Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4(watchOS 9.4 (build 20T253)) ( ANSSI-CC-2023/60)

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status active
Valid from 19.01.2024
Valid until 19.01.2029
Scheme 🇫🇷 FR
Manufacturer Apple Inc.
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ADV_FSP.3, EAL2+

Heuristics summary ?

Certificate ID: ANSSI-CC-2023/60

Certificate ?

Extracted keywords

Security level
EAL2
Security Assurance Requirements (SAR)
ADV_FSP.3
Certificates
ANSSI-CC-2023/60
Evaluation facilities
THALES/CNES

File metadata

Creation date D:20240222154647+01'00'
Modification date D:20240222155209+01'00'
Pages 2
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

Certification report ?

Extracted keywords

Security level
EAL2, EAL4, EAL2 augmented, ITSEC E3 Basic
Security Assurance Requirements (SAR)
ADV_FSP.3, ALC_FLR
Certificates
ANSSI-CC-2023/60
Evaluation facilities
THALES/CNES

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Creation date D:20240222154716+01'00'
Modification date D:20240222155205+01'00'
Pages 13
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

Security target ?

Extracted keywords

Symmetric Algorithms
AES
Schemes
MAC
Protocols
TLS

Trusted Execution Environments
SE

Security level
EAL 2, EAL2
Claims
D.OS, D.SEP_SE, T.CORRUPT, T.PHYSICAL, T.RECOVER, T.REPLAY, T.SILENT, T.SKIMMING, T.USURP, A.DE-, A.PERSO, A.CDCVM, A.IPH-, A.DEVICE_AUTH, A.IPHONE_USER, OE.CDCVM
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.1, ADV_FSP.2, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1
Security Functional Requirements (SFR)
FDP_DAU.1, FDP_DAU.1.1, FDP_DAU.1.2, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_ETC, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_UCT, FDP_UCT.1, FDP_UIT, FDP_UIT.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.1.1, FDP_ACC.1, FDP_IFC.1, FDP_ETC.2, FIA_UID.2, FIA_UID.2.1, FIA_UAU.2, FIA_UAU.2.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_AFL, FIA_AFL.1, FIA_UAU.6.1, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.1, FIA_UID.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1.1, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.3, FMT_MTD.3.1, FPR_UNO.1, FPR_UNO.1.1, FPT_ITC.1, FPT_ITC.1.1, FPT_RPL, FPT_RPL.1, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1

Certification process
out of scope, Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by, pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.Card_Data D.Unlock_Secret* D.SEP_iPhone* T.RECOVER Card Recovery An attacker

Standards
FIPS 140-3, FIPS 140-2

File metadata

Title Microsoft Word - [ST] Watch_S8_watchOS9_SecurityTarget_v1.4.docx
Creation date D:20231109133713Z
Modification date D:20231109133737Z
Pages 54
Creator Word
Producer Adobe Mac PDF Plug-in

Heuristics ?

Certificate ID: ANSSI-CC-2023/60

Extracted SARs

ADV_ARC.1, ADV_FSP.3, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2023-27930
C M N
HIGH 7.8 5.9 23.06.2023 18:15
CVE-2023-28191
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-28202
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-28204
C M N
MEDIUM 6.5 3.6 23.06.2023 18:15
CVE-2023-32352
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32354
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32357
C M N
HIGH 7.1 5.2 23.06.2023 18:15
CVE-2023-32361
C M N
MEDIUM 5.5 3.6 27.09.2023 15:18
CVE-2023-32368
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32372
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32373
C M N
HIGH 8.8 5.9 23.06.2023 18:15
CVE-2023-32376
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32381
C M N
HIGH 7.8 5.9 27.07.2023 00:15
CVE-2023-32384
C M N
HIGH 7.8 5.9 23.06.2023 18:15
CVE-2023-32388
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32389
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32390
C M N
LOW 2.4 1.4 23.06.2023 18:15
CVE-2023-32391
C M N
MEDIUM 4.6 3.6 23.06.2023 18:15
CVE-2023-32392
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32394
C M N
LOW 2.4 1.4 23.06.2023 18:15
CVE-2023-32396
C M N
HIGH 7.8 5.9 27.09.2023 15:18
CVE-2023-32398
C M N
HIGH 7.8 5.9 23.06.2023 18:15
CVE-2023-32399
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32400
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32402
C M N
MEDIUM 6.5 3.6 23.06.2023 18:15
CVE-2023-32403
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32404
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32407
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32408
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32409
C M N
HIGH 8.6 4.0 23.06.2023 18:15
CVE-2023-32412
C M N
CRITICAL 9.8 5.9 23.06.2023 18:15
CVE-2023-32413
C M N
HIGH 7.0 5.9 23.06.2023 18:15
CVE-2023-32416
C M N
MEDIUM 5.5 3.6 27.07.2023 01:15
CVE-2023-32417
C M N
LOW 2.4 1.4 23.06.2023 18:15
CVE-2023-32420
C M N
HIGH 7.1 5.2 23.06.2023 18:15
CVE-2023-32423
C M N
MEDIUM 6.5 3.6 23.06.2023 18:15
CVE-2023-32425
C M N
HIGH 7.8 5.9 06.09.2023 02:15
CVE-2023-32428
C M N
HIGH 7.8 5.9 06.09.2023 02:15
CVE-2023-32432
C M N
MEDIUM 5.5 3.6 06.09.2023 02:15
CVE-2023-32433
C M N
HIGH 7.8 5.9 27.07.2023 00:15
CVE-2023-32434
C M N
HIGH 7.8 5.9 23.06.2023 18:15
CVE-2023-32441
C M N
HIGH 7.8 5.9 27.07.2023 01:15
CVE-2023-32445
C M N
MEDIUM 6.1 2.7 28.07.2023 05:15
CVE-2023-32734
C M N
HIGH 7.8 5.9 27.07.2023 01:15
CVE-2023-34352
C M N
MEDIUM 5.3 1.4 06.09.2023 02:15
CVE-2023-34425
C M N
CRITICAL 9.8 5.9 28.07.2023 05:15
CVE-2023-35074
C M N
HIGH 8.8 5.9 27.09.2023 15:18
CVE-2023-35984
C M N
MEDIUM 4.3 3.4 27.09.2023 15:18
CVE-2023-35990
C M N
LOW 3.3 1.4 27.09.2023 15:18
CVE-2023-35993
C M N
HIGH 7.8 5.9 27.07.2023 01:15
CVE-2023-36495
C M N
CRITICAL 9.8 5.9 28.07.2023 05:15
CVE-2023-37450
C M N
HIGH 8.8 5.9 27.07.2023 00:15
CVE-2023-38133
C M N
MEDIUM 6.5 3.6 27.07.2023 00:15
CVE-2023-38136
C M N
HIGH 7.8 5.9 27.07.2023 01:15
CVE-2023-38565
C M N
HIGH 7.8 5.9 27.07.2023 01:15
CVE-2023-38572
C M N
HIGH 7.5 3.6 27.07.2023 01:15
CVE-2023-38580
C M N
HIGH 7.8 5.9 27.07.2023 01:15
CVE-2023-38590
C M N
HIGH 8.8 5.9 28.07.2023 05:15
CVE-2023-38592
C M N
HIGH 8.8 5.9 28.07.2023 05:15
CVE-2023-38593
C M N
MEDIUM 5.5 3.6 27.07.2023 01:15
CVE-2023-38594
C M N
HIGH 8.8 5.9 27.07.2023 00:15
CVE-2023-38595
C M N
HIGH 8.8 5.9 27.07.2023 01:15
CVE-2023-38596
C M N
MEDIUM 5.5 3.6 27.09.2023 15:18
CVE-2023-38598
C M N
CRITICAL 9.8 5.9 28.07.2023 05:15
CVE-2023-38599
C M N
MEDIUM 6.5 3.6 28.07.2023 05:15
CVE-2023-38600
C M N
HIGH 8.8 5.9 27.07.2023 01:15
CVE-2023-38604
C M N
CRITICAL 9.8 5.9 28.07.2023 05:15
CVE-2023-38606
C M N
MEDIUM 5.5 3.6 27.07.2023 00:15
CVE-2023-38611
C M N
HIGH 8.8 5.9 27.07.2023 01:15
CVE-2023-39434
C M N
HIGH 8.8 5.9 27.09.2023 15:18
CVE-2023-40395
C M N
LOW 3.3 1.4 27.09.2023 15:19
CVE-2023-40396
C M N
HIGH 7.8 5.9 29.07.2024 21:15
CVE-2023-40399
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-40400
C M N
CRITICAL 9.8 5.9 27.09.2023 15:19
CVE-2023-40403
C M N
MEDIUM 6.5 3.6 27.09.2023 15:19
CVE-2023-40408
C M N
MEDIUM 5.3 1.4 25.10.2023 19:15
CVE-2023-40409
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-40410
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-40412
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-40413
C M N
MEDIUM 5.5 3.6 25.10.2023 19:15
CVE-2023-40414
C M N
CRITICAL 9.8 5.9 10.01.2024 22:15
CVE-2023-40417
C M N
MEDIUM 5.4 2.5 27.09.2023 15:19
CVE-2023-40419
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-40420
C M N
MEDIUM 6.5 3.6 27.09.2023 15:19
CVE-2023-40424
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-40427
C M N
LOW 3.3 1.4 27.09.2023 15:19
CVE-2023-40429
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-40432
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-40447
C M N
HIGH 8.8 5.9 25.10.2023 19:15
CVE-2023-40448
C M N
HIGH 8.6 4.0 27.09.2023 15:19
CVE-2023-40452
C M N
HIGH 7.1 5.2 27.09.2023 15:19
CVE-2023-40454
C M N
HIGH 7.1 5.2 27.09.2023 15:19
CVE-2023-40456
C M N
LOW 3.3 1.4 27.09.2023 15:19
CVE-2023-40520
C M N
LOW 3.3 1.4 27.09.2023 15:19
CVE-2023-40528
C M N
MEDIUM 5.5 3.6 23.01.2024 01:15
CVE-2023-41061
C M N
HIGH 7.8 5.9 07.09.2023 18:15
CVE-2023-41065
C M N
LOW 3.3 1.4 27.09.2023 15:19
CVE-2023-41068
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-41070
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-41071
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-41073
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-41074
C M N
HIGH 8.8 5.9 27.09.2023 15:19
CVE-2023-41174
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-41254
C M N
MEDIUM 5.5 3.6 25.10.2023 19:15
CVE-2023-41968
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-41976
C M N
HIGH 8.8 5.9 25.10.2023 19:15
CVE-2023-41981
C M N
MEDIUM 4.4 3.6 27.09.2023 15:19
CVE-2023-41982
C M N
MEDIUM 4.6 3.6 25.10.2023 19:15
CVE-2023-41984
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-41988
C M N
MEDIUM 6.8 5.9 25.10.2023 19:15
CVE-2023-41997
C M N
MEDIUM 4.6 3.6 25.10.2023 19:15
CVE-2023-42823
C M N
MEDIUM 5.5 3.6 21.02.2024 07:15
CVE-2023-42834
C M N
MEDIUM 5.5 3.6 21.02.2024 07:15
CVE-2023-42839
C M N
MEDIUM 5.5 3.6 21.02.2024 07:15
CVE-2023-42846
C M N
MEDIUM 5.3 1.4 25.10.2023 19:15
CVE-2023-42848
C M N
HIGH 7.8 5.9 21.02.2024 07:15
CVE-2023-42849
C M N
MEDIUM 6.5 3.6 25.10.2023 19:15
CVE-2023-42852
C M N
HIGH 8.8 5.9 25.10.2023 19:15
CVE-2023-42866
C M N
HIGH 8.8 5.9 10.01.2024 22:15
CVE-2023-42878
C M N
MEDIUM 5.5 3.6 21.02.2024 07:15
CVE-2023-42883
C M N
MEDIUM 5.5 3.6 12.12.2023 01:15
CVE-2023-42888
C M N
MEDIUM 5.5 3.6 23.01.2024 01:15
CVE-2023-42890
C M N
HIGH 8.8 5.9 12.12.2023 01:15
CVE-2023-42893
C M N
MEDIUM 5.5 3.6 28.03.2024 16:15
CVE-2023-42898
C M N
MEDIUM 5.5 3.6 12.12.2023 01:15
CVE-2023-42899
C M N
HIGH 7.8 5.9 12.12.2023 01:15
CVE-2023-42914
C M N
MEDIUM 6.3 4.0 12.12.2023 01:15
CVE-2023-42936
C M N
MEDIUM 5.5 3.6 28.03.2024 16:15
CVE-2023-42937
C M N
MEDIUM 5.5 3.6 23.01.2024 01:15
CVE-2023-42942
C M N
HIGH 7.8 5.9 21.02.2024 07:15
CVE-2023-42946
C M N
MEDIUM 5.5 3.6 21.02.2024 07:15
CVE-2023-42947
C M N
HIGH 8.6 6.0 28.03.2024 16:15
CVE-2023-42949
C M N
LOW 3.3 1.4 29.07.2024 21:15
CVE-2023-42950
C M N
HIGH 8.8 5.9 28.03.2024 16:15
CVE-2023-42953
C M N
MEDIUM 5.5 3.6 21.02.2024 07:15
CVE-2023-42957
C M N
LOW 3.3 1.4 29.07.2024 21:15
CVE-2024-0258
C M N
HIGH 8.6 6.0 08.03.2024 02:15
CVE-2024-23201
C M N
MEDIUM 5.5 3.6 08.03.2024 02:15
CVE-2024-23204
C M N
HIGH 7.5 3.6 23.01.2024 01:15
CVE-2024-23206
C M N
MEDIUM 6.5 3.6 23.01.2024 01:15
CVE-2024-23207
C M N
MEDIUM 5.5 3.6 23.01.2024 01:15
CVE-2024-23208
C M N
HIGH 7.8 5.9 23.01.2024 01:15
CVE-2024-23210
C M N
LOW 3.3 1.4 23.01.2024 01:15
CVE-2024-23211
C M N
LOW 3.3 1.4 23.01.2024 01:15
CVE-2024-23212
C M N
HIGH 7.8 5.9 23.01.2024 01:15
CVE-2024-23213
C M N
HIGH 8.8 5.9 23.01.2024 01:15
CVE-2024-23215
C M N
MEDIUM 5.5 3.6 23.01.2024 01:15
CVE-2024-23217
C M N
LOW 3.3 1.4 23.01.2024 01:15
CVE-2024-23218
C M N
MEDIUM 5.9 3.6 23.01.2024 01:15
CVE-2024-23223
C M N
MEDIUM 6.2 3.6 23.01.2024 01:15
CVE-2024-23225
C M N
HIGH 7.8 5.9 05.03.2024 20:16
CVE-2024-23226
C M N
HIGH 8.8 5.9 08.03.2024 02:15
CVE-2024-23231
C M N
MEDIUM 5.5 3.6 08.03.2024 02:15
CVE-2024-23235
C M N
MEDIUM 4.7 3.6 08.03.2024 02:15
CVE-2024-23239
C M N
MEDIUM 4.7 3.6 08.03.2024 02:15
CVE-2024-23246
C M N
HIGH 8.6 6.0 08.03.2024 02:15
CVE-2024-23250
C M N
MEDIUM 5.5 3.6 08.03.2024 02:15
CVE-2024-23251
C M N
MEDIUM 4.6 3.6 10.06.2024 21:15
CVE-2024-23254
C M N
MEDIUM 6.5 3.6 08.03.2024 02:15
CVE-2024-23263
C M N
MEDIUM 6.5 3.6 08.03.2024 02:15
CVE-2024-23265
C M N
HIGH 7.8 5.9 08.03.2024 02:15
CVE-2024-23271
C M N
MEDIUM 6.5 3.6 24.04.2024 17:15
CVE-2024-23278
C M N
HIGH 8.6 6.0 08.03.2024 02:15
CVE-2024-23280
C M N
MEDIUM 6.5 3.6 08.03.2024 02:15
CVE-2024-23282
C M N
MEDIUM 5.5 3.6 10.06.2024 21:15
CVE-2024-23284
C M N
MEDIUM 6.5 3.6 08.03.2024 02:15
CVE-2024-23286
C M N
HIGH 7.8 5.9 08.03.2024 02:15
CVE-2024-23287
C M N
MEDIUM 5.5 3.6 08.03.2024 02:15
CVE-2024-23288
C M N
HIGH 7.8 5.9 08.03.2024 02:15
CVE-2024-23289
C M N
LOW 3.3 1.4 08.03.2024 02:15
CVE-2024-23290
C M N
MEDIUM 5.5 3.6 08.03.2024 02:15
CVE-2024-23291
C M N
LOW 3.3 1.4 08.03.2024 02:15
CVE-2024-23293
C M N
MEDIUM 4.6 3.6 08.03.2024 02:15
CVE-2024-23296
C M N
HIGH 7.8 5.9 05.03.2024 20:16
CVE-2024-23297
C M N
MEDIUM 5.5 3.6 08.03.2024 02:15
CVE-2024-27800
C M N
MEDIUM 6.5 3.6 10.06.2024 21:15
CVE-2024-27801
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27804
C M N
MEDIUM 5.5 3.6 14.05.2024 15:13
CVE-2024-27805
C M N
MEDIUM 5.5 3.6 10.06.2024 21:15
CVE-2024-27806
C M N
MEDIUM 5.5 3.6 10.06.2024 21:15
CVE-2024-27808
C M N
HIGH 8.8 5.9 10.06.2024 21:15
CVE-2024-27810
C M N
MEDIUM 5.5 3.6 14.05.2024 15:13
CVE-2024-27811
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27814
C M N
LOW 2.4 1.4 10.06.2024 21:15
CVE-2024-27815
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27816
C M N
MEDIUM 5.5 3.6 14.05.2024 15:13
CVE-2024-27820
C M N
HIGH 8.8 5.9 10.06.2024 21:15
CVE-2024-27821
C M N
MEDIUM 4.7 3.6 14.05.2024 15:13
CVE-2024-27823
C M N
MEDIUM 5.9 3.6 29.07.2024 23:15
CVE-2024-27826
C M N
HIGH 7.8 5.9 29.07.2024 23:15
CVE-2024-27828
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27830
C M N
MEDIUM 6.5 3.6 10.06.2024 21:15
CVE-2024-27832
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27834
C M N
MEDIUM 5.5 3.6 14.05.2024 15:13
CVE-2024-27838
C M N
MEDIUM 6.5 3.6 10.06.2024 21:15
CVE-2024-27840
C M N
MEDIUM 6.3 4.0 10.06.2024 21:15
CVE-2024-27851
C M N
HIGH 8.8 5.9 10.06.2024 21:15
CVE-2024-27863
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-27880
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-27884
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40774
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40776
C M N
MEDIUM 4.3 1.4 29.07.2024 23:15
CVE-2024-40777
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40779
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40780
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40782
C M N
MEDIUM 6.5 3.6 29.07.2024 23:15
CVE-2024-40784
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40785
C M N
MEDIUM 6.1 2.7 29.07.2024 23:15
CVE-2024-40787
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40788
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40789
C M N
MEDIUM 6.5 3.6 29.07.2024 23:15
CVE-2024-40793
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40795
C M N
LOW 3.3 1.4 29.07.2024 23:15
CVE-2024-40799
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40805
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40806
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40809
C M N
HIGH 7.8 5.9 29.07.2024 23:15
CVE-2024-40812
C M N
HIGH 7.8 5.9 29.07.2024 23:15
CVE-2024-40813
C M N
MEDIUM 4.6 3.6 29.07.2024 23:15
CVE-2024-40815
C M N
HIGH 7.5 5.9 29.07.2024 23:15
CVE-2024-40818
C M N
MEDIUM 4.6 3.6 29.07.2024 23:15
CVE-2024-40822
C M N
LOW 2.4 1.4 29.07.2024 23:15
CVE-2024-40824
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40829
C M N
MEDIUM 4.6 3.6 29.07.2024 23:15
CVE-2024-40835
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40836
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40850
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40857
C M N
MEDIUM 6.1 2.7 17.09.2024 00:15
CVE-2024-44144
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44155
C M N
MEDIUM 6.5 3.6 28.10.2024 21:15
CVE-2024-44169
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44170
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44171
C M N
MEDIUM 4.6 3.6 17.09.2024 00:15
CVE-2024-44176
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44183
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44185
C M N
MEDIUM 5.5 3.6 24.10.2024 17:15
CVE-2024-44187
C M N
MEDIUM 6.5 3.6 17.09.2024 00:15
CVE-2024-44191
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44194
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44198
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44212
C M N
MEDIUM 5.3 1.4 12.12.2024 02:15
CVE-2024-44215
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44225
C M N
HIGH 7.8 5.9 12.12.2024 02:15
CVE-2024-44232
C M N
MEDIUM 5.5 3.6 01.11.2024 21:15
CVE-2024-44233
C M N
MEDIUM 5.5 3.6 01.11.2024 21:15
CVE-2024-44234
C M N
MEDIUM 5.5 3.6 01.11.2024 21:15
CVE-2024-44239
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44240
C M N
MEDIUM 5.5 3.6 28.10.2024 22:15
CVE-2024-44244
C M N
MEDIUM 4.3 1.4 28.10.2024 21:15
CVE-2024-44254
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44255
C M N
HIGH 7.8 5.9 28.10.2024 21:15
CVE-2024-44269
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44273
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44274
C M N
MEDIUM 4.6 3.6 28.10.2024 21:15
CVE-2024-44278
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44282
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44285
C M N
HIGH 7.8 5.9 28.10.2024 21:15
CVE-2024-44290
C M N
LOW 3.3 1.4 12.12.2024 02:15
CVE-2024-44296
C M N
MEDIUM 5.4 2.5 28.10.2024 21:15
CVE-2024-44297
C M N
MEDIUM 6.5 3.6 28.10.2024 21:15
CVE-2024-44302
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-54479
C M N
HIGH 7.5 3.6 12.12.2024 02:15
CVE-2024-54486
C M N
MEDIUM 6.5 3.6 12.12.2024 02:15
CVE-2024-54494
C M N
MEDIUM 5.9 3.6 12.12.2024 02:15
CVE-2024-54500
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54501
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54502
C M N
MEDIUM 6.5 3.6 12.12.2024 02:15
CVE-2024-54505
C M N
HIGH 8.8 5.9 12.12.2024 02:15
CVE-2024-54508
C M N
HIGH 7.5 3.6 12.12.2024 02:15
CVE-2024-54510
C M N
MEDIUM 5.1 3.6 12.12.2024 02:15
CVE-2024-54513
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54514
C M N
HIGH 8.6 6.0 12.12.2024 02:15
CVE-2024-54526
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54527
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54534
C M N
CRITICAL 9.8 5.9 12.12.2024 02:15
Showing 5 out of 275.

Similar certificates

Name Certificate ID
Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1iOS 16.4.1 (build 20E252) (ANSSI-CC-2023/58) ANSSI-CC-2023/58 Compare
Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1Version iOS 16.4.1 (build 20E252) ( ANSSI-CC-2023/59) ANSSI-CC-2023/59 Compare
Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1 , macOS Ventura 13.3.1 (build 22E261) ( ANSSI-CC-2023/61) ANSSI-CC-2023/61 Compare
Strong customer authentication pour Apple Pay sur Apple Watch série 4 exécutant watchOS 7.4.1 (Version 18T201) ANSSI-CC-2023/13 Compare
Strong Customer Authentication pour Apple Pay sur Apple Watch avec S7 exécutant watchOS 8.5.1 (Version 8.5.1 (build 19T252)) ANSSI-CC-2023/17 Compare
Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1 Version 15.4.1 (build 19E258) ANSSI-CC-2023/18 Compare
Strong Customer Authentication pour Apple Pay sur iPhone SE (2nde génération) avec A13 Bionic exécutant iOS 15.4.1 (Version 15.4.1 (build 19E258)) ANSSI-CC-2023/15 Compare
Strong Customer Authentication pour Apple Pay sur MacBook Air 2020 avec M1 exécutant macOS Monterey 12.3.1 (Version 12.3.1 (build 21E258)) ANSSI-CC-2023/16 Compare
Strong Customer Authentication pour Apple Pay sur Mac mini avec M1 et Magic keyboard avec Touch ID, exécutant macOS Monterey 12.3.1 (Version 12.3.1 (build 21E258)) ANSSI-CC-2023/19 Compare
Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1 2023-9-INF-4307 Compare
IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-2023/57 ) ANSSI-CC-2023/57 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in SSCD configuration Version 4.1.1.52 (ANSSI-CC-2023/69) ANSSI-CC-2023/69 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO BAC configuration Version 4.1.1.52 ( ANSSI-CC-2023/67) ANSSI-CC-2023/67 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration Version 4.1.1.52 ( ANSSI-CC-2023/68) ANSSI-CC-2023/68 Compare
ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01) ANSSI-CC-2023/12-R01 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO BAC configuration (Version 4.0.1.52) ( ANSSI-CC-2023/10-R01 ) ANSSI-CC-2023/10-R01 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration (Version 4.0.1.52) (ANSSI-CC-2023/11-R01) ANSSI-CC-2023/11-R01 Compare
Showing 5 out of 17.

References ?

No references are available for this certificate.

Updates ?

  • 06.01.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2024-54514', 'CVE-2024-54502', 'CVE-2024-54501', 'CVE-2024-44225']} values added.
  • 16.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2024-23263', 'CVE-2024-23286', 'CVE-2024-54513', 'CVE-2024-54526', 'CVE-2024-54500', 'CVE-2024-54534', 'CVE-2024-23297', 'CVE-2024-44278', 'CVE-2024-23289', 'CVE-2023-40396', 'CVE-2024-44240', 'CVE-2024-54486', 'CVE-2024-44169', 'CVE-2024-23271', 'CVE-2024-40784', 'CVE-2024-23284', 'CVE-2024-40805', 'CVE-2024-27810', 'CVE-2024-27821', 'CVE-2024-27816', 'CVE-2024-23265', 'CVE-2024-40836', 'CVE-2024-23288', 'CVE-2024-54479', 'CVE-2024-44212', 'CVE-2024-54510', 'CVE-2024-40829', 'CVE-2024-23293', 'CVE-2024-27826', 'CVE-2024-23291', 'CVE-2024-40782', 'CVE-2024-27804', 'CVE-2024-40777', 'CVE-2024-23290', 'CVE-2024-44290', 'CVE-2024-27834', 'CVE-2024-54494', 'CVE-2023-42848', 'CVE-2024-54505', 'CVE-2024-23287', 'CVE-2024-54527', 'CVE-2024-54508', 'CVE-2024-40824']} values added.
    • The scheme_data property was set to {'product': 'Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4 watchOS 9.4 (Build 20T253)', 'url': 'https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-apple-watch-s8-running-watchos-94', 'description': 'Le produit Ă©valuĂ© est « Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4, watchOS 9.4 (build 20T253) » dĂ©veloppĂ© par APPLE INC.. Apple Pay est une solution de paiement mobile dĂ©veloppĂ©e par la sociĂ©tĂ© APPLE INC. Après avoir enregistrĂ© une carte bancaire dans son Ă©quipement Apple, l’utilisateur peut faire des paiements au travers de celui-ci. Pour que le paie', 'sponsor': 'APPLE INC', 'developer': 'APPLE INC', 'cert_id': 'ANSSI-CC-2023/60', 'level': 'EAL2+', 'expiration_date': '2029-01-19', 'enhanced': {'cert_id': 'ANSSI-CC-2023/60', 'certification_date': '2024-01-19', 'expiration_date': '2029-01-19', 'category': 'Divers', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'APPLE INC', 'sponsor': 'APPLE INC', 'evaluation_facility': 'THALES / CNES', 'level': 'EAL2+', 'protection_profile': '', 'mutual_recognition': 'CCRA SOG-IS', 'augmented': 'ADV_FSP.3', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_60en.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_60en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_60en.pdf'}}.
  • 09.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2024-23201', 'CVE-2024-23226', 'CVE-2023-42942', 'CVE-2023-42823', 'CVE-2024-23250', 'CVE-2024-0258', 'CVE-2024-23280', 'CVE-2024-23239', 'CVE-2024-23231', 'CVE-2023-42953', 'CVE-2023-42839', 'CVE-2023-42834', 'CVE-2024-23235', 'CVE-2024-23246', 'CVE-2024-23254', 'CVE-2024-23278', 'CVE-2023-42878', 'CVE-2023-42946']} values added.
    • The scheme_data property was set to None.
  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 18.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2024-44296']} values added.
  • 12.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2024-44239', 'CVE-2024-44274', 'CVE-2024-44215', 'CVE-2024-44232', 'CVE-2024-44244', 'CVE-2024-44254', 'CVE-2024-44282', 'CVE-2024-44194', 'CVE-2024-44233', 'CVE-2024-44255', 'CVE-2024-44285', 'CVE-2024-44234', 'CVE-2024-44273', 'CVE-2024-44269', 'CVE-2024-44302']} values added.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'description': 'Le produit Ă©valuĂ© est « Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4, watchOS 9.4 (build 20T253) » dĂ©veloppĂ© par APPLE INC.. Apple Pay est une solution de paiement mobile dĂ©veloppĂ©e par la sociĂ©tĂ© APPLE INC. Après avoir enregistrĂ© une carte bancaire dans son Ă©quipement Apple, l’utilisateur peut faire des paiements au travers de celui-ci. Pour que le paie', 'expiration_date': '2029-01-19', 'enhanced': {'__update__': {'certification_date': '2024-01-19', 'expiration_date': '2029-01-19', 'mutual_recognition': 'CCRA SOG-IS'}}} data.
  • 30.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2024-44297', 'CVE-2024-44144', 'CVE-2024-44185', 'CVE-2024-44155']} values added.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:o:apple:watchos:9.4:*:*:*:*:*:*:*']}.
    • The related_cves property was set to {'_type': 'Set', 'elements': ['CVE-2023-41061', 'CVE-2024-40776', 'CVE-2023-32420', 'CVE-2024-23223', 'CVE-2023-38133', 'CVE-2023-32408', 'CVE-2023-28204', 'CVE-2024-40789', 'CVE-2023-32368', 'CVE-2024-23215', 'CVE-2024-44187', 'CVE-2023-42846', 'CVE-2023-41070', 'CVE-2023-32352', 'CVE-2023-42866', 'CVE-2024-27814', 'CVE-2023-40454', 'CVE-2024-23210', 'CVE-2023-42849', 'CVE-2023-40417', 'CVE-2023-38590', 'CVE-2023-38596', 'CVE-2023-27930', 'CVE-2023-42947', 'CVE-2023-32384', 'CVE-2023-42899', 'CVE-2024-40779', 'CVE-2023-32398', 'CVE-2023-32402', 'CVE-2024-23218', 'CVE-2023-40429', 'CVE-2023-40413', 'CVE-2023-32399', 'CVE-2023-40414', 'CVE-2024-40799', 'CVE-2023-40419', 'CVE-2023-32413', 'CVE-2023-38580', 'CVE-2024-27815', 'CVE-2023-32434', 'CVE-2024-27840', 'CVE-2024-23296', 'CVE-2023-40528', 'CVE-2024-40774', 'CVE-2024-27801', 'CVE-2024-44171', 'CVE-2024-27820', 'CVE-2023-39434', 'CVE-2023-28191', 'CVE-2023-32412', 'CVE-2023-32407', 'CVE-2024-27808', 'CVE-2023-41071', 'CVE-2023-41982', 'CVE-2023-32409', 'CVE-2024-40785', 'CVE-2023-38593', 'CVE-2023-38592', 'CVE-2024-23282', 'CVE-2023-38600', 'CVE-2024-40806', 'CVE-2024-27828', 'CVE-2023-32381', 'CVE-2023-32357', 'CVE-2023-40399', 'CVE-2024-27830', 'CVE-2023-38598', 'CVE-2023-42852', 'CVE-2024-40813', 'CVE-2023-41997', 'CVE-2023-38572', 'CVE-2023-42937', 'CVE-2023-32404', 'CVE-2023-42957', 'CVE-2023-40420', 'CVE-2023-35990', 'CVE-2023-41984', 'CVE-2024-44183', 'CVE-2023-42936', 'CVE-2024-44176', 'CVE-2024-23217', 'CVE-2023-40408', 'CVE-2023-40424', 'CVE-2024-40780', 'CVE-2023-41988', 'CVE-2023-32423', 'CVE-2024-27800', 'CVE-2024-23213', 'CVE-2023-41254', 'CVE-2023-32389', 'CVE-2024-44198', 'CVE-2023-32416', 'CVE-2024-40835', 'CVE-2024-27805', 'CVE-2024-27863', 'CVE-2023-38136', 'CVE-2023-34352', 'CVE-2024-40822', 'CVE-2023-32400', 'CVE-2023-40456', 'CVE-2023-32432', 'CVE-2023-40448', 'CVE-2023-42890', 'CVE-2024-23204', 'CVE-2024-40795', 'CVE-2024-40793', 'CVE-2023-42893', 'CVE-2024-23225', 'CVE-2023-32354', 'CVE-2023-42950', 'CVE-2024-40788', 'CVE-2024-27884', 'CVE-2023-41174', 'CVE-2023-32394', 'CVE-2023-32361', 'CVE-2024-40850', 'CVE-2023-38565', 'CVE-2024-40812', 'CVE-2023-32391', 'CVE-2024-40809', 'CVE-2023-37450', 'CVE-2024-40815', 'CVE-2023-40412', 'CVE-2024-23206', 'CVE-2023-41073', 'CVE-2023-32376', 'CVE-2024-44170', 'CVE-2023-40395', 'CVE-2023-40447', 'CVE-2023-41981', 'CVE-2024-40857', 'CVE-2023-41976', 'CVE-2023-42914', 'CVE-2023-40409', 'CVE-2024-23211', 'CVE-2023-40410', 'CVE-2023-40400', 'CVE-2023-32403', 'CVE-2023-35984', 'CVE-2023-32417', 'CVE-2024-27811', 'CVE-2023-42898', 'CVE-2023-41065', 'CVE-2023-32390', 'CVE-2023-40427', 'CVE-2023-38604', 'CVE-2023-42888', 'CVE-2023-28202', 'CVE-2023-32396', 'CVE-2023-32433', 'CVE-2024-27851', 'CVE-2023-32392', 'CVE-2023-38599', 'CVE-2023-32445', 'CVE-2024-44191', 'CVE-2023-38595', 'CVE-2023-32734', 'CVE-2024-27806', 'CVE-2024-23207', 'CVE-2023-38594', 'CVE-2024-40787', 'CVE-2023-41968', 'CVE-2024-23212', 'CVE-2023-42883', 'CVE-2023-40452', 'CVE-2024-27838', 'CVE-2024-27880', 'CVE-2023-38611', 'CVE-2024-27832', 'CVE-2023-42949', 'CVE-2023-36495', 'CVE-2023-38606', 'CVE-2023-40403', 'CVE-2023-40520', 'CVE-2023-32372', 'CVE-2023-35074', 'CVE-2023-32428', 'CVE-2023-32425', 'CVE-2023-34425', 'CVE-2023-40432', 'CVE-2024-27823', 'CVE-2023-35993', 'CVE-2023-41074', 'CVE-2024-23251', 'CVE-2023-32373', 'CVE-2024-23208', 'CVE-2023-32388', 'CVE-2023-32441', 'CVE-2023-41068', 'CVE-2024-40818']}.
    • The scheme_data property was set to {'product': 'Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4 watchOS 9.4 (Build 20T253)', 'url': 'https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-apple-watch-s8-running-watchos-94', 'description': 'Le produit Ă©valuĂ© est « Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4, watchOS 9.4 (build 20T253) » dĂ©veloppĂ© par APPLE INC..\nApple Pay est une solution de paiement mobile dĂ©veloppĂ©e par la sociĂ©tĂ© APPLE INC. Après avoir enregistrĂ© une carte bancaire dans son Ă©quipement Apple, l’utilisateur peut faire des paiements au travers de celui-ci. Pour que le paie', 'sponsor': 'APPLE INC', 'developer': 'APPLE INC', 'cert_id': 'ANSSI-CC-2023/60', 'level': 'EAL2+', 'expiration_date': '19 Janvier 2029', 'enhanced': {'cert_id': 'ANSSI-CC-2023/60', 'certification_date': '19/01/2024', 'expiration_date': '19/01/2029', 'category': 'Divers', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'APPLE INC', 'sponsor': 'APPLE INC', 'evaluation_facility': 'THALES / CNES', 'level': 'EAL2+', 'protection_profile': '', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ADV_FSP.3', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_60en.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_60en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_60en.pdf'}}.
  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e723453c42e1b2a7775e09dbac95077a96bfde5f91be9ffac6144e43102c1d99', 'txt_hash': '577b9a17afa8f6ef94207e56754ef3e0d82be3ac29742c9ab7d913ad6464bb55'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5484f9225194fb80f4936f7fc05e17a6b4193024fabd540321f557163e7ea14e', 'txt_hash': '1e00b0721b5e01d10f2e0ba7052fc0b0478f1196180bcee7b9bc21c27965fd4f'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 2365643, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 54, '/CreationDate': 'D:20231109133713Z', '/Creator': 'Word', '/ModDate': 'D:20231109133737Z', '/Producer': 'Adobe Mac PDF Plug-in', '/Title': 'Microsoft Word - [ST] Watch_S8_watchOS9_SecurityTarget_v1.4.docx', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 138059, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20240222154647+01'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20240222155209+01'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL2': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 3, 'ADV_FSP.3': 2, 'ADV_TDS.1': 4, 'ADV_FSP.2': 4, 'ADV_FSP.1': 2}, 'AGD': {'AGD_OPE.1': 4, 'AGD_PRE.1': 4}, 'ALC': {'ALC_CMC.2': 2, 'ALC_CMS.2': 2, 'ALC_DEL.1': 2}, 'ATE': {'ATE_COV.1': 4, 'ATE_FUN.1': 3, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 2}, 'ASE': {'ASE_CCL.1': 2, 'ASE_ECD.1': 3, 'ASE_INT.1': 2, 'ASE_OBJ.2': 2, 'ASE_REQ.2': 2, 'ASE_SPD.1': 1, 'ASE_TSS.1': 2, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FDP': {'FDP_DAU.1': 4, 'FDP_DAU.1.1': 1, 'FDP_DAU.1.2': 1, 'FDP_ACC': 22, 'FDP_ACC.2': 4, 'FDP_ACF': 20, 'FDP_ACF.1': 12, 'FDP_ETC': 7, 'FDP_ETC.2.1': 2, 'FDP_ETC.2.2': 2, 'FDP_ETC.2.3': 2, 'FDP_ETC.2.4': 2, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_ITC': 5, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_UCT': 10, 'FDP_UCT.1': 1, 'FDP_UIT': 10, 'FDP_UIT.1': 2, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_RIP.1': 12, 'FDP_RIP.1.1': 1, 'FDP_SDI.1': 9, 'FDP_SDI.1.1': 1, 'FDP_ACC.1': 11, 'FDP_IFC.1': 8, 'FDP_ETC.2': 2}, 'FIA': {'FIA_UID.2': 6, 'FIA_UID.2.1': 1, 'FIA_UAU.2': 8, 'FIA_UAU.2.1': 1, 'FIA_UAU.5': 5, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6': 11, 'FIA_AFL': 9, 'FIA_AFL.1': 5, 'FIA_UAU.6.1': 2, 'FIA_ATD.1': 5, 'FIA_ATD.1.1': 2, 'FIA_SOS.2': 4, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_UAU.1': 2, 'FIA_UID.1': 1}, 'FMT': {'FMT_SMR.1': 10, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 7, 'FMT_SMF.1.1': 1, 'FMT_MSA.1': 6, 'FMT_MSA.3': 11, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.1.1': 2, 'FMT_MTD.1': 4, 'FMT_MTD.1.1': 1, 'FMT_MTD.3': 4, 'FMT_MTD.3.1': 1}, 'FPR': {'FPR_UNO.1': 12, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_ITC.1': 4, 'FPT_ITC.1.1': 1, 'FPT_RPL': 8, 'FPT_RPL.1': 6}, 'FTP': {'FTP_ITC': 14, 'FTP_ITC.1': 7, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 4}}, 'cc_claims': {'D': {'D.OS': 16, 'D.SEP_SE': 3}, 'T': {'T.CORRUPT': 2, 'T.PHYSICAL': 2, 'T.RECOVER': 2, 'T.REPLAY': 2, 'T.SILENT': 2, 'T.SKIMMING': 2, 'T.USURP': 2}, 'A': {'A.DE-': 2, 'A.PERSO': 3, 'A.CDCVM': 3, 'A.IPH-': 2, 'A.DEVICE_AUTH': 1, 'A.IPHONE_USER': 1}, 'OE': {'OE.CDCVM': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 3}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 4}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-3': 1, 'FIPS 140-2': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by': 1, 'pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.Card_Data D.Unlock_Secret* D.SEP_iPhone* T.RECOVER Card Recovery An attacker': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2023/60': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 2}}, 'cc_sar': {'ADV': {'ADV_FSP.3': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Thales': {'THALES/CNES': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to ANSSI-cible-CC-2023_60en.pdf.
    • The cert_filename property was set to certificat-CC-2023_60en.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_60en.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_60en.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4 watchOS 9.4 (Build 20T253)', 'url': 'https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-apple-watch-s8-running-watchos-94', 'description': 'Le produit Ă©valuĂ© est « Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4, watchOS 9.4 (build 20T253) » dĂ©veloppĂ© par APPLE INC..\nApple Pay est une solution de paiement mobile dĂ©veloppĂ©e par la sociĂ©tĂ© APPLE INC. Après avoir enregistrĂ© une carte bancaire dans son Ă©quipement Apple, l’utilisateur peut faire des paiements au travers de celui-ci. Pour que le paie', 'sponsor': 'APPLE INC', 'developer': 'APPLE INC', 'cert_id': 'ANSSI-CC-2023/60', 'level': 'EAL2+', 'expiration_date': '19 Janvier 2029', 'enhanced': {'cert_id': 'ANSSI-CC-2023/60', 'certification_date': '19/01/2024', 'expiration_date': '19/01/2029', 'category': 'Divers', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'APPLE INC', 'sponsor': 'APPLE INC', 'evaluation_facility': 'THALES / CNES', 'level': 'EAL2+', 'protection_profile': '', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ADV_FSP.3', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_60en.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_60en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_60en.pdf'}}.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4(watchOS 9.4 (build 20T253)) ( ANSSI-CC-2023/60) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_60en.pdf",
  "dgst": "6207e27699db6695",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2023/60",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:o:apple:watchos:9.4:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "9.4"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2024-23271",
        "CVE-2024-44255",
        "CVE-2023-32352",
        "CVE-2023-41074",
        "CVE-2023-42866",
        "CVE-2024-23235",
        "CVE-2023-41070",
        "CVE-2023-41065",
        "CVE-2023-41071",
        "CVE-2024-23290",
        "CVE-2023-38595",
        "CVE-2023-32368",
        "CVE-2024-27832",
        "CVE-2023-42942",
        "CVE-2023-38611",
        "CVE-2023-38596",
        "CVE-2023-42834",
        "CVE-2024-23225",
        "CVE-2023-40409",
        "CVE-2023-40395",
        "CVE-2023-32428",
        "CVE-2023-40420",
        "CVE-2024-44234",
        "CVE-2023-38592",
        "CVE-2023-42823",
        "CVE-2023-42946",
        "CVE-2024-44274",
        "CVE-2024-27851",
        "CVE-2023-42852",
        "CVE-2023-38606",
        "CVE-2024-54527",
        "CVE-2024-27805",
        "CVE-2023-32396",
        "CVE-2023-38572",
        "CVE-2024-44212",
        "CVE-2024-44171",
        "CVE-2024-44169",
        "CVE-2023-32389",
        "CVE-2023-42957",
        "CVE-2023-42878",
        "CVE-2024-23212",
        "CVE-2023-32417",
        "CVE-2023-38590",
        "CVE-2023-40454",
        "CVE-2023-40520",
        "CVE-2023-38136",
        "CVE-2024-44278",
        "CVE-2024-40795",
        "CVE-2023-28204",
        "CVE-2023-40456",
        "CVE-2024-23282",
        "CVE-2023-42888",
        "CVE-2024-54505",
        "CVE-2024-23278",
        "CVE-2024-23296",
        "CVE-2024-40777",
        "CVE-2023-32357",
        "CVE-2024-27816",
        "CVE-2023-32434",
        "CVE-2023-38594",
        "CVE-2024-23210",
        "CVE-2023-41984",
        "CVE-2024-44239",
        "CVE-2023-32391",
        "CVE-2024-44225",
        "CVE-2024-40776",
        "CVE-2024-27806",
        "CVE-2023-40528",
        "CVE-2024-27863",
        "CVE-2023-42950",
        "CVE-2024-54502",
        "CVE-2024-40780",
        "CVE-2023-35993",
        "CVE-2024-23218",
        "CVE-2023-38599",
        "CVE-2024-27838",
        "CVE-2023-32412",
        "CVE-2024-23211",
        "CVE-2024-23217",
        "CVE-2023-32403",
        "CVE-2024-40806",
        "CVE-2024-44194",
        "CVE-2023-40399",
        "CVE-2024-23286",
        "CVE-2024-44155",
        "CVE-2024-40788",
        "CVE-2023-32433",
        "CVE-2024-40812",
        "CVE-2023-42937",
        "CVE-2023-41976",
        "CVE-2023-40432",
        "CVE-2024-44269",
        "CVE-2023-40447",
        "CVE-2023-32420",
        "CVE-2023-42947",
        "CVE-2024-23251",
        "CVE-2024-27814",
        "CVE-2024-40829",
        "CVE-2024-23204",
        "CVE-2024-23291",
        "CVE-2023-32376",
        "CVE-2024-54508",
        "CVE-2023-42890",
        "CVE-2024-23246",
        "CVE-2024-54486",
        "CVE-2024-27808",
        "CVE-2023-41174",
        "CVE-2024-40782",
        "CVE-2024-40818",
        "CVE-2023-32398",
        "CVE-2024-23263",
        "CVE-2024-44198",
        "CVE-2024-40779",
        "CVE-2024-40787",
        "CVE-2024-27828",
        "CVE-2024-27840",
        "CVE-2024-44170",
        "CVE-2024-27800",
        "CVE-2024-40822",
        "CVE-2024-27821",
        "CVE-2023-32361",
        "CVE-2024-23280",
        "CVE-2024-40774",
        "CVE-2023-37450",
        "CVE-2023-42936",
        "CVE-2024-27884",
        "CVE-2023-40413",
        "CVE-2023-32404",
        "CVE-2023-32354",
        "CVE-2024-40836",
        "CVE-2024-40784",
        "CVE-2024-44282",
        "CVE-2024-54479",
        "CVE-2024-23213",
        "CVE-2023-40417",
        "CVE-2024-27801",
        "CVE-2023-38598",
        "CVE-2024-54514",
        "CVE-2024-23208",
        "CVE-2023-40427",
        "CVE-2024-44185",
        "CVE-2023-32408",
        "CVE-2023-32372",
        "CVE-2023-41061",
        "CVE-2024-44273",
        "CVE-2023-32384",
        "CVE-2024-40857",
        "CVE-2024-23265",
        "CVE-2023-41073",
        "CVE-2024-23297",
        "CVE-2024-40789",
        "CVE-2024-40813",
        "CVE-2024-40824",
        "CVE-2024-27834",
        "CVE-2023-35990",
        "CVE-2023-32441",
        "CVE-2023-35984",
        "CVE-2024-54501",
        "CVE-2024-44254",
        "CVE-2023-40400",
        "CVE-2023-32445",
        "CVE-2024-54510",
        "CVE-2023-42883",
        "CVE-2024-44187",
        "CVE-2023-34425",
        "CVE-2024-23284",
        "CVE-2024-23215",
        "CVE-2024-27823",
        "CVE-2024-44232",
        "CVE-2024-44233",
        "CVE-2023-32381",
        "CVE-2023-40410",
        "CVE-2023-41981",
        "CVE-2024-23206",
        "CVE-2024-44244",
        "CVE-2023-32390",
        "CVE-2023-41968",
        "CVE-2023-32394",
        "CVE-2024-23288",
        "CVE-2024-27810",
        "CVE-2023-39434",
        "CVE-2023-38604",
        "CVE-2024-40793",
        "CVE-2023-42846",
        "CVE-2023-41982",
        "CVE-2024-23223",
        "CVE-2023-40452",
        "CVE-2024-27815",
        "CVE-2024-23254",
        "CVE-2023-32373",
        "CVE-2023-32416",
        "CVE-2023-35074",
        "CVE-2023-41068",
        "CVE-2023-40429",
        "CVE-2024-44297",
        "CVE-2023-40396",
        "CVE-2024-54526",
        "CVE-2024-23226",
        "CVE-2023-38593",
        "CVE-2023-32392",
        "CVE-2023-42899",
        "CVE-2024-27811",
        "CVE-2024-54494",
        "CVE-2024-40809",
        "CVE-2023-32388",
        "CVE-2024-23231",
        "CVE-2024-54500",
        "CVE-2024-23293",
        "CVE-2023-36495",
        "CVE-2024-27826",
        "CVE-2023-40408",
        "CVE-2024-44215",
        "CVE-2023-42898",
        "CVE-2024-40799",
        "CVE-2023-41997",
        "CVE-2023-42839",
        "CVE-2023-40403",
        "CVE-2023-32399",
        "CVE-2023-42848",
        "CVE-2023-38133",
        "CVE-2024-23287",
        "CVE-2024-44302",
        "CVE-2023-32413",
        "CVE-2023-38580",
        "CVE-2023-32432",
        "CVE-2023-42849",
        "CVE-2023-41254",
        "CVE-2024-23239",
        "CVE-2023-32407",
        "CVE-2024-44240",
        "CVE-2023-42914",
        "CVE-2024-44183",
        "CVE-2023-40448",
        "CVE-2023-28202",
        "CVE-2023-32400",
        "CVE-2024-27820",
        "CVE-2024-44290",
        "CVE-2024-40815",
        "CVE-2023-41988",
        "CVE-2024-23201",
        "CVE-2023-42949",
        "CVE-2024-44191",
        "CVE-2023-32402",
        "CVE-2023-32425",
        "CVE-2024-27830",
        "CVE-2023-42953",
        "CVE-2024-23207",
        "CVE-2023-40414",
        "CVE-2024-0258",
        "CVE-2023-40419",
        "CVE-2023-40412",
        "CVE-2024-54513",
        "CVE-2024-54534",
        "CVE-2024-23289",
        "CVE-2023-40424",
        "CVE-2024-44176",
        "CVE-2023-34352",
        "CVE-2023-28191",
        "CVE-2023-27930",
        "CVE-2023-38600",
        "CVE-2023-32423",
        "CVE-2023-32409",
        "CVE-2024-40805",
        "CVE-2024-40835",
        "CVE-2024-40785",
        "CVE-2024-40850",
        "CVE-2024-44285",
        "CVE-2024-27804",
        "CVE-2024-27880",
        "CVE-2024-44144",
        "CVE-2023-38565",
        "CVE-2023-32734",
        "CVE-2024-44296",
        "CVE-2024-23250",
        "CVE-2023-42893"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Apple Inc.",
  "manufacturer_web": "https://www.apple.com/",
  "name": "Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4(watchOS 9.4 (build 20T253)) ( ANSSI-CC-2023/60)",
  "not_valid_after": "2029-01-19",
  "not_valid_before": "2024-01-19",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "certificat-CC-2023_60en.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2023/60": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 2
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Thales": {
          "THALES/CNES": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20240222154647+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20240222155209+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 138059,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "ANSSI-CC-2023_60en.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2023/60": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.3": 1
        },
        "ALC": {
          "ALC_FLR": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 3,
          "EAL2 augmented": 1,
          "EAL4": 1
        },
        "ITSEC": {
          "ITSEC E3 Basic": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Thales": {
          "THALES/CNES": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20240222154716+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20240222155205+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 403804,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]",
          "http://www.sogis.eu/",
          "http://www.ssi.gouv.fr/",
          "http://www.commoncriteriaportal.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 13
    },
    "st_filename": "ANSSI-cible-CC-2023_60en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CDCVM": 3,
          "A.DE-": 2,
          "A.DEVICE_AUTH": 1,
          "A.IPH-": 2,
          "A.IPHONE_USER": 1,
          "A.PERSO": 3
        },
        "D": {
          "D.OS": 16,
          "D.SEP_SE": 3
        },
        "OE": {
          "OE.CDCVM": 3
        },
        "T": {
          "T.CORRUPT": 2,
          "T.PHYSICAL": 2,
          "T.RECOVER": 2,
          "T.REPLAY": 2,
          "T.SILENT": 2,
          "T.SKIMMING": 2,
          "T.USURP": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 3,
          "ADV_FSP.1": 2,
          "ADV_FSP.2": 4,
          "ADV_FSP.3": 2,
          "ADV_TDS.1": 4
        },
        "AGD": {
          "AGD_OPE.1": 4,
          "AGD_PRE.1": 4
        },
        "ALC": {
          "ALC_CMC.2": 2,
          "ALC_CMS.2": 2,
          "ALC_DEL.1": 2
        },
        "ASE": {
          "ASE_CCL.1": 2,
          "ASE_ECD.1": 3,
          "ASE_INT.1": 2,
          "ASE_OBJ.2": 2,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 2
        },
        "ATE": {
          "ATE_COV.1": 4,
          "ATE_FUN.1": 3,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL2": 1
        }
      },
      "cc_sfr": {
        "FDP": {
          "FDP_ACC": 22,
          "FDP_ACC.1": 11,
          "FDP_ACC.2": 4,
          "FDP_ACC.2.1": 1,
          "FDP_ACC.2.2": 1,
          "FDP_ACF": 20,
          "FDP_ACF.1": 12,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_DAU.1": 4,
          "FDP_DAU.1.1": 1,
          "FDP_DAU.1.2": 1,
          "FDP_ETC": 7,
          "FDP_ETC.2": 2,
          "FDP_ETC.2.1": 2,
          "FDP_ETC.2.2": 2,
          "FDP_ETC.2.3": 2,
          "FDP_ETC.2.4": 2,
          "FDP_IFC.1": 8,
          "FDP_ITC": 5,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_RIP.1": 12,
          "FDP_RIP.1.1": 1,
          "FDP_SDI.1": 9,
          "FDP_SDI.1.1": 1,
          "FDP_UCT": 10,
          "FDP_UCT.1": 1,
          "FDP_UCT.1.1": 1,
          "FDP_UIT": 10,
          "FDP_UIT.1": 2,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_AFL": 9,
          "FIA_AFL.1": 5,
          "FIA_ATD.1": 5,
          "FIA_ATD.1.1": 2,
          "FIA_SOS.2": 4,
          "FIA_SOS.2.1": 1,
          "FIA_SOS.2.2": 1,
          "FIA_UAU.1": 2,
          "FIA_UAU.2": 8,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.5": 5,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 11,
          "FIA_UAU.6.1": 2,
          "FIA_UID.1": 1,
          "FIA_UID.2": 6,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MSA.1": 6,
          "FMT_MSA.1.1": 2,
          "FMT_MSA.3": 11,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 4,
          "FMT_MTD.1.1": 1,
          "FMT_MTD.3": 4,
          "FMT_MTD.3.1": 1,
          "FMT_SMF.1": 7,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 10,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO.1": 12,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_ITC.1": 4,
          "FPT_ITC.1.1": 1,
          "FPT_RPL": 8,
          "FPT_RPL.1": 6
        },
        "FTP": {
          "FTP_ITC": 14,
          "FTP_ITC.1": 7,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {
        "OutOfScope": {
          "Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by": 1,
          "out of scope": 2,
          "pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.Card_Data D.Unlock_Secret* D.SEP_iPhone* T.RECOVER Card Recovery An attacker": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 3
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS 140-3": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 4
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20231109133713Z",
      "/Creator": "Word",
      "/ModDate": "D:20231109133737Z",
      "/Producer": "Adobe Mac PDF Plug-in",
      "/Title": "Microsoft Word - [ST] Watch_S8_watchOS9_SecurityTarget_v1.4.docx",
      "pdf_file_size_bytes": 2365643,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 54
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_60en.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ADV_FSP.3",
      "EAL2+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_60en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "5484f9225194fb80f4936f7fc05e17a6b4193024fabd540321f557163e7ea14e",
      "txt_hash": "1e00b0721b5e01d10f2e0ba7052fc0b0478f1196180bcee7b9bc21c27965fd4f"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "c7fe41baa75b869067263842cc44bb4f43ffa4d0b42bc8c332d44a58d24f7808",
      "txt_hash": "73c0b750b752064dc9c6b7257313bf1ea6b2f89bee4040eb27ec6ab8dd2ed61f"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e723453c42e1b2a7775e09dbac95077a96bfde5f91be9ffac6144e43102c1d99",
      "txt_hash": "577b9a17afa8f6ef94207e56754ef3e0d82be3ac29742c9ab7d913ad6464bb55"
    }
  },
  "status": "active"
}