This page was not yet optimized for use on mobile devices.
Xerox WorkCentre 7970
This certificate has known related CVEs, which means that
the certified
product might be vulnerable.
CSV information ?
Status | archived |
---|---|
Valid from | 09.01.2015 |
Valid until | 09.01.2020 |
Scheme | 🇨🇦 CA |
Manufacturer | Xerox Corporation |
Category | Multi-Function Devices |
Security level | ALC_FLR.3, EAL2+ |
Heuristics summary ?
Certificate ID: 383-4-317
Certificate ?
Certification report ?
Extracted keywords
Libraries
OpenSSLSecurity level
EAL 2+, EAL 2, EAL2+, EAL 2 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.3Security Functional Requirements (SFR)
FPT_FDI_EXP.1Certificates
383-4-317-CRStandards
FIPS 140-2, FIPS PUB 140-2, ISO/IEC 17025:2005File metadata
Title | 383-4-XXX CR vxe |
---|---|
Author | White, Debra E. |
Creation date | D:20150206085454-05'00' |
Modification date | D:20150206085454-05'00' |
Pages | 14 |
Creator | Microsoft® Word 2010 |
Producer | Microsoft® Word 2010 |
Frontpage
Certificate ID | 383-4-317-CR |
---|---|
Certification lab | CANADA |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, HMACAsymmetric Algorithms
RSA 1024, Diffie-HellmanHash functions
SHA-1, SHA-256Protocols
SSH, TLS, IPsecLibraries
OpenSSLBlock cipher modes
CBCSecurity level
EAL2, EAL2+Claims
D.DOC, D.FUNC, D.PROT, D.CONF, O.DOC, O.FUNC, O.PROT, O.CONF, O.USER, O.INTERFACE, O.SOFTWARE, O.AUDIT, O.AUDIT_STORAGE, O.AUDIT_STORA, T.DOC, T.FUNC, T.PROT, T.CONF, A.ACCESS, A.USER, A.ADMIN, OE.AUDIT_STORAGE, OE.AUDIT_ACCESS, OE.INTERFACE, OE.USER, OE.PHYSICAL, OE.ADMIN, OE.AUDIT, OE.PHYISCALSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_GEN.2, FAU_STG.1, FAU_STG.4, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_STG.3, FCS_COP.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FDP_IFF, FDP_IFC, FDP_IFC.1, FDP_ACC.1, FDP_ACF.1, FDP_IFF.1, FDP_RIP.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_RIP.1.1, FIA_ATD.1, FIA_UAU.1, FIA_UAU.7, FIA_UID.1, FIA_USB.1, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMR, FPT_FDI_EXP, FPT_FDI_EXP.1, FPT_FDI_EXP.1.1, FPT_STM.1, FPT_TST.1, FPT_STM.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_SSL.3, FTA_SSL.3.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TST.1Side-channel analysis
malfunctionStandards
FIPS 46-3, FIPS 197, FIPS 186-3, FIPS 180-3, FIPS 198, FIPS 186-2, FIPS 140-2, RFC 4366, RFC 5280, RFC 2631, ISO/IEC 15408, X.509File metadata
Title | Xerox Multi-Function Device Security Target |
---|---|
Subject | Security Target |
Author | Lachlan Turner |
Creation date | D:20150112102734-05'00' |
Modification date | D:20150112102734-05'00' |
Pages | 78 |
Creator | Microsoft® Word 2010 |
Producer | Microsoft® Word 2010 |
Heuristics ?
Certificate ID: 383-4-317
Extracted SARs
ASE_SPD.1, ASE_REQ.2, ADV_FSP.2, ASE_INT.1, ALC_CMC.2, ASE_CCL.1, ADV_TDS.1, AGD_OPE.1, ALC_CMS.2, ASE_TSS.1, ALC_DEL.1, ATE_FUN.1, ADV_ARC.1, AVA_VAN.2, AGD_PRE.1, ATE_IND.2, ATE_COV.1, ALC_FLR.3, ASE_OBJ.2, ASE_ECD.1CPE matches
Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-2018-20767 | HIGH | 8.8 | 5.9 | 10.02.2019 17:29 | ||
CVE-2018-20768 | CRITICAL | 9.8 | 5.9 | 10.02.2019 17:29 | ||
CVE-2018-20769 | HIGH | 7.5 | 3.6 | 10.02.2019 17:29 | ||
CVE-2018-20770 | CRITICAL | 9.8 | 5.9 | 10.02.2019 17:29 | ||
CVE-2018-20771 | CRITICAL | 9.8 | 5.9 | 10.02.2019 17:29 | ||
CVE-2020-36201 | HIGH | 7.5 | 3.6 | 26.01.2021 18:15 | ||
CVE-2020-9330 | HIGH | 8.8 | 5.9 | 21.02.2020 23:15 |
References ?
No references are available for this certificate.
Updates ?
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ec51f6be80f1422704a3715de21950cd31afbc9297dc50e09354ec5fc2ed4bfe', 'txt_hash': '2f319f6e0617be6a0cd99a7f3ec921bf320a6cfc27fd45aa1b136e7888049732'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ac980d7de3db40ec13ee69a6633b47e8b62782d45acfb8a6d8fca74faae3bee6', 'txt_hash': 'b7491bcf285308196fe5894d5601364d54896b3e8c6aa07fdefb4b9ef03ccaf3'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 228901, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 14, '/Title': '383-4-XXX CR vxe', '/Author': 'White, Debra E.', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20150206085454-05'00'", '/ModDate': "D:20150206085454-05'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1404927, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 78, '/Title': 'Xerox Multi-Function Device Security Target', '/Author': 'Lachlan Turner', '/Subject': 'Security Target', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20150112102734-05'00'", '/ModDate': "D:20150112102734-05'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1051.pdf', 'http://www.xerox.com/information-security/product/enus.html']}}
. - The report_frontpage property was set to
{'CA': {'cert_id': '383-4-317-CR', 'cert_lab': 'CANADA'}}
. - The report_keywords property was set to
{'cc_cert_id': {'CA': {'383-4-317-CR': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2+': 2, 'EAL 2': 1, 'EAL2+': 1, 'EAL 2 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.3': 1}}, 'cc_sfr': {'FPT': {'FPT_FDI_EXP.1': 1}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 2}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 1, 'FIPS PUB 140-2': 2}, 'ISO': {'ISO/IEC 17025:2005': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 4, 'EAL2+': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 3, 'ADV_FSP.2': 4, 'ADV_TDS.1': 4, 'ADV_FSP.1': 2}, 'AGD': {'AGD_OPE.1': 4, 'AGD_PRE.1': 2}, 'ALC': {'ALC_FLR.3': 9, 'ALC_CMC.2': 2, 'ALC_CMS.2': 2, 'ALC_DEL.1': 2}, 'ATE': {'ATE_COV.1': 3, 'ATE_FUN.1': 3, 'ATE_IND.2': 2}, 'AVA': {'AVA_VAN.2': 2}, 'ASE': {'ASE_CCL.1': 2, 'ASE_ECD.1': 2, 'ASE_INT.1': 4, 'ASE_OBJ.2': 3, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2, 'ASE_TSS.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_GEN.1': 9, 'FAU_GEN.2': 7, 'FAU_STG.1': 9, 'FAU_STG.4': 7, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_STG.3': 1}, 'FCS': {'FCS_COP.1': 9, 'FCS_CKM.1': 12, 'FCS_CKM.2': 7, 'FCS_CKM.4': 12, 'FCS_COP.1.1': 1, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_IFF': 1, 'FDP_IFC': 1, 'FDP_IFC.1': 14, 'FDP_ACC.1': 21, 'FDP_ACF.1': 18, 'FDP_IFF.1': 10, 'FDP_RIP.1': 6, 'FDP_ITC.1': 6, 'FDP_ITC.2': 6, 'FDP_ACC.1.1': 2, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_RIP.1.1': 1}, 'FIA': {'FIA_ATD.1': 8, 'FIA_UAU.1': 9, 'FIA_UAU.7': 7, 'FIA_UID.1': 18, 'FIA_USB.1': 7, 'FIA_ATD.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_SMF.1': 26, 'FMT_SMR.1': 29, 'FMT_MSA.1': 17, 'FMT_MSA.3': 21, 'FMT_MTD.1': 22, 'FMT_MSA.1.1': 2, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MTD.1.1': 4, 'FMT_SMF.1.1': 2, 'FMT_SMR.1.1': 2, 'FMT_SMR.1.2': 1, 'FMT_SMR': 1}, 'FPT': {'FPT_FDI_EXP': 3, 'FPT_FDI_EXP.1': 11, 'FPT_FDI_EXP.1.1': 2, 'FPT_STM.1': 10, 'FPT_TST.1': 5, 'FPT_STM.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTA': {'FTA_SSL.3': 8, 'FTA_SSL.3.1': 1}, 'FTP': {'FTP_ITC.1': 7, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TST.1': 1}}, 'cc_claims': {'D': {'D.DOC': 18, 'D.FUNC': 12, 'D.PROT': 5, 'D.CONF': 7}, 'O': {'O.DOC': 17, 'O.FUNC': 8, 'O.PROT': 8, 'O.CONF': 16, 'O.USER': 13, 'O.INTERFACE': 7, 'O.SOFTWARE': 7, 'O.AUDIT': 7, 'O.AUDIT_STORAGE': 6, 'O.AUDIT_STORA': 1}, 'T': {'T.DOC': 6, 'T.FUNC': 3, 'T.PROT': 3, 'T.CONF': 6}, 'A': {'A.ACCESS': 3, 'A.USER': 3, 'A.ADMIN': 6}, 'OE': {'OE.AUDIT_STORAGE': 3, 'OE.AUDIT_ACCESS': 3, 'OE.INTERFACE': 3, 'OE.USER': 21, 'OE.PHYSICAL': 2, 'OE.ADMIN': 6, 'OE.AUDIT': 3, 'OE.PHYISCAL': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 8}}, 'DES': {'DES': {'DES': 3}, '3DES': {'TDES': 2}}, 'constructions': {'MAC': {'HMAC': 3}}}, 'asymmetric_crypto': {'RSA': {'RSA 1024': 1}, 'FF': {'DH': {'Diffie-Hellman': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}, 'SHA2': {'SHA-256': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'TLS': {'TLS': 20}}, 'IPsec': {'IPsec': 9}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 5}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 46-3': 1, 'FIPS 197': 1, 'FIPS 186-3': 1, 'FIPS 180-3': 2, 'FIPS 198': 1, 'FIPS 186-2': 4, 'FIPS 140-2': 1}, 'RFC': {'RFC 4366': 1, 'RFC 5280': 1, 'RFC 2631': 2}, 'ISO': {'ISO/IEC 15408': 2}, 'X509': {'X.509': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
383-4-317 CR v1.0e.pdf
. - The st_filename property was set to
383-4-317_ST_1.4.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['CANADA']
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-317%20CR%20v1.0e.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-317_ST_1.4.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Xerox WorkCentre 7970 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Multi-Function Devices",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-317%20cert%20v1.0e.docx",
"dgst": "1463cbb29334f346",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "383-4-317",
"cert_lab": [
"CANADA"
],
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:h:xerox:workcentre_7970i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xerox:workcentre_7970i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:workcentre_7970:-:*:*:*:*:*:*:*",
"cpe:2.3:o:xerox:workcentre_7970_firmware:-:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"7970"
]
},
"indirect_transitive_cves": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2018-20770",
"CVE-2016-11061",
"CVE-2018-20768",
"CVE-2018-20769",
"CVE-2020-9330",
"CVE-2020-36201",
"CVE-2018-20771",
"CVE-2018-20767"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Xerox Corporation",
"manufacturer_web": "https://www.xerox.com",
"name": "Xerox WorkCentre 7970",
"not_valid_after": "2020-01-09",
"not_valid_before": "2015-01-09",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "383-4-317 cert v1.0e.docx",
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "383-4-317 CR v1.0e.pdf",
"report_frontpage": {
"CA": {
"cert_id": "383-4-317-CR",
"cert_lab": "CANADA"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"CA": {
"383-4-317-CR": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 2 augmented": 1,
"EAL 2+": 2,
"EAL2+": 1
}
},
"cc_sfr": {
"FPT": {
"FPT_FDI_EXP.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 2
}
},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 1,
"FIPS PUB 140-2": 2
},
"ISO": {
"ISO/IEC 17025:2005": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "White, Debra E.",
"/CreationDate": "D:20150206085454-05\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20150206085454-05\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Title": "383-4-XXX CR vxe",
"pdf_file_size_bytes": 228901,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 14
},
"st_filename": "383-4-317_ST_1.4.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"Diffie-Hellman": 2
}
},
"RSA": {
"RSA 1024": 1
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ACCESS": 3,
"A.ADMIN": 6,
"A.USER": 3
},
"D": {
"D.CONF": 7,
"D.DOC": 18,
"D.FUNC": 12,
"D.PROT": 5
},
"O": {
"O.AUDIT": 7,
"O.AUDIT_STORA": 1,
"O.AUDIT_STORAGE": 6,
"O.CONF": 16,
"O.DOC": 17,
"O.FUNC": 8,
"O.INTERFACE": 7,
"O.PROT": 8,
"O.SOFTWARE": 7,
"O.USER": 13
},
"OE": {
"OE.ADMIN": 6,
"OE.AUDIT": 3,
"OE.AUDIT_ACCESS": 3,
"OE.AUDIT_STORAGE": 3,
"OE.INTERFACE": 3,
"OE.PHYISCAL": 1,
"OE.PHYSICAL": 2,
"OE.USER": 21
},
"T": {
"T.CONF": 6,
"T.DOC": 6,
"T.FUNC": 3,
"T.PROT": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 3,
"ADV_FSP.1": 2,
"ADV_FSP.2": 4,
"ADV_TDS.1": 4
},
"AGD": {
"AGD_OPE.1": 4,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.2": 2,
"ALC_CMS.2": 2,
"ALC_DEL.1": 2,
"ALC_FLR.3": 9
},
"ASE": {
"ASE_CCL.1": 2,
"ASE_ECD.1": 2,
"ASE_INT.1": 4,
"ASE_OBJ.2": 3,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_COV.1": 3,
"ATE_FUN.1": 3,
"ATE_IND.2": 2
},
"AVA": {
"AVA_VAN.2": 2
}
},
"cc_security_level": {
"EAL": {
"EAL2": 4,
"EAL2+": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 9,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 7,
"FAU_GEN.2.1": 1,
"FAU_STG.1": 9,
"FAU_STG.3": 1,
"FAU_STG.4": 7
},
"FCS": {
"FCS_CKM.1": 12,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 7,
"FCS_CKM.2.1": 1,
"FCS_CKM.4": 12,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 9,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC.1": 21,
"FDP_ACC.1.1": 2,
"FDP_ACF.1": 18,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 2,
"FDP_IFC": 1,
"FDP_IFC.1": 14,
"FDP_IFC.1.1": 1,
"FDP_IFF": 1,
"FDP_IFF.1": 10,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1,
"FDP_ITC.1": 6,
"FDP_ITC.2": 6,
"FDP_RIP.1": 6,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_ATD.1": 8,
"FIA_ATD.1.1": 1,
"FIA_UAU.1": 9,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.7": 7,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 18,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB.1": 7,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MSA.1": 17,
"FMT_MSA.1.1": 2,
"FMT_MSA.3": 21,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 2,
"FMT_MTD.1": 22,
"FMT_MTD.1.1": 4,
"FMT_SMF.1": 26,
"FMT_SMF.1.1": 2,
"FMT_SMR": 1,
"FMT_SMR.1": 29,
"FMT_SMR.1.1": 2,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FDI_EXP": 3,
"FPT_FDI_EXP.1": 11,
"FPT_FDI_EXP.1.1": 2,
"FPT_STM.1": 10,
"FPT_STM.1.1": 1,
"FPT_TST.1": 5,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTA": {
"FTA_SSL.3": 8,
"FTA_SSL.3.1": 1
},
"FTP": {
"FTP_ITC.1": 7,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TST.1": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 5
}
},
"crypto_protocol": {
"IPsec": {
"IPsec": 9
},
"SSH": {
"SSH": 2
},
"TLS": {
"TLS": {
"TLS": 20
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 3
},
"SHA2": {
"SHA-256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 1,
"FIPS 180-3": 2,
"FIPS 186-2": 4,
"FIPS 186-3": 1,
"FIPS 197": 1,
"FIPS 198": 1,
"FIPS 46-3": 1
},
"ISO": {
"ISO/IEC 15408": 2
},
"RFC": {
"RFC 2631": 2,
"RFC 4366": 1,
"RFC 5280": 1
},
"X509": {
"X.509": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 8
}
},
"DES": {
"3DES": {
"TDES": 2
},
"DES": {
"DES": 3
}
},
"constructions": {
"MAC": {
"HMAC": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Lachlan Turner",
"/CreationDate": "D:20150112102734-05\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20150112102734-05\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Subject": "Security Target",
"/Title": "Xerox Multi-Function Device Security Target",
"pdf_file_size_bytes": 1404927,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1051.pdf",
"http://www.xerox.com/information-security/product/enus.html"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 78
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-317%20CR%20v1.0e.pdf",
"scheme": "CA",
"security_level": {
"_type": "Set",
"elements": [
"EAL2+",
"ALC_FLR.3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-317_ST_1.4.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": true,
"convert_ok": false,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "98335e283876a023815c8a4134840115ffd180bfa1099bd72d3442cc3aafb284",
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ec51f6be80f1422704a3715de21950cd31afbc9297dc50e09354ec5fc2ed4bfe",
"txt_hash": "2f319f6e0617be6a0cd99a7f3ec921bf320a6cfc27fd45aa1b136e7888049732"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ac980d7de3db40ec13ee69a6633b47e8b62782d45acfb8a6d8fca74faae3bee6",
"txt_hash": "b7491bcf285308196fe5894d5601364d54896b3e8c6aa07fdefb4b9ef03ccaf3"
}
},
"status": "archived"
}