This page was not yet optimized for use on mobile
devices.
Junos-FIPS 10.4 L2 OS Cryptographic Module
Known vulnerabilities detected
Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.Certificate #1813
Webpage information
Security policy
Symmetric Algorithms
AES, DES, Triple-DES, TDES, HMAC, HMAC-SHA-256, CMACAsymmetric Algorithms
ECDH, ECDSA, Diffie-Hellman, DH, DSAHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2, MD5Schemes
MAC, Key Exchange, Key AgreementProtocols
SSL, TLS, IKEv1, IKE, IPsec, VPNRandomness
RNGLibraries
OpenSSLElliptic Curves
Curve P-192, P-192Security level
Level 2Standards
FIPS 140-2, FIPS 186-2, PKCS1, X.509File metadata
| Title | TID-02-3820-2511-5CM3-Juniper_Ne-120914-V1_140sp |
|---|---|
| Author | ngoble |
| Creation date | D:20120913135808-04'00' |
| Modification date | D:20120913135808-04'00' |
| Pages | 29 |
| Creator | PDFCreator Version 1.2.3 |
| Producer | GPL Ghostscript 9.04 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.CPE matches
Related CVEs
| ID | Links | Severity | CVSS Score | Published on |
|---|---|---|---|---|
| Base score | ||||
| CVE-2004-0230 | MEDIUM | 5.0 | 18.08.2004 | |
| CVE-2019-0036 | CRITICAL | 9.8 | 10.04.2019 | |
| CVE-2021-31362 | LOW | 3.3 | 19.10.2021 | |
| CVE-2021-31372 | HIGH | 9.0 | 19.10.2021 | |
| CVE-2022-22156 | HIGH | 7.4 | 19.01.2022 | |
| CVE-2022-22162 | HIGH | 7.8 | 19.01.2022 | |
| CVE-2022-22163 | MEDIUM | 6.5 | 19.01.2022 | |
| CVE-2022-22173 | HIGH | 7.5 | 19.01.2022 | |
| CVE-2022-22181 | MEDIUM | 5.4 | 14.04.2022 | |
| CVE-2022-22197 | HIGH | 7.5 | 14.04.2022 | |
| CVE-2022-22208 | MEDIUM | 5.9 | 18.10.2022 | |
| CVE-2022-22214 | MEDIUM | 6.5 | 20.07.2022 | |
| CVE-2022-22215 | MEDIUM | 5.5 | 20.07.2022 | |
| CVE-2022-22220 | MEDIUM | 5.9 | 18.10.2022 | |
| CVE-2022-22224 | MEDIUM | 6.5 | 18.10.2022 | |
| CVE-2022-22238 | MEDIUM | 6.5 | 18.10.2022 | |
| CVE-2022-22241 | CRITICAL | 9.8 | 18.10.2022 | |
| CVE-2022-22242 | MEDIUM | 6.1 | 18.10.2022 | |
| CVE-2022-22243 | MEDIUM | 4.3 | 18.10.2022 | |
| CVE-2022-22244 | MEDIUM | 5.3 | 18.10.2022 | |
| CVE-2022-22245 | MEDIUM | 4.3 | 18.10.2022 | |
| CVE-2022-22246 | HIGH | 8.8 | 18.10.2022 | |
| CVE-2023-22391 | HIGH | 7.5 | 13.01.2023 | |
| CVE-2023-22395 | MEDIUM | 6.5 | 13.01.2023 | |
| CVE-2023-22406 | MEDIUM | 6.5 | 13.01.2023 | |
| CVE-2023-22407 | MEDIUM | 6.5 | 13.01.2023 | |
| CVE-2023-28962 | CRITICAL | 9.8 | 17.04.2023 | |
| CVE-2023-28963 | MEDIUM | 5.3 | 17.04.2023 | |
| CVE-2023-28964 | HIGH | 7.5 | 17.04.2023 | |
| CVE-2023-28975 | MEDIUM | 4.6 | 17.04.2023 | |
| CVE-2023-28979 | MEDIUM | 4.7 | 17.04.2023 | |
| CVE-2023-36839 | MEDIUM | 6.5 | 12.10.2023 | |
| CVE-2023-36840 | MEDIUM | 5.5 | 14.07.2023 | |
| CVE-2023-36841 | HIGH | 7.5 | 12.10.2023 | |
| CVE-2023-36842 | MEDIUM | 6.5 | 12.01.2024 | |
| CVE-2023-36843 | HIGH | 7.5 | 12.10.2023 | |
| CVE-2023-44175 | HIGH | 7.5 | 12.10.2023 | |
| CVE-2023-44176 | MEDIUM | 5.5 | 13.10.2023 | |
| CVE-2023-44177 | MEDIUM | 5.5 | 13.10.2023 | |
| CVE-2023-44178 | MEDIUM | 5.5 | 13.10.2023 | |
| CVE-2023-44182 | HIGH | 8.8 | 13.10.2023 | |
| CVE-2023-44184 | MEDIUM | 6.5 | 13.10.2023 | |
| CVE-2023-44185 | HIGH | 7.5 | 13.10.2023 | |
| CVE-2023-44186 | HIGH | 7.5 | 11.10.2023 | |
| CVE-2023-44194 | HIGH | 7.8 | 13.10.2023 | |
| CVE-2023-44197 | HIGH | 7.5 | 13.10.2023 | |
| CVE-2023-44201 | MEDIUM | 5.5 | 13.10.2023 | |
| CVE-2023-4481 | HIGH | 7.5 | 01.09.2023 | |
| CVE-2024-21591 | CRITICAL | 9.8 | 12.01.2024 | |
| CVE-2024-21594 | MEDIUM | 5.5 | 12.01.2024 | |
| CVE-2024-21615 | MEDIUM | 5.0 | 12.04.2024 | |
| CVE-2024-30380 | MEDIUM | 6.5 | 16.04.2024 | |
| CVE-2024-30382 | HIGH | 7.5 | 12.04.2024 | |
| CVE-2024-30386 | MEDIUM | 5.3 | 12.04.2024 | |
| CVE-2024-30394 | HIGH | 7.5 | 12.04.2024 | |
| CVE-2024-30395 | HIGH | 7.5 | 12.04.2024 | |
| CVE-2024-30397 | HIGH | 7.5 | 12.04.2024 | |
| CVE-2024-30402 | MEDIUM | 5.3 | 12.04.2024 | |
| CVE-2024-39511 | MEDIUM | 5.5 | 10.07.2024 | |
| CVE-2024-39514 | MEDIUM | 6.5 | 10.07.2024 | |
| CVE-2024-39515 | HIGH | 7.5 | 09.10.2024 | |
| CVE-2024-39516 | HIGH | 7.5 | 09.10.2024 | |
| CVE-2024-39517 | MEDIUM | 6.5 | 10.07.2024 | |
| CVE-2024-39525 | HIGH | 7.5 | 09.10.2024 | |
| CVE-2024-39528 | MEDIUM | 5.7 | 11.07.2024 | |
| CVE-2024-39536 | MEDIUM | 5.3 | 11.07.2024 | |
| CVE-2024-39543 | MEDIUM | 6.5 | 11.07.2024 | |
| CVE-2024-39549 | HIGH | 7.5 | 11.07.2024 | |
| CVE-2024-39552 | HIGH | 7.5 | 11.07.2024 | |
| CVE-2024-39555 | HIGH | 7.5 | 10.07.2024 | |
| CVE-2024-39556 | HIGH | 7.0 | 10.07.2024 | |
| CVE-2024-39558 | MEDIUM | 6.5 | 10.07.2024 | |
| CVE-2024-39560 | MEDIUM | 6.5 | 10.07.2024 | |
| CVE-2024-39564 | HIGH | 7.5 | 05.02.2025 | |
| CVE-2024-47491 | MEDIUM | 5.9 | 11.10.2024 | |
| CVE-2024-47494 | MEDIUM | 5.9 | 11.10.2024 | |
| CVE-2024-47499 | HIGH | 7.5 | 11.10.2024 | |
| CVE-2024-47507 | MEDIUM | 5.8 | 11.10.2024 | |
| CVE-2025-21593 | MEDIUM | 6.5 | 09.01.2025 | |
| CVE-2025-21595 | MEDIUM | 6.5 | 09.04.2025 | |
| CVE-2025-21597 | MEDIUM | 5.3 | 09.04.2025 | |
| CVE-2025-30646 | MEDIUM | 6.5 | 09.04.2025 | |
| CVE-2025-30648 | HIGH | 7.4 | 09.04.2025 | |
| CVE-2025-30651 | HIGH | 7.5 | 09.04.2025 | |
| CVE-2025-30652 | MEDIUM | 5.5 | 09.04.2025 | |
| CVE-2025-30654 | MEDIUM | 5.5 | 09.04.2025 | |
| CVE-2025-30655 | MEDIUM | 5.5 | 09.04.2025 | |
| CVE-2025-30657 | MEDIUM | 5.3 | 09.04.2025 | |
| CVE-2025-52946 | HIGH | 7.5 | 11.07.2025 | |
| CVE-2025-52948 | MEDIUM | 5.9 | 11.07.2025 | |
| CVE-2025-52949 | MEDIUM | 6.5 | 11.07.2025 | |
| CVE-2025-52951 | MEDIUM | 5.8 | 11.07.2025 | |
| CVE-2025-52953 | MEDIUM | 6.5 | 11.07.2025 | |
| CVE-2025-52955 | MEDIUM | 6.5 | 11.07.2025 | |
| CVE-2025-52963 | MEDIUM | 5.5 | 11.07.2025 | |
| CVE-2025-52964 | MEDIUM | 6.5 | 11.07.2025 | |
| CVE-2025-52984 | MEDIUM | 5.9 | 11.07.2025 | |
| CVE-2025-52986 | MEDIUM | 5.5 | 11.07.2025 | |
| CVE-2025-52988 | MEDIUM | 6.7 | 11.07.2025 | |
| CVE-2025-59959 | MEDIUM | 5.5 | 15.01.2026 | |
| CVE-2025-59960 | HIGH | 7.4 | 15.01.2026 | |
| CVE-2025-59961 | MEDIUM | 5.5 | 15.01.2026 | |
| CVE-2025-59962 | MEDIUM | 5.3 | 09.10.2025 | |
| CVE-2025-59980 | MEDIUM | 6.5 | 09.10.2025 | |
| CVE-2025-60003 | HIGH | 7.5 | 15.01.2026 | |
| CVE-2025-60010 | MEDIUM | 5.4 | 09.10.2025 | |
| CVE-2025-60011 | MEDIUM | 5.8 | 15.01.2026 | |
| CVE-2026-0203 | MEDIUM | 6.5 | 15.01.2026 | |
| CVE-2026-21903 | MEDIUM | 6.5 | 15.01.2026 | |
| CVE-2026-21921 | MEDIUM | 6.5 | 15.01.2026 |
Showing 5 out of 110.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 1813,
"dgst": "ce63ea0809ce3233",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"Triple-DES#1113",
"RSA#847",
"RNG#909",
"SHS#1509",
"HMAC#994",
"SHS#1508",
"DSA#531",
"SHS#1502",
"AES#1726",
"HMAC#1002",
"Triple-DES#1106",
"HMAC#1001",
"ECDSA#225",
"AES#1719",
"HMAC#1000",
"AES#1727",
"Triple-DES#1112",
"SHS#1510"
]
},
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:juniper:junos:10.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:10.4r:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:10.4:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"10.4"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2025-59960",
"CVE-2024-21591",
"CVE-2024-39517",
"CVE-2024-39528",
"CVE-2022-22244",
"CVE-2023-28975",
"CVE-2025-30657",
"CVE-2023-22391",
"CVE-2022-22163",
"CVE-2022-22238",
"CVE-2025-52988",
"CVE-2022-22208",
"CVE-2023-28962",
"CVE-2025-52953",
"CVE-2024-39511",
"CVE-2022-22245",
"CVE-2023-22395",
"CVE-2026-0203",
"CVE-2024-39515",
"CVE-2023-44176",
"CVE-2025-59962",
"CVE-2021-31362",
"CVE-2023-36841",
"CVE-2024-39543",
"CVE-2023-36840",
"CVE-2023-28964",
"CVE-2023-44177",
"CVE-2023-28979",
"CVE-2023-28963",
"CVE-2021-31372",
"CVE-2022-22241",
"CVE-2025-60010",
"CVE-2024-39555",
"CVE-2024-47507",
"CVE-2023-44201",
"CVE-2022-22246",
"CVE-2024-39552",
"CVE-2023-44175",
"CVE-2024-39558",
"CVE-2025-59980",
"CVE-2024-39560",
"CVE-2022-22214",
"CVE-2022-22224",
"CVE-2023-44194",
"CVE-2025-52986",
"CVE-2025-21595",
"CVE-2025-59961",
"CVE-2024-39514",
"CVE-2024-39556",
"CVE-2023-44178",
"CVE-2024-47491",
"CVE-2024-21615",
"CVE-2022-22181",
"CVE-2023-44186",
"CVE-2025-52964",
"CVE-2024-21594",
"CVE-2024-39516",
"CVE-2024-39536",
"CVE-2024-30395",
"CVE-2019-0036",
"CVE-2022-22215",
"CVE-2024-30402",
"CVE-2023-4481",
"CVE-2024-39564",
"CVE-2025-30652",
"CVE-2023-44197",
"CVE-2026-21921",
"CVE-2025-52955",
"CVE-2023-36843",
"CVE-2026-21903",
"CVE-2023-36839",
"CVE-2022-22197",
"CVE-2024-30397",
"CVE-2025-52948",
"CVE-2024-47494",
"CVE-2025-21593",
"CVE-2025-60011",
"CVE-2023-44185",
"CVE-2023-36842",
"CVE-2025-60003",
"CVE-2024-30382",
"CVE-2025-52984",
"CVE-2025-30648",
"CVE-2025-30646",
"CVE-2024-30394",
"CVE-2025-30655",
"CVE-2022-22173",
"CVE-2024-30386",
"CVE-2022-22156",
"CVE-2023-44182",
"CVE-2024-39549",
"CVE-2025-59959",
"CVE-2025-52949",
"CVE-2024-47499",
"CVE-2025-21597",
"CVE-2004-0230",
"CVE-2023-22406",
"CVE-2023-22407",
"CVE-2025-52951",
"CVE-2025-30651",
"CVE-2025-52963",
"CVE-2022-22162",
"CVE-2024-30380",
"CVE-2022-22220",
"CVE-2022-22243",
"CVE-2025-52946",
"CVE-2023-44184",
"CVE-2022-22242",
"CVE-2025-30654",
"CVE-2024-39525"
]
},
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 4
}
},
"FF": {
"DH": {
"DH": 3,
"Diffie-Hellman": 1
},
"DSA": {
"DSA": 15
}
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 1
}
},
"crypto_protocol": {
"IKE": {
"IKE": 14,
"IKEv1": 1
},
"IPsec": {
"IPsec": 17
},
"TLS": {
"SSL": {
"SSL": 1
},
"TLS": {
"TLS": 14
}
},
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"KEX": {
"Key Exchange": 1
},
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"Curve P-192": 1,
"P-192": 1
}
},
"eval_facility": {},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"AES 128, 192": 3,
"AES 1719": 1,
"AES 1726": 1,
"AES 1727": 1,
"DES - KAT 1": 1,
"DSA 531": 1,
"HMAC 1000": 2,
"HMAC 1001": 2,
"HMAC 1002": 2,
"HMAC 994": 2,
"HMAC-SHA-1": 18,
"HMAC-SHA-256": 4,
"PKCS1": 2,
"RSA 847": 1,
"SHA 1502": 1,
"SHA 1508": 1,
"SHA 1509": 1,
"SHA 1510": 1,
"SHA-1": 5,
"SHA-2": 1,
"SHA-224": 2,
"SHA-256": 1,
"SHA-384": 1,
"SHA-512": 1
}
},
"fips_security_level": {
"Level": {
"Level 2": 4
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 3
}
},
"SHA": {
"SHA1": {
"SHA-1": 5
},
"SHA2": {
"SHA-2": 1,
"SHA-224": 2,
"SHA-256": 1,
"SHA-384": 1,
"SHA-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 14
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 8,
"FIPS 186-2": 5
},
"PKCS": {
"PKCS1": 1
},
"X509": {
"X.509": 6
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 9
}
},
"DES": {
"3DES": {
"TDES": 13,
"Triple-DES": 1
},
"DES": {
"DES": 3
}
},
"constructions": {
"MAC": {
"CMAC": 1,
"HMAC": 7,
"HMAC-SHA-256": 2
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "ngoble",
"/CreationDate": "D:20120913135808-04\u002700\u0027",
"/Creator": "PDFCreator Version 1.2.3",
"/Keywords": "",
"/ModDate": "D:20120913135808-04\u002700\u0027",
"/Producer": "GPL Ghostscript 9.04",
"/Subject": "",
"/Title": "TID-02-3820-2511-5CM3-Juniper_Ne-120914-V1_140sp",
"pdf_file_size_bytes": 1399049,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 29
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "8c2894c5e690dab0ba4d1d93ac89bdac85e4f3a1fca8a099d6dd76bf5c58f065",
"policy_txt_hash": "b56ddd465f0ee57674c94b64d2c64dbf7680c2d5e3be599cce737422276cbca4"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated only on the specific platforms specified on the reverse. The routing engine and chassis configured with tamper evident seals installed as indicated in the Security Policy.",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0022.pdf",
"date_sunset": null,
"description": "Juniper Networks M, T and MX series routing platforms are complete routing systems that support a variety of high-speed interfaces for medium/large networks and network applications and numerous routing standards. All platforms are physically self-contained, housing software, firmware, and hardware necessary for routing. The router architecture provides for streamlined forwarding and routing control and the capability to run Internet-scale networks at high speeds. They are powered by the same JUNOS software, which provides both management and control functions as well as all IP routing.",
"embodiment": "Multi-Chip Embedded",
"exceptions": [
"Design Assurance: Level 3",
"Tested: M120 [1], M320 [2], MX240 [3], MX480 [4], MX960 [5] and T1600 [6]",
"Routing Engines: (RE-A-2000-4096 [1,2] and RE-S-2000-4096 [3,4,5,6])",
"Routing Engine Control Boards: (750-011402 [1] and 750-021524 [3,4,5])",
"Blanking Plate (540-015089 Rev02 [5])",
"Control Boards: (750-009188 [2] and 750-024570 [6])",
"with Tamper Evident Seal Kit: (JNPR-FIPS-TAMPER-LBLS [1,2,3,4,5,6])"
],
"fw_versions": "10.4R5",
"historical_reason": "RNG SP800-131A Revision 1 Transition",
"hw_versions": null,
"level": 2,
"mentioned_certs": {},
"module_name": "Junos-FIPS 10.4 L2 OS Cryptographic Module",
"module_type": "Firmware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2012-10-11",
"lab": "CYGNACOM SOLUTIONS INC",
"validation_type": "Initial"
}
],
"vendor": "Juniper Networks, Inc.",
"vendor_url": "http://www.juniper.net"
}
}