This page was not yet optimized for use on mobile devices.
Strong Customer Authentication for Apple Pay on Mac mini with M2 Pro and Magic keyboard with Touch ID running macOS Sonoma 14.4(macOS Sonoma 14.4 (build 23E214)) (ANSSI-CC-2024/42)
This certificate has known related CVEs, which means that
the certified
product might be vulnerable.
CSV information ?
Status | active |
---|---|
Valid from | 10.01.2025 |
Valid until | 10.01.2030 |
Scheme | 🇫🇷 FR |
Manufacturer | Apple Inc. |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | ADV_FSP.3, EAL2+, ALC_FLR.3 |
Heuristics summary ?
Certificate ?
Certification report ?
Security target ?
Heuristics ?
Extracted SARs
ADV_FSP.3, ALC_FLR.3CPE matches
Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-1999-0590 | HIGH | 10.0 | 10.0 | 01.06.2000 04:00 | ||
CVE-2001-0102 | HIGH | 7.2 | 10.0 | 12.02.2001 05:00 | ||
CVE-2024-1580 | HIGH | 8.8 | 5.9 | 19.02.2024 11:15 | ||
CVE-2024-23236 | MEDIUM | 5.5 | 3.6 | 14.05.2024 14:58 | ||
CVE-2024-23237 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-23251 | MEDIUM | 4.6 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-23282 | MEDIUM | 5.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27795 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27796 | HIGH | 7.8 | 5.9 | 14.05.2024 15:13 | ||
CVE-2024-27798 | HIGH | 7.8 | 5.9 | 14.05.2024 15:13 | ||
CVE-2024-27799 | LOW | 3.3 | 1.4 | 10.06.2024 21:15 | ||
CVE-2024-27800 | MEDIUM | 6.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27801 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27802 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27804 | MEDIUM | 5.5 | 3.6 | 14.05.2024 15:13 | ||
CVE-2024-27805 | MEDIUM | 5.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27806 | MEDIUM | 5.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27808 | HIGH | 8.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27810 | MEDIUM | 5.5 | 3.6 | 14.05.2024 15:13 | ||
CVE-2024-27811 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27813 | HIGH | 8.6 | 6.0 | 14.05.2024 15:13 | ||
CVE-2024-27815 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27816 | MEDIUM | 5.5 | 3.6 | 14.05.2024 15:13 | ||
CVE-2024-27817 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27818 | HIGH | 7.8 | 5.9 | 14.05.2024 15:13 | ||
CVE-2024-27820 | HIGH | 8.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27821 | MEDIUM | 4.7 | 3.6 | 14.05.2024 15:13 | ||
CVE-2024-27822 | HIGH | 7.8 | 5.9 | 14.05.2024 15:13 | ||
CVE-2024-27823 | MEDIUM | 5.9 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27824 | HIGH | 7.8 | 5.9 | 14.05.2024 15:13 | ||
CVE-2024-27825 | HIGH | 7.1 | 5.2 | 14.05.2024 15:13 | ||
CVE-2024-27826 | HIGH | 7.8 | 5.9 | 29.07.2024 23:15 | ||
CVE-2024-27827 | MEDIUM | 5.5 | 3.6 | 14.05.2024 15:13 | ||
CVE-2024-27829 | HIGH | 7.8 | 5.9 | 14.05.2024 15:13 | ||
CVE-2024-27830 | MEDIUM | 6.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27831 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27832 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27834 | MEDIUM | 5.5 | 3.6 | 14.05.2024 15:13 | ||
CVE-2024-27836 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27837 | LOW | 3.3 | 1.4 | 14.05.2024 15:13 | ||
CVE-2024-27838 | MEDIUM | 6.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27841 | MEDIUM | 5.5 | 3.6 | 14.05.2024 15:13 | ||
CVE-2024-27842 | HIGH | 7.8 | 5.9 | 14.05.2024 15:13 | ||
CVE-2024-27843 | HIGH | 7.8 | 5.9 | 14.05.2024 15:13 | ||
CVE-2024-27844 | MEDIUM | 5.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27847 | MEDIUM | 5.5 | 3.6 | 14.05.2024 15:13 | ||
CVE-2024-27848 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27849 | LOW | 3.3 | 1.4 | 28.10.2024 21:15 | ||
CVE-2024-27850 | MEDIUM | 6.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27851 | HIGH | 8.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27855 | HIGH | 8.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27857 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27858 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27860 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27861 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27862 | LOW | 2.4 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-27863 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27869 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27871 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27872 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27873 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27875 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27876 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27877 | MEDIUM | 6.1 | 4.2 | 29.07.2024 23:15 | ||
CVE-2024-27878 | MEDIUM | 6.7 | 5.9 | 29.07.2024 23:15 | ||
CVE-2024-27880 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27881 | MEDIUM | 5.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-27882 | MEDIUM | 4.4 | 2.5 | 29.07.2024 23:15 | ||
CVE-2024-27883 | MEDIUM | 4.4 | 2.5 | 29.07.2024 23:15 | ||
CVE-2024-27884 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27885 | MEDIUM | 6.3 | 4.0 | 10.06.2024 21:15 | ||
CVE-2024-40770 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40774 | HIGH | 7.1 | 5.2 | 29.07.2024 23:15 | ||
CVE-2024-40775 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40776 | MEDIUM | 4.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40777 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40778 | LOW | 3.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40779 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40780 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40781 | HIGH | 7.8 | 5.9 | 29.07.2024 23:15 | ||
CVE-2024-40782 | MEDIUM | 6.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40783 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40784 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40785 | MEDIUM | 6.1 | 2.7 | 29.07.2024 23:15 | ||
CVE-2024-40787 | HIGH | 7.1 | 5.2 | 29.07.2024 23:15 | ||
CVE-2024-40788 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40789 | MEDIUM | 6.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40791 | LOW | 3.3 | 1.4 | 17.09.2024 00:15 | ||
CVE-2024-40792 | LOW | 3.3 | 1.4 | 28.10.2024 21:15 | ||
CVE-2024-40793 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40794 | MEDIUM | 5.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40795 | LOW | 3.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40796 | MEDIUM | 5.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40797 | MEDIUM | 6.1 | 2.7 | 17.09.2024 00:15 | ||
CVE-2024-40798 | LOW | 3.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40799 | HIGH | 7.1 | 5.2 | 29.07.2024 23:15 | ||
CVE-2024-40800 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40801 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40802 | HIGH | 7.8 | 5.9 | 29.07.2024 23:15 | ||
CVE-2024-40803 | HIGH | 7.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40804 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40805 | HIGH | 7.1 | 5.2 | 29.07.2024 23:15 | ||
CVE-2024-40807 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40809 | HIGH | 7.8 | 5.9 | 29.07.2024 23:15 | ||
CVE-2024-40810 | MEDIUM | 5.5 | 3.6 | 24.10.2024 17:15 | ||
CVE-2024-40811 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40812 | HIGH | 7.8 | 5.9 | 29.07.2024 23:15 | ||
CVE-2024-40814 | HIGH | 7.1 | 5.2 | 29.07.2024 23:15 | ||
CVE-2024-40815 | HIGH | 7.5 | 5.9 | 29.07.2024 23:15 | ||
CVE-2024-40816 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40817 | MEDIUM | 6.1 | 2.7 | 29.07.2024 23:15 | ||
CVE-2024-40818 | MEDIUM | 4.6 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40821 | HIGH | 7.1 | 5.2 | 29.07.2024 23:15 | ||
CVE-2024-40822 | LOW | 2.4 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40823 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40824 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40825 | MEDIUM | 4.4 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40826 | MEDIUM | 6.1 | 4.2 | 17.09.2024 00:15 | ||
CVE-2024-40827 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40828 | HIGH | 7.8 | 5.9 | 29.07.2024 23:15 | ||
CVE-2024-40831 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40832 | LOW | 3.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40833 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40834 | MEDIUM | 4.4 | 2.5 | 29.07.2024 23:15 | ||
CVE-2024-40835 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40836 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40837 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40838 | LOW | 3.3 | 1.4 | 17.09.2024 00:15 | ||
CVE-2024-40841 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40842 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40843 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40844 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40845 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40846 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40847 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40848 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40850 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40855 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-40856 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40857 | MEDIUM | 6.1 | 2.7 | 17.09.2024 00:15 | ||
CVE-2024-40859 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40860 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40861 | HIGH | 7.8 | 5.9 | 17.09.2024 00:15 | ||
CVE-2024-40866 | MEDIUM | 6.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44122 | HIGH | 8.8 | 6.0 | 28.10.2024 21:15 | ||
CVE-2024-44123 | LOW | 2.3 | 1.4 | 28.10.2024 21:15 | ||
CVE-2024-44125 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44126 | HIGH | 7.8 | 5.9 | 28.10.2024 21:15 | ||
CVE-2024-44128 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44130 | MEDIUM | 4.4 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44131 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44132 | HIGH | 8.8 | 6.0 | 17.09.2024 00:15 | ||
CVE-2024-44133 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44134 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44135 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44137 | MEDIUM | 4.6 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44141 | MEDIUM | 6.8 | 5.9 | 24.10.2024 17:15 | ||
CVE-2024-44144 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44145 | MEDIUM | 6.1 | 5.2 | 28.10.2024 22:15 | ||
CVE-2024-44146 | CRITICAL | 10.0 | 6.0 | 17.09.2024 00:15 | ||
CVE-2024-44148 | CRITICAL | 10.0 | 6.0 | 17.09.2024 00:15 | ||
CVE-2024-44149 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44151 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44152 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44153 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44154 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44155 | MEDIUM | 6.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44156 | HIGH | 7.1 | 5.2 | 28.10.2024 21:15 | ||
CVE-2024-44158 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44159 | HIGH | 7.1 | 5.2 | 28.10.2024 21:15 | ||
CVE-2024-44160 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44161 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44163 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44164 | HIGH | 7.1 | 5.2 | 17.09.2024 00:15 | ||
CVE-2024-44165 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44166 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44167 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44168 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44169 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44170 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44174 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44175 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44176 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44177 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44178 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44181 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44182 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44183 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44184 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44185 | MEDIUM | 5.5 | 3.6 | 24.10.2024 17:15 | ||
CVE-2024-44186 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44187 | MEDIUM | 6.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44188 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44189 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44190 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44191 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44196 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44197 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44198 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44201 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-44203 | HIGH | 7.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44205 | MEDIUM | 5.5 | 3.6 | 24.10.2024 17:15 | ||
CVE-2024-44206 | CRITICAL | 9.3 | 4.7 | 24.10.2024 17:15 | ||
CVE-2024-44208 | HIGH | 7.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44213 | MEDIUM | 5.9 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44215 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44216 | MEDIUM | 5.5 | 3.6 | 28.10.2024 22:15 | ||
CVE-2024-44218 | HIGH | 7.8 | 5.9 | 28.10.2024 21:15 | ||
CVE-2024-44220 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-44222 | LOW | 3.3 | 1.4 | 28.10.2024 21:15 | ||
CVE-2024-44224 | HIGH | 7.8 | 5.9 | 12.12.2024 02:15 | ||
CVE-2024-44225 | HIGH | 7.8 | 5.9 | 12.12.2024 02:15 | ||
CVE-2024-44232 | MEDIUM | 5.5 | 3.6 | 01.11.2024 21:15 | ||
CVE-2024-44233 | MEDIUM | 5.5 | 3.6 | 01.11.2024 21:15 | ||
CVE-2024-44234 | MEDIUM | 5.5 | 3.6 | 01.11.2024 21:15 | ||
CVE-2024-44236 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44237 | MEDIUM | 5.5 | 3.6 | 28.10.2024 22:15 | ||
CVE-2024-44239 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44240 | MEDIUM | 5.5 | 3.6 | 28.10.2024 22:15 | ||
CVE-2024-44244 | MEDIUM | 4.3 | 1.4 | 28.10.2024 21:15 | ||
CVE-2024-44245 | HIGH | 7.1 | 5.2 | 12.12.2024 02:15 | ||
CVE-2024-44247 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44248 | MEDIUM | 6.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-44253 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44254 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44255 | HIGH | 7.8 | 5.9 | 28.10.2024 21:15 | ||
CVE-2024-44256 | HIGH | 8.6 | 6.0 | 28.10.2024 22:15 | ||
CVE-2024-44257 | MEDIUM | 5.5 | 3.6 | 28.10.2024 22:15 | ||
CVE-2024-44260 | MEDIUM | 4.4 | 3.6 | 28.10.2024 22:15 | ||
CVE-2024-44264 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44265 | LOW | 2.4 | 1.4 | 28.10.2024 21:15 | ||
CVE-2024-44267 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44269 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44270 | HIGH | 8.6 | 4.0 | 28.10.2024 21:15 | ||
CVE-2024-44273 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44275 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44278 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44279 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44280 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44281 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44282 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44283 | MEDIUM | 5.5 | 3.6 | 28.10.2024 22:15 | ||
CVE-2024-44284 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44287 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44289 | HIGH | 7.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44291 | HIGH | 7.8 | 5.9 | 12.12.2024 02:15 | ||
CVE-2024-44294 | MEDIUM | 6.5 | 5.2 | 28.10.2024 21:15 | ||
CVE-2024-44295 | MEDIUM | 5.5 | 3.6 | 28.10.2024 22:15 | ||
CVE-2024-44296 | MEDIUM | 5.4 | 2.5 | 28.10.2024 21:15 | ||
CVE-2024-44297 | MEDIUM | 6.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44300 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-44301 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44302 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44306 | HIGH | 7.8 | 5.9 | 20.11.2024 00:15 | ||
CVE-2024-44307 | HIGH | 7.8 | 5.9 | 20.11.2024 00:15 | ||
CVE-2024-44308 | HIGH | 8.8 | 5.9 | 20.11.2024 00:15 | ||
CVE-2024-4558 | CRITICAL | 9.6 | 6.0 | 07.05.2024 19:15 | ||
CVE-2024-54465 | CRITICAL | 9.8 | 5.9 | 12.12.2024 02:15 | ||
CVE-2024-54466 | MEDIUM | 5.3 | 1.4 | 12.12.2024 02:15 | ||
CVE-2024-54471 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54474 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54476 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54477 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54479 | HIGH | 7.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54484 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54486 | MEDIUM | 6.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54489 | HIGH | 7.8 | 5.9 | 12.12.2024 02:15 | ||
CVE-2024-54490 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54491 | LOW | 3.3 | 1.4 | 12.12.2024 02:15 | ||
CVE-2024-54492 | MEDIUM | 5.9 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54493 | LOW | 3.3 | 1.4 | 12.12.2024 02:15 | ||
CVE-2024-54494 | MEDIUM | 5.9 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54495 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54498 | HIGH | 8.8 | 6.0 | 12.12.2024 02:15 | ||
CVE-2024-54500 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54501 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54504 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54505 | HIGH | 8.8 | 5.9 | 12.12.2024 02:15 | ||
CVE-2024-54506 | CRITICAL | 9.8 | 5.9 | 12.12.2024 02:15 | ||
CVE-2024-54508 | HIGH | 7.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54510 | MEDIUM | 5.1 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54513 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54514 | HIGH | 8.6 | 6.0 | 12.12.2024 02:15 | ||
CVE-2024-54515 | HIGH | 7.8 | 5.9 | 12.12.2024 02:15 | ||
CVE-2024-54526 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54527 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54528 | HIGH | 7.1 | 5.2 | 12.12.2024 02:15 | ||
CVE-2024-54529 | HIGH | 7.8 | 5.9 | 12.12.2024 02:15 | ||
CVE-2024-54531 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54534 | CRITICAL | 9.8 | 5.9 | 12.12.2024 02:15 | ||
CVE-2024-54538 | HIGH | 7.5 | 3.6 | 20.12.2024 01:15 |
Showing 5 out of 291.
Similar certificates
Showing 5 out of 19.
Scheme data ?
Product | Strong Customer Authentication for Apple Pay on Mac mini with M2 Pro and Magic keyboard with Touch ID running macOS Sonoma 14.4 (macOS Sonoma 14.4 (build 23E214)) | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-mac-mini-m2-pro-and-magic-keyboard | |
Description | Le produit évalué est « Strong Customer Authentication for Apple Pay on Mac mini with M2 Pro and Magic keyboard with Touch ID running macOS Sonoma 14.4, macOS Sonoma 14.4 (build 23E214) » développé par APPLE INC. | |
Sponsor | APPLE INC. | |
Developer | APPLE INC. | |
Cert Id | ANSSI-CC-2024/42 | |
Level | EAL2+ | |
Expiration Date | 10.01.2030 | |
Enhanced | ||
Cert Id | ANSSI-CC-2024/42 | |
Certification Date | 10.01.2025 | |
Expiration Date | 10.01.2030 | |
Category | Divers | |
Cc Version | Critères Communs CC:2022 révision 1 | |
Developer | APPLE INC. | |
Sponsor | APPLE INC. | |
Evaluation Facility | THALES / CNES | |
Level | EAL2+ | |
Protection Profile | ||
Mutual Recognition | CCRA SOG-IS | |
Augmented | ADV_FSP.3, ALC_FLR.3 | |
Cert Link | https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2024_42en.pdf | |
Report Link | https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_42en.pdf |
References ?
No references are available for this certificate as its ID was not successfully extracted.
Updates ?
-
27.01.2025 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Strong Customer Authentication for Apple Pay on Mac mini with M2 Pro and Magic keyboard with Touch ID running macOS Sonoma 14.4(macOS Sonoma 14.4 (build 23E214)) (ANSSI-CC-2024/42) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2024_42fr.pdf",
"dgst": "326d25d021069416",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": null,
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:apple:macos:14.4:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"14.4"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2024-27842",
"CVE-2024-44287",
"CVE-2024-54513",
"CVE-2024-44203",
"CVE-2024-44222",
"CVE-2024-40807",
"CVE-2024-44283",
"CVE-2024-27838",
"CVE-2024-44254",
"CVE-2024-44302",
"CVE-2024-44232",
"CVE-2024-54528",
"CVE-2024-40831",
"CVE-2001-0102",
"CVE-2024-40777",
"CVE-2024-54506",
"CVE-2024-27801",
"CVE-2024-40783",
"CVE-2024-27848",
"CVE-2024-44168",
"CVE-2024-40795",
"CVE-2024-44270",
"CVE-2024-44137",
"CVE-2024-27844",
"CVE-2024-40812",
"CVE-2024-40836",
"CVE-2024-44244",
"CVE-2024-44297",
"CVE-2024-54484",
"CVE-2024-40834",
"CVE-2024-40848",
"CVE-2024-54477",
"CVE-2024-44307",
"CVE-2024-44151",
"CVE-2024-40861",
"CVE-2024-40803",
"CVE-2024-54474",
"CVE-2024-44282",
"CVE-2024-44123",
"CVE-2024-44156",
"CVE-2024-44144",
"CVE-2024-54498",
"CVE-2024-54515",
"CVE-2024-44225",
"CVE-2024-40856",
"CVE-2024-27811",
"CVE-2024-44257",
"CVE-2024-44191",
"CVE-2024-54465",
"CVE-2024-44278",
"CVE-2024-44269",
"CVE-2024-44215",
"CVE-2024-44256",
"CVE-2024-27862",
"CVE-2024-27822",
"CVE-2024-27836",
"CVE-2024-27849",
"CVE-2024-40809",
"CVE-2024-40815",
"CVE-2024-27877",
"CVE-2024-44181",
"CVE-2024-40775",
"CVE-2024-44197",
"CVE-2024-44208",
"CVE-2024-54494",
"CVE-2024-44216",
"CVE-2024-40843",
"CVE-2024-40778",
"CVE-2024-27843",
"CVE-2024-44170",
"CVE-2024-54504",
"CVE-2024-44130",
"CVE-2024-40814",
"CVE-2024-44236",
"CVE-2024-44218",
"CVE-2024-40837",
"CVE-2024-54514",
"CVE-2024-40792",
"CVE-2024-27795",
"CVE-2024-44213",
"CVE-2024-27802",
"CVE-2024-23236",
"CVE-2024-27827",
"CVE-2024-27798",
"CVE-2024-23251",
"CVE-2024-54510",
"CVE-2024-40779",
"CVE-2024-27855",
"CVE-2024-27871",
"CVE-2024-40860",
"CVE-2024-40824",
"CVE-2024-27885",
"CVE-2024-27821",
"CVE-2024-44308",
"CVE-2024-27834",
"CVE-2024-40811",
"CVE-2024-27878",
"CVE-2024-27832",
"CVE-2024-40857",
"CVE-2024-44295",
"CVE-2024-44306",
"CVE-2024-27863",
"CVE-2024-40823",
"CVE-2024-27872",
"CVE-2024-54508",
"CVE-2024-54526",
"CVE-2024-27883",
"CVE-2024-27820",
"CVE-2024-27830",
"CVE-2024-40818",
"CVE-2024-40844",
"CVE-2024-44141",
"CVE-2024-27806",
"CVE-2024-44182",
"CVE-2024-44301",
"CVE-2024-27804",
"CVE-2024-27818",
"CVE-2024-27813",
"CVE-2024-40832",
"CVE-2024-27805",
"CVE-2024-40797",
"CVE-2024-44296",
"CVE-2024-44196",
"CVE-2024-54489",
"CVE-2024-40817",
"CVE-2024-27857",
"CVE-2024-44161",
"CVE-2024-40798",
"CVE-2024-44237",
"CVE-2024-40799",
"CVE-2024-40845",
"CVE-2024-40816",
"CVE-2024-44253",
"CVE-2024-40850",
"CVE-2024-27796",
"CVE-2024-44294",
"CVE-2024-27847",
"CVE-2024-1580",
"CVE-2024-40842",
"CVE-2024-44220",
"CVE-2024-44275",
"CVE-2024-40788",
"CVE-2024-27861",
"CVE-2024-44163",
"CVE-2024-44178",
"CVE-2024-40846",
"CVE-2024-44264",
"CVE-2024-54466",
"CVE-1999-0590",
"CVE-2024-44239",
"CVE-2024-40847",
"CVE-2024-44224",
"CVE-2024-40838",
"CVE-2024-40833",
"CVE-2024-27881",
"CVE-2024-40785",
"CVE-2024-54529",
"CVE-2024-44177",
"CVE-2024-44145",
"CVE-2024-54500",
"CVE-2024-44284",
"CVE-2024-40866",
"CVE-2024-44267",
"CVE-2024-40805",
"CVE-2024-44234",
"CVE-2024-44125",
"CVE-2024-54486",
"CVE-2024-40780",
"CVE-2024-40827",
"CVE-2024-44133",
"CVE-2024-44166",
"CVE-2024-27882",
"CVE-2024-40784",
"CVE-2024-54534",
"CVE-2024-40794",
"CVE-2024-44205",
"CVE-2024-44183",
"CVE-2024-44176",
"CVE-2024-27817",
"CVE-2024-54491",
"CVE-2024-27850",
"CVE-2024-23282",
"CVE-2024-27860",
"CVE-2024-44187",
"CVE-2024-27799",
"CVE-2024-27800",
"CVE-2024-44289",
"CVE-2024-44265",
"CVE-2024-27851",
"CVE-2024-44165",
"CVE-2024-44206",
"CVE-2024-40821",
"CVE-2024-44247",
"CVE-2024-44233",
"CVE-2024-54471",
"CVE-2024-44273",
"CVE-2024-44149",
"CVE-2024-44201",
"CVE-2024-54490",
"CVE-2024-44131",
"CVE-2024-27884",
"CVE-2024-44190",
"CVE-2024-44198",
"CVE-2024-44153",
"CVE-2024-54538",
"CVE-2024-44169",
"CVE-2024-40804",
"CVE-2024-44281",
"CVE-2024-44245",
"CVE-2024-54501",
"CVE-2024-27880",
"CVE-2024-44175",
"CVE-2024-44280",
"CVE-2024-27825",
"CVE-2024-54531",
"CVE-2024-27873",
"CVE-2024-44255",
"CVE-2024-27810",
"CVE-2024-44184",
"CVE-2024-40810",
"CVE-2024-27808",
"CVE-2024-54476",
"CVE-2024-40826",
"CVE-2024-54493",
"CVE-2024-27816",
"CVE-2024-44158",
"CVE-2024-40770",
"CVE-2024-44186",
"CVE-2024-27815",
"CVE-2024-40796",
"CVE-2024-54505",
"CVE-2024-40787",
"CVE-2024-27831",
"CVE-2024-44154",
"CVE-2024-27869",
"CVE-2024-40793",
"CVE-2024-44126",
"CVE-2024-44167",
"CVE-2024-44174",
"CVE-2024-40859",
"CVE-2024-40789",
"CVE-2024-40801",
"CVE-2024-40782",
"CVE-2024-44148",
"CVE-2024-44160",
"CVE-2024-27824",
"CVE-2024-27876",
"CVE-2024-40776",
"CVE-2024-44134",
"CVE-2024-44146",
"CVE-2024-40791",
"CVE-2024-40822",
"CVE-2024-27841",
"CVE-2024-54527",
"CVE-2024-44279",
"CVE-2024-40774",
"CVE-2024-44300",
"CVE-2024-40828",
"CVE-2024-54479",
"CVE-2024-40855",
"CVE-2024-44122",
"CVE-2024-40835",
"CVE-2024-44132",
"CVE-2024-27837",
"CVE-2024-44189",
"CVE-2024-27826",
"CVE-2024-40841",
"CVE-2024-44248",
"CVE-2024-44164",
"CVE-2024-44128",
"CVE-2024-4558",
"CVE-2024-44155",
"CVE-2024-44188",
"CVE-2024-23237",
"CVE-2024-54492",
"CVE-2024-44135",
"CVE-2024-27875",
"CVE-2024-44260",
"CVE-2024-44240",
"CVE-2024-44159",
"CVE-2024-44152",
"CVE-2024-40825",
"CVE-2024-40781",
"CVE-2024-27829",
"CVE-2024-54495",
"CVE-2024-44185",
"CVE-2024-27823",
"CVE-2024-40800",
"CVE-2024-44291",
"CVE-2024-40802",
"CVE-2024-27858"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "ANSSI-CC-2024/42",
"description": "Le produit \u00e9valu\u00e9 est \u00ab Strong Customer Authentication for Apple Pay on Mac mini with M2 Pro and Magic keyboard with Touch ID running macOS Sonoma 14.4, macOS Sonoma 14.4 (build 23E214) \u00bb d\u00e9velopp\u00e9 par APPLE INC.",
"developer": "APPLE INC.",
"enhanced": {
"augmented": "ADV_FSP.3, ALC_FLR.3",
"category": "Divers",
"cc_version": "Crit\u00e8res Communs CC:2022 r\u00e9vision 1",
"cert_id": "ANSSI-CC-2024/42",
"cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2024_42en.pdf",
"certification_date": "2025-01-10",
"developer": "APPLE INC.",
"evaluation_facility": "THALES / CNES",
"expiration_date": "2030-01-10",
"level": "EAL2+",
"mutual_recognition": "CCRA SOG-IS",
"protection_profile": "",
"report_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_42en.pdf",
"sponsor": "APPLE INC."
},
"expiration_date": "2030-01-10",
"level": "EAL2+",
"product": "Strong Customer Authentication for Apple Pay on Mac mini with M2 Pro and Magic keyboard with Touch ID running macOS Sonoma 14.4 (macOS Sonoma 14.4 (build 23E214))",
"sponsor": "APPLE INC.",
"url": "https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-mac-mini-m2-pro-and-magic-keyboard"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Apple Inc.",
"manufacturer_web": "https://www.apple.com/",
"name": "Strong Customer Authentication for Apple Pay on Mac mini with M2 Pro and Magic keyboard with Touch ID running macOS Sonoma 14.4(macOS Sonoma 14.4 (build 23E214)) (ANSSI-CC-2024/42)",
"not_valid_after": "2030-01-10",
"not_valid_before": "2025-01-10",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": null,
"report_frontpage": null,
"report_keywords": null,
"report_metadata": null,
"st_filename": null,
"st_frontpage": null,
"st_keywords": null,
"st_metadata": null
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_42fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL2+",
"ALC_FLR.3",
"ADV_FSP.3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-Cible-2024_42en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
}
},
"status": "active"
}