Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4(watchOS 9.4 (build 20T253)) ( ANSSI-CC-2023/60)
CSV information ?
Status | active |
---|---|
Valid from | 19.01.2024 |
Valid until | 19.01.2029 |
Scheme | 🇫🇷 FR |
Manufacturer | Apple Inc. |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL2+, ADV_FSP.3 |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL2Security Assurance Requirements (SAR)
ADV_FSP.3Certificates
ANSSI-CC-2023/60Evaluation facilities
THALES/CNESFile metadata
Creation date | D:20240222154647+01'00' |
---|---|
Modification date | D:20240222155209+01'00' |
Pages | 2 |
Creator | Acrobat PDFMaker 23 pour Word |
Producer | Adobe PDF Library 23.1.175 |
Certification report ?
Extracted keywords
Security level
EAL2, EAL4, EAL2 augmented, ITSEC E3 BasicSecurity Assurance Requirements (SAR)
ADV_FSP.3, ALC_FLRCertificates
ANSSI-CC-2023/60Evaluation facilities
THALES/CNESStandards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
Creation date | D:20240222154716+01'00' |
---|---|
Modification date | D:20240222155205+01'00' |
Pages | 13 |
Creator | Acrobat PDFMaker 23 pour Word |
Producer | Adobe PDF Library 23.1.175 |
Security target ?
Extracted keywords
Symmetric Algorithms
AESSchemes
MACProtocols
TLSTrusted Execution Environments
SESecurity level
EAL 2, EAL2Claims
D.OS, D.SEP_SE, T.CORRUPT, T.PHYSICAL, T.RECOVER, T.REPLAY, T.SILENT, T.SKIMMING, T.USURP, A.DE-, A.PERSO, A.CDCVM, A.IPH-, A.DEVICE_AUTH, A.IPHONE_USER, OE.CDCVMSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.1, ADV_FSP.2, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1Security Functional Requirements (SFR)
FDP_DAU.1, FDP_DAU.1.1, FDP_DAU.1.2, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_ETC, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_UCT, FDP_UCT.1, FDP_UIT, FDP_UIT.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.1.1, FDP_ACC.1, FDP_IFC.1, FDP_ETC.2, FIA_UID.2, FIA_UID.2.1, FIA_UAU.2, FIA_UAU.2.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_AFL, FIA_AFL.1, FIA_UAU.6.1, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.1, FIA_UID.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1.1, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.3, FMT_MTD.3.1, FPR_UNO.1, FPR_UNO.1.1, FPT_ITC.1, FPT_ITC.1.1, FPT_RPL, FPT_RPL.1, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1Certification process
out of scope, Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by, pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.Card_Data D.Unlock_Secret* D.SEP_iPhone* T.RECOVER Card Recovery An attackerStandards
FIPS 140-3, FIPS 140-2File metadata
Title | Microsoft Word - [ST] Watch_S8_watchOS9_SecurityTarget_v1.4.docx |
---|---|
Creation date | D:20231109133713Z |
Modification date | D:20231109133737Z |
Pages | 54 |
Creator | Word |
Producer | Adobe Mac PDF Plug-in |
Heuristics ?
Extracted SARs
ASE_CCL.1, ALC_DEL.1, ATE_FUN.1, ATE_IND.2, ASE_TSS.1, ADV_ARC.1, ADV_TDS.1, ATE_COV.1, ASE_SPD.1, ASE_REQ.2, AGD_OPE.1, ASE_ECD.1, ALC_CMS.2, ALC_CMC.2, AVA_VAN.2, ASE_INT.1, AGD_PRE.1, ASE_OBJ.2, ADV_FSP.3CPE matches
Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-2023-27930 | HIGH | 7.8 | 5.9 | 23.06.2023 18:15 | ||
CVE-2023-28191 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-28202 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-28204 | MEDIUM | 6.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32352 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32354 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32357 | HIGH | 7.1 | 5.2 | 23.06.2023 18:15 | ||
CVE-2023-32361 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:18 | ||
CVE-2023-32368 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32372 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32373 | HIGH | 8.8 | 5.9 | 23.06.2023 18:15 | ||
CVE-2023-32376 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32381 | HIGH | 7.8 | 5.9 | 27.07.2023 00:15 | ||
CVE-2023-32384 | HIGH | 7.8 | 5.9 | 23.06.2023 18:15 | ||
CVE-2023-32388 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32389 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32390 | LOW | 2.4 | 1.4 | 23.06.2023 18:15 | ||
CVE-2023-32391 | MEDIUM | 4.6 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32392 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32394 | LOW | 2.4 | 1.4 | 23.06.2023 18:15 | ||
CVE-2023-32396 | HIGH | 7.8 | 5.9 | 27.09.2023 15:18 | ||
CVE-2023-32398 | HIGH | 7.8 | 5.9 | 23.06.2023 18:15 | ||
CVE-2023-32399 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32400 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32402 | MEDIUM | 6.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32403 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32404 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32407 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32408 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32409 | HIGH | 8.6 | 4.0 | 23.06.2023 18:15 | ||
CVE-2023-32412 | CRITICAL | 9.8 | 5.9 | 23.06.2023 18:15 | ||
CVE-2023-32413 | HIGH | 7.0 | 5.9 | 23.06.2023 18:15 | ||
CVE-2023-32416 | MEDIUM | 5.5 | 3.6 | 27.07.2023 01:15 | ||
CVE-2023-32417 | LOW | 2.4 | 1.4 | 23.06.2023 18:15 | ||
CVE-2023-32420 | HIGH | 7.1 | 5.2 | 23.06.2023 18:15 | ||
CVE-2023-32423 | MEDIUM | 6.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32425 | HIGH | 7.8 | 5.9 | 06.09.2023 02:15 | ||
CVE-2023-32428 | HIGH | 7.8 | 5.9 | 06.09.2023 02:15 | ||
CVE-2023-32432 | MEDIUM | 5.5 | 3.6 | 06.09.2023 02:15 | ||
CVE-2023-32433 | HIGH | 7.8 | 5.9 | 27.07.2023 00:15 | ||
CVE-2023-32434 | HIGH | 7.8 | 5.9 | 23.06.2023 18:15 | ||
CVE-2023-32441 | HIGH | 7.8 | 5.9 | 27.07.2023 01:15 | ||
CVE-2023-32445 | MEDIUM | 6.1 | 2.7 | 28.07.2023 05:15 | ||
CVE-2023-32734 | HIGH | 7.8 | 5.9 | 27.07.2023 01:15 | ||
CVE-2023-34352 | MEDIUM | 5.3 | 1.4 | 06.09.2023 02:15 | ||
CVE-2023-34425 | CRITICAL | 9.8 | 5.9 | 28.07.2023 05:15 | ||
CVE-2023-35074 | HIGH | 8.8 | 5.9 | 27.09.2023 15:18 | ||
CVE-2023-35984 | MEDIUM | 4.3 | 3.4 | 27.09.2023 15:18 | ||
CVE-2023-35990 | LOW | 3.3 | 1.4 | 27.09.2023 15:18 | ||
CVE-2023-35993 | HIGH | 7.8 | 5.9 | 27.07.2023 01:15 | ||
CVE-2023-36495 | CRITICAL | 9.8 | 5.9 | 28.07.2023 05:15 | ||
CVE-2023-37450 | HIGH | 8.8 | 5.9 | 27.07.2023 00:15 | ||
CVE-2023-38133 | MEDIUM | 6.5 | 3.6 | 27.07.2023 00:15 | ||
CVE-2023-38136 | HIGH | 7.8 | 5.9 | 27.07.2023 01:15 | ||
CVE-2023-38565 | HIGH | 7.8 | 5.9 | 27.07.2023 01:15 | ||
CVE-2023-38572 | HIGH | 7.5 | 3.6 | 27.07.2023 01:15 | ||
CVE-2023-38580 | HIGH | 7.8 | 5.9 | 27.07.2023 01:15 | ||
CVE-2023-38590 | HIGH | 8.8 | 5.9 | 28.07.2023 05:15 | ||
CVE-2023-38592 | HIGH | 8.8 | 5.9 | 28.07.2023 05:15 | ||
CVE-2023-38593 | MEDIUM | 5.5 | 3.6 | 27.07.2023 01:15 | ||
CVE-2023-38594 | HIGH | 8.8 | 5.9 | 27.07.2023 00:15 | ||
CVE-2023-38595 | HIGH | 8.8 | 5.9 | 27.07.2023 01:15 | ||
CVE-2023-38596 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:18 | ||
CVE-2023-38598 | CRITICAL | 9.8 | 5.9 | 28.07.2023 05:15 | ||
CVE-2023-38599 | MEDIUM | 6.5 | 3.6 | 28.07.2023 05:15 | ||
CVE-2023-38600 | HIGH | 8.8 | 5.9 | 27.07.2023 01:15 | ||
CVE-2023-38604 | CRITICAL | 9.8 | 5.9 | 28.07.2023 05:15 | ||
CVE-2023-38606 | MEDIUM | 5.5 | 3.6 | 27.07.2023 00:15 | ||
CVE-2023-38611 | HIGH | 8.8 | 5.9 | 27.07.2023 01:15 | ||
CVE-2023-39434 | HIGH | 8.8 | 5.9 | 27.09.2023 15:18 | ||
CVE-2023-40395 | LOW | 3.3 | 1.4 | 27.09.2023 15:19 | ||
CVE-2023-40399 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40400 | CRITICAL | 9.8 | 5.9 | 27.09.2023 15:19 | ||
CVE-2023-40403 | MEDIUM | 6.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40408 | MEDIUM | 5.3 | 1.4 | 25.10.2023 19:15 | ||
CVE-2023-40409 | HIGH | 7.8 | 5.9 | 27.09.2023 15:19 | ||
CVE-2023-40410 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40412 | HIGH | 7.8 | 5.9 | 27.09.2023 15:19 | ||
CVE-2023-40413 | MEDIUM | 5.5 | 3.6 | 25.10.2023 19:15 | ||
CVE-2023-40414 | CRITICAL | 9.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-40417 | MEDIUM | 5.4 | 2.5 | 27.09.2023 15:19 | ||
CVE-2023-40419 | HIGH | 7.8 | 5.9 | 27.09.2023 15:19 | ||
CVE-2023-40420 | MEDIUM | 6.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40424 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40427 | LOW | 3.3 | 1.4 | 27.09.2023 15:19 | ||
CVE-2023-40429 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40432 | HIGH | 7.8 | 5.9 | 27.09.2023 15:19 | ||
CVE-2023-40447 | HIGH | 8.8 | 5.9 | 25.10.2023 19:15 | ||
CVE-2023-40448 | HIGH | 8.6 | 4.0 | 27.09.2023 15:19 | ||
CVE-2023-40452 | HIGH | 7.1 | 5.2 | 27.09.2023 15:19 | ||
CVE-2023-40454 | HIGH | 7.1 | 5.2 | 27.09.2023 15:19 | ||
CVE-2023-40456 | LOW | 3.3 | 1.4 | 27.09.2023 15:19 | ||
CVE-2023-40520 | LOW | 3.3 | 1.4 | 27.09.2023 15:19 | ||
CVE-2023-40528 | MEDIUM | 5.5 | 3.6 | 23.01.2024 01:15 | ||
CVE-2023-41061 | HIGH | 7.8 | 5.9 | 07.09.2023 18:15 | ||
CVE-2023-41065 | LOW | 3.3 | 1.4 | 27.09.2023 15:19 | ||
CVE-2023-41068 | HIGH | 7.8 | 5.9 | 27.09.2023 15:19 | ||
CVE-2023-41070 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-41071 | HIGH | 7.8 | 5.9 | 27.09.2023 15:19 | ||
CVE-2023-41073 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-41074 | HIGH | 8.8 | 5.9 | 27.09.2023 15:19 | ||
CVE-2023-41174 | HIGH | 7.8 | 5.9 | 27.09.2023 15:19 | ||
CVE-2023-41254 | MEDIUM | 5.5 | 3.6 | 25.10.2023 19:15 | ||
CVE-2023-41968 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-41976 | HIGH | 8.8 | 5.9 | 25.10.2023 19:15 | ||
CVE-2023-41981 | MEDIUM | 4.4 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-41982 | MEDIUM | 4.6 | 3.6 | 25.10.2023 19:15 | ||
CVE-2023-41984 | HIGH | 7.8 | 5.9 | 27.09.2023 15:19 | ||
CVE-2023-41988 | MEDIUM | 6.8 | 5.9 | 25.10.2023 19:15 | ||
CVE-2023-41997 | MEDIUM | 4.6 | 3.6 | 25.10.2023 19:15 | ||
CVE-2023-42846 | MEDIUM | 5.3 | 1.4 | 25.10.2023 19:15 | ||
CVE-2023-42849 | MEDIUM | 6.5 | 3.6 | 25.10.2023 19:15 | ||
CVE-2023-42852 | HIGH | 8.8 | 5.9 | 25.10.2023 19:15 | ||
CVE-2023-42866 | HIGH | 8.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-42883 | MEDIUM | 5.5 | 3.6 | 12.12.2023 01:15 | ||
CVE-2023-42888 | MEDIUM | 5.5 | 3.6 | 23.01.2024 01:15 | ||
CVE-2023-42890 | HIGH | 8.8 | 5.9 | 12.12.2023 01:15 | ||
CVE-2023-42893 | MEDIUM | 5.5 | 3.6 | 28.03.2024 16:15 | ||
CVE-2023-42898 | MEDIUM | 5.5 | 3.6 | 12.12.2023 01:15 | ||
CVE-2023-42899 | HIGH | 7.8 | 5.9 | 12.12.2023 01:15 | ||
CVE-2023-42914 | MEDIUM | 6.3 | 4.0 | 12.12.2023 01:15 | ||
CVE-2023-42936 | MEDIUM | 5.5 | 3.6 | 28.03.2024 16:15 | ||
CVE-2023-42937 | MEDIUM | 5.5 | 3.6 | 23.01.2024 01:15 | ||
CVE-2023-42947 | HIGH | 8.6 | 6.0 | 28.03.2024 16:15 | ||
CVE-2023-42949 | LOW | 3.3 | 1.4 | 29.07.2024 21:15 | ||
CVE-2023-42950 | HIGH | 8.8 | 5.9 | 28.03.2024 16:15 | ||
CVE-2023-42957 | LOW | 3.3 | 1.4 | 29.07.2024 21:15 | ||
CVE-2024-23204 | HIGH | 7.5 | 3.6 | 23.01.2024 01:15 | ||
CVE-2024-23206 | MEDIUM | 6.5 | 3.6 | 23.01.2024 01:15 | ||
CVE-2024-23207 | MEDIUM | 5.5 | 3.6 | 23.01.2024 01:15 | ||
CVE-2024-23208 | HIGH | 7.8 | 5.9 | 23.01.2024 01:15 | ||
CVE-2024-23210 | LOW | 3.3 | 1.4 | 23.01.2024 01:15 | ||
CVE-2024-23211 | LOW | 3.3 | 1.4 | 23.01.2024 01:15 | ||
CVE-2024-23212 | HIGH | 7.8 | 5.9 | 23.01.2024 01:15 | ||
CVE-2024-23213 | HIGH | 8.8 | 5.9 | 23.01.2024 01:15 | ||
CVE-2024-23215 | MEDIUM | 5.5 | 3.6 | 23.01.2024 01:15 | ||
CVE-2024-23217 | LOW | 3.3 | 1.4 | 23.01.2024 01:15 | ||
CVE-2024-23218 | MEDIUM | 5.9 | 3.6 | 23.01.2024 01:15 | ||
CVE-2024-23223 | MEDIUM | 6.2 | 3.6 | 23.01.2024 01:15 | ||
CVE-2024-23225 | HIGH | 7.8 | 5.9 | 05.03.2024 20:16 | ||
CVE-2024-23251 | MEDIUM | 4.6 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-23282 | MEDIUM | 5.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-23296 | HIGH | 7.8 | 5.9 | 05.03.2024 20:16 | ||
CVE-2024-27800 | MEDIUM | 6.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27801 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27805 | MEDIUM | 5.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27806 | MEDIUM | 5.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27808 | HIGH | 8.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27811 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27814 | LOW | 2.4 | 1.4 | 10.06.2024 21:15 | ||
CVE-2024-27815 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27820 | HIGH | 8.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27823 | MEDIUM | 5.9 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27828 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27830 | MEDIUM | 6.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27832 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27838 | MEDIUM | 6.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27840 | MEDIUM | 6.3 | 4.0 | 10.06.2024 21:15 | ||
CVE-2024-27851 | HIGH | 8.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27863 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27880 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27884 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40774 | HIGH | 7.1 | 5.2 | 29.07.2024 23:15 | ||
CVE-2024-40776 | MEDIUM | 4.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40779 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40780 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40785 | MEDIUM | 6.1 | 2.7 | 29.07.2024 23:15 | ||
CVE-2024-40787 | HIGH | 7.1 | 5.2 | 29.07.2024 23:15 | ||
CVE-2024-40788 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40789 | MEDIUM | 6.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40793 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40795 | LOW | 3.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40799 | HIGH | 7.1 | 5.2 | 29.07.2024 23:15 | ||
CVE-2024-40806 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40809 | HIGH | 7.8 | 5.9 | 29.07.2024 23:15 | ||
CVE-2024-40812 | HIGH | 7.8 | 5.9 | 29.07.2024 23:15 | ||
CVE-2024-40813 | MEDIUM | 4.6 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40815 | HIGH | 7.5 | 5.9 | 29.07.2024 23:15 | ||
CVE-2024-40818 | MEDIUM | 4.6 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40822 | LOW | 2.4 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40835 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40850 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40857 | MEDIUM | 6.1 | 2.7 | 17.09.2024 00:15 | ||
CVE-2024-44144 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44155 | MEDIUM | 6.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44170 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44171 | MEDIUM | 4.6 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44176 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44183 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44185 | MEDIUM | 5.5 | 3.6 | 24.10.2024 17:15 | ||
CVE-2024-44187 | MEDIUM | 6.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44191 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44194 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44198 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44215 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44232 | MEDIUM | 5.5 | 3.6 | 01.11.2024 21:15 | ||
CVE-2024-44233 | MEDIUM | 5.5 | 3.6 | 01.11.2024 21:15 | ||
CVE-2024-44234 | MEDIUM | 5.5 | 3.6 | 01.11.2024 21:15 | ||
CVE-2024-44239 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44244 | MEDIUM | 4.3 | 1.4 | 28.10.2024 21:15 | ||
CVE-2024-44254 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44255 | HIGH | 7.8 | 5.9 | 28.10.2024 21:15 | ||
CVE-2024-44269 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44273 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44274 | MEDIUM | 4.6 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44282 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44285 | HIGH | 7.8 | 5.9 | 28.10.2024 21:15 | ||
CVE-2024-44297 | MEDIUM | 6.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44302 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 |
Similar certificates
Scheme data ?
Product | Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4 watchOS 9.4 (Build 20T253) | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-apple-watch-s8-running-watchos-94 | |
Description | Le produit évalué est « Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4, watchOS 9.4 (build 20T253) » développé par APPLE INC.. Apple Pay est une solution de paiement mobile développée par la société APPLE INC. Après avoir enregistré une carte bancaire dans son équipement Apple, l’utilisateur peut faire des paiements au travers de celui-ci. Pour que le paie | |
Sponsor | APPLE INC | |
Developer | APPLE INC | |
Cert Id | ANSSI-CC-2023/60 | |
Level | EAL2+ | |
Expiration Date | 19.01.2029 | |
Enhanced | ||
Cert Id | ANSSI-CC-2023/60 | |
Certification Date | 19.01.2024 | |
Expiration Date | 19.01.2029 | |
Category | Divers | |
Cc Version | Critères Communs version 3.1r5 | |
Developer | APPLE INC | |
Sponsor | APPLE INC | |
Evaluation Facility | THALES / CNES | |
Level | EAL2+ | |
Protection Profile | ||
Mutual Recognition | CCRA SOG-IS | |
Augmented | ADV_FSP.3 | |
Report Link | https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_60en.pdf | |
Target Link | https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_60en.pdf | |
Cert Link | https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_60en.pdf |
References ?
No references are available for this certificate.
Updates ?
-
12.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2024-44239', 'CVE-2024-44273', 'CVE-2024-44244', 'CVE-2024-44285', 'CVE-2024-44254', 'CVE-2024-44233', 'CVE-2024-44234', 'CVE-2024-44194', 'CVE-2024-44232', 'CVE-2024-44215', 'CVE-2024-44302', 'CVE-2024-44274', 'CVE-2024-44269', 'CVE-2024-44255', 'CVE-2024-44282']}
values added.
- The related_cves property was updated, with the
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'description': 'Le produit évalué est « Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4, watchOS 9.4 (build 20T253) » développé par APPLE INC.. Apple Pay est une solution de paiement mobile développée par la société APPLE INC. Après avoir enregistré une carte bancaire dans son équipement Apple, l’utilisateur peut faire des paiements au travers de celui-ci. Pour que le paie', 'expiration_date': '2029-01-19', 'enhanced': {'__update__': {'certification_date': '2024-01-19', 'expiration_date': '2029-01-19', 'mutual_recognition': 'CCRA SOG-IS'}}}
data.
- The scheme_data property was updated, with the
-
30.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2024-44144', 'CVE-2024-44155', 'CVE-2024-44297', 'CVE-2024-44185']}
values added.
- The related_cves property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was set to
{'_type': 'Set', 'elements': ['cpe:2.3:o:apple:watchos:9.4:*:*:*:*:*:*:*']}
. - The related_cves property was set to
{'_type': 'Set', 'elements': ['CVE-2023-41988', 'CVE-2023-40417', 'CVE-2024-23207', 'CVE-2023-38600', 'CVE-2023-41065', 'CVE-2023-41997', 'CVE-2024-44171', 'CVE-2024-44176', 'CVE-2023-40420', 'CVE-2023-41968', 'CVE-2023-40424', 'CVE-2023-32396', 'CVE-2023-32352', 'CVE-2023-32403', 'CVE-2023-38133', 'CVE-2023-32388', 'CVE-2023-40419', 'CVE-2024-23218', 'CVE-2024-40822', 'CVE-2023-32354', 'CVE-2023-42937', 'CVE-2024-27832', 'CVE-2024-40857', 'CVE-2024-23225', 'CVE-2023-40400', 'CVE-2023-41174', 'CVE-2024-40812', 'CVE-2023-40452', 'CVE-2023-38598', 'CVE-2023-32368', 'CVE-2023-42888', 'CVE-2023-40432', 'CVE-2023-38592', 'CVE-2023-41982', 'CVE-2023-42852', 'CVE-2023-40528', 'CVE-2023-32381', 'CVE-2023-32404', 'CVE-2024-40795', 'CVE-2024-27863', 'CVE-2023-40399', 'CVE-2023-40427', 'CVE-2023-32399', 'CVE-2023-32357', 'CVE-2023-35993', 'CVE-2023-32445', 'CVE-2024-23213', 'CVE-2023-32433', 'CVE-2023-40408', 'CVE-2023-38596', 'CVE-2023-38136', 'CVE-2024-40818', 'CVE-2024-44198', 'CVE-2024-27884', 'CVE-2024-27815', 'CVE-2023-42949', 'CVE-2023-32441', 'CVE-2023-38594', 'CVE-2023-40409', 'CVE-2024-44183', 'CVE-2023-32402', 'CVE-2024-23212', 'CVE-2023-32390', 'CVE-2023-41070', 'CVE-2023-32408', 'CVE-2024-23296', 'CVE-2023-38593', 'CVE-2024-40774', 'CVE-2023-40413', 'CVE-2024-27808', 'CVE-2023-38606', 'CVE-2023-27930', 'CVE-2023-32413', 'CVE-2024-27840', 'CVE-2024-27814', 'CVE-2023-40456', 'CVE-2023-38572', 'CVE-2023-38565', 'CVE-2024-27880', 'CVE-2024-40813', 'CVE-2023-36495', 'CVE-2023-34352', 'CVE-2023-40410', 'CVE-2023-39434', 'CVE-2023-32384', 'CVE-2023-32400', 'CVE-2024-40789', 'CVE-2024-40809', 'CVE-2024-27800', 'CVE-2024-23217', 'CVE-2023-41074', 'CVE-2023-41061', 'CVE-2024-27805', 'CVE-2023-40403', 'CVE-2023-40412', 'CVE-2023-38590', 'CVE-2023-41073', 'CVE-2023-28191', 'CVE-2024-23204', 'CVE-2024-23215', 'CVE-2023-32407', 'CVE-2023-38595', 'CVE-2023-32391', 'CVE-2024-44187', 'CVE-2023-40448', 'CVE-2024-40787', 'CVE-2023-32373', 'CVE-2023-28204', 'CVE-2023-41981', 'CVE-2024-40793', 'CVE-2024-27806', 'CVE-2024-40850', 'CVE-2023-32376', 'CVE-2024-27823', 'CVE-2023-42899', 'CVE-2024-40776', 'CVE-2023-42849', 'CVE-2023-42883', 'CVE-2024-23251', 'CVE-2023-38604', 'CVE-2024-27851', 'CVE-2023-32394', 'CVE-2024-23206', 'CVE-2023-32434', 'CVE-2023-42957', 'CVE-2023-32428', 'CVE-2023-42890', 'CVE-2024-40806', 'CVE-2023-32417', 'CVE-2023-35074', 'CVE-2023-41071', 'CVE-2023-32420', 'CVE-2023-32389', 'CVE-2023-32425', 'CVE-2024-44191', 'CVE-2024-27828', 'CVE-2024-27801', 'CVE-2024-27820', 'CVE-2023-40429', 'CVE-2023-32416', 'CVE-2024-23210', 'CVE-2023-41068', 'CVE-2023-32398', 'CVE-2024-44170', 'CVE-2024-40780', 'CVE-2023-35990', 'CVE-2024-40835', 'CVE-2024-27830', 'CVE-2023-28202', 'CVE-2023-42866', 'CVE-2023-32361', 'CVE-2024-40785', 'CVE-2023-32372', 'CVE-2023-32734', 'CVE-2023-37450', 'CVE-2023-32392', 'CVE-2023-42936', 'CVE-2023-42898', 'CVE-2023-38580', 'CVE-2023-40414', 'CVE-2023-40520', 'CVE-2024-23208', 'CVE-2023-42846', 'CVE-2024-23223', 'CVE-2024-40788', 'CVE-2023-38599', 'CVE-2023-34425', 'CVE-2023-41254', 'CVE-2023-42947', 'CVE-2023-40447', 'CVE-2023-32412', 'CVE-2023-42914', 'CVE-2023-41984', 'CVE-2023-42950', 'CVE-2023-32423', 'CVE-2023-42893', 'CVE-2023-32409', 'CVE-2024-40815', 'CVE-2023-38611', 'CVE-2023-40454', 'CVE-2024-27838', 'CVE-2024-40799', 'CVE-2024-23211', 'CVE-2024-40779', 'CVE-2024-23282', 'CVE-2024-27811', 'CVE-2023-32432', 'CVE-2023-40395', 'CVE-2023-41976', 'CVE-2023-35984']}
. - The scheme_data property was set to
{'product': 'Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4 watchOS 9.4 (Build 20T253)', 'url': 'https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-apple-watch-s8-running-watchos-94', 'description': 'Le produit évalué est « Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4, watchOS 9.4 (build 20T253) » développé par APPLE INC..\nApple Pay est une solution de paiement mobile développée par la société APPLE INC. Après avoir enregistré une carte bancaire dans son équipement Apple, l’utilisateur peut faire des paiements au travers de celui-ci. Pour que le paie', 'sponsor': 'APPLE INC', 'developer': 'APPLE INC', 'cert_id': 'ANSSI-CC-2023/60', 'level': 'EAL2+', 'expiration_date': '19 Janvier 2029', 'enhanced': {'cert_id': 'ANSSI-CC-2023/60', 'certification_date': '19/01/2024', 'expiration_date': '19/01/2029', 'category': 'Divers', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'APPLE INC', 'sponsor': 'APPLE INC', 'evaluation_facility': 'THALES / CNES', 'level': 'EAL2+', 'protection_profile': '', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ADV_FSP.3', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_60en.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_60en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_60en.pdf'}}
.
- The cpe_matches property was set to
-
02.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e723453c42e1b2a7775e09dbac95077a96bfde5f91be9ffac6144e43102c1d99', 'txt_hash': '577b9a17afa8f6ef94207e56754ef3e0d82be3ac29742c9ab7d913ad6464bb55'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5484f9225194fb80f4936f7fc05e17a6b4193024fabd540321f557163e7ea14e', 'txt_hash': '1e00b0721b5e01d10f2e0ba7052fc0b0478f1196180bcee7b9bc21c27965fd4f'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 2365643, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 54, '/CreationDate': 'D:20231109133713Z', '/Creator': 'Word', '/ModDate': 'D:20231109133737Z', '/Producer': 'Adobe Mac PDF Plug-in', '/Title': 'Microsoft Word - [ST] Watch_S8_watchOS9_SecurityTarget_v1.4.docx', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 138059, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20240222154647+01'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20240222155209+01'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL2': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 3, 'ADV_FSP.3': 2, 'ADV_TDS.1': 4, 'ADV_FSP.2': 4, 'ADV_FSP.1': 2}, 'AGD': {'AGD_OPE.1': 4, 'AGD_PRE.1': 4}, 'ALC': {'ALC_CMC.2': 2, 'ALC_CMS.2': 2, 'ALC_DEL.1': 2}, 'ATE': {'ATE_COV.1': 4, 'ATE_FUN.1': 3, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 2}, 'ASE': {'ASE_CCL.1': 2, 'ASE_ECD.1': 3, 'ASE_INT.1': 2, 'ASE_OBJ.2': 2, 'ASE_REQ.2': 2, 'ASE_SPD.1': 1, 'ASE_TSS.1': 2, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FDP': {'FDP_DAU.1': 4, 'FDP_DAU.1.1': 1, 'FDP_DAU.1.2': 1, 'FDP_ACC': 22, 'FDP_ACC.2': 4, 'FDP_ACF': 20, 'FDP_ACF.1': 12, 'FDP_ETC': 7, 'FDP_ETC.2.1': 2, 'FDP_ETC.2.2': 2, 'FDP_ETC.2.3': 2, 'FDP_ETC.2.4': 2, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_ITC': 5, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_UCT': 10, 'FDP_UCT.1': 1, 'FDP_UIT': 10, 'FDP_UIT.1': 2, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_RIP.1': 12, 'FDP_RIP.1.1': 1, 'FDP_SDI.1': 9, 'FDP_SDI.1.1': 1, 'FDP_ACC.1': 11, 'FDP_IFC.1': 8, 'FDP_ETC.2': 2}, 'FIA': {'FIA_UID.2': 6, 'FIA_UID.2.1': 1, 'FIA_UAU.2': 8, 'FIA_UAU.2.1': 1, 'FIA_UAU.5': 5, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6': 11, 'FIA_AFL': 9, 'FIA_AFL.1': 5, 'FIA_UAU.6.1': 2, 'FIA_ATD.1': 5, 'FIA_ATD.1.1': 2, 'FIA_SOS.2': 4, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_UAU.1': 2, 'FIA_UID.1': 1}, 'FMT': {'FMT_SMR.1': 10, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 7, 'FMT_SMF.1.1': 1, 'FMT_MSA.1': 6, 'FMT_MSA.3': 11, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.1.1': 2, 'FMT_MTD.1': 4, 'FMT_MTD.1.1': 1, 'FMT_MTD.3': 4, 'FMT_MTD.3.1': 1}, 'FPR': {'FPR_UNO.1': 12, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_ITC.1': 4, 'FPT_ITC.1.1': 1, 'FPT_RPL': 8, 'FPT_RPL.1': 6}, 'FTP': {'FTP_ITC': 14, 'FTP_ITC.1': 7, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 4}}, 'cc_claims': {'D': {'D.OS': 16, 'D.SEP_SE': 3}, 'T': {'T.CORRUPT': 2, 'T.PHYSICAL': 2, 'T.RECOVER': 2, 'T.REPLAY': 2, 'T.SILENT': 2, 'T.SKIMMING': 2, 'T.USURP': 2}, 'A': {'A.DE-': 2, 'A.PERSO': 3, 'A.CDCVM': 3, 'A.IPH-': 2, 'A.DEVICE_AUTH': 1, 'A.IPHONE_USER': 1}, 'OE': {'OE.CDCVM': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 3}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 4}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-3': 1, 'FIPS 140-2': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by': 1, 'pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.Card_Data D.Unlock_Secret* D.SEP_iPhone* T.RECOVER Card Recovery An attacker': 1}}}
. - The cert_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2023/60': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 2}}, 'cc_sar': {'ADV': {'ADV_FSP.3': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Thales': {'THALES/CNES': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
ANSSI-cible-CC-2023_60en.pdf
. - The cert_filename property was set to
certificat-CC-2023_60en.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]}
values added.
- The st property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_60en.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_60en.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The st_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The st_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4 watchOS 9.4 (Build 20T253)', 'url': 'https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-apple-watch-s8-running-watchos-94', 'description': 'Le produit évalué est « Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4, watchOS 9.4 (build 20T253) » développé par APPLE INC..\nApple Pay est une solution de paiement mobile développée par la société APPLE INC. Après avoir enregistré une carte bancaire dans son équipement Apple, l’utilisateur peut faire des paiements au travers de celui-ci. Pour que le paie', 'sponsor': 'APPLE INC', 'developer': 'APPLE INC', 'cert_id': 'ANSSI-CC-2023/60', 'level': 'EAL2+', 'expiration_date': '19 Janvier 2029', 'enhanced': {'cert_id': 'ANSSI-CC-2023/60', 'certification_date': '19/01/2024', 'expiration_date': '19/01/2029', 'category': 'Divers', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'APPLE INC', 'sponsor': 'APPLE INC', 'evaluation_facility': 'THALES / CNES', 'level': 'EAL2+', 'protection_profile': '', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ADV_FSP.3', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_60en.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_60en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_60en.pdf'}}
.
- The scheme_data property was set to
-
31.07.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4(watchOS 9.4 (build 20T253)) ( ANSSI-CC-2023/60) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_60en.pdf",
"dgst": "6207e27699db6695",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2023/60",
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:apple:watchos:9.4:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"9.4"
]
},
"indirect_transitive_cves": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2023-38598",
"CVE-2023-37450",
"CVE-2023-40520",
"CVE-2024-27806",
"CVE-2023-28191",
"CVE-2023-40456",
"CVE-2024-27832",
"CVE-2023-40413",
"CVE-2023-38593",
"CVE-2023-32428",
"CVE-2023-32368",
"CVE-2023-38136",
"CVE-2023-38572",
"CVE-2023-32390",
"CVE-2024-44269",
"CVE-2024-27884",
"CVE-2023-41071",
"CVE-2023-40412",
"CVE-2023-41997",
"CVE-2023-42883",
"CVE-2023-41068",
"CVE-2023-32396",
"CVE-2024-40774",
"CVE-2023-42888",
"CVE-2024-40813",
"CVE-2023-38133",
"CVE-2024-27820",
"CVE-2023-42914",
"CVE-2023-41065",
"CVE-2024-44215",
"CVE-2023-32408",
"CVE-2023-32394",
"CVE-2023-32376",
"CVE-2023-40395",
"CVE-2024-23296",
"CVE-2024-27838",
"CVE-2023-32441",
"CVE-2023-32361",
"CVE-2024-40795",
"CVE-2023-42866",
"CVE-2023-41073",
"CVE-2023-32425",
"CVE-2024-23211",
"CVE-2024-44185",
"CVE-2024-27863",
"CVE-2023-32416",
"CVE-2024-27830",
"CVE-2023-35074",
"CVE-2023-40454",
"CVE-2023-40403",
"CVE-2023-39434",
"CVE-2023-40447",
"CVE-2023-40417",
"CVE-2023-32399",
"CVE-2023-38594",
"CVE-2023-32734",
"CVE-2023-42890",
"CVE-2024-44171",
"CVE-2023-41070",
"CVE-2023-28202",
"CVE-2023-42846",
"CVE-2023-32404",
"CVE-2023-32389",
"CVE-2023-41988",
"CVE-2023-32445",
"CVE-2023-32434",
"CVE-2023-40410",
"CVE-2024-40806",
"CVE-2023-32402",
"CVE-2023-32420",
"CVE-2023-42950",
"CVE-2023-27930",
"CVE-2024-40822",
"CVE-2023-38606",
"CVE-2023-40414",
"CVE-2023-35990",
"CVE-2023-42899",
"CVE-2024-27808",
"CVE-2023-42949",
"CVE-2024-40812",
"CVE-2023-40409",
"CVE-2023-32432",
"CVE-2023-41968",
"CVE-2024-40789",
"CVE-2024-44273",
"CVE-2023-42936",
"CVE-2024-40779",
"CVE-2023-41254",
"CVE-2023-41981",
"CVE-2023-40452",
"CVE-2023-40429",
"CVE-2023-38596",
"CVE-2023-40420",
"CVE-2024-44144",
"CVE-2024-27840",
"CVE-2024-23208",
"CVE-2023-32409",
"CVE-2024-44282",
"CVE-2024-23213",
"CVE-2024-40776",
"CVE-2024-23207",
"CVE-2024-44234",
"CVE-2024-40799",
"CVE-2023-40399",
"CVE-2023-42947",
"CVE-2024-27800",
"CVE-2023-40432",
"CVE-2024-40835",
"CVE-2023-42937",
"CVE-2023-32354",
"CVE-2024-44255",
"CVE-2024-40788",
"CVE-2024-44274",
"CVE-2023-38565",
"CVE-2023-34352",
"CVE-2024-40815",
"CVE-2024-44233",
"CVE-2024-23204",
"CVE-2024-27880",
"CVE-2024-40857",
"CVE-2024-44297",
"CVE-2024-23251",
"CVE-2023-41976",
"CVE-2024-44187",
"CVE-2023-40419",
"CVE-2023-38590",
"CVE-2024-40787",
"CVE-2023-38580",
"CVE-2024-23218",
"CVE-2024-27811",
"CVE-2024-27801",
"CVE-2023-32381",
"CVE-2023-41982",
"CVE-2023-35984",
"CVE-2024-44155",
"CVE-2023-32398",
"CVE-2023-32417",
"CVE-2023-32412",
"CVE-2023-42849",
"CVE-2024-23282",
"CVE-2023-36495",
"CVE-2023-38592",
"CVE-2024-23223",
"CVE-2023-40424",
"CVE-2023-42898",
"CVE-2024-44191",
"CVE-2024-27828",
"CVE-2023-40427",
"CVE-2024-40785",
"CVE-2024-27805",
"CVE-2024-23212",
"CVE-2023-32392",
"CVE-2023-38599",
"CVE-2023-38604",
"CVE-2023-41061",
"CVE-2023-40528",
"CVE-2024-44198",
"CVE-2023-40400",
"CVE-2024-27815",
"CVE-2023-32388",
"CVE-2024-23217",
"CVE-2024-44285",
"CVE-2023-40448",
"CVE-2023-41074",
"CVE-2024-23225",
"CVE-2023-42893",
"CVE-2024-40850",
"CVE-2023-32413",
"CVE-2023-41174",
"CVE-2024-40818",
"CVE-2024-27814",
"CVE-2024-40809",
"CVE-2024-40780",
"CVE-2023-38595",
"CVE-2024-23210",
"CVE-2024-44170",
"CVE-2023-41984",
"CVE-2023-32423",
"CVE-2023-32391",
"CVE-2023-32384",
"CVE-2024-23206",
"CVE-2024-27851",
"CVE-2024-44302",
"CVE-2023-38611",
"CVE-2024-40793",
"CVE-2024-44239",
"CVE-2023-32433",
"CVE-2023-38600",
"CVE-2023-40408",
"CVE-2024-44244",
"CVE-2023-32400",
"CVE-2023-32352",
"CVE-2023-28204",
"CVE-2023-42957",
"CVE-2023-42852",
"CVE-2024-44176",
"CVE-2024-44194",
"CVE-2023-34425",
"CVE-2023-32407",
"CVE-2023-35993",
"CVE-2023-32373",
"CVE-2023-32357",
"CVE-2024-44232",
"CVE-2024-23215",
"CVE-2024-44183",
"CVE-2024-44254",
"CVE-2023-32403",
"CVE-2023-32372",
"CVE-2024-27823"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "ANSSI-CC-2023/60",
"description": "Le produit \u00e9valu\u00e9 est \u00ab Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4, watchOS 9.4 (build 20T253) \u00bb d\u00e9velopp\u00e9 par APPLE INC.. Apple Pay est une solution de paiement mobile d\u00e9velopp\u00e9e par la soci\u00e9t\u00e9 APPLE INC. Apr\u00e8s avoir enregistr\u00e9 une carte bancaire dans son \u00e9quipement Apple, l\u2019utilisateur peut faire des paiements au travers de celui-ci. Pour que le paie",
"developer": "APPLE INC",
"enhanced": {
"augmented": "ADV_FSP.3",
"category": "Divers",
"cc_version": "Crit\u00e8res Communs version 3.1r5",
"cert_id": "ANSSI-CC-2023/60",
"cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_60en.pdf",
"certification_date": "2024-01-19",
"developer": "APPLE INC",
"evaluation_facility": "THALES / CNES",
"expiration_date": "2029-01-19",
"level": "EAL2+",
"mutual_recognition": "CCRA SOG-IS",
"protection_profile": "",
"report_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_60en.pdf",
"sponsor": "APPLE INC",
"target_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_60en.pdf"
},
"expiration_date": "2029-01-19",
"level": "EAL2+",
"product": "Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4 watchOS 9.4 (Build 20T253)",
"sponsor": "APPLE INC",
"url": "https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-apple-watch-s8-running-watchos-94"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Apple Inc.",
"manufacturer_web": "https://www.apple.com/",
"name": "Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4(watchOS 9.4 (build 20T253)) ( ANSSI-CC-2023/60)",
"not_valid_after": "2029-01-19",
"not_valid_before": "2024-01-19",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "certificat-CC-2023_60en.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2023/60": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 2
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Thales": {
"THALES/CNES": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20240222154647+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 23 pour Word",
"/Keywords": "",
"/ModDate": "D:20240222155209+01\u002700\u0027",
"/Producer": "Adobe PDF Library 23.1.175",
"pdf_file_size_bytes": 138059,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "ANSSI-CC-2023_60en.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2023/60": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.3": 1
},
"ALC": {
"ALC_FLR": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 3,
"EAL2 augmented": 1,
"EAL4": 1
},
"ITSEC": {
"ITSEC E3 Basic": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Thales": {
"THALES/CNES": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20240222154716+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 23 pour Word",
"/Keywords": "",
"/ModDate": "D:20240222155205+01\u002700\u0027",
"/Producer": "Adobe PDF Library 23.1.175",
"pdf_file_size_bytes": 403804,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ssi.gouv.fr/",
"mailto:[email protected]",
"http://www.commoncriteriaportal.org/",
"http://www.sogis.eu/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 13
},
"st_filename": "ANSSI-cible-CC-2023_60en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CDCVM": 3,
"A.DE-": 2,
"A.DEVICE_AUTH": 1,
"A.IPH-": 2,
"A.IPHONE_USER": 1,
"A.PERSO": 3
},
"D": {
"D.OS": 16,
"D.SEP_SE": 3
},
"OE": {
"OE.CDCVM": 3
},
"T": {
"T.CORRUPT": 2,
"T.PHYSICAL": 2,
"T.RECOVER": 2,
"T.REPLAY": 2,
"T.SILENT": 2,
"T.SKIMMING": 2,
"T.USURP": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 3,
"ADV_FSP.1": 2,
"ADV_FSP.2": 4,
"ADV_FSP.3": 2,
"ADV_TDS.1": 4
},
"AGD": {
"AGD_OPE.1": 4,
"AGD_PRE.1": 4
},
"ALC": {
"ALC_CMC.2": 2,
"ALC_CMS.2": 2,
"ALC_DEL.1": 2
},
"ASE": {
"ASE_CCL.1": 2,
"ASE_ECD.1": 3,
"ASE_INT.1": 2,
"ASE_OBJ.2": 2,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 1,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_COV.1": 4,
"ATE_FUN.1": 3,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL2": 1
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC": 22,
"FDP_ACC.1": 11,
"FDP_ACC.2": 4,
"FDP_ACC.2.1": 1,
"FDP_ACC.2.2": 1,
"FDP_ACF": 20,
"FDP_ACF.1": 12,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_DAU.1": 4,
"FDP_DAU.1.1": 1,
"FDP_DAU.1.2": 1,
"FDP_ETC": 7,
"FDP_ETC.2": 2,
"FDP_ETC.2.1": 2,
"FDP_ETC.2.2": 2,
"FDP_ETC.2.3": 2,
"FDP_ETC.2.4": 2,
"FDP_IFC.1": 8,
"FDP_ITC": 5,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_RIP.1": 12,
"FDP_RIP.1.1": 1,
"FDP_SDI.1": 9,
"FDP_SDI.1.1": 1,
"FDP_UCT": 10,
"FDP_UCT.1": 1,
"FDP_UCT.1.1": 1,
"FDP_UIT": 10,
"FDP_UIT.1": 2,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL": 9,
"FIA_AFL.1": 5,
"FIA_ATD.1": 5,
"FIA_ATD.1.1": 2,
"FIA_SOS.2": 4,
"FIA_SOS.2.1": 1,
"FIA_SOS.2.2": 1,
"FIA_UAU.1": 2,
"FIA_UAU.2": 8,
"FIA_UAU.2.1": 1,
"FIA_UAU.5": 5,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 11,
"FIA_UAU.6.1": 2,
"FIA_UID.1": 1,
"FIA_UID.2": 6,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MSA.1": 6,
"FMT_MSA.1.1": 2,
"FMT_MSA.3": 11,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 4,
"FMT_MTD.1.1": 1,
"FMT_MTD.3": 4,
"FMT_MTD.3.1": 1,
"FMT_SMF.1": 7,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 10,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 12,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_ITC.1": 4,
"FPT_ITC.1.1": 1,
"FPT_RPL": 8,
"FPT_RPL.1": 6
},
"FTP": {
"FTP_ITC": 14,
"FTP_ITC.1": 7,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 4
}
},
"certification_process": {
"OutOfScope": {
"Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by": 1,
"out of scope": 2,
"pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.Card_Data D.Unlock_Secret* D.SEP_iPhone* T.RECOVER Card Recovery An attacker": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 3
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 1,
"FIPS 140-3": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 4
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20231109133713Z",
"/Creator": "Word",
"/ModDate": "D:20231109133737Z",
"/Producer": "Adobe Mac PDF Plug-in",
"/Title": "Microsoft Word - [ST] Watch_S8_watchOS9_SecurityTarget_v1.4.docx",
"pdf_file_size_bytes": 2365643,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 54
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_60en.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ADV_FSP.3",
"EAL2+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_60en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "5484f9225194fb80f4936f7fc05e17a6b4193024fabd540321f557163e7ea14e",
"txt_hash": "1e00b0721b5e01d10f2e0ba7052fc0b0478f1196180bcee7b9bc21c27965fd4f"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "c7fe41baa75b869067263842cc44bb4f43ffa4d0b42bc8c332d44a58d24f7808",
"txt_hash": "73c0b750b752064dc9c6b7257313bf1ea6b2f89bee4040eb27ec6ab8dd2ed61f"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e723453c42e1b2a7775e09dbac95077a96bfde5f91be9ffac6144e43102c1d99",
"txt_hash": "577b9a17afa8f6ef94207e56754ef3e0d82be3ac29742c9ab7d913ad6464bb55"
}
},
"status": "active"
}