22215, CVE-2023-28975, CVE-2013-4689, CVE-2024-39555, CVE-2022-22242, CVE-2023-36840, CVE-2022-22244, CVE-2022-22214, CVE-2019-0036, CVE-2024-30380, CVE-2024-39549, CVE-2022-22208, CVE-2021-31372, CVE-2024-39511, CVE-2023-28962, CVE-2024-39558, CVE-2023-36841, CVE-2013-6618, CVE-2024-39514, CVE-2023-44182, CVE-2023-28979, CVE-2022-22241, CVE-2023-44175, CVE-2023-44184, CVE-2022-22243, CVE-2013-5650, CVE-2023-22406, CVE-2023-44186, CVE-2023-36839, CVE-2022-22224, CVE-2022-22238, CVE-2022-22181, CVE-2023-28964, CVE-2023-44177, CVE-2022-22163, CVE-2024-39556, CVE-2022-22162, CVE-2023-28963, CVE-2004-0230, CVE-2023-36842, CVE-2004-0468, CVE-2023-44194, CVE-2023-44197, CVE-2023-44201, CVE-2022-22220, CVE-2024-21591, CVE-2024-39517, CVE-2024-21594, CVE-2022-22156, CVE-2013-7313, CVE-2023-4481, CVE-2021-31362, CVE-2022-22245, CVE-2022-22197, CVE-2022-22173, CVE-2023-44178, CVE-2024-30397, CVE-2022-22246, CVE-2023-22395, CVE-2023-36843, CVE-2023-44185, CVE-2023-22391, CVE-2023-44176 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
heuristics/extracted_versions |
9.3 |
4.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
CRP274 |
{} |
heuristics/report_references/directly_referencing |
CRP262 |
{} |
heuristics/report_references/indirectly_referenced_by |
CRP274 |
{} |
heuristics/report_references/indirectly_referencing |
CRP253, CRP262, CRP247 |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
CRP267 v1.0.pdf |
ISCB-5-RPT-C039-CR-v1a.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- MY:
- ISCB-5-RPT-C039-CR-v1a: 31
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 3
- EAL2 augmented: 2
|
- EAL:
- EAL3: 6
- EAL3 augmented: 1
- EAL3+: 5
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 1
- FAU_SAR.1: 1
- FAU_UAU.2: 1
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.2: 1
- FCS_COP.1: 1
- FDP:
- FIA:
- FIA_ATD.1: 2
- FIA_UAU.2: 1
- FIA_UID.2: 1
- FMT:
- FMT_MOF.1: 2
- FMT_MSA.2: 1
- FMT_MSA.3: 1
- FMT_SMF.1.1: 1
- FMT_SMR.1: 1
- FMT_SMT.1: 1
- FPT:
- FPT_ITT.1.1: 1
- FPT_STM.1: 1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
- FIPS:
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- below. March 2012 Issue 1.0 Page 11 of 23 Figure 1 TOE Configuration 3 Layer 3 routing (L3 mode) is out of scope as this enables IP forwarding, allowing traffic to be routed according to static routes in the: 1
- out of scope: 1
|
|
pdf_data/report_metadata |
- /Author: Mike Brown, Nigel Whittaker-Axon, Bhavin Desai
- /Company: Certification Body, CESG
- /CreationDate: D:20120315141538Z
- /Creator: Acrobat PDFMaker 8.1 for Word
- /ModDate: D:20120315141627Z
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /SourceModified: D:20120315141356
- /Title: Certification Report template v3.0
- pdf_file_size_bytes: 467310
- pdf_hyperlinks: http://support.citrix.com/, https://www.citrix.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /Author: ISCB Department
- /Category: PUBLIC
- /Caveat: FINAL
- /Classification: PUBLIC
- /Company: CyberSecurity Malaysia
- /CreationDate: D:20130806134853+08'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Developer: Juniper Networks
- /Document Type: REPORT
- /Identifier: ISCB-5-RPT-C039-CR-v1a
- /Index: MyCB_TMP_011
- /Keywords: UAC
- /ModDate: D:20130806134906+08'00'
- /Phase: External
- /Producer: Adobe PDF Library 10.0
- /Project Code: C039
- /Released: 5 August 2013
- /ST Title: Security Target: Juniper Networks Junos Pulse Access Control Service 4.2 R4
- /ST Version: v1.3
- /SourceModified: D:20130806054834
- /Sponsor: Juniper Networks
- /Subject: Juniper Networks Junos Pulse Access Control Service 4.2 R4
- /TOE Name: Juniper Networks Junos Pulse Access Control Service
- /TOE Version: 4.2 R4
- /Title: C039 Certification Report
- /Version: v1a
- pdf_file_size_bytes: 341341
- pdf_hyperlinks: http://www.cybersecurity.my/mycc, mailto:[email protected]
- pdf_is_encrypted: True
- pdf_number_of_pages: 32
|
pdf_data/st_filename |
ST267 v1.0.pdf |
JNPR UAC 4.2R4 EAL3 ST v1.3.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 5
- EAL2 augmented: 2
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 6
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.3: 2
- ADV_TDS.2: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.3: 2
- ALC_CMS.3: 2
- ALC_DEL.1: 2
- ALC_DVS.1: 2
- ALC_FLR.2: 5
- ALC_LCD.1: 2
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 2
- ASE_INT.1: 2
- ASE_OBJ.2: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 2
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3: 5
- FAU_SAR.3.1: 1
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FDP:
- FDP_ACC: 15
- FDP_ACC.1: 8
- FDP_ACF: 16
- FDP_ACF.1: 13
- FDP_IFC: 22
- FDP_IFC.1: 10
- FDP_IFF: 22
- FDP_IFF.1: 21
- FIA:
- FIA_UAU.1: 1
- FIA_UAU.2: 10
- FIA_UAU.2.1: 1
- FIA_UID.1: 6
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA: 32
- FMT_MSA.1: 20
- FMT_MSA.1.1: 1
- FMT_MSA.3: 21
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR.1: 24
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 9
- FPT_STM.1.1: 1
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 4
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 1
- FAU_SAR.1: 4
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG: 1
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 5
- FCS_CKM.1.1: 1
- FCS_CKM.2: 5
- FCS_CKM.2.1: 1
- FCS_CKM.4: 6
- FCS_COP: 1
- FCS_COP.1: 7
- FCS_COP.1.1: 1
- FDP:
- FDP_IFC: 1
- FDP_IFC.1: 4
- FDP_IFC.1.1: 1
- FDP_IFF: 1
- FDP_IFF.1: 6
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FIA:
- FIA_ATD: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU: 1
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UID: 1
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA: 3
- FMT_MSA.1: 4
- FMT_MSA.1.1: 1
- FMT_MSA.2: 4
- FMT_MSA.2.1: 1
- FMT_MSA.3: 4
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 1
- FMT_MTD.1: 8
- FMT_MTD.1.1: 3
- FMT_SMF: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 8
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT: 1
- FPT_ITT.1: 4
- FPT_ITT.1.1: 1
- FPT_STM: 1
- FPT_STM.1: 5
- FPT_STM.1.1: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- O:
- O.AMANAGE: 6
- O.AUDIT: 7
- O.ENCRYPT: 7
- O.PROTECT: 5
- O.SECKEY: 5
- O.TOECOM: 4
- O.UNAUTH_ENDPOINT: 6
- OE:
- OE.ADMIN: 3
- OE.PHYSICAL: 3
- T:
- T.NOAUDIT: 2
- T.OPS: 3
- T.PRIVIL: 2
- T.PROCOM: 3
- T.TOECOM: 2
- T.UNAUTH_ENDPOINT: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
|
- FIPS:
- FIPS 180-2: 1
- FIPS 197: 2
- FIPS 46-3: 2
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Tony Boswell
- /CreationDate: D:20120222221755
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20120222221755
- /Producer: Microsoft® Office Word 2007
- pdf_file_size_bytes: 869566
- pdf_hyperlinks: http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 55
|
- /Author: Apex Assurance Group
- /Client: Juniper Networks
- /Company:
- /CreationDate: D:20130722160254+08'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /DocVersion: 1.3
- /ModDate: D:20130722160304+08'00'
- /Producer: Adobe PDF Library 10.0
- /Product Name: Junos Pulse Access Control Service
- /Product Version: 4.2
- /Rev: R4
- /SourceModified: D:20130716035006
- /Subject: Junos Pulse Access Control Service 4.2R4
- /Title: Security Target
- pdf_file_size_bytes: 504670
- pdf_hyperlinks: http://www.juniper.net/, http://www.apexassurance.com/
- pdf_is_encrypted: True
- pdf_number_of_pages: 38
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |