Strong Customer Authentication for Apple Pay on Mac mini with M2 Pro and Magic keyboard with Touch ID running macOS Sonoma 14.4(macOS Sonoma 14.4 (build 23E214)) (ANSSI-CC-2024/42)

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status active
Valid from 10.01.2025
Valid until 10.01.2030
Scheme 🇫🇷 FR
Manufacturer Apple Inc.
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ADV_FSP.3, EAL2+, ALC_FLR.3

Heuristics summary ?

Certificate ?

Certification report ?

Security target ?

Heuristics ?

Extracted SARs

ADV_FSP.3, ALC_FLR.3

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-1999-0590
C M N
HIGH 10.0 10.0 01.06.2000 04:00
CVE-2001-0102
C M N
HIGH 7.2 10.0 12.02.2001 05:00
CVE-2024-1580
C M N
HIGH 8.8 5.9 19.02.2024 11:15
CVE-2024-23236
C M N
MEDIUM 5.5 3.6 14.05.2024 14:58
CVE-2024-23237
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-23251
C M N
MEDIUM 4.6 3.6 10.06.2024 21:15
CVE-2024-23282
C M N
MEDIUM 5.5 3.6 10.06.2024 21:15
CVE-2024-27795
C M N
HIGH 7.5 3.6 17.09.2024 00:15
CVE-2024-27796
C M N
HIGH 7.8 5.9 14.05.2024 15:13
CVE-2024-27798
C M N
HIGH 7.8 5.9 14.05.2024 15:13
CVE-2024-27799
C M N
LOW 3.3 1.4 10.06.2024 21:15
CVE-2024-27800
C M N
MEDIUM 6.5 3.6 10.06.2024 21:15
CVE-2024-27801
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27802
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27804
C M N
MEDIUM 5.5 3.6 14.05.2024 15:13
CVE-2024-27805
C M N
MEDIUM 5.5 3.6 10.06.2024 21:15
CVE-2024-27806
C M N
MEDIUM 5.5 3.6 10.06.2024 21:15
CVE-2024-27808
C M N
HIGH 8.8 5.9 10.06.2024 21:15
CVE-2024-27810
C M N
MEDIUM 5.5 3.6 14.05.2024 15:13
CVE-2024-27811
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27813
C M N
HIGH 8.6 6.0 14.05.2024 15:13
CVE-2024-27815
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27816
C M N
MEDIUM 5.5 3.6 14.05.2024 15:13
CVE-2024-27817
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27818
C M N
HIGH 7.8 5.9 14.05.2024 15:13
CVE-2024-27820
C M N
HIGH 8.8 5.9 10.06.2024 21:15
CVE-2024-27821
C M N
MEDIUM 4.7 3.6 14.05.2024 15:13
CVE-2024-27822
C M N
HIGH 7.8 5.9 14.05.2024 15:13
CVE-2024-27823
C M N
MEDIUM 5.9 3.6 29.07.2024 23:15
CVE-2024-27824
C M N
HIGH 7.8 5.9 14.05.2024 15:13
CVE-2024-27825
C M N
HIGH 7.1 5.2 14.05.2024 15:13
CVE-2024-27826
C M N
HIGH 7.8 5.9 29.07.2024 23:15
CVE-2024-27827
C M N
MEDIUM 5.5 3.6 14.05.2024 15:13
CVE-2024-27829
C M N
HIGH 7.8 5.9 14.05.2024 15:13
CVE-2024-27830
C M N
MEDIUM 6.5 3.6 10.06.2024 21:15
CVE-2024-27831
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27832
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27834
C M N
MEDIUM 5.5 3.6 14.05.2024 15:13
CVE-2024-27836
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27837
C M N
LOW 3.3 1.4 14.05.2024 15:13
CVE-2024-27838
C M N
MEDIUM 6.5 3.6 10.06.2024 21:15
CVE-2024-27841
C M N
MEDIUM 5.5 3.6 14.05.2024 15:13
CVE-2024-27842
C M N
HIGH 7.8 5.9 14.05.2024 15:13
CVE-2024-27843
C M N
HIGH 7.8 5.9 14.05.2024 15:13
CVE-2024-27844
C M N
MEDIUM 5.5 3.6 10.06.2024 21:15
CVE-2024-27847
C M N
MEDIUM 5.5 3.6 14.05.2024 15:13
CVE-2024-27848
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27849
C M N
LOW 3.3 1.4 28.10.2024 21:15
CVE-2024-27850
C M N
MEDIUM 6.5 3.6 10.06.2024 21:15
CVE-2024-27851
C M N
HIGH 8.8 5.9 10.06.2024 21:15
CVE-2024-27855
C M N
HIGH 8.8 5.9 10.06.2024 21:15
CVE-2024-27857
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27858
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-27860
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-27861
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-27862
C M N
LOW 2.4 1.4 29.07.2024 23:15
CVE-2024-27863
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-27869
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-27871
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-27872
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-27873
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-27875
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-27876
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-27877
C M N
MEDIUM 6.1 4.2 29.07.2024 23:15
CVE-2024-27878
C M N
MEDIUM 6.7 5.9 29.07.2024 23:15
CVE-2024-27880
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-27881
C M N
MEDIUM 5.3 1.4 29.07.2024 23:15
CVE-2024-27882
C M N
MEDIUM 4.4 2.5 29.07.2024 23:15
CVE-2024-27883
C M N
MEDIUM 4.4 2.5 29.07.2024 23:15
CVE-2024-27884
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-27885
C M N
MEDIUM 6.3 4.0 10.06.2024 21:15
CVE-2024-40770
C M N
HIGH 7.5 3.6 17.09.2024 00:15
CVE-2024-40774
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40775
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40776
C M N
MEDIUM 4.3 1.4 29.07.2024 23:15
CVE-2024-40777
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40778
C M N
LOW 3.3 1.4 29.07.2024 23:15
CVE-2024-40779
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40780
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40781
C M N
HIGH 7.8 5.9 29.07.2024 23:15
CVE-2024-40782
C M N
MEDIUM 6.5 3.6 29.07.2024 23:15
CVE-2024-40783
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40784
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40785
C M N
MEDIUM 6.1 2.7 29.07.2024 23:15
CVE-2024-40787
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40788
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40789
C M N
MEDIUM 6.5 3.6 29.07.2024 23:15
CVE-2024-40791
C M N
LOW 3.3 1.4 17.09.2024 00:15
CVE-2024-40792
C M N
LOW 3.3 1.4 28.10.2024 21:15
CVE-2024-40793
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40794
C M N
MEDIUM 5.3 1.4 29.07.2024 23:15
CVE-2024-40795
C M N
LOW 3.3 1.4 29.07.2024 23:15
CVE-2024-40796
C M N
MEDIUM 5.3 1.4 29.07.2024 23:15
CVE-2024-40797
C M N
MEDIUM 6.1 2.7 17.09.2024 00:15
CVE-2024-40798
C M N
LOW 3.3 1.4 29.07.2024 23:15
CVE-2024-40799
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40800
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40801
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40802
C M N
HIGH 7.8 5.9 29.07.2024 23:15
CVE-2024-40803
C M N
HIGH 7.5 3.6 29.07.2024 23:15
CVE-2024-40804
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40805
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40807
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40809
C M N
HIGH 7.8 5.9 29.07.2024 23:15
CVE-2024-40810
C M N
MEDIUM 5.5 3.6 24.10.2024 17:15
CVE-2024-40811
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40812
C M N
HIGH 7.8 5.9 29.07.2024 23:15
CVE-2024-40814
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40815
C M N
HIGH 7.5 5.9 29.07.2024 23:15
CVE-2024-40816
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40817
C M N
MEDIUM 6.1 2.7 29.07.2024 23:15
CVE-2024-40818
C M N
MEDIUM 4.6 3.6 29.07.2024 23:15
CVE-2024-40821
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40822
C M N
LOW 2.4 1.4 29.07.2024 23:15
CVE-2024-40823
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40824
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40825
C M N
MEDIUM 4.4 3.6 17.09.2024 00:15
CVE-2024-40826
C M N
MEDIUM 6.1 4.2 17.09.2024 00:15
CVE-2024-40827
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40828
C M N
HIGH 7.8 5.9 29.07.2024 23:15
CVE-2024-40831
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40832
C M N
LOW 3.3 1.4 29.07.2024 23:15
CVE-2024-40833
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40834
C M N
MEDIUM 4.4 2.5 29.07.2024 23:15
CVE-2024-40835
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40836
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40837
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40838
C M N
LOW 3.3 1.4 17.09.2024 00:15
CVE-2024-40841
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40842
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40843
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40844
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40845
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40846
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40847
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40848
C M N
HIGH 7.5 3.6 17.09.2024 00:15
CVE-2024-40850
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40855
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-40856
C M N
HIGH 7.5 3.6 17.09.2024 00:15
CVE-2024-40857
C M N
MEDIUM 6.1 2.7 17.09.2024 00:15
CVE-2024-40859
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40860
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40861
C M N
HIGH 7.8 5.9 17.09.2024 00:15
CVE-2024-40866
C M N
MEDIUM 6.5 3.6 17.09.2024 00:15
CVE-2024-44122
C M N
HIGH 8.8 6.0 28.10.2024 21:15
CVE-2024-44123
C M N
LOW 2.3 1.4 28.10.2024 21:15
CVE-2024-44125
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44126
C M N
HIGH 7.8 5.9 28.10.2024 21:15
CVE-2024-44128
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44130
C M N
MEDIUM 4.4 3.6 17.09.2024 00:15
CVE-2024-44131
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44132
C M N
HIGH 8.8 6.0 17.09.2024 00:15
CVE-2024-44133
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44134
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44135
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44137
C M N
MEDIUM 4.6 3.6 28.10.2024 21:15
CVE-2024-44141
C M N
MEDIUM 6.8 5.9 24.10.2024 17:15
CVE-2024-44144
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44145
C M N
MEDIUM 6.1 5.2 28.10.2024 22:15
CVE-2024-44146
C M N
CRITICAL 10.0 6.0 17.09.2024 00:15
CVE-2024-44148
C M N
CRITICAL 10.0 6.0 17.09.2024 00:15
CVE-2024-44149
C M N
HIGH 7.5 3.6 17.09.2024 00:15
CVE-2024-44151
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44152
C M N
HIGH 7.5 3.6 17.09.2024 00:15
CVE-2024-44153
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44154
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44155
C M N
MEDIUM 6.5 3.6 28.10.2024 21:15
CVE-2024-44156
C M N
HIGH 7.1 5.2 28.10.2024 21:15
CVE-2024-44158
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44159
C M N
HIGH 7.1 5.2 28.10.2024 21:15
CVE-2024-44160
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44161
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44163
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44164
C M N
HIGH 7.1 5.2 17.09.2024 00:15
CVE-2024-44165
C M N
HIGH 7.5 3.6 17.09.2024 00:15
CVE-2024-44166
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44167
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44168
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44169
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44170
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44174
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44175
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44176
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44177
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44178
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44181
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44182
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44183
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44184
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44185
C M N
MEDIUM 5.5 3.6 24.10.2024 17:15
CVE-2024-44186
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44187
C M N
MEDIUM 6.5 3.6 17.09.2024 00:15
CVE-2024-44188
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44189
C M N
HIGH 7.5 3.6 17.09.2024 00:15
CVE-2024-44190
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44191
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44196
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44197
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44198
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44201
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-44203
C M N
HIGH 7.5 3.6 28.10.2024 21:15
CVE-2024-44205
C M N
MEDIUM 5.5 3.6 24.10.2024 17:15
CVE-2024-44206
C M N
CRITICAL 9.3 4.7 24.10.2024 17:15
CVE-2024-44208
C M N
HIGH 7.5 3.6 28.10.2024 21:15
CVE-2024-44213
C M N
MEDIUM 5.9 3.6 28.10.2024 21:15
CVE-2024-44215
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44216
C M N
MEDIUM 5.5 3.6 28.10.2024 22:15
CVE-2024-44218
C M N
HIGH 7.8 5.9 28.10.2024 21:15
CVE-2024-44220
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-44222
C M N
LOW 3.3 1.4 28.10.2024 21:15
CVE-2024-44224
C M N
HIGH 7.8 5.9 12.12.2024 02:15
CVE-2024-44225
C M N
HIGH 7.8 5.9 12.12.2024 02:15
CVE-2024-44232
C M N
MEDIUM 5.5 3.6 01.11.2024 21:15
CVE-2024-44233
C M N
MEDIUM 5.5 3.6 01.11.2024 21:15
CVE-2024-44234
C M N
MEDIUM 5.5 3.6 01.11.2024 21:15
CVE-2024-44236
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44237
C M N
MEDIUM 5.5 3.6 28.10.2024 22:15
CVE-2024-44239
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44240
C M N
MEDIUM 5.5 3.6 28.10.2024 22:15
CVE-2024-44244
C M N
MEDIUM 4.3 1.4 28.10.2024 21:15
CVE-2024-44245
C M N
HIGH 7.1 5.2 12.12.2024 02:15
CVE-2024-44247
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44248
C M N
MEDIUM 6.5 3.6 12.12.2024 02:15
CVE-2024-44253
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44254
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44255
C M N
HIGH 7.8 5.9 28.10.2024 21:15
CVE-2024-44256
C M N
HIGH 8.6 6.0 28.10.2024 22:15
CVE-2024-44257
C M N
MEDIUM 5.5 3.6 28.10.2024 22:15
CVE-2024-44260
C M N
MEDIUM 4.4 3.6 28.10.2024 22:15
CVE-2024-44264
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44265
C M N
LOW 2.4 1.4 28.10.2024 21:15
CVE-2024-44267
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44269
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44270
C M N
HIGH 8.6 4.0 28.10.2024 21:15
CVE-2024-44273
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44275
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44278
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44279
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44280
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44281
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44282
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44283
C M N
MEDIUM 5.5 3.6 28.10.2024 22:15
CVE-2024-44284
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44287
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44289
C M N
HIGH 7.5 3.6 28.10.2024 21:15
CVE-2024-44291
C M N
HIGH 7.8 5.9 12.12.2024 02:15
CVE-2024-44294
C M N
MEDIUM 6.5 5.2 28.10.2024 21:15
CVE-2024-44295
C M N
MEDIUM 5.5 3.6 28.10.2024 22:15
CVE-2024-44296
C M N
MEDIUM 5.4 2.5 28.10.2024 21:15
CVE-2024-44297
C M N
MEDIUM 6.5 3.6 28.10.2024 21:15
CVE-2024-44300
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-44301
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44302
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44306
C M N
HIGH 7.8 5.9 20.11.2024 00:15
CVE-2024-44307
C M N
HIGH 7.8 5.9 20.11.2024 00:15
CVE-2024-44308
C M N
HIGH 8.8 5.9 20.11.2024 00:15
CVE-2024-4558
C M N
CRITICAL 9.6 6.0 07.05.2024 19:15
CVE-2024-54465
C M N
CRITICAL 9.8 5.9 12.12.2024 02:15
CVE-2024-54466
C M N
MEDIUM 5.3 1.4 12.12.2024 02:15
CVE-2024-54471
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54474
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54476
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54477
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54479
C M N
HIGH 7.5 3.6 12.12.2024 02:15
CVE-2024-54484
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54486
C M N
MEDIUM 6.5 3.6 12.12.2024 02:15
CVE-2024-54489
C M N
HIGH 7.8 5.9 12.12.2024 02:15
CVE-2024-54490
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54491
C M N
LOW 3.3 1.4 12.12.2024 02:15
CVE-2024-54492
C M N
MEDIUM 5.9 3.6 12.12.2024 02:15
CVE-2024-54493
C M N
LOW 3.3 1.4 12.12.2024 02:15
CVE-2024-54494
C M N
MEDIUM 5.9 3.6 12.12.2024 02:15
CVE-2024-54495
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54498
C M N
HIGH 8.8 6.0 12.12.2024 02:15
CVE-2024-54500
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54501
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54504
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54505
C M N
HIGH 8.8 5.9 12.12.2024 02:15
CVE-2024-54506
C M N
CRITICAL 9.8 5.9 12.12.2024 02:15
CVE-2024-54508
C M N
HIGH 7.5 3.6 12.12.2024 02:15
CVE-2024-54510
C M N
MEDIUM 5.1 3.6 12.12.2024 02:15
CVE-2024-54513
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54514
C M N
HIGH 8.6 6.0 12.12.2024 02:15
CVE-2024-54515
C M N
HIGH 7.8 5.9 12.12.2024 02:15
CVE-2024-54526
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54527
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54528
C M N
HIGH 7.1 5.2 12.12.2024 02:15
CVE-2024-54529
C M N
HIGH 7.8 5.9 12.12.2024 02:15
CVE-2024-54531
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54534
C M N
CRITICAL 9.8 5.9 12.12.2024 02:15
CVE-2024-54538
C M N
HIGH 7.5 3.6 20.12.2024 01:15
Showing 5 out of 291.

Similar certificates

Name Certificate ID
Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1 , macOS Ventura 13.3.1 (build 22E261) ( ANSSI-CC-2023/61) ANSSI-CC-2023/61 Compare
Strong Customer Authentication pour Apple Pay sur Mac mini avec M1 et Magic keyboard avec Touch ID, exécutant macOS Monterey 12.3.1 (Version 12.3.1 (build 21E258)) ANSSI-CC-2023/19 Compare
Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1Version iOS 16.4.1 (build 20E252) ( ANSSI-CC-2023/59) ANSSI-CC-2023/59 Compare
Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4(watchOS 9.4 (build 20T253)) ( ANSSI-CC-2023/60) ANSSI-CC-2023/60 Compare
Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1iOS 16.4.1 (build 20E252) (ANSSI-CC-2023/58) ANSSI-CC-2023/58 Compare
Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 17.4(iOS 17.4 (build 21E219)) (ANSSI-CC-2024/39) None Compare
Strong Customer Authentication for Apple Pay on iPhone 15 Pro with A17 Pro running iOS 17.4(iOS 17.4 (Build 21E219)) None Compare
Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1 Version 15.4.1 (build 19E258) ANSSI-CC-2023/18 Compare
Strong Customer Authentication pour Apple Pay sur iPhone SE (2nde génération) avec A13 Bionic exécutant iOS 15.4.1 (Version 15.4.1 (build 19E258)) ANSSI-CC-2023/15 Compare
Strong customer authentication pour Apple Pay sur Apple Watch série 4 exécutant watchOS 7.4.1 (Version 18T201) ANSSI-CC-2023/13 Compare
Strong Customer Authentication pour Apple Pay sur MacBook Air 2020 avec M1 exécutant macOS Monterey 12.3.1 (Version 12.3.1 (build 21E258)) ANSSI-CC-2023/16 Compare
Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4(watchOS 10.4 (build 21T216)) None Compare
Strong Customer Authentication pour Apple Pay sur Apple Watch avec S7 exécutant watchOS 8.5.1 (Version 8.5.1 (build 19T252)) ANSSI-CC-2023/17 Compare
Strong Customer Authentication pour Apple Pay sur iPhone (SoC A12 Bionic) exécutant iOS 14.5.1 Version 18E212 ANSSI-CC-2022/04 Compare
Strong Customer Authentication pour Apple Pay, sur MacBook Air 2020 avec M1 exécutant macOS Big Sur 11.3.1 ANSSI-CC-2022/44 Compare
Strong Customer Authentication pour Apple Pay sur iPhone SE (de seconde génération) exécutant iOS 14.5.1 Version 18E212 ANSSI-CC-2022/05 Compare
Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1 2023-9-INF-4307 Compare
Cryptographic library NESLIB 6.7.4 on ST31N600 A02 (version 6.7.4) ( ANSSI-CC-2022/42-R01) ANSSI-CC-2022/42-R01 Compare
Connected eSE 5.3.4 Platform v1.1 (Revision 1.0) (ANSSI-CC-2024/33) ANSSI-CC-2024/33 Compare
Showing 5 out of 19.

Scheme data ?

Product Strong Customer Authentication for Apple Pay on Mac mini with M2 Pro and Magic keyboard with Touch ID running macOS Sonoma 14.4 (macOS Sonoma 14.4 (build 23E214))
Url https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-mac-mini-m2-pro-and-magic-keyboard
Description Le produit évalué est « Strong Customer Authentication for Apple Pay on Mac mini with M2 Pro and Magic keyboard with Touch ID running macOS Sonoma 14.4, macOS Sonoma 14.4 (build 23E214) » développé par APPLE INC.
Sponsor APPLE INC.
Developer APPLE INC.
Cert Id ANSSI-CC-2024/42
Level EAL2+
Expiration Date 10.01.2030
Enhanced
Cert Id ANSSI-CC-2024/42
Certification Date 10.01.2025
Expiration Date 10.01.2030
Category Divers
Cc Version Critères Communs CC:2022 révision 1
Developer APPLE INC.
Sponsor APPLE INC.
Evaluation Facility THALES / CNES
Level EAL2+
Protection Profile
Mutual Recognition CCRA SOG-IS
Augmented ADV_FSP.3, ALC_FLR.3
Cert Link https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2024_42en.pdf
Report Link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_42en.pdf

References ?

No references are available for this certificate as its ID was not successfully extracted.

Updates ?

  • 27.01.2025 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Strong Customer Authentication for Apple Pay on Mac mini with M2 Pro and Magic keyboard with Touch ID running macOS Sonoma 14.4(macOS Sonoma 14.4 (build 23E214)) (ANSSI-CC-2024/42) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2024_42fr.pdf",
  "dgst": "326d25d021069416",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": null,
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:o:apple:macos:14.4:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "14.4"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2024-27842",
        "CVE-2024-44287",
        "CVE-2024-54513",
        "CVE-2024-44203",
        "CVE-2024-44222",
        "CVE-2024-40807",
        "CVE-2024-44283",
        "CVE-2024-27838",
        "CVE-2024-44254",
        "CVE-2024-44302",
        "CVE-2024-44232",
        "CVE-2024-54528",
        "CVE-2024-40831",
        "CVE-2001-0102",
        "CVE-2024-40777",
        "CVE-2024-54506",
        "CVE-2024-27801",
        "CVE-2024-40783",
        "CVE-2024-27848",
        "CVE-2024-44168",
        "CVE-2024-40795",
        "CVE-2024-44270",
        "CVE-2024-44137",
        "CVE-2024-27844",
        "CVE-2024-40812",
        "CVE-2024-40836",
        "CVE-2024-44244",
        "CVE-2024-44297",
        "CVE-2024-54484",
        "CVE-2024-40834",
        "CVE-2024-40848",
        "CVE-2024-54477",
        "CVE-2024-44307",
        "CVE-2024-44151",
        "CVE-2024-40861",
        "CVE-2024-40803",
        "CVE-2024-54474",
        "CVE-2024-44282",
        "CVE-2024-44123",
        "CVE-2024-44156",
        "CVE-2024-44144",
        "CVE-2024-54498",
        "CVE-2024-54515",
        "CVE-2024-44225",
        "CVE-2024-40856",
        "CVE-2024-27811",
        "CVE-2024-44257",
        "CVE-2024-44191",
        "CVE-2024-54465",
        "CVE-2024-44278",
        "CVE-2024-44269",
        "CVE-2024-44215",
        "CVE-2024-44256",
        "CVE-2024-27862",
        "CVE-2024-27822",
        "CVE-2024-27836",
        "CVE-2024-27849",
        "CVE-2024-40809",
        "CVE-2024-40815",
        "CVE-2024-27877",
        "CVE-2024-44181",
        "CVE-2024-40775",
        "CVE-2024-44197",
        "CVE-2024-44208",
        "CVE-2024-54494",
        "CVE-2024-44216",
        "CVE-2024-40843",
        "CVE-2024-40778",
        "CVE-2024-27843",
        "CVE-2024-44170",
        "CVE-2024-54504",
        "CVE-2024-44130",
        "CVE-2024-40814",
        "CVE-2024-44236",
        "CVE-2024-44218",
        "CVE-2024-40837",
        "CVE-2024-54514",
        "CVE-2024-40792",
        "CVE-2024-27795",
        "CVE-2024-44213",
        "CVE-2024-27802",
        "CVE-2024-23236",
        "CVE-2024-27827",
        "CVE-2024-27798",
        "CVE-2024-23251",
        "CVE-2024-54510",
        "CVE-2024-40779",
        "CVE-2024-27855",
        "CVE-2024-27871",
        "CVE-2024-40860",
        "CVE-2024-40824",
        "CVE-2024-27885",
        "CVE-2024-27821",
        "CVE-2024-44308",
        "CVE-2024-27834",
        "CVE-2024-40811",
        "CVE-2024-27878",
        "CVE-2024-27832",
        "CVE-2024-40857",
        "CVE-2024-44295",
        "CVE-2024-44306",
        "CVE-2024-27863",
        "CVE-2024-40823",
        "CVE-2024-27872",
        "CVE-2024-54508",
        "CVE-2024-54526",
        "CVE-2024-27883",
        "CVE-2024-27820",
        "CVE-2024-27830",
        "CVE-2024-40818",
        "CVE-2024-40844",
        "CVE-2024-44141",
        "CVE-2024-27806",
        "CVE-2024-44182",
        "CVE-2024-44301",
        "CVE-2024-27804",
        "CVE-2024-27818",
        "CVE-2024-27813",
        "CVE-2024-40832",
        "CVE-2024-27805",
        "CVE-2024-40797",
        "CVE-2024-44296",
        "CVE-2024-44196",
        "CVE-2024-54489",
        "CVE-2024-40817",
        "CVE-2024-27857",
        "CVE-2024-44161",
        "CVE-2024-40798",
        "CVE-2024-44237",
        "CVE-2024-40799",
        "CVE-2024-40845",
        "CVE-2024-40816",
        "CVE-2024-44253",
        "CVE-2024-40850",
        "CVE-2024-27796",
        "CVE-2024-44294",
        "CVE-2024-27847",
        "CVE-2024-1580",
        "CVE-2024-40842",
        "CVE-2024-44220",
        "CVE-2024-44275",
        "CVE-2024-40788",
        "CVE-2024-27861",
        "CVE-2024-44163",
        "CVE-2024-44178",
        "CVE-2024-40846",
        "CVE-2024-44264",
        "CVE-2024-54466",
        "CVE-1999-0590",
        "CVE-2024-44239",
        "CVE-2024-40847",
        "CVE-2024-44224",
        "CVE-2024-40838",
        "CVE-2024-40833",
        "CVE-2024-27881",
        "CVE-2024-40785",
        "CVE-2024-54529",
        "CVE-2024-44177",
        "CVE-2024-44145",
        "CVE-2024-54500",
        "CVE-2024-44284",
        "CVE-2024-40866",
        "CVE-2024-44267",
        "CVE-2024-40805",
        "CVE-2024-44234",
        "CVE-2024-44125",
        "CVE-2024-54486",
        "CVE-2024-40780",
        "CVE-2024-40827",
        "CVE-2024-44133",
        "CVE-2024-44166",
        "CVE-2024-27882",
        "CVE-2024-40784",
        "CVE-2024-54534",
        "CVE-2024-40794",
        "CVE-2024-44205",
        "CVE-2024-44183",
        "CVE-2024-44176",
        "CVE-2024-27817",
        "CVE-2024-54491",
        "CVE-2024-27850",
        "CVE-2024-23282",
        "CVE-2024-27860",
        "CVE-2024-44187",
        "CVE-2024-27799",
        "CVE-2024-27800",
        "CVE-2024-44289",
        "CVE-2024-44265",
        "CVE-2024-27851",
        "CVE-2024-44165",
        "CVE-2024-44206",
        "CVE-2024-40821",
        "CVE-2024-44247",
        "CVE-2024-44233",
        "CVE-2024-54471",
        "CVE-2024-44273",
        "CVE-2024-44149",
        "CVE-2024-44201",
        "CVE-2024-54490",
        "CVE-2024-44131",
        "CVE-2024-27884",
        "CVE-2024-44190",
        "CVE-2024-44198",
        "CVE-2024-44153",
        "CVE-2024-54538",
        "CVE-2024-44169",
        "CVE-2024-40804",
        "CVE-2024-44281",
        "CVE-2024-44245",
        "CVE-2024-54501",
        "CVE-2024-27880",
        "CVE-2024-44175",
        "CVE-2024-44280",
        "CVE-2024-27825",
        "CVE-2024-54531",
        "CVE-2024-27873",
        "CVE-2024-44255",
        "CVE-2024-27810",
        "CVE-2024-44184",
        "CVE-2024-40810",
        "CVE-2024-27808",
        "CVE-2024-54476",
        "CVE-2024-40826",
        "CVE-2024-54493",
        "CVE-2024-27816",
        "CVE-2024-44158",
        "CVE-2024-40770",
        "CVE-2024-44186",
        "CVE-2024-27815",
        "CVE-2024-40796",
        "CVE-2024-54505",
        "CVE-2024-40787",
        "CVE-2024-27831",
        "CVE-2024-44154",
        "CVE-2024-27869",
        "CVE-2024-40793",
        "CVE-2024-44126",
        "CVE-2024-44167",
        "CVE-2024-44174",
        "CVE-2024-40859",
        "CVE-2024-40789",
        "CVE-2024-40801",
        "CVE-2024-40782",
        "CVE-2024-44148",
        "CVE-2024-44160",
        "CVE-2024-27824",
        "CVE-2024-27876",
        "CVE-2024-40776",
        "CVE-2024-44134",
        "CVE-2024-44146",
        "CVE-2024-40791",
        "CVE-2024-40822",
        "CVE-2024-27841",
        "CVE-2024-54527",
        "CVE-2024-44279",
        "CVE-2024-40774",
        "CVE-2024-44300",
        "CVE-2024-40828",
        "CVE-2024-54479",
        "CVE-2024-40855",
        "CVE-2024-44122",
        "CVE-2024-40835",
        "CVE-2024-44132",
        "CVE-2024-27837",
        "CVE-2024-44189",
        "CVE-2024-27826",
        "CVE-2024-40841",
        "CVE-2024-44248",
        "CVE-2024-44164",
        "CVE-2024-44128",
        "CVE-2024-4558",
        "CVE-2024-44155",
        "CVE-2024-44188",
        "CVE-2024-23237",
        "CVE-2024-54492",
        "CVE-2024-44135",
        "CVE-2024-27875",
        "CVE-2024-44260",
        "CVE-2024-44240",
        "CVE-2024-44159",
        "CVE-2024-44152",
        "CVE-2024-40825",
        "CVE-2024-40781",
        "CVE-2024-27829",
        "CVE-2024-54495",
        "CVE-2024-44185",
        "CVE-2024-27823",
        "CVE-2024-40800",
        "CVE-2024-44291",
        "CVE-2024-40802",
        "CVE-2024-27858"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "ANSSI-CC-2024/42",
      "description": "Le produit \u00e9valu\u00e9 est \u00ab Strong Customer Authentication for Apple Pay on Mac mini with M2 Pro and Magic keyboard with Touch ID running macOS Sonoma 14.4, macOS Sonoma 14.4 (build 23E214) \u00bb d\u00e9velopp\u00e9 par APPLE INC.",
      "developer": "APPLE INC.",
      "enhanced": {
        "augmented": "ADV_FSP.3, ALC_FLR.3",
        "category": "Divers",
        "cc_version": "Crit\u00e8res Communs CC:2022 r\u00e9vision 1",
        "cert_id": "ANSSI-CC-2024/42",
        "cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2024_42en.pdf",
        "certification_date": "2025-01-10",
        "developer": "APPLE INC.",
        "evaluation_facility": "THALES / CNES",
        "expiration_date": "2030-01-10",
        "level": "EAL2+",
        "mutual_recognition": "CCRA SOG-IS",
        "protection_profile": "",
        "report_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_42en.pdf",
        "sponsor": "APPLE INC."
      },
      "expiration_date": "2030-01-10",
      "level": "EAL2+",
      "product": "Strong Customer Authentication for Apple Pay on Mac mini with M2 Pro and Magic keyboard with Touch ID running macOS Sonoma 14.4 (macOS Sonoma 14.4 (build 23E214))",
      "sponsor": "APPLE INC.",
      "url": "https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-mac-mini-m2-pro-and-magic-keyboard"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Apple Inc.",
  "manufacturer_web": "https://www.apple.com/",
  "name": "Strong Customer Authentication for Apple Pay on Mac mini with M2 Pro and Magic keyboard with Touch ID running macOS Sonoma 14.4(macOS Sonoma 14.4 (build 23E214)) (ANSSI-CC-2024/42)",
  "not_valid_after": "2030-01-10",
  "not_valid_before": "2025-01-10",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": null,
    "report_frontpage": null,
    "report_keywords": null,
    "report_metadata": null,
    "st_filename": null,
    "st_frontpage": null,
    "st_keywords": null,
    "st_metadata": null
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_42fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2+",
      "ALC_FLR.3",
      "ADV_FSP.3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-Cible-2024_42en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    }
  },
  "status": "active"
}