Juniper Networks, Inc. JUNOS 12.1 X44 D15.5 for SRX Series Platforms Components: Software JUNOS US/Canada Version 12.1X44 JUNOS-FIPS Version 12.1 X44 Hardware SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650, SRX1400, SRX3400, SRX3600; SRX5600 and SRX5800 with SPC-2-10-40; and SRX5600 and SRX5800 with SPC-4-15-320.

Known vulnerabilities detected

Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.

CSV information

Status archived
Valid from 06.09.2013
Valid until 01.09.2019
Scheme 🇦🇺 AU
Manufacturer Juniper Networks, Inc.
Category Network and Network-Related Devices and Systems
Security level
Protection profiles

Heuristics summary

Certificate ID: Certificate Number: 2013/85

Certificate

certificate file processing did not finish successfully.
Download pdf: ERROR
Convert pdf to text: ERROR
Extract keywords: ERROR

Certification report

Extracted keywords

Hash functions
MD5
Randomness
RBG

Certificates
Certification Report 2013/85

Certification process
out of scope, Flow Control; Identification and Authentication – note that Telnet and FTP are considered to be out of scope; Security Management; Protection of the TSF; TOE Access; Trusted Path/Channel; and

File metadata

Title
Author ACA
Creation date D:20130906112243+10'00'
Modification date D:20130906112248+10'00'
Pages 21
Creator Acrobat PDFMaker 9.0 for Word
Producer Acrobat Distiller 9.0.0 (Windows)

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, TDEA, HMAC
Asymmetric Algorithms
ECDSA, ECC, DH, DSA
Hash functions
SHA1
Schemes
MAC, Key Exchange, Key exchange
Protocols
SSH, SSHv2, SSL, IKE, IPsec, VPN
Randomness
PRNG, RNG, RBG
Libraries
OpenSSL
Block cipher modes
CBC, CCM

Claims
O.PROTECTED_COMMUNICATIONS, O.VERIFIABLE_UPDATES, O.SYSTEM_MONITORING, O.DISPLAY_BANNER, O.TOE_ADMINISTRATION, O.RESIDUAL_INFORMATION_CLEARING, O.SESSION_LOCK, O.TSF_SELF_TEST, O.ADDRESS_FILTERING, O.PORT_FILTERING, O.STATEFUL_INSPECTION, O.RELATED_CONNECTION_FILTERING, T.ADMIN_ERROR, T.TSF_FAILURE, T.UNDETECTED_ACTIONS, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_UPDATE, T.USER_DATA_REUSE, T.NETWORK_DISCLOSURE, T.NETWORK_MISUSE, T.NETWORK_DOS, A.NO_GENERAL_PURPOSE, A.PHYSICAL, A.TRUSTED_ADMIN, A.CONNECTIONS, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.TRUSTED_ADMIN, OE.CONNECTIONS
Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
Security Functional Requirements (SFR)
FAU_STG_EXT.1, FAU_GEN.1, FAU_GEN.2, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_STG_EXT.1.1, FCS_CKM_EXT.4, FCS_RBG_EXT.1, FCS_SSH_EXT.1, FCS_CKM.1, FCS_COP.1, FCS_CKM.1.1, FCS_CKM_EXT.4.1, FCS_COP.1.1, FCS_SSH_EXT, FCS_SSH_EXT.1.2, FCS_SSH_EXT.1.3, FCS_SSH_EXT.1.4, FCS_SSH_EXT.1.5, FCS_SSH_EXT.1.6, FCS_SSH_EXT.1.7, FDP_RIP.2, FDP_RIP.2.1, FIA_PMG_EXT.1, FIA_UIA_EXT.1, FIA_UAU_EXT.5, FIA_UAU_EXT.2, FIA_UAU.7, FIA_PMG_EXT.1.1, FIA_UAU_EXT.2.1, FIA_UIA_EXT.1.1, FIA_UIA_EXT.1.2, FIA_UAU.7.1, FMT_MTD.1, FMT_SMF.1, FMT_SMR.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FPT_SKP_EXT.1, FPT_APW_EXT.1, FPT_TUD_EXT.1, FPT_TST_EXT.1, FPT_STM.1, FPT_SKP_EXT, FPT_SKP_EXT.1.1, FPT_APW_EXT, FPT_APW_EXT.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_TST_EXT, FPT_TST_EXT.1.1, FTA_SSL_EXT.1, FTA_SSL.3, FTA_SSL.4, FTA_TAB.1, FTA_SSL_EXT.1.1, FTA_SSL.3.1, FTA_SSL_EXT.4.1, FTA_TAB.1.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3

Certification process
out of scope, SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Document Version 2.1 ©Juniper Networks, Inc, including Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Document Version 2.1 ©Juniper Networks, Inc. Page 12 of 56 Security Target: Juniper Networks, Inc

Standards
FIPS PUB 197, RFC2410, RFC 4253, RFC 792, RFC 4443, RFC 791, RFC 2460, RFC 793, RFC 768, RFC 959, RFC 5735, RFC 3513, RFC4253, RFC 4251, RFC 4252, RFC 4254

File metadata

Title Security Target
Subject JUNOS 12.1 X44 D15.5 for SRX Series Platforms
Author Apex Assurance Group
Creation date D:20130905114107+10'00'
Modification date D:20130905114123+10'00'
Pages 56
Creator Acrobat PDFMaker 9.0 for Word
Producer Acrobat Distiller 9.0.0 (Windows)

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

Certificate Number: 2013/85

Extracted SARs

ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2004-0230
C N
MEDIUM 5.0 2.9 18.08.2004
CVE-2004-0468
C N
MEDIUM 5.0 2.9 06.12.2004
CVE-2013-4686
C N
HIGH 7.1 6.9 11.07.2013
CVE-2013-4689
C N
MEDIUM 5.1 6.4 17.10.2013
CVE-2013-6012
C N
HIGH 8.5 10.0 28.10.2013
CVE-2013-6014
C N
CRITICAL 9.3 5.8 28.10.2013
CVE-2013-6618
C N
HIGH 9.0 10.0 05.11.2013
CVE-2013-7313
C N
MEDIUM 5.4 6.4 23.01.2014
CVE-2014-0613
C N
HIGH 7.1 6.9 15.01.2014
CVE-2014-0615
C N
HIGH 7.2 10.0 15.01.2014
CVE-2014-0616
C N
HIGH 7.1 6.9 15.01.2014
CVE-2014-2711
C N
MEDIUM 4.3 2.9 14.04.2014
CVE-2014-2712
C N
MEDIUM 4.3 2.9 14.04.2014
CVE-2014-2713
C N
MEDIUM 5.0 2.9 14.04.2014
CVE-2014-2714
C N
HIGH 7.1 6.9 14.04.2014
CVE-2014-3816
C N
HIGH 9.0 10.0 11.07.2014
CVE-2014-3818
C N
HIGH 7.8 6.9 14.10.2014
CVE-2014-3819
C N
HIGH 7.8 6.9 11.07.2014
CVE-2014-3821
C N
MEDIUM 4.3 2.9 11.07.2014
CVE-2014-6378
C N
HIGH 7.8 6.9 14.10.2014
CVE-2014-6379
C N
HIGH 7.5 6.4 14.10.2014
CVE-2014-6380
C N
HIGH 7.8 6.9 14.10.2014
CVE-2014-6384
C N
MEDIUM 6.9 10.0 16.01.2015
CVE-2014-6385
C N
MEDIUM 6.1 6.9 16.01.2015
CVE-2014-6386
C N
HIGH 7.8 6.9 16.01.2015
CVE-2014-6447
C N
HIGH 7.1 3.7 11.02.2020
CVE-2014-6449
C N
MEDIUM 5.0 2.9 16.10.2015
CVE-2014-6450
C N
HIGH 7.8 6.9 16.10.2015
CVE-2015-3003
C N
HIGH 7.2 10.0 10.04.2015
CVE-2015-3004
C N
MEDIUM 4.3 2.9 10.04.2015
CVE-2015-5358
C N
HIGH 7.1 6.9 14.07.2015
CVE-2015-5359
C N
HIGH 7.1 6.9 14.07.2015
CVE-2015-5360
C N
MEDIUM 5.0 2.9 16.07.2015
CVE-2015-5362
C N
HIGH 9.3 10.0 14.07.2015
CVE-2015-7752
C N
HIGH 7.8 6.9 19.10.2015
CVE-2016-1256
C N
MEDIUM 5.3 1.4 15.01.2016
CVE-2016-1258
C N
MEDIUM 5.3 1.4 15.01.2016
CVE-2016-1261
C N
HIGH 8.8 5.9 13.10.2017
CVE-2016-4923
C N
MEDIUM 6.1 2.7 13.10.2017
CVE-2017-2349
C N
HIGH 8.8 5.9 17.07.2017
CVE-2019-0036
C N
CRITICAL 9.8 5.9 10.04.2019
CVE-2021-31362
C N
LOW 3.3 2.9 19.10.2021
CVE-2021-31372
C N
HIGH 9.0 10.0 19.10.2021
CVE-2022-22156
C N
HIGH 7.4 5.2 19.01.2022
CVE-2022-22162
C N
HIGH 7.8 5.9 19.01.2022
CVE-2022-22163
C N
MEDIUM 6.5 3.6 19.01.2022
CVE-2022-22173
C N
HIGH 7.5 3.6 19.01.2022
CVE-2022-22181
C N
MEDIUM 5.4 2.7 14.04.2022
CVE-2022-22197
C N
HIGH 7.5 3.6 14.04.2022
CVE-2022-22208
C N
MEDIUM 5.9 3.6 18.10.2022
CVE-2022-22214
C N
MEDIUM 6.5 3.6 20.07.2022
CVE-2022-22215
C N
MEDIUM 5.5 3.6 20.07.2022
CVE-2022-22220
C N
MEDIUM 5.9 3.6 18.10.2022
CVE-2022-22224
C N
MEDIUM 6.5 3.6 18.10.2022
CVE-2022-22238
C N
MEDIUM 6.5 3.6 18.10.2022
CVE-2022-22241
C N
CRITICAL 9.8 5.9 18.10.2022
CVE-2022-22242
C N
MEDIUM 6.1 2.7 18.10.2022
CVE-2022-22243
C N
MEDIUM 4.3 1.4 18.10.2022
CVE-2022-22244
C N
MEDIUM 5.3 1.4 18.10.2022
CVE-2022-22245
C N
MEDIUM 4.3 1.4 18.10.2022
CVE-2022-22246
C N
HIGH 8.8 5.9 18.10.2022
CVE-2023-22391
C N
HIGH 7.5 3.6 13.01.2023
CVE-2023-22395
C N
MEDIUM 6.5 3.6 13.01.2023
CVE-2023-22406
C N
MEDIUM 6.5 3.6 13.01.2023
CVE-2023-22407
C N
MEDIUM 6.5 3.6 13.01.2023
CVE-2023-28962
C N
CRITICAL 9.8 5.9 17.04.2023
CVE-2023-28963
C N
MEDIUM 5.3 1.4 17.04.2023
CVE-2023-28964
C N
HIGH 7.5 3.6 17.04.2023
CVE-2023-28975
C N
MEDIUM 4.6 3.6 17.04.2023
CVE-2023-28979
C N
MEDIUM 4.7 1.4 17.04.2023
CVE-2023-36839
C N
MEDIUM 6.5 3.6 12.10.2023
CVE-2023-36840
C N
MEDIUM 5.5 3.6 14.07.2023
CVE-2023-36841
C N
HIGH 7.5 3.6 12.10.2023
CVE-2023-36842
C N
MEDIUM 6.5 3.6 12.01.2024
CVE-2023-36843
C N
HIGH 7.5 3.6 12.10.2023
CVE-2023-44175
C N
HIGH 7.5 3.6 12.10.2023
CVE-2023-44176
C N
MEDIUM 5.5 3.6 13.10.2023
CVE-2023-44177
C N
MEDIUM 5.5 3.6 13.10.2023
CVE-2023-44178
C N
MEDIUM 5.5 3.6 13.10.2023
CVE-2023-44182
C N
HIGH 8.8 5.9 13.10.2023
CVE-2023-44184
C N
MEDIUM 6.5 3.6 13.10.2023
CVE-2023-44185
C N
HIGH 7.5 3.6 13.10.2023
CVE-2023-44186
C N
HIGH 7.5 3.6 11.10.2023
CVE-2023-44194
C N
HIGH 7.8 5.9 13.10.2023
CVE-2023-44197
C N
HIGH 7.5 3.6 13.10.2023
CVE-2023-44201
C N
MEDIUM 5.5 3.6 13.10.2023
CVE-2023-4481
C N
HIGH 7.5 3.6 01.09.2023
CVE-2024-21591
C N
CRITICAL 9.8 5.9 12.01.2024
CVE-2024-21594
C N
MEDIUM 5.5 3.6 12.01.2024
CVE-2024-30380
C N
MEDIUM 6.5 3.6 16.04.2024
CVE-2024-30397
C N
HIGH 7.5 3.6 12.04.2024
CVE-2024-39511
C N
MEDIUM 5.5 3.6 10.07.2024
CVE-2024-39514
C N
MEDIUM 6.5 3.6 10.07.2024
CVE-2024-39517
C N
MEDIUM 6.5 3.6 10.07.2024
CVE-2024-39528
C N
MEDIUM 5.7 3.6 11.07.2024
CVE-2024-39549
C N
HIGH 7.5 3.6 11.07.2024
CVE-2024-39555
C N
HIGH 7.5 3.6 10.07.2024
CVE-2024-39556
C N
HIGH 7.0 5.9 10.07.2024
CVE-2024-39558
C N
MEDIUM 6.5 3.6 10.07.2024
CVE-2025-21590
C N
MEDIUM 4.4 3.6 12.03.2025
Showing 5 out of 100.

Similar certificates

Name Certificate ID
JUNOS 12.3 X48-D30 FOR SRX PLATFORMSComponents: SRX100, SRX110, SRX210, SRX220, SRX240, SRX550 and SRX650; SRX5400, S... Certificate Number: 2016/103 Compare
JUNOS 12.3 X48-D30 FOR SRX PLATFORMSComponents: SRX100, SRX110, SRX210, SRX220, SRX240, SRX550 and SRX650; SRX5400, S... None Compare
JUNOS 12.3X48-D30 FOR SRX XLR PLATFORMSComponents: Hardware Platforms: SRX1400, SRX3400 and SRX3600; SRX5400, SRX5400... None Compare
JUNOS 12.3X48-D30 FOR SRX XLR PLATFORMSComponents: Hardware Platforms: SRX1400, SRX3400 and SRX3600; SRX5400, SRX5400... Certificate Number: 2016/104 Compare
Ricoh imagio MP C5001A SP/C4001A SP both with imagio FAX Unit Type24 Version: - Software version: System/Copy 2.02, N... JISEC-CC-CRP-C0324 Compare
Ricoh imagio MP C5001 SP / imagio MP C4001 SP, both with imagio FAX Unit Type24, and Ricoh imagio MP C5001 SPF / imag... JISEC-CC-CRP-C0301 Compare
Composite system comprised of ECI LightSoft Software Version 11.2 (build 04113) with fixes NSx1120_4113-100 10, NC112... None Compare
Juniper Networks, Inc. Junos 12.1 X46 D20 for SRX Series and LN Series Platforms Certificate Number: 2015/91 Compare
Cisco Intrusion Prevention System Version: Software Version 7.2(1) Components: IPS 4300 and 4500 series sensors (4345... Certificate Number: 2013/84 Compare
Ricoh imagio MP 5002/4002 all of above with Printer/Scanner/Facsimile Functions Version: - Software: System/Copy 1.00... JISEC-CC-CRP-C0346 Compare
Ricoh imagio MP C5002A SP/C4002A SP all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Net... JISEC-CC-CRP-C0354 Compare
Ricoh imagio MP C3302 SP/C3302 SPF/C2802 SP/C2802 SPF all of above with Facsimile Function Version: - Software: Syste... JISEC-CC-CRP-C0352 Compare
Ricoh imagio MP C5002 SP/C5002 SPF/C4002 SP/C4002 SPF all of above with Facsimile Function Version: - Software: Syste... JISEC-CC-CRP-C0356 Compare
Juniper Networks, Inc. Junos 12.1 X46 D20 for SRX Series Platforms Certificate Number: 2015/90 Compare
Ricoh Aficio MP 2352/2852/3352, Savin MP 2352/2852/3352, Lanier MP 2352/2852/3352, nashuatec MP 2352/2852/3352, Rex-R... JISEC-CC-CRP-C0334 Compare
Ricoh Aficio MP 301, Savin MP 301, Lanier MP 301, nashuatec MP 301, Rex-Rotary MP 301, Gestetner MP 301, infotec MP 3... JISEC-CC-CRP-C0382 Compare
Cisco Adaptive Security Appliances Version: ASA software version 9.1(2) Components: ASA 5500 (5505, 5510, 5520, 5540,... Certificate Number: 2013/86 Compare
Ricoh Aficio MP C4501A/C4501AG/C5501A/C5501AG, Savin C9145A/C9145AG/C9155A/C9155AG, Lanier LD645CA/LD645CAG/LD655CA/L... JISEC-CC-CRP-C0326 Compare
Ricoh Aficio MP C4501/C4501G/C5501/C5501G, Savin C9145/C9145G/C9155/C9155G, Lanier LD645C/LD645CG/LD655C/LD655CG, Lan... JISEC-CC-CRP-C0302 Compare
Following MFP with FCU(Fax Option Type 3351) MFP:Ricoh Aficio MP 2851, Ricoh Aficio MP 3351, Savin 9228, Savin 9233, ... JISEC-CC-CRP-C0261 Compare
Following MFP with FCU(Fax Option Type C5000) MFP: Ricoh Aficio MP C2800, Ricoh Aficio MP C2800G, Ricoh Aficio MP C33... JISEC-CC-CRP-C0266 Compare
RICOH MP 1601/1301 all of the above with Fax function and HDD unit Version: - Software: system/Copy 1.01, Network Sup... JISEC-CC-CRP-C0389 Compare
Ricoh Aficio MP 4002/4002G/5002/5002G, Savin MP 4002/4002G/5002/5002G, Lanier MP 4002/4002G/5002/5002G, nashuatec MP ... JISEC-CC-CRP-C0347 Compare
Ricoh Aficio MP C4502A/C5502A, Savin MP C4502A/C5502A, Lanier MP C4502A/C5502A, nashuatec MP C4502A/C5502A, Rex-Rotar... JISEC-CC-CRP-C0355 Compare
Ricoh Aficio MP C305, Savin MP C305, Lanier MP C305, nashuatec MP C305, Rex-Rotary MP C305, Gestetner MP C305, infote... JISEC-CC-CRP-C0381 Compare
Ricoh Aficio MP C3002/C3002G/C3502/C3502G, Savin MP C3002/C3002G/C3502/C3502G, Lanier MP C3002/C3002G/C3502/C3502G, n... JISEC-CC-CRP-C0353 Compare
Ricoh Aficio MP C4502/C4502G/C5502/C5502G, Savin MP C4502/C4502G/C5502/C5502G, Lanier MP C4502/C4502G/C5502/C5502G, n... JISEC-CC-CRP-C0357 Compare
Ricoh imagio MP C2201 SP with imagio FAX Unit Type28, and Ricoh imagio MP C2201 SPF Version: - Software version: Syst... JISEC-CC-CRP-C0323 Compare
Ricoh imagio MP C3301 SP / imagio MP C2801 SP, both with imagio FAX Unit Type24, and Ricoh imagio MP C3301 SPF / imag... JISEC-CC-CRP-C0299 Compare
Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit MFP: Ricoh Aficio MP 2851, Ricoh Aficio MP... JISEC-CC-CRP-C0286 Compare
Trustwave Network Access Control (NAC) Version 4.1 and Central Manager Software Version 4.1 383-4-249 Compare
Following MFP with Fax Option JAPAN: MFP: imagio MP 6001 SP,imagio MP 7501 SP Fax Option: imagio FAX Unit Type 18 Ove... JISEC-CC-CRP-C0274 Compare
Following MFP with FCU, DataOverwriteSecurity Unit, HDD Encryption Unit and Printer/Scanner Unit, MFP: Ricoh Aficio M... JISEC-CC-CRP-C0289 Compare
Following MFP with FCU (Fax Option Type 5001). MFP: Ricoh Aficio MP 4001, Ricoh Aficio MP 4001G, Ricoh Aficio MP 5001... JISEC-CC-CRP-C0262 Compare
Ricoh imagio MP 3352/2552 both with Printer/Scanner/Facsimile Functions Version: - Software: System/Copy 1.04, Networ... JISEC-CC-CRP-C0333 Compare
Ricoh imagio MP 9002/9002T/7502/6002/6002GP all of above with Printer/Scanner/Facsimile Functions Version: - Software... JISEC-CC-CRP-C0372 Compare
Utimaco CryptoServer Se-Series Gen2 CP5, versions: CryptoServer CP5 Se12 5.1.2.0, CryptoServer CP5 Se52 5.1.2.0, Cryp... NSCIB-CC-2300142-02-CR Compare
Juniper Networks JUNOS 10.0 r4 for J-Series and SRX-Series Platforms Certificate Number: 2011/75 Compare
Ricoh Aficio SP 5200S/5210SF/5210SR, Savin SP 5200S/5210SF/5210SR, Lanier SP 5200S/5210SF/5210SR, nashuatec SP 5200S/... JISEC-CC-CRP-C0366 Compare
Ricoh MP 2001/2501, Savin MP 2501, Lanier MP 2001/2501, nashuatec MP 2001/2501, Rex-Rotary MP 2001/2501, Gestetner MP... JISEC-CC-CRP-C0390 Compare
Ricoh Aficio MP C300/C300SR/C400/C400SR, Savin C230/C230SR/C240/C240SR, Lanier LD130C/LD130CSR/LD140C/LD140CSR, Lanie... JISEC-CC-CRP-C0367 Compare
Ricoh imagio MP C7501 SP/C6001 SP both with imagio FAX Unit Type23, imagio Security Card Type7, and imagio HDD Encryp... JISEC-CC-CRP-C0320 Compare
JUNOS-FIPS for SRX Series version 10.4R4 383-4-180 Compare
Ricoh Aficio MP C3001/C3001G/C3501/C3501G, Savin C9130/C9130G/C9135/C9135G, Lanier LD630C/LD630CG/LD635C/LD635CG, Lan... JISEC-CC-CRP-C0300 Compare
Ricoh Aficio MP C2051/C2551, Savin C9120/C9125, Lanier LD620C/LD625C, Lanier MP C2051/C2551, nashuatec MP C2051/C2551... JISEC-CC-CRP-C0325 Compare
secunet konnektor 2.0.0 und 2.1.0, Version 5.70.4:2.0.0 und 5.70.4:2.1.0 BSI-DSZ-CC-1044-V8-2025 Compare
Showing 5 out of 46.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": null,
  "dgst": "190a0e55abcc41f1",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "Certificate Number: 2013/85",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:o:juniper:junos:12.1:-:*:*:*:*:*:*",
        "cpe:2.3:o:juniper:junos:12.1x44:-:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "eal": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "15.5",
        "12.1"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "ac9abe3d5c5a31f0",
        "d7508f508083d040"
      ]
    },
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2023-44197",
        "CVE-2015-5358",
        "CVE-2024-30397",
        "CVE-2022-22245",
        "CVE-2013-4689",
        "CVE-2013-6618",
        "CVE-2022-22224",
        "CVE-2022-22181",
        "CVE-2022-22220",
        "CVE-2022-22244",
        "CVE-2023-22406",
        "CVE-2023-22407",
        "CVE-2022-22243",
        "CVE-2024-21594",
        "CVE-2016-1258",
        "CVE-2015-5360",
        "CVE-2022-22242",
        "CVE-2023-22395",
        "CVE-2022-22197",
        "CVE-2023-44175",
        "CVE-2014-6379",
        "CVE-2024-39555",
        "CVE-2014-0613",
        "CVE-2023-28963",
        "CVE-2022-22246",
        "CVE-2023-28975",
        "CVE-2022-22241",
        "CVE-2014-6384",
        "CVE-2014-6385",
        "CVE-2014-2714",
        "CVE-2025-21590",
        "CVE-2023-44177",
        "CVE-2023-28964",
        "CVE-2024-39514",
        "CVE-2015-5362",
        "CVE-2023-22391",
        "CVE-2023-44178",
        "CVE-2023-36841",
        "CVE-2024-39549",
        "CVE-2023-36840",
        "CVE-2014-6449",
        "CVE-2014-3819",
        "CVE-2014-6380",
        "CVE-2015-3004",
        "CVE-2015-5359",
        "CVE-2023-36842",
        "CVE-2014-6450",
        "CVE-2014-6386",
        "CVE-2004-0468",
        "CVE-2013-4686",
        "CVE-2013-6014",
        "CVE-2022-22163",
        "CVE-2014-0616",
        "CVE-2021-31362",
        "CVE-2023-4481",
        "CVE-2023-28962",
        "CVE-2014-2712",
        "CVE-2024-39528",
        "CVE-2014-0615",
        "CVE-2023-44176",
        "CVE-2024-30380",
        "CVE-2023-44201",
        "CVE-2015-3003",
        "CVE-2016-1256",
        "CVE-2024-39511",
        "CVE-2015-7752",
        "CVE-2022-22156",
        "CVE-2019-0036",
        "CVE-2017-2349",
        "CVE-2013-6012",
        "CVE-2023-44186",
        "CVE-2022-22173",
        "CVE-2014-3821",
        "CVE-2024-39556",
        "CVE-2014-3818",
        "CVE-2022-22208",
        "CVE-2022-22162",
        "CVE-2022-22214",
        "CVE-2013-7313",
        "CVE-2014-6447",
        "CVE-2014-2713",
        "CVE-2023-44182",
        "CVE-2021-31372",
        "CVE-2016-1261",
        "CVE-2024-21591",
        "CVE-2016-4923",
        "CVE-2024-39558",
        "CVE-2014-2711",
        "CVE-2023-36843",
        "CVE-2024-39517",
        "CVE-2022-22215",
        "CVE-2022-22238",
        "CVE-2023-44184",
        "CVE-2023-44185",
        "CVE-2004-0230",
        "CVE-2014-6378",
        "CVE-2023-44194",
        "CVE-2023-36839",
        "CVE-2023-28979",
        "CVE-2014-3816"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Juniper Networks, Inc.",
  "manufacturer_web": "https://www.juniper.net/",
  "name": "Juniper Networks, Inc. JUNOS 12.1 X44 D15.5 for SRX Series Platforms Components: Software JUNOS US/Canada Version 12.1X44 JUNOS-FIPS Version 12.1 X44 Hardware SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650, SRX1400, SRX3400, SRX3600; SRX5600 and SRX5800 with SPC-2-10-40; and SRX5600 and SRX5800 with SPC-4-15-320.",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2013-09-06",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "JUNOS_CR.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "AU": {
          "Certification Report 2013/85": 1
        },
        "FR": {
          "Certification Report 2013/85": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {
        "OutOfScope": {
          "Flow Control;  Identification and Authentication \u2013 note that Telnet and FTP are considered to be out of scope;  Security Management;  Protection of the TSF;  TOE Access;  Trusted Path/Channel; and ": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RBG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "ACA",
      "/Company": "Department of Defence",
      "/CreationDate": "D:20130906112243+10\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 9.0 for Word",
      "/ModDate": "D:20130906112248+10\u002700\u0027",
      "/Producer": "Acrobat Distiller 9.0.0 (Windows)",
      "/SourceModified": "D:20130906012109",
      "/Title": " ",
      "pdf_file_size_bytes": 82439,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 21
    },
    "st_filename": "JUNOS_ST.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 7
          },
          "ECDSA": {
            "ECDSA": 2
          }
        },
        "FF": {
          "DH": {
            "DH": 2
          },
          "DSA": {
            "DSA": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CONNECTIONS": 1,
          "A.NO_GENERAL_PURPOSE": 1,
          "A.PHYSICAL": 1,
          "A.TRUSTED_ADMIN": 1
        },
        "O": {
          "O.ADDRESS_FILTERING": 2,
          "O.DISPLAY_BANNER": 1,
          "O.PORT_FILTERING": 2,
          "O.PROTECTED_COMMUNICATIONS": 2,
          "O.RELATED_CONNECTION_FILTERING": 2,
          "O.RESIDUAL_INFORMATION_CLEARING": 2,
          "O.SESSION_LOCK": 2,
          "O.STATEFUL_INSPECTION": 2,
          "O.SYSTEM_MONITORING": 3,
          "O.TOE_ADMINISTRATION": 3,
          "O.TSF_SELF_TEST": 2,
          "O.VERIFIABLE_UPDATES": 2
        },
        "OE": {
          "OE.CONNECTIONS": 1,
          "OE.NO_GENERAL_PURPOSE": 1,
          "OE.PHYSICAL": 1,
          "OE.TRUSTED_ADMIN": 1
        },
        "T": {
          "T.ADMIN_ERROR": 1,
          "T.NETWORK_DISCLOSURE": 1,
          "T.NETWORK_DOS": 1,
          "T.NETWORK_MISUSE": 1,
          "T.TSF_FAILURE": 1,
          "T.UNAUTHORIZED_ACCESS": 1,
          "T.UNAUTHORIZED_UPDATE": 1,
          "T.UNDETECTED_ACTIONS": 1,
          "T.USER_DATA_REUSE": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 2
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.1": 2,
          "ALC_CMS.1": 2
        },
        "ATE": {
          "ATE_IND.1": 2
        },
        "AVA": {
          "AVA_VAN.1": 2
        }
      },
      "cc_security_level": {},
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 6,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 4,
          "FAU_GEN.2.1": 1,
          "FAU_STG_EXT.1": 6,
          "FAU_STG_EXT.1.1": 1
        },
        "FCS": {
          "FCS_CKM.1": 6,
          "FCS_CKM.1.1": 1,
          "FCS_CKM_EXT.4": 5,
          "FCS_CKM_EXT.4.1": 1,
          "FCS_COP.1": 22,
          "FCS_COP.1.1": 4,
          "FCS_RBG_EXT.1": 4,
          "FCS_SSH_EXT": 1,
          "FCS_SSH_EXT.1": 5,
          "FCS_SSH_EXT.1.2": 1,
          "FCS_SSH_EXT.1.3": 1,
          "FCS_SSH_EXT.1.4": 1,
          "FCS_SSH_EXT.1.5": 1,
          "FCS_SSH_EXT.1.6": 1,
          "FCS_SSH_EXT.1.7": 1
        },
        "FDP": {
          "FDP_RIP.2": 5,
          "FDP_RIP.2.1": 1
        },
        "FIA": {
          "FIA_PMG_EXT.1": 5,
          "FIA_PMG_EXT.1.1": 1,
          "FIA_UAU.7": 4,
          "FIA_UAU.7.1": 1,
          "FIA_UAU_EXT.2": 5,
          "FIA_UAU_EXT.2.1": 1,
          "FIA_UAU_EXT.5": 1,
          "FIA_UIA_EXT.1": 6,
          "FIA_UIA_EXT.1.1": 1,
          "FIA_UIA_EXT.1.2": 1
        },
        "FMT": {
          "FMT_MTD.1": 5,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 5,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.2": 4,
          "FMT_SMR.2.1": 1,
          "FMT_SMR.2.2": 1,
          "FMT_SMR.2.3": 1
        },
        "FPT": {
          "FPT_APW_EXT": 1,
          "FPT_APW_EXT.1": 4,
          "FPT_APW_EXT.1.1": 1,
          "FPT_SKP_EXT": 1,
          "FPT_SKP_EXT.1": 4,
          "FPT_SKP_EXT.1.1": 1,
          "FPT_STM.1": 5,
          "FPT_TST_EXT": 1,
          "FPT_TST_EXT.1": 5,
          "FPT_TST_EXT.1.1": 1,
          "FPT_TUD_EXT.1": 5,
          "FPT_TUD_EXT.1.1": 1,
          "FPT_TUD_EXT.1.2": 1,
          "FPT_TUD_EXT.1.3": 1
        },
        "FTA": {
          "FTA_SSL.3": 4,
          "FTA_SSL.3.1": 1,
          "FTA_SSL.4": 5,
          "FTA_SSL_EXT.1": 6,
          "FTA_SSL_EXT.1.1": 1,
          "FTA_SSL_EXT.4.1": 1,
          "FTA_TAB.1": 5,
          "FTA_TAB.1.1": 1
        },
        "FTP": {
          "FTP_ITC": 1,
          "FTP_ITC.1": 4,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP": 1,
          "FTP_TRP.1": 3,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Document Version 2.1 \u00a9Juniper Networks, Inc": 1,
          "including Secure Shell (SSH). Telnet, File Transfer Protocol (FTP), Secure Socket Layer (SSL) are out of scope. Document Version 2.1 \u00a9Juniper Networks, Inc. Page 12 of 56 Security Target: Juniper Networks, Inc": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        },
        "CCM": {
          "CCM": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 1
        }
      },
      "crypto_protocol": {
        "IKE": {
          "IKE": 1
        },
        "IPsec": {
          "IPsec": 2
        },
        "SSH": {
          "SSH": 51,
          "SSHv2": 7
        },
        "TLS": {
          "SSL": {
            "SSL": 3
          }
        },
        "VPN": {
          "VPN": 1
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 2,
          "Key exchange": 1
        },
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA1": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 1
        },
        "RNG": {
          "RBG": 2,
          "RNG": 5
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS PUB 197": 1
        },
        "RFC": {
          "RFC 2460": 2,
          "RFC 3513": 2,
          "RFC 4251": 2,
          "RFC 4252": 1,
          "RFC 4253": 2,
          "RFC 4254": 1,
          "RFC 4443": 2,
          "RFC 5735": 2,
          "RFC 768": 2,
          "RFC 791": 2,
          "RFC 792": 2,
          "RFC 793": 2,
          "RFC 959": 2,
          "RFC2410": 1,
          "RFC4253": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 4
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Apex Assurance Group",
      "/Client": "Juniper Networks, Inc.",
      "/Company": "Apex",
      "/CreationDate": "D:20130905114107+10\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 9.0 for Word",
      "/DocVersion": "2.1",
      "/ModDate": "D:20130905114123+10\u002700\u0027",
      "/Producer": "Acrobat Distiller 9.0.0 (Windows)",
      "/SourceModified": "D:20130905013924",
      "/Subject": "JUNOS 12.1 X44 D15.5 for SRX Series Platforms",
      "/Title": "Security Target",
      "pdf_file_size_bytes": 872150,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.juniper.net/",
          "http://www.apexassurance.com/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 56
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_ND_TFFWEP_V1.0.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JUNOS_CR.pdf",
  "scheme": "AU",
  "security_level": {
    "_type": "Set",
    "elements": []
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/JUNOS_ST.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "f408f37974cf39471bab4d8168e0dbb67cfe9c9e4b9384af0a069598cba55560",
      "txt_hash": "2a1a625bde5944dfe4b7da13e19bbfc47061cf16beb0a12835e791e3b2a7841c"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "01d5765b7cdc1e89b3eb511331f8be829616e130ab3d4022143ab29b371a8950",
      "txt_hash": "093053400f113b4fe765b778e3451b2b3104d6a3c7fd3ecddabfd852afcd2332"
    }
  },
  "status": "archived"
}