Cisco Nexus 7000 Series Switch running Software version NX-OS version 5.1(a) and Cisco Secure Access Control Server (ACS) running version 5.2 patch 3

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status archived
Valid from 27.04.2011
Valid until 26.02.2015
Scheme 🇺🇸 US
Manufacturer Cisco Systems, Inc.
Category Network and Network-Related Devices and Systems
Security level EAL4+, ALC_FLR.2
Maintenance updates Cisco Nexus 7000 Series Switch running NX-OS version 5.2(5) and Cisco Secure Access Control Server (ACS) running ACS version 5.2 patch 10 (05.02.2013) Certification report Security target

Heuristics summary ?

Certificate ID: CCEVS-VR-10349-2011

Certificate ?

Certification report ?

Extracted keywords

Schemes
MAC
Protocols
SSH

Vendor
Cisco Systems, Inc, Cisco, Cisco Systems

Security level
EAL 4, EAL4, EAL 4 augmented, EAL4 augmented
Security Assurance Requirements (SAR)
ALC_FLR.2
Certificates
CCEVS-VR-10349-2011

File metadata

Title Validation Report for N7K
Author Tammy Compton
Creation date D:20110512124706
Modification date D:20110512124706
Pages 21
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

Frontpage

Certificate ID CCEVS-VR-10349-2011
Certified item Cisco Systems, Inc, 170 West Tasman Dr., San Jose, CA 95134 Cisco Nexus 7000 Series Switch
Certification lab US NIAP

Security target ?

Extracted keywords

Symmetric Algorithms
AES, TDES, Triple-DES, HMAC
Asymmetric Algorithms
Diffie-Hellman, DSA
Hash functions
MD5
Schemes
MAC
Protocols
SSH, SSL, TLS

Vendor
Cisco, Cisco Systems, Inc

Security level
EAL4, EAL 4, EAL4 augmented, EAL 4 augmented
Claims
T.AVAIL, T.NETTRAFFIC, T.UNAUTHDEVICE, T.IMPCONF, T.ADMINAUTHOR, T.ADMINAUDIT, T.AUDITCOMP, T.VDCCOMP, T.VRFCOMP, A.PROTCT, A.LOCATE, A.MANAGE, A.NOEVIL, A.NOTRST, OE.PERSON, OE.INSTALL, OE.PHYCAL, OE.TIME, OE.CTSCOMPATIBLE, OE.EXTERNALAUTH, OE.EXTENALAUTH
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.3, ADV_IMP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.4, ALC_LCD.1, ALC_TAT.1, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ATE_COV.2, ATE_IND.2, ATE_DPT.2, ATE_FUN.1, AVA_VAN.3, ASE_CCL.1, ASE_REQ.2, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_STG.1, FAU_GEN.1.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.4.1, FCS_COP.1.1, FDP_ACC.1, FDP_ACF.1, FDP_IFC.1, FDP_IFF.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.3, FIA_UAU.1, FIA_UAU.5, FIA_UID.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_FLS.1, FPT_STM.1, FPT_FLS.1.1, FPT_STM.1.1

Standards
FIPS 140-2, CCMB-2009-07-004

File metadata

Creation date D:20120817145343
Modification date D:20120817145343
Pages 87
Producer ESP Ghostscript 815.02

Heuristics ?

Certificate ID: CCEVS-VR-10349-2011

Extracted SARs

ASE_CCL.1, ALC_DEL.1, ALC_CMC.4, ATE_FUN.1, ATE_IND.2, ASE_TSS.1, ADV_TDS.3, ADV_ARC.1, AVA_VAN.3, ASE_SPD.1, ASE_REQ.2, ALC_CMS.4, ADV_IMP.1, ALC_TAT.1, ATE_COV.2, AGD_OPE.1, ALC_DVS.1, ALC_FLR.2, ASE_ECD.1, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ATE_DPT.2, ASE_OBJ.2

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2012-4135
C M N
MEDIUM 4.6 6.9 21.12.2013 14:22
CVE-2012-5424
C M N
MEDIUM 5.0 2.9 07.11.2012 23:55
CVE-2013-6975
C M N
MEDIUM 4.6 6.9 20.05.2014 11:13
CVE-2013-6982
C M N
MEDIUM 4.3 2.9 08.01.2014 21:55
CVE-2014-3295
C M N
MEDIUM 4.8 4.9 14.06.2014 04:26
CVE-2016-1351
C M N
HIGH 7.5 3.6 26.03.2016 01:59
CVE-2016-1409
C M N
HIGH 7.5 3.6 29.05.2016 22:59
CVE-2016-1453
C M N
CRITICAL 9.8 5.9 06.10.2016 10:59
CVE-2017-6770
C M N
MEDIUM 4.2 2.5 07.08.2017 06:29

Similar certificates

Name Certificate ID
Cisco Nexus 5000 Series Switch w/2000 Series Fabric Extenders running s/w NX-OS v5.0(3)N1(1c), and Cisco Secure Access Control Server (ACS) running s/w v5.2 patch 3 CCEVS-VR-10384-2011 Compare
Cisco Systems (1100, 1200, 1300, 1400 series Wireless Devices running IOS 12.3 (8JA2; 3200 series Wireless Router running IOS 12..4(6)XE3; AS5350, 5400, 5850 Universal Gateway running IOS 12.4(17); IAD2430 Integrated Access Device running IOS 12.4(17) with Cisco Secure Access Control Server (ACS) version 4.1.4.13 for Microsoft Windows Server CCEVS-VR-VID-6013-2008 Compare
Cisco Nexus 7000 Series Switches running NX-OS version 6.2.12 NSCIB-CC-14-49712-CR Compare
Cisco Nexus 5600 Series Switches with 2000 Series Fabric Extenders running NX-OS 7.2(1)N1(1) NSCIB-CC-15-77333-CR Compare
Cisco Unified Wireless Network Solution composed of the following components: Cisco Aironet 1130, 1230, and 1240 AG Series Access Points; Cisco 4400 Series Wireless LAN Controllers; Cisco Catalyst 6500 Series Wireless Integrated Services Module (WiSM); Cisco Wireless Control System (WCS); Cisco Secure Access Control Server (ACS); Cisco 2710 Wireless Location CCEVS-VR-VID-10324-2009 Compare
CISCO ADAPTIVE SECURITY APPLIANCES (ASA) AND CISCO ADAPTIVE SECURITY APPLIANCES VIRTUAL (ASAV) Version: ASA 9.4(1.13), ASAv 9.4(1.240) ASDM 7.4Components: ASA 5500 Series (5506-X, 5506-H, 5506-W, 5508-X, 5516-X) and ASAv running on VM ESXi 5.1 and 5.5 on the Unified Computing System (UCS) EN120E, EN120S M2, E140S M1, E140S M2, E140D M1, E160D M2, E160D M1, E180D M2, E140DP M1, E160DP M1, C22 M3, C24 M3, C220 M3, C220 M4, C240 M3, C240 M4, C260 M2, C420 M3, C460 M2, and C460 M4 Certificate Number: 2016/102 Compare
Cisco Systems Routers (800, 1700, 1800, 2600XM, 2800, 3700, 3800, and 7200 running Cisco IOS Release 12.4(11)T2; 7300, 7400, and 7600 running Cisco IOS Release 12.2(18) SXF8; 10000 and 12000 running 12.0(32)s7) and Cisco Secure ACS version 4.1.2.12 CCEVS-VR-VID-6014-2008 Compare
Cisco Catalyst 3850 Series Switches running IOS-XE 3.6.0E and Catalyst 6500 Series Switches running IOS 15.1(2)SY3 NSCIB-CC-14-39582-CR Compare
Cisco Nexus 3000 and 9000 Series Switches running NX-OS 9.3 CCEVS-VR-VID-11173-2021 Compare
WatchGuard Fireware OS v12.3.1.B585922 (Running on Firebox Security Appliances) with WatchGuard Dimension 2.1.2.B588050 Software 2018-26-INF-3091 Compare
Secure Objects incorporating Secure Envelopes, Version: 1.5.1, Auth Server Component: Build 1.5.1.6 All Other Components: Build 1.5.1.5 Certificate Number: 2011/73 Compare
Cisco Security MARS 110 and 110R, Cisco Security MARS 210, and Cisco Security MARS GC2, with Software Version 5.2.4.2487 CCEVS-VR-VID-10181-2008 Compare
Cisco Catalyst 6500-E Series Switches Cisco IOS Software, Version 15.1(1)SY1, RELEASE SOFTWARE (fc5) BSI-DSZ-CC-0937-2014 Compare
Cisco Catalyst 6500-E Series Switches Cisco IOS Software, Version 15.1(1)SY1, RELEASE SOFTWARE (fc5) BSI-DSZ-CC-0838-2014 Compare
Cisco Systems Catalyst Switches and Cisco Secure ACS for Windows Server Version 4.1.4.13 CCEVS-VR-VID-6012-2008 Compare
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6 BSI-DSZ-CC-0772-2014 Compare
Showing 5 out of 16.

Scheme data ?

Product Cisco Nexus 7000 Series Switch running software version NX-OS version 5.1(a) and Cisco Secure Access Control Server (ACS) running version 5.2 patch 3
Id CCEVS-VR-VID10349
Url https://www.niap-ccevs.org/product/10349
Certification Date 27.04.2011
Expiration Date 05.02.2015
Category Network Switch
Vendor Cisco Systems, Inc.
Evaluation Facility Leidos Common Criteria Testing Laboratory
Scheme US

References ?

No references are available for this certificate.

Updates ?

  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '2011-04-27', 'expiration_date': '2015-02-05'} data.
  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2013-02-05', 'maintenance_title': 'Cisco Nexus 7000 Series Switch running NX-OS version 5.2(5) and Cisco Secure Access Control Server (ACS) running ACS version 5.2 patch 10', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10349-add1.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10349-st.pdf'}]}.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:o:cisco:nx-os:5.2\\\\(9\\\\):*:*:*:*:*:*:*']} values discarded.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2017-6770', 'CVE-2016-1409']} values added.
  • 30.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2017-6770', 'CVE-2016-1409']} values discarded.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '751857b7aa845c03318d432eb92b0d654e2168ed5425d41741057260f4a98425', 'txt_hash': 'cd84335034fa4563b608d2bf8b3092a003f50fba21a04bae61cc3b9b4d68be29'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f24967f6b6ca9c60927a194a6874764ba67d8b2607b2bee10589b911a166f4da', 'txt_hash': 'e63cfe619ab545e0f4a6c9789e078379bc1e53a898175ebde6c1a2a1dd6fbab0'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 421208, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 21, '/Title': 'Validation Report for N7K', '/Author': 'Tammy Compton', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20110512124706', '/ModDate': 'D:20110512124706', '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/virtual_device_context/configuration/guide/vdc_nx-os.pdf', 'http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/unicast/configuration/guide/l3_nx-os.pdf', 'http://www.cisco.com/en/US/docs/switches/datacenter/hw/nexus7000/cmp/configuration/guide/n7cmp.pdf', 'http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/interfaces/configuration/guide/if_cli.pdf', 'http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/qos/command/reference/qos_cmd.pdf', 'http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/system_management/configuration/guide/sm_nx-os.pdf', 'http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/virtual_device_context/command/reference/vdc_cmd.pdf', 'http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/multicast/command/reference/mcr_cmd.pdf', 'http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/unicast/command/reference/l3_cmd.pdf', 'http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.2/user/guide/ACSuserguide.pdf', 'http://www.cisco.com/en/US/docs/switches/datacenter/sw/system_messages/reference/sl_nx-os.pdf', 'http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/system_management/command/reference/sm_cmd.pdf', 'http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/layer2/command/reference/l2_cmd.pdf', 'http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/fundamentals/command/reference/fnd_cmd.pdf', 'http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/qos/configuration/guide/qos_cli.pdf', 'http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/layer2/configuration/guide/Cisco_Nexus_7000_Series_NX-OS_Layer_2_Switching_Configuration_Guide_Release_5.x.pdf', 'http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/interfaces/command/reference/if_cmd.pdf', 'http://www.cisco.com/en/US/docs/switches/datacenter/sw/4_2/nx-os/licensing/guide/Cisco_Nexus_7000_Series_NX-OS_Licensing_Guide__Release_4.2.pdf', 'http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.2/command/reference/acs_5_1_cli_reference_guide.pdf', 'http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/security/command/reference/security_cmd.pdf', 'http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/fundamentals/configuration/guide/Cisco_Nexus_7000_Series_NX-OS_Fundamentals_Configuration_Guide_Release_5.x.pdf', 'http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/security/configuration/guide/Cisco_Nexus_7000_NX-OS_Security_Configuration_Guide__Release_5.x.pdf', 'http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/multicast/configuration/guide/multicast_cli.pdf']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 3232297, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 87, '/Producer': 'ESP Ghostscript 815.02', '/CreationDate': 'D:20120817145343', '/ModDate': 'D:20120817145343', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'US': {'cert_id': 'CCEVS-VR-10349-2011', 'cert_item': 'Cisco Systems, Inc, 170 West Tasman Dr., San Jose, CA 95134 Cisco Nexus 7000 Series Switch', 'cert_lab': 'US NIAP'}}.
    • The report_keywords property was set to {'cc_cert_id': {'US': {'CCEVS-VR-10349-2011': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 9, 'EAL4': 2, 'EAL 4 augmented': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 5}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Cisco': {'Cisco Systems, Inc': 8, 'Cisco': 97, 'Cisco Systems': 2}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 7}}, 'crypto_protocol': {'SSH': {'SSH': 3}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 4, 'EAL 4': 1, 'EAL4 augmented': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_TDS.3': 1, 'ADV_IMP.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 5, 'ALC_CMC.4': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_IND.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VAN.3': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_REQ.2': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 16, 'FAU_SAR.1': 12, 'FAU_STG.1': 5, 'FAU_GEN.1.1': 1, 'FAU_SAR.1.1': 2, 'FAU_SAR.1.2': 2, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FCS': {'FCS_CKM.1': 56, 'FCS_CKM.4': 37, 'FCS_COP.1': 66, 'FCS_CKM.1.1': 3, 'FCS_CKM.2': 8, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 7}, 'FDP': {'FDP_ACC.1': 28, 'FDP_ACF.1': 18, 'FDP_IFC.1': 31, 'FDP_IFF.1': 20, 'FDP_ITC.1': 16, 'FDP_ITC.2': 16, 'FDP_ACC.1.1': 2, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_IFC.1.1': 2, 'FDP_IFF.1.1': 2, 'FDP_IFF.1.2': 2, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 2, 'FDP_IFF.1.3': 1}, 'FIA': {'FIA_UAU.1': 24, 'FIA_UAU.5': 19, 'FIA_UID.1': 40, 'FIA_UAU.1.1': 4, 'FIA_UAU.1.2': 4, 'FIA_UAU.5.1': 3, 'FIA_UAU.5.2': 2, 'FIA_UID.1.1': 4, 'FIA_UID.1.2': 3}, 'FMT': {'FMT_MSA.1': 37, 'FMT_MSA.3': 32, 'FMT_MTD.1': 10, 'FMT_SMF.1': 19, 'FMT_SMR.1': 35, 'FMT_MSA.1.1': 4, 'FMT_MSA.3.1': 4, 'FMT_MSA.3.2': 4, 'FMT_MTD.1.1': 2, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FLS.1': 6, 'FPT_STM.1': 9, 'FPT_FLS.1.1': 1, 'FPT_STM.1.1': 1}}, 'cc_claims': {'T': {'T.AVAIL': 3, 'T.NETTRAFFIC': 3, 'T.UNAUTHDEVICE': 3, 'T.IMPCONF': 3, 'T.ADMINAUTHOR': 3, 'T.ADMINAUDIT': 3, 'T.AUDITCOMP': 3, 'T.VDCCOMP': 3, 'T.VRFCOMP': 3}, 'A': {'A.PROTCT': 3, 'A.LOCATE': 3, 'A.MANAGE': 3, 'A.NOEVIL': 3, 'A.NOTRST': 3}, 'OE': {'OE.PERSON': 4, 'OE.INSTALL': 3, 'OE.PHYCAL': 1, 'OE.TIME': 3, 'OE.CTSCOMPATIBLE': 2, 'OE.EXTERNALAUTH': 2, 'OE.EXTENALAUTH': 1}}, 'vendor': {'Cisco': {'Cisco': 68, 'Cisco Systems, Inc': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 10}}, 'DES': {'3DES': {'TDES': 1, 'Triple-DES': 5}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 4}, 'DSA': {'DSA': 8}}}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 5}}}, 'crypto_scheme': {'MAC': {'MAC': 74}}, 'crypto_protocol': {'SSH': {'SSH': 25}, 'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS': 38}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 23}, 'CC': {'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to st_vid10349-vr.pdf.
    • The st_filename property was set to st_vid10349-st.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['US'].
    • The cert_id property was set to CCEVS-VR-10349-2011.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10349-vr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10349-st.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Cisco Nexus 7000 Series Switch running Software version NX-OS version 5.1(a) and Cisco Secure Access Control Server (ACS) running version 5.2 patch 3 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": null,
  "dgst": "582944bdde9508b3",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-10349-2011",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:o:cisco:nx-os:5.1\\(5\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(3\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.1.3:*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.2\\(1\\):-:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.2\\(5\\):*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_access_control_server:5.1:*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.2\\(7\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.1\\(4\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.1\\(3\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.1\\(1\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.2\\(9\\):*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_access_control_server:5.2:*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.2\\(1\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.1\\(6\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.1\\(2\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.2\\(4\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.2\\(3\\):*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.2",
        "5.1"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2014-3295",
        "CVE-2016-1453",
        "CVE-2017-6770",
        "CVE-2013-6975",
        "CVE-2012-5424",
        "CVE-2012-4135",
        "CVE-2013-6982",
        "CVE-2016-1351",
        "CVE-2016-1409"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Network Switch",
      "certification_date": "2011-04-27",
      "evaluation_facility": "Leidos Common Criteria Testing Laboratory",
      "expiration_date": "2015-02-05",
      "id": "CCEVS-VR-VID10349",
      "product": "Cisco Nexus 7000 Series Switch running software version NX-OS version 5.1(a) and Cisco Secure Access Control Server (ACS) running version 5.2 patch 3",
      "scheme": "US",
      "url": "https://www.niap-ccevs.org/product/10349",
      "vendor": "Cisco Systems, Inc."
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2013-02-05",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10349-add1.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10349-st.pdf",
        "maintenance_title": "Cisco Nexus 7000 Series Switch running NX-OS version 5.2(5) and Cisco Secure Access Control Server (ACS) running ACS version 5.2 patch 10"
      }
    ]
  },
  "manufacturer": "Cisco Systems, Inc.",
  "manufacturer_web": "https://www.cisco.com",
  "name": "Cisco Nexus 7000 Series Switch running Software version NX-OS version 5.1(a) and Cisco Secure Access Control Server (ACS) running version 5.2 patch 3",
  "not_valid_after": "2015-02-26",
  "not_valid_before": "2011-04-27",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "st_vid10349-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-10349-2011",
        "cert_item": "Cisco Systems, Inc, 170 West Tasman Dr., San Jose, CA 95134 Cisco Nexus 7000 Series Switch",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-10349-2011": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 9,
          "EAL 4 augmented": 2,
          "EAL4": 2,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 3
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 7
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 97,
          "Cisco Systems": 2,
          "Cisco Systems, Inc": 8
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Tammy Compton",
      "/CreationDate": "D:20110512124706",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20110512124706",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Title": "Validation Report for N7K",
      "pdf_file_size_bytes": 421208,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/security/configuration/guide/Cisco_Nexus_7000_NX-OS_Security_Configuration_Guide__Release_5.x.pdf",
          "http://www.cisco.com/en/US/docs/switches/datacenter/sw/4_2/nx-os/licensing/guide/Cisco_Nexus_7000_Series_NX-OS_Licensing_Guide__Release_4.2.pdf",
          "http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/qos/configuration/guide/qos_cli.pdf",
          "http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.2/user/guide/ACSuserguide.pdf",
          "http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/fundamentals/command/reference/fnd_cmd.pdf",
          "http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/fundamentals/configuration/guide/Cisco_Nexus_7000_Series_NX-OS_Fundamentals_Configuration_Guide_Release_5.x.pdf",
          "http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/layer2/command/reference/l2_cmd.pdf",
          "http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/multicast/configuration/guide/multicast_cli.pdf",
          "http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/layer2/configuration/guide/Cisco_Nexus_7000_Series_NX-OS_Layer_2_Switching_Configuration_Guide_Release_5.x.pdf",
          "http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/system_management/command/reference/sm_cmd.pdf",
          "http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/unicast/configuration/guide/l3_nx-os.pdf",
          "http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/system_management/configuration/guide/sm_nx-os.pdf",
          "http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/interfaces/command/reference/if_cmd.pdf",
          "http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.2/command/reference/acs_5_1_cli_reference_guide.pdf",
          "http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/multicast/command/reference/mcr_cmd.pdf",
          "http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/qos/command/reference/qos_cmd.pdf",
          "http://www.cisco.com/en/US/docs/switches/datacenter/sw/system_messages/reference/sl_nx-os.pdf",
          "http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/interfaces/configuration/guide/if_cli.pdf",
          "http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/unicast/command/reference/l3_cmd.pdf",
          "http://www.cisco.com/en/US/docs/switches/datacenter/hw/nexus7000/cmp/configuration/guide/n7cmp.pdf",
          "http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/virtual_device_context/configuration/guide/vdc_nx-os.pdf",
          "http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/security/command/reference/security_cmd.pdf",
          "http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/virtual_device_context/command/reference/vdc_cmd.pdf"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 21
    },
    "st_filename": "st_vid10349-st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "Diffie-Hellman": 4
          },
          "DSA": {
            "DSA": 8
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.LOCATE": 3,
          "A.MANAGE": 3,
          "A.NOEVIL": 3,
          "A.NOTRST": 3,
          "A.PROTCT": 3
        },
        "OE": {
          "OE.CTSCOMPATIBLE": 2,
          "OE.EXTENALAUTH": 1,
          "OE.EXTERNALAUTH": 2,
          "OE.INSTALL": 3,
          "OE.PERSON": 4,
          "OE.PHYCAL": 1,
          "OE.TIME": 3
        },
        "T": {
          "T.ADMINAUDIT": 3,
          "T.ADMINAUTHOR": 3,
          "T.AUDITCOMP": 3,
          "T.AVAIL": 3,
          "T.IMPCONF": 3,
          "T.NETTRAFFIC": 3,
          "T.UNAUTHDEVICE": 3,
          "T.VDCCOMP": 3,
          "T.VRFCOMP": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR.2": 5,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.2": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL4": 4,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 16,
          "FAU_GEN.1.1": 1,
          "FAU_SAR.1": 12,
          "FAU_SAR.1.1": 2,
          "FAU_SAR.1.2": 2,
          "FAU_STG.1": 5,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1
        },
        "FCS": {
          "FCS_CKM.1": 56,
          "FCS_CKM.1.1": 3,
          "FCS_CKM.2": 8,
          "FCS_CKM.4": 37,
          "FCS_CKM.4.1": 1,
          "FCS_COP.1": 66,
          "FCS_COP.1.1": 7
        },
        "FDP": {
          "FDP_ACC.1": 28,
          "FDP_ACC.1.1": 2,
          "FDP_ACF.1": 18,
          "FDP_ACF.1.1": 2,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 2,
          "FDP_ACF.1.4": 2,
          "FDP_IFC.1": 31,
          "FDP_IFC.1.1": 2,
          "FDP_IFF.1": 20,
          "FDP_IFF.1.1": 2,
          "FDP_IFF.1.2": 2,
          "FDP_IFF.1.3": 1,
          "FDP_IFF.1.4": 1,
          "FDP_IFF.1.5": 2,
          "FDP_ITC.1": 16,
          "FDP_ITC.2": 16
        },
        "FIA": {
          "FIA_UAU.1": 24,
          "FIA_UAU.1.1": 4,
          "FIA_UAU.1.2": 4,
          "FIA_UAU.5": 19,
          "FIA_UAU.5.1": 3,
          "FIA_UAU.5.2": 2,
          "FIA_UID.1": 40,
          "FIA_UID.1.1": 4,
          "FIA_UID.1.2": 3
        },
        "FMT": {
          "FMT_MSA.1": 37,
          "FMT_MSA.1.1": 4,
          "FMT_MSA.3": 32,
          "FMT_MSA.3.1": 4,
          "FMT_MSA.3.2": 4,
          "FMT_MTD.1": 10,
          "FMT_MTD.1.1": 2,
          "FMT_SMF.1": 19,
          "FMT_SMR.1": 35,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS.1": 6,
          "FPT_FLS.1.1": 1,
          "FPT_STM.1": 9,
          "FPT_STM.1.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 25
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 38
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 74
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 5
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2009-07-004": 1
        },
        "FIPS": {
          "FIPS 140-2": 23
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 10
          }
        },
        "DES": {
          "3DES": {
            "TDES": 1,
            "Triple-DES": 5
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 68,
          "Cisco Systems, Inc": 2
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20120817145343",
      "/ModDate": "D:20120817145343",
      "/Producer": "ESP Ghostscript 815.02",
      "pdf_file_size_bytes": 3232297,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 87
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10349-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.2",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10349-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "751857b7aa845c03318d432eb92b0d654e2168ed5425d41741057260f4a98425",
      "txt_hash": "cd84335034fa4563b608d2bf8b3092a003f50fba21a04bae61cc3b9b4d68be29"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "f24967f6b6ca9c60927a194a6874764ba67d8b2607b2bee10589b911a166f4da",
      "txt_hash": "e63cfe619ab545e0f4a6c9789e078379bc1e53a898175ebde6c1a2a1dd6fbab0"
    }
  },
  "status": "archived"
}