Junos-FIPS 10.4 L2 OS Cryptographic Module

Known vulnerabilities detected

Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.

Certificate #1813

Webpage information

Status historical
Historical reason RNG SP800-131A Revision 1 Transition
Validation dates 11.10.2012
Standard FIPS 140-2
Security level 2
Type Firmware
Embodiment Multi-Chip Embedded
Caveat When operated only on the specific platforms specified on the reverse. The routing engine and chassis configured with tamper evident seals installed as indicated in the Security Policy.
Exceptions
  • Design Assurance: Level 3
  • Tested: M120 [1], M320 [2], MX240 [3], MX480 [4], MX960 [5] and T1600 [6]
  • Routing Engines: (RE-A-2000-4096 [1,2] and RE-S-2000-4096 [3,4,5,6])
  • Routing Engine Control Boards: (750-011402 [1] and 750-021524 [3,4,5])
  • Blanking Plate (540-015089 Rev02 [5])
  • Control Boards: (750-009188 [2] and 750-024570 [6])
  • with Tamper Evident Seal Kit: (JNPR-FIPS-TAMPER-LBLS [1,2,3,4,5,6])
Description Juniper Networks M, T and MX series routing platforms are complete routing systems that support a variety of high-speed interfaces for medium/large networks and network applications and numerous routing standards. All platforms are physically self-contained, housing software, firmware, and hardware necessary for routing. The router architecture provides for streamlined forwarding and routing control and the capability to run Internet-scale networks at high speeds. They are powered by the same JUNOS software, which provides both management and control functions as well as all IP routing.
Version (Firmware) 10.4R5
Vendor Juniper Networks, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, DES, Triple-DES, TDES, HMAC, HMAC-SHA-256, CMAC
Asymmetric Algorithms
ECDH, ECDSA, Diffie-Hellman, DH, DSA
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2, MD5
Schemes
MAC, Key Exchange, Key Agreement
Protocols
SSL, TLS, IKEv1, IKE, IPsec, VPN
Randomness
RNG
Libraries
OpenSSL
Elliptic Curves
Curve P-192, P-192

Security level
Level 2

Standards
FIPS 140-2, FIPS 186-2, PKCS1, X.509

File metadata

Title TID-02-3820-2511-5CM3-Juniper_Ne-120914-V1_140sp
Author ngoble
Creation date D:20120913135808-04'00'
Modification date D:20120913135808-04'00'
Pages 29
Creator PDFCreator Version 1.2.3
Producer GPL Ghostscript 9.04

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Related CVEs

ID Links Severity CVSS Score Published on
Base score
CVE-2004-0230
C N
MEDIUM 5.0 18.08.2004
CVE-2019-0036
C N
CRITICAL 9.8 10.04.2019
CVE-2021-31362
C N
LOW 3.3 19.10.2021
CVE-2021-31372
C N
HIGH 9.0 19.10.2021
CVE-2022-22156
C N
HIGH 7.4 19.01.2022
CVE-2022-22162
C N
HIGH 7.8 19.01.2022
CVE-2022-22163
C N
MEDIUM 6.5 19.01.2022
CVE-2022-22173
C N
HIGH 7.5 19.01.2022
CVE-2022-22181
C N
MEDIUM 5.4 14.04.2022
CVE-2022-22197
C N
HIGH 7.5 14.04.2022
CVE-2022-22208
C N
MEDIUM 5.9 18.10.2022
CVE-2022-22214
C N
MEDIUM 6.5 20.07.2022
CVE-2022-22215
C N
MEDIUM 5.5 20.07.2022
CVE-2022-22220
C N
MEDIUM 5.9 18.10.2022
CVE-2022-22224
C N
MEDIUM 6.5 18.10.2022
CVE-2022-22238
C N
MEDIUM 6.5 18.10.2022
CVE-2022-22241
C N
CRITICAL 9.8 18.10.2022
CVE-2022-22242
C N
MEDIUM 6.1 18.10.2022
CVE-2022-22243
C N
MEDIUM 4.3 18.10.2022
CVE-2022-22244
C N
MEDIUM 5.3 18.10.2022
CVE-2022-22245
C N
MEDIUM 4.3 18.10.2022
CVE-2022-22246
C N
HIGH 8.8 18.10.2022
CVE-2023-22391
C N
HIGH 7.5 13.01.2023
CVE-2023-22395
C N
MEDIUM 6.5 13.01.2023
CVE-2023-22406
C N
MEDIUM 6.5 13.01.2023
CVE-2023-22407
C N
MEDIUM 6.5 13.01.2023
CVE-2023-28962
C N
CRITICAL 9.8 17.04.2023
CVE-2023-28963
C N
MEDIUM 5.3 17.04.2023
CVE-2023-28964
C N
HIGH 7.5 17.04.2023
CVE-2023-28975
C N
MEDIUM 4.6 17.04.2023
CVE-2023-28979
C N
MEDIUM 4.7 17.04.2023
CVE-2023-36839
C N
MEDIUM 6.5 12.10.2023
CVE-2023-36840
C N
MEDIUM 5.5 14.07.2023
CVE-2023-36841
C N
HIGH 7.5 12.10.2023
CVE-2023-36842
C N
MEDIUM 6.5 12.01.2024
CVE-2023-36843
C N
HIGH 7.5 12.10.2023
CVE-2023-44175
C N
HIGH 7.5 12.10.2023
CVE-2023-44176
C N
MEDIUM 5.5 13.10.2023
CVE-2023-44177
C N
MEDIUM 5.5 13.10.2023
CVE-2023-44178
C N
MEDIUM 5.5 13.10.2023
CVE-2023-44182
C N
HIGH 8.8 13.10.2023
CVE-2023-44184
C N
MEDIUM 6.5 13.10.2023
CVE-2023-44185
C N
HIGH 7.5 13.10.2023
CVE-2023-44186
C N
HIGH 7.5 11.10.2023
CVE-2023-44194
C N
HIGH 7.8 13.10.2023
CVE-2023-44197
C N
HIGH 7.5 13.10.2023
CVE-2023-44201
C N
MEDIUM 5.5 13.10.2023
CVE-2023-4481
C N
HIGH 7.5 01.09.2023
CVE-2024-21591
C N
CRITICAL 9.8 12.01.2024
CVE-2024-21594
C N
MEDIUM 5.5 12.01.2024
CVE-2024-21615
C N
MEDIUM 5.0 12.04.2024
CVE-2024-30380
C N
MEDIUM 6.5 16.04.2024
CVE-2024-30382
C N
HIGH 7.5 12.04.2024
CVE-2024-30386
C N
MEDIUM 5.3 12.04.2024
CVE-2024-30394
C N
HIGH 7.5 12.04.2024
CVE-2024-30395
C N
HIGH 7.5 12.04.2024
CVE-2024-30397
C N
HIGH 7.5 12.04.2024
CVE-2024-30402
C N
MEDIUM 5.3 12.04.2024
CVE-2024-39511
C N
MEDIUM 5.5 10.07.2024
CVE-2024-39514
C N
MEDIUM 6.5 10.07.2024
CVE-2024-39515
C N
HIGH 7.5 09.10.2024
CVE-2024-39516
C N
HIGH 7.5 09.10.2024
CVE-2024-39517
C N
MEDIUM 6.5 10.07.2024
CVE-2024-39525
C N
HIGH 7.5 09.10.2024
CVE-2024-39528
C N
MEDIUM 5.7 11.07.2024
CVE-2024-39536
C N
MEDIUM 5.3 11.07.2024
CVE-2024-39543
C N
MEDIUM 6.5 11.07.2024
CVE-2024-39549
C N
HIGH 7.5 11.07.2024
CVE-2024-39552
C N
HIGH 7.5 11.07.2024
CVE-2024-39555
C N
HIGH 7.5 10.07.2024
CVE-2024-39556
C N
HIGH 7.0 10.07.2024
CVE-2024-39558
C N
MEDIUM 6.5 10.07.2024
CVE-2024-39560
C N
MEDIUM 6.5 10.07.2024
CVE-2024-39564
C N
HIGH 7.5 05.02.2025
CVE-2024-47491
C N
MEDIUM 5.9 11.10.2024
CVE-2024-47494
C N
MEDIUM 5.9 11.10.2024
CVE-2024-47499
C N
HIGH 7.5 11.10.2024
CVE-2024-47507
C N
MEDIUM 5.8 11.10.2024
CVE-2025-21593
C N
MEDIUM 6.5 09.01.2025
CVE-2025-21595
C N
MEDIUM 6.5 09.04.2025
CVE-2025-21597
C N
MEDIUM 5.3 09.04.2025
CVE-2025-30646
C N
MEDIUM 6.5 09.04.2025
CVE-2025-30648
C N
HIGH 7.4 09.04.2025
CVE-2025-30651
C N
HIGH 7.5 09.04.2025
CVE-2025-30652
C N
MEDIUM 5.5 09.04.2025
CVE-2025-30654
C N
MEDIUM 5.5 09.04.2025
CVE-2025-30655
C N
MEDIUM 5.5 09.04.2025
CVE-2025-30657
C N
MEDIUM 5.3 09.04.2025
CVE-2025-52946
C N
HIGH 7.5 11.07.2025
CVE-2025-52948
C N
MEDIUM 5.9 11.07.2025
CVE-2025-52949
C N
MEDIUM 6.5 11.07.2025
CVE-2025-52951
C N
MEDIUM 5.8 11.07.2025
CVE-2025-52953
C N
MEDIUM 6.5 11.07.2025
CVE-2025-52955
C N
MEDIUM 6.5 11.07.2025
CVE-2025-52963
C N
MEDIUM 5.5 11.07.2025
CVE-2025-52964
C N
MEDIUM 6.5 11.07.2025
CVE-2025-52984
C N
MEDIUM 5.9 11.07.2025
CVE-2025-52986
C N
MEDIUM 5.5 11.07.2025
CVE-2025-52988
C N
MEDIUM 6.7 11.07.2025
CVE-2025-59959
C N
MEDIUM 5.5 15.01.2026
CVE-2025-59960
C N
HIGH 7.4 15.01.2026
CVE-2025-59961
C N
MEDIUM 5.5 15.01.2026
CVE-2025-59962
C N
MEDIUM 5.3 09.10.2025
CVE-2025-59980
C N
MEDIUM 6.5 09.10.2025
CVE-2025-60003
C N
HIGH 7.5 15.01.2026
CVE-2025-60010
C N
MEDIUM 5.4 09.10.2025
CVE-2025-60011
C N
MEDIUM 5.8 15.01.2026
CVE-2026-0203
C N
MEDIUM 6.5 15.01.2026
CVE-2026-21903
C N
MEDIUM 6.5 15.01.2026
CVE-2026-21921
C N
MEDIUM 6.5 15.01.2026
Showing 5 out of 110.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 1813,
  "dgst": "ce63ea0809ce3233",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "Triple-DES#1113",
        "RSA#847",
        "RNG#909",
        "SHS#1509",
        "HMAC#994",
        "SHS#1508",
        "DSA#531",
        "SHS#1502",
        "AES#1726",
        "HMAC#1002",
        "Triple-DES#1106",
        "HMAC#1001",
        "ECDSA#225",
        "AES#1719",
        "HMAC#1000",
        "AES#1727",
        "Triple-DES#1112",
        "SHS#1510"
      ]
    },
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:o:juniper:junos:10.4s:*:*:*:*:*:*:*",
        "cpe:2.3:o:juniper:junos:10.4r:*:*:*:*:*:*:*",
        "cpe:2.3:o:juniper:junos:10.4:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "10.4"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2025-59960",
        "CVE-2024-21591",
        "CVE-2024-39517",
        "CVE-2024-39528",
        "CVE-2022-22244",
        "CVE-2023-28975",
        "CVE-2025-30657",
        "CVE-2023-22391",
        "CVE-2022-22163",
        "CVE-2022-22238",
        "CVE-2025-52988",
        "CVE-2022-22208",
        "CVE-2023-28962",
        "CVE-2025-52953",
        "CVE-2024-39511",
        "CVE-2022-22245",
        "CVE-2023-22395",
        "CVE-2026-0203",
        "CVE-2024-39515",
        "CVE-2023-44176",
        "CVE-2025-59962",
        "CVE-2021-31362",
        "CVE-2023-36841",
        "CVE-2024-39543",
        "CVE-2023-36840",
        "CVE-2023-28964",
        "CVE-2023-44177",
        "CVE-2023-28979",
        "CVE-2023-28963",
        "CVE-2021-31372",
        "CVE-2022-22241",
        "CVE-2025-60010",
        "CVE-2024-39555",
        "CVE-2024-47507",
        "CVE-2023-44201",
        "CVE-2022-22246",
        "CVE-2024-39552",
        "CVE-2023-44175",
        "CVE-2024-39558",
        "CVE-2025-59980",
        "CVE-2024-39560",
        "CVE-2022-22214",
        "CVE-2022-22224",
        "CVE-2023-44194",
        "CVE-2025-52986",
        "CVE-2025-21595",
        "CVE-2025-59961",
        "CVE-2024-39514",
        "CVE-2024-39556",
        "CVE-2023-44178",
        "CVE-2024-47491",
        "CVE-2024-21615",
        "CVE-2022-22181",
        "CVE-2023-44186",
        "CVE-2025-52964",
        "CVE-2024-21594",
        "CVE-2024-39516",
        "CVE-2024-39536",
        "CVE-2024-30395",
        "CVE-2019-0036",
        "CVE-2022-22215",
        "CVE-2024-30402",
        "CVE-2023-4481",
        "CVE-2024-39564",
        "CVE-2025-30652",
        "CVE-2023-44197",
        "CVE-2026-21921",
        "CVE-2025-52955",
        "CVE-2023-36843",
        "CVE-2026-21903",
        "CVE-2023-36839",
        "CVE-2022-22197",
        "CVE-2024-30397",
        "CVE-2025-52948",
        "CVE-2024-47494",
        "CVE-2025-21593",
        "CVE-2025-60011",
        "CVE-2023-44185",
        "CVE-2023-36842",
        "CVE-2025-60003",
        "CVE-2024-30382",
        "CVE-2025-52984",
        "CVE-2025-30648",
        "CVE-2025-30646",
        "CVE-2024-30394",
        "CVE-2025-30655",
        "CVE-2022-22173",
        "CVE-2024-30386",
        "CVE-2022-22156",
        "CVE-2023-44182",
        "CVE-2024-39549",
        "CVE-2025-59959",
        "CVE-2025-52949",
        "CVE-2024-47499",
        "CVE-2025-21597",
        "CVE-2004-0230",
        "CVE-2023-22406",
        "CVE-2023-22407",
        "CVE-2025-52951",
        "CVE-2025-30651",
        "CVE-2025-52963",
        "CVE-2022-22162",
        "CVE-2024-30380",
        "CVE-2022-22220",
        "CVE-2022-22243",
        "CVE-2025-52946",
        "CVE-2023-44184",
        "CVE-2022-22242",
        "CVE-2025-30654",
        "CVE-2024-39525"
      ]
    },
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 4
          }
        },
        "FF": {
          "DH": {
            "DH": 3,
            "Diffie-Hellman": 1
          },
          "DSA": {
            "DSA": 15
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 1
        }
      },
      "crypto_protocol": {
        "IKE": {
          "IKE": 14,
          "IKEv1": 1
        },
        "IPsec": {
          "IPsec": 17
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 14
          }
        },
        "VPN": {
          "VPN": 1
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "KEX": {
          "Key Exchange": 1
        },
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "Curve P-192": 1,
          "P-192": 1
        }
      },
      "eval_facility": {},
      "fips_cert_id": {},
      "fips_certlike": {
        "Certlike": {
          "AES 128, 192": 3,
          "AES 1719": 1,
          "AES 1726": 1,
          "AES 1727": 1,
          "DES - KAT 1": 1,
          "DSA 531": 1,
          "HMAC 1000": 2,
          "HMAC 1001": 2,
          "HMAC 1002": 2,
          "HMAC 994": 2,
          "HMAC-SHA-1": 18,
          "HMAC-SHA-256": 4,
          "PKCS1": 2,
          "RSA 847": 1,
          "SHA 1502": 1,
          "SHA 1508": 1,
          "SHA 1509": 1,
          "SHA 1510": 1,
          "SHA-1": 5,
          "SHA-2": 1,
          "SHA-224": 2,
          "SHA-256": 1,
          "SHA-384": 1,
          "SHA-512": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 2": 4
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 3
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 5
          },
          "SHA2": {
            "SHA-2": 1,
            "SHA-224": 2,
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 14
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 8,
          "FIPS 186-2": 5
        },
        "PKCS": {
          "PKCS1": 1
        },
        "X509": {
          "X.509": 6
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 9
          }
        },
        "DES": {
          "3DES": {
            "TDES": 13,
            "Triple-DES": 1
          },
          "DES": {
            "DES": 3
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1,
            "HMAC": 7,
            "HMAC-SHA-256": 2
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "ngoble",
      "/CreationDate": "D:20120913135808-04\u002700\u0027",
      "/Creator": "PDFCreator Version 1.2.3",
      "/Keywords": "",
      "/ModDate": "D:20120913135808-04\u002700\u0027",
      "/Producer": "GPL Ghostscript 9.04",
      "/Subject": "",
      "/Title": "TID-02-3820-2511-5CM3-Juniper_Ne-120914-V1_140sp",
      "pdf_file_size_bytes": 1399049,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 29
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "8c2894c5e690dab0ba4d1d93ac89bdac85e4f3a1fca8a099d6dd76bf5c58f065",
    "policy_txt_hash": "b56ddd465f0ee57674c94b64d2c64dbf7680c2d5e3be599cce737422276cbca4"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated only on the specific platforms specified on the reverse. The routing engine and chassis configured with tamper evident seals installed as indicated in the Security Policy.",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0022.pdf",
    "date_sunset": null,
    "description": "Juniper Networks M, T and MX series routing platforms are complete routing systems that support a variety of high-speed interfaces for medium/large networks and network applications and numerous routing standards. All platforms are physically self-contained, housing software, firmware, and hardware necessary for routing. The router architecture provides for streamlined forwarding and routing control and the capability to run Internet-scale networks at high speeds. They are powered by the same JUNOS software, which provides both management and control functions as well as all IP routing.",
    "embodiment": "Multi-Chip Embedded",
    "exceptions": [
      "Design Assurance: Level 3",
      "Tested: M120 [1], M320 [2], MX240 [3], MX480 [4], MX960 [5] and T1600 [6]",
      "Routing Engines: (RE-A-2000-4096 [1,2] and RE-S-2000-4096 [3,4,5,6])",
      "Routing Engine Control Boards: (750-011402 [1] and 750-021524 [3,4,5])",
      "Blanking Plate (540-015089 Rev02 [5])",
      "Control Boards: (750-009188 [2] and 750-024570 [6])",
      "with Tamper Evident Seal Kit: (JNPR-FIPS-TAMPER-LBLS [1,2,3,4,5,6])"
    ],
    "fw_versions": "10.4R5",
    "historical_reason": "RNG SP800-131A Revision 1 Transition",
    "hw_versions": null,
    "level": 2,
    "mentioned_certs": {},
    "module_name": "Junos-FIPS 10.4 L2 OS Cryptographic Module",
    "module_type": "Firmware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2012-10-11",
        "lab": "CYGNACOM SOLUTIONS INC",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Juniper Networks, Inc.",
    "vendor_url": "http://www.juniper.net"
  }
}