1E Power and Patch Management Pack including WakeUp and NightWatchman Version 5.6 running on multiple platforms

Known vulnerabilities detected

Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.

CSV information

Status archived
Valid from 18.12.2009
Valid until 18.12.2014
Scheme 🇬🇧 UK
Manufacturer 1E Ltd
Category Other Devices and Systems
Security level EAL2

Heuristics summary

Certificate ID: CRP252

Certificate

certificate file processing did not finish successfully.
Download pdf: ERROR
Convert pdf to text: ERROR
Extract keywords: ERROR

Certification report

Extracted keywords

Schemes
MAC

Vendor
Microsoft

Security level
EAL2
Certificates
CRP252

Standards
CCMB-2006-09-001, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2007-09-004

File metadata

Title Certification Report No. CRP252
Subject 1E Power and Patch Management Pack Version 5.6
Author CESG
Creation date D:20100107140907Z
Modification date D:20100107141649Z
Pages 21
Producer Acrobat Distiller 6.0 (Windows)

Security target

Extracted keywords

Schemes
MAC

Vendor
Microsoft

Security level
EAL2
Claims
OE.ROUTE
Security Assurance Requirements (SAR)
ADV_ARC.1, AVA_VAN.2
Security Functional Requirements (SFR)
FDP_ACC, FDP_ACF.1, FDP_ACC.1, FDP_ACF, FDP_IFC, FDP_IFF.1, FDP_IFC.1, FDP_IFF, FDP_UIT, FDP_UIT.1, FIA_UID.1, FMT_SMR, FMT_SMR.1, FMT_SMF, FMT_SMF.1, FMT_MTD, FMT_MTD.1, FMT_MSA.3, FPT_ICP.1, FPT_ITA.1, FPT_ICP.1.1, FPT_ICP, FPT_TST.1.1, FPT_TST.1, FPT_TOP.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TOP.1.1, FPT_TOP.1.2, FPT_TOP, FTP_ITC.1, FTP_TRP.1

Certification process
out of scope, • Wake-up mechanism • Controlled shutdown (including saving of user data) 1.4.3 Summary of items out of scope of the TOE The items out of scope of the TOE are the following Microsoft components with which 1E

Standards
CCMB-2006-09-001, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2007-09-004

File metadata

Title 1E Commom Criteria Security Target
Subject Security Target for !E Power and Patch Management Pack
Author CESG
Creation date D:20100107141109Z
Modification date D:20100107141933Z
Pages 47
Producer Acrobat Distiller 6.0 (Windows)

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

CRP252

Extracted SARs

ADV_ARC.1, AVA_VAN.2

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2023-45161
C N
HIGH 7.2 5.9 06.11.2023
CVE-2023-45163
C N
HIGH 7.2 5.9 06.11.2023
CVE-2023-5964
C N
HIGH 7.2 5.9 06.11.2023

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": null,
  "dgst": "5709b3fa0e432054",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CRP252",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:a:1e:platform:-:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "eal": "EAL2",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.6"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2023-5964",
        "CVE-2023-45161",
        "CVE-2023-45163"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "1E Ltd",
  "manufacturer_web": "https://www.1e.com",
  "name": "1E Power and Patch Management Pack including WakeUp and NightWatchman Version 5.6 running on multiple platforms",
  "not_valid_after": "2014-12-18",
  "not_valid_before": "2009-12-18",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "crp252.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "UK": {
          "CRP252": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL2": 2
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2006-09-001": 1,
          "CCMB-2007-09-002": 1,
          "CCMB-2007-09-003": 1,
          "CCMB-2007-09-004": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 37
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "CESG",
      "/CreationDate": "D:20100107140907Z",
      "/ModDate": "D:20100107141649Z",
      "/Producer": "Acrobat Distiller 6.0 (Windows)",
      "/Subject": "1E Power and Patch Management Pack Version 5.6",
      "/Title": "Certification Report No. CRP252",
      "pdf_file_size_bytes": 220156,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 21
    },
    "st_filename": "1ecc_st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "OE": {
          "OE.ROUTE": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 2
        },
        "AVA": {
          "AVA_VAN.2": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 6
        }
      },
      "cc_sfr": {
        "FDP": {
          "FDP_ACC": 5,
          "FDP_ACC.1": 2,
          "FDP_ACF": 5,
          "FDP_ACF.1": 7,
          "FDP_IFC": 17,
          "FDP_IFC.1": 7,
          "FDP_IFF": 20,
          "FDP_IFF.1": 21,
          "FDP_UIT": 5,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_UID.1": 2
        },
        "FMT": {
          "FMT_MSA.3": 12,
          "FMT_MTD": 10,
          "FMT_MTD.1": 2,
          "FMT_SMF": 18,
          "FMT_SMF.1": 7,
          "FMT_SMR": 5,
          "FMT_SMR.1": 4
        },
        "FPT": {
          "FPT_ICP": 3,
          "FPT_ICP.1": 5,
          "FPT_ICP.1.1": 2,
          "FPT_ITA.1": 1,
          "FPT_TOP": 1,
          "FPT_TOP.1": 36,
          "FPT_TOP.1.1": 1,
          "FPT_TOP.1.2": 2,
          "FPT_TST.1": 1,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC.1": 3,
          "FTP_TRP.1": 3
        }
      },
      "certification_process": {
        "OutOfScope": {
          "out of scope": 2,
          "\u2022 Wake-up mechanism \u2022 Controlled shutdown (including saving of user data) 1.4.3 Summary of items out of scope of the TOE The items out of scope of the TOE are the following Microsoft components with which 1E": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 5
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2006-09-001": 1,
          "CCMB-2007-09-002": 1,
          "CCMB-2007-09-003": 1,
          "CCMB-2007-09-004": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 26
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "CESG",
      "/CreationDate": "D:20100107141109Z",
      "/ModDate": "D:20100107141933Z",
      "/Producer": "Acrobat Distiller 6.0 (Windows)",
      "/Subject": "Security Target for !E Power and Patch Management Pack",
      "/Title": "1E Commom Criteria Security Target",
      "pdf_file_size_bytes": 217497,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 47
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/crp252.pdf",
  "scheme": "UK",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1ecc_st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "babb49c7e656332d9e00efdd18cb97851d4c42ccb11b3df5966b97017e65e272",
      "txt_hash": "355ae099f8c3b6711ff4a905c3629c159205614c2e091159b7b93b0ca45c175f"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "cd50c0e9371095f72c16fcb8dc7d3fb7090c82490ab49a4f1714a5e382c53c1a",
      "txt_hash": "c01873dd5fa6fc8c778c844be5d6c0a197b6fbf12c3a90e3d44438a06e0f586a"
    }
  },
  "status": "archived"
}