This page was not yet optimized for use on mobile devices.
EMC VPLEX with GeoSynchrony version 5.0
This certificate has known related CVEs, which means that
the certified
product might be vulnerable.
CSV information ?
Status | archived |
---|---|
Valid from | 09.01.2012 |
Valid until | 15.05.2017 |
Scheme | 🇨🇦 CA |
Manufacturer | EMC Corporation |
Category | Other Devices and Systems |
Security level | EAL2+, ALC_FLR.2 |
Heuristics summary ?
Certificate ID: 383-4-200
Certificate ?
Certification report ?
Extracted keywords
Security level
EAL 2+, EAL 2, EAL2+, EAL 2 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.2Certificates
383-4-200-CREvaluation facilities
EWA-CanadaStandards
ISO/IEC 17025:2005File metadata
Title | EAL 2 Evaluation of <TOE name and version> |
---|---|
Author | User |
Creation date | D:20120110175239-05'00' |
Modification date | D:20120110175254-05'00' |
Pages | 12 |
Creator | Acrobat PDFMaker 6.0 for Word |
Producer | Acrobat Distiller 6.0 (Windows) |
Frontpage
Certificate ID | 383-4-200-CR |
---|---|
Certification lab | CANADA |
Security target ?
Extracted keywords
Protocols
SSH, TLS, VPNSecurity level
EAL2+, EAL2, EAL2 augmentedClaims
O.AUDIT, O.FAIL_PRO, O.ADMIN, O.AUTHENTICATE, O.STOR_ACC, O.STRONG_PWD, O.INACTIVE, O.TIMESTAMP, O.CONSISTENCY, O.ADMIN_ROLES, T.IA, T.IMPROPER_CONFIG, T.UNAUTH, T.DATA_AVAILABILITY, T.NO_AUDIT, A.PHYSICAL, A.CONNECTIVITY, A.TIMESTAMP, A.SECURE_CONFIG, A.MANAGE, A.NOEVIL, A.SECURE_CONNECT, OE.SECURE_SERVERS, OE.AUTH_HOSTS, OE.NTP, OE.TRAFFIC, OE.SECURE_COMMUNICATION, OE.SECURE_REMOTE, OE.MANAGE, OE.PHYSICAL, OE.NOEVIL, OE.SECURE_COMMUNICATIO, OE.SECURE_COMMUNISecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_STG.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.2, FIA_UAU.7, FIA_UID.2, FIA_UID.1, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1, FIA_UAU.2.1, FIA_UAU.7.1, FIA_UID.2.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.2.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_TRC, FPT_TRC.1, FPT_RTC.1.1, FPT_RTC.1.2, FPT_ITC.1, FPT_FLS.1, FPT_STM.1, FPT_FLS.1.1, FPT_STM.1.1, FTA_SSL.1, FTA_SSL.1.1, FTA_SSL.1.2File metadata
Title | Security Target |
---|---|
Subject | VPLEX with GeoSynchrony 5.0 |
Author | Amy Nicewick |
Creation date | D:20120104083234 |
Modification date | D:20120104083234 |
Pages | 50 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
Heuristics ?
Certificate ID: 383-4-200
Extracted SARs
ASE_CCL.1, AGD_PRE.1, ASE_REQ.2, ASE_TSS.1, ATE_COV.1, ATE_IND.2, ADV_FSP.2, ASE_ECD.1, ALC_CMS.2, ASE_SPD.1, ALC_DEL.1, ALC_FLR.2, ADV_TDS.1, ASE_INT.1, ALC_CMC.2, ATE_FUN.1, ASE_OBJ.2, AVA_VAN.2, ADV_ARC.1, AGD_OPE.1Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-2014-0632 | HIGH | 9.0 | 10.0 | 01.04.2014 06:28 | ||
CVE-2014-0633 | HIGH | 7.7 | 10.0 | 01.04.2014 06:28 | ||
CVE-2014-0634 | MEDIUM | 6.0 | 6.4 | 01.04.2014 06:28 | ||
CVE-2014-0635 | HIGH | 7.5 | 8.5 | 01.04.2014 06:28 |
References ?
No references are available for this certificate.
Updates ?
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name EMC VPLEX with GeoSynchrony version 5.0 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": null,
"dgst": "a11a37f5ef51dae0",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "383-4-200",
"cert_lab": [
"CANADA"
],
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:a:emc:vplex_geosynchrony:5.0:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"5.0"
]
},
"indirect_transitive_cves": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2014-0635",
"CVE-2014-0632",
"CVE-2014-0633",
"CVE-2014-0634"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "EMC Corporation",
"manufacturer_web": "https://www.emc.com/",
"name": "EMC VPLEX with GeoSynchrony version 5.0",
"not_valid_after": "2017-05-15",
"not_valid_before": "2012-01-09",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "383-4-200_CRv1.0.pdf",
"report_frontpage": {
"CA": {
"cert_id": "383-4-200-CR",
"cert_lab": "CANADA"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"CA": {
"383-4-200-CR": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 4,
"EAL 2 augmented": 2,
"EAL 2+": 2,
"EAL2+": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"EWA": {
"EWA-Canada": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 17025:2005": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "User",
"/CCEF": "EWA-Canada",
"/CR date": "9 January 2012",
"/CR version": "1.0",
"/Certificate date": "9 January 2012",
"/Company": "Microsoft",
"/CreationDate": "D:20120110175239-05\u002700\u0027",
"/Creator": "Acrobat PDFMaker 6.0 for Word",
"/Developer name": "EMC Corporation",
"/Document number": "383-4-200-CR",
"/ETR title, version, date": "Evaluation Technical Report for EAL2+ Common Criteria Evaluation of EMC Corporation VPLEX with GeoSynchrony 5.0, Version 1.0, 9 December 2011",
"/Evaluation completion date": "9 December 2011",
"/ModDate": "D:20120110175254-05\u002700\u0027",
"/Producer": "Acrobat Distiller 6.0 (Windows)",
"/ST Title": "EMC Corporation VPLEX with GeoSynchrony 5.0 Security Target",
"/ST date": "6 December 2011",
"/ST version": "0.6",
"/SourceModified": "D:20120110225221",
"/Sponsor": "EMC Corporation",
"/TOE Version": "5.0",
"/TOE name and version": "EMC VPLEX with GeoSynchrony version 5.0",
"/TOE short name": "VPLEX",
"/Title": "EAL 2 Evaluation of \u003cTOE name and version\u003e",
"pdf_file_size_bytes": 93419,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 12
},
"st_filename": "EMC VPLEX with GeoSynchrony 5.0 ST v0.6.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONNECTIVITY": 2,
"A.MANAGE": 2,
"A.NOEVIL": 2,
"A.PHYSICAL": 2,
"A.SECURE_CONFIG": 2,
"A.SECURE_CONNECT": 2,
"A.TIMESTAMP": 2
},
"O": {
"O.ADMIN": 10,
"O.ADMIN_ROLES": 9,
"O.AUDIT": 8,
"O.AUTHENTICATE": 8,
"O.CONSISTENCY": 5,
"O.FAIL_PRO": 4,
"O.INACTIVE": 5,
"O.STOR_ACC": 7,
"O.STRONG_PWD": 6,
"O.TIMESTAMP": 5
},
"OE": {
"OE.AUTH_HOSTS": 3,
"OE.MANAGE": 3,
"OE.NOEVIL": 3,
"OE.NTP": 3,
"OE.PHYSICAL": 2,
"OE.SECURE_COMMUNI": 1,
"OE.SECURE_COMMUNICATIO": 2,
"OE.SECURE_COMMUNICATION": 1,
"OE.SECURE_REMOTE": 3,
"OE.SECURE_SERVERS": 3,
"OE.TRAFFIC": 3
},
"T": {
"T.DATA_AVAILABILITY": 2,
"T.IA": 2,
"T.IMPROPER_CONFIG": 2,
"T.NO_AUDIT": 2,
"T.UNAUTH": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1,
"ALC_FLR.2": 4
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 3,
"EAL2 augmented": 1,
"EAL2+": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 12,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 6,
"FAU_GEN.2.1": 1,
"FAU_SAR.1": 6,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_STG.1": 6,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1
},
"FDP": {
"FDP_ACC.1": 12,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 8,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 2
},
"FIA": {
"FIA_ATD.1": 6,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 6,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 8,
"FIA_UAU.2": 8,
"FIA_UAU.2.1": 1,
"FIA_UAU.7": 6,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 12,
"FIA_UID.2": 9,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF.1": 6,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 8,
"FMT_MSA.1.1": 1,
"FMT_MSA.2": 6,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 4,
"FMT_MTD.1": 6,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 11,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 12,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 6,
"FPT_FLS.1.1": 1,
"FPT_ITC.1": 4,
"FPT_RTC.1.1": 2,
"FPT_RTC.1.2": 2,
"FPT_STM.1": 8,
"FPT_STM.1.1": 1,
"FPT_TRC": 1,
"FPT_TRC.1": 1
},
"FTA": {
"FTA_SSL.1": 6,
"FTA_SSL.1.1": 1,
"FTA_SSL.1.2": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 5
},
"TLS": {
"TLS": {
"TLS": 1
}
},
"VPN": {
"VPN": 11
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Amy Nicewick",
"/CreationDate": "D:20120104083234",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20120104083234",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Subject": "VPLEX with GeoSynchrony 5.0",
"/Title": "Security Target",
"pdf_file_size_bytes": 1127518,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:info@corsec.com",
"mailto:info@emc.com",
"http://www.corsec.com/",
"http://www.emc.com/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 50
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/383-4-200_CRv1.0.pdf",
"scheme": "CA",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.2",
"EAL2+"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/EMC%20VPLEX%20with%20GeoSynchrony%205.0%20ST%20v0.6.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "342b6beee88eecb8fe674b0c20d676dffb1760fb5d28e987e53c42ce2b89335a",
"txt_hash": "cbff3618ba9537384d088ce4abf16324c1f4a1096c6a2913d404488988a3be43"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "feb06c1079daa6a8639e17c4bb7bc63bbae97b60e14163efdebaec83e3378563",
"txt_hash": "f9959acdd4eda5972963857f8b12a1d6f549842463834381173300b37f95dde0"
}
},
"status": "archived"
}