VMware® ESXi 4.0 Update 1 and vCenter Server 4.0 Update 1
CSV information ?
Status | archived |
---|---|
Valid from | 15.10.2010 |
Valid until | 15.05.2017 |
Scheme | 🇨🇦 CA |
Manufacturer | VMware Inc. |
Category | Operating Systems |
Security level | EAL4+, ALC_FLR.2 |
Maintenance updates | VMware® ESXi 4.1 and vCenter Server 4.1 (15.12.2010) Certification report Security target |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, Triple-DES, 3DESHash functions
SHA-1Vendor
MicrosoftSecurity level
EAL 4+, EAL 4, EAL4+, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.2Certificates
383-4-147-CREvaluation facilities
EWA-CanadaStandards
FIPS 46-3, FIPS 197, FIPS 180-3, FIPS 186-2, ISO/IEC 17025:2005File metadata
Title | EAL X+ Evaluation of [Developer Long Name] |
---|---|
Author | sjackson |
Creation date | D:20101123115917-05'00' |
Modification date | D:20101123120044-05'00' |
Pages | 17 |
Creator | Acrobat PDFMaker 9.0 for Word |
Producer | Acrobat Distiller 9.0.0 (Windows) |
Frontpage
Certificate ID | 383-4-147-CR |
---|---|
Certification lab | CANADA |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DESHash functions
SHA-1Protocols
SSLLibraries
OpenSSLBlock cipher modes
CBCVendor
Microsoft, CiscoSecurity level
EAL4+, EAL4Claims
O.CONTINUITY, O.ACCESS, O.ADMIN, O.AUDIT, O.IDAUTH, O.SECURE, O.VLAN, O.VM, O.VSWITCH, T.AVAILABILITY, T.COMINT, T.PRIVIL, T.VM, T.VIRTUAL_NETWORK, A.NOEVIL, A.PHYSCL, OE.IDAUTH, OE.SEP, OE.TIMESecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3Security Functional Requirements (SFR)
FAU_ARP.1, FAU_GEN.1, FAU_SAR.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.4, FDP_ACC.1, FDP_ACF.1, FDP_IFC.2, FDP_IFF.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_IFC.2.1, FDP_IFC.2.2, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FIA_UAU.1, FIA_UID.1, FIA_UAU.2, FIA_UID.2, FIA_UAU.2.1, FIA_UID.2.1, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_ITC.1, FPT_ITT.1, FPT_STM.1, FPT_ITC.1.1, FPT_ITT.1.1Side-channel analysis
physical tampering, malfunctionFile metadata
Title | Security Target |
---|---|
Subject | ESXi 4.0 Update 1 and vCenter Server 4.0 Update 1 |
Author | Justin Yu |
Creation date | D:20100907131759Z |
Modification date | D:20101018134341-04'00' |
Pages | 68 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
Heuristics ?
Extracted SARs
ADV_TDS.3, ATE_COV.2, AGD_OPE.1, ALC_DEL.1, ALC_DVS.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.4, AVA_VAN.3, ALC_LCD.1, ATE_DPT.1, ALC_CMS.4, ADV_IMP.1, ALC_TAT.1, ATE_FUN.1, ATE_IND.2, ADV_ARC.1, ADV_FSP.4Similar certificates
Name | Certificate ID | |
---|---|---|
VMware® ESX 4.0 Update 1 and vCenter Server 4.0 Update 1 | 383-4-145 | Compare |
References ?
No references are available for this certificate.
Updates ?
-
17.10.2024 The certificate data changed.
Certificate changed
The Maintenance Updates of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2010-12-15', 'maintenance_title': 'VMware® ESXi 4.1 and vCenter Server 4.1', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/vmware-esxi-v40-dec-maint-eng.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/vmware-esxi-v40-sec-eng.pdf'}]}
.
- The new value is
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '61f5c450c65763a7324a7702bb53307a5671313c671951133acd3461b9823827', 'txt_hash': '4a46fc26dffc24ab516b75a143f9b8867d8aa528e827792a6c5e02ff57d2645e'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '8ba313268d00afb713017659c21de44b3fbca99226a9e2b21ecbd2c1dc4fbf50', 'txt_hash': 'ad5648bea977f1d0f177570df3ea2cff3a22268ce57cc6b059103b6439495bd4'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 95769, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 17, '/AM_ACPP_Date': '[dd month yyyy]', '/AM_ACPP_Doc#': '[AM_AMCPP_Doc#]', '/AM_ACPP_Title': 'Assurance Continuity Program Plan (ACPP)', '/AM_ACPP_Version': '[AM_AMCPP_Version]', '/AM_IAR_Date': '[dd month yyyy]', '/AM_IAR_Doc#': '[AM_IAR_Doc#]', '/AM_IAR_Title': 'Assurance Maintenace Impact Analysis Report', '/AM_IAR_Version': '[AM_IAR_Version]', '/AM_ST Date': '[dd month yyyy]', '/AM_ST Title': '[AM_ST Title]', '/AM_ST Version': '[AM_ST Version]', '/AM_TOE': '[AM_TOE]', '/AM_TOE Short': '[AM_TOE Short]', '/AM_TOE Version': '[AM_TOE Version]', '/Author': 'sjackson', '/CC Version': '3.1 Revision 3', '/CC date': 'July 2009', '/CEM Version': '3.1 Revision 3', '/CEM date': 'July 2009', '/CR_Date': '2 September 2010', '/CR_Version': '0.3', '/Client City': 'Palo Alto', '/Client Country': 'USA', '/Client Full Name': 'VMware, Inc.', '/Client Postal Code': '94304', '/Client Short Name': 'VMware', '/Client State': 'CA', '/Client Street': '3401 Hillview Ave.', '/CreationDate': "D:20101123115917-05'00'", '/Creator': 'Acrobat PDFMaker 9.0 for Word', '/Developer Long Name': 'VMware, Inc.', '/Developer Short Name': 'VMware', '/EAL Level': '4+', '/EAL Level Base': '4', '/EAL Level Text': '4 augmented', '/EAL Long': 'EAL 4 Augmented', '/EAL Short': 'EAL 4+', '/ER Document Date': '9 September 2009', '/ER Version': 'Version 1.0', '/ETPlan_Doc#': '1651-000-D003', '/ETPlan_Title': 'Evaluation Test Plan', '/ETPlan_Version': '0.1', '/ETPlan_date': '3 August 2010', '/ETProcRes_Date': 'September 2010', '/ETProcRes_Doc#': '1651-000-D005', '/ETProcRes_Title': 'Evaluation Test Results', '/ETProcRes_Version': '0.1', '/ETProc_Date': '13 August 2010', '/ETProc_Doc#': '1651-000-D004', '/ETProc_Title': 'Evaluation Test Procedures', '/ETProc_Version': '0.2', '/ETReport_Date': '1 September 2010', '/ETReport_Doc#': '1651-000-D002', '/ETReport_Title': 'Evaluation Technical Report', '/ETReport_TitleShort': 'ETR', '/ETReport_Version': '1.4', '/EWP_Date': '5 July 2010', '/EWP_Doc#': '1651-000-D001', '/EWP_Title': 'Evaluation Work Plan for EAL 4+ Common Criteria Evaluation of VMware Incorporated ESX 4.0 and vCenter 4.0, Document No. 1651-000-D001, Version 1.3, 5 July 2010, Common Criteria Evaluation Number: 383-4-145', '/EWP_Version': '1.3', '/Eval number': '383-4-145', '/Eval_End_Date': '22 October 2010', '/Eval_Start_Date': '1 December 2009', '/LeadEvaluator': 'K. Braun ', '/LeadEvaluatorInitials': 'KB', '/ModDate': "D:20101123120044-05'00'", '/Producer': 'Acrobat Distiller 9.0.0 (Windows)', '/ProjectManager': 'M. Gauvreau', '/ProjectManagerInitials': 'MG', '/ProjectNumber': '1651', '/ST_Date': '31 August 2010', '/ST_Title': 'VMware, Inc. VMware® ESXi 4.0 Update 1 and vCenter Server 4.0 Update 1 Security Target', '/ST_Version': '1.2', '/SVC_Date': '5 August 2009', '/SVC_Doc#': '1610-000-D006', '/SVC_Title': 'Site Visit Checklist', '/SVC_Version': '1.0', '/SVR_Date': '5 August 2009', '/SVR_Doc#': '1610-000-D006', '/SVR_Title': 'Site Visit Report', '/SVR_Version': '1.0', '/SV_City': 'Palo Alto', '/Security Classification': 'EWA-Canada & VMware Proprietary', '/SourceModified': 'D:20101123164210', '/Sponsor': 'VMware, Inc.', '/Sponsor City': 'Palo Alto', '/Sponsor Country': 'USA', '/Sponsor Postal Code': '94304', '/Sponsor State': 'CA', '/Sponsor Street': '3401 Hillview Ave.', '/TOE': 'VMware® ESX 4.0 Update 1 and vCenter Server 4.0 Update 1', '/TOE Short-NoTM': 'ESXi and vCenter Server 4.0 Update 1', '/TOE Version': '4.0 Update 1', '/TOE with version': 'VMware® ESXi 4.0 Update 1 and vCenter Server 4.0 Update 1', '/TOE-NoTM': 'VMware® ESX 4.0 Update 1 and vCenter Server 4.0 Update 1', '/Title': 'EAL X+ Evaluation of [Developer Long Name]', '/_AdHocReviewCycleID': '1598644691', '/_AuthorEmail': '[email protected]', '/_AuthorEmailDisplayName': 'Reade, Rick A.', '/_EmailSubject': 'CPL post request ... rr', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1003281, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 68, '/Author': 'Justin Yu', '/CreationDate': 'D:20100907131759Z', '/Creator': 'Microsoft® Office Word 2007', '/ModDate': "D:20101018134341-04'00'", '/Producer': 'Microsoft® Office Word 2007', '/Subject': 'ESXi 4.0 Update 1 and vCenter Server 4.0 Update 1', '/Title': 'Security Target', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.vmware.com/', 'http://www.corsec.com/', 'http://www.vmware.com/resources/compatibility/search.php']}}
. - The report_frontpage property was set to
{'CA': {'cert_id': '383-4-147-CR', 'cert_lab': 'CANADA'}}
. - The report_keywords property was set to
{'cc_cert_id': {'CA': {'383-4-147-CR': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4+': 3, 'EAL 4': 4, 'EAL4+': 1, 'EAL 4 augmented': 2}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 2}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {'EWA': {'EWA-Canada': 4}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'3DES': {'Triple-DES': 1, '3DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 46-3': 1, 'FIPS 197': 1, 'FIPS 180-3': 1, 'FIPS 186-2': 1}, 'ISO': {'ISO/IEC 17025:2005': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 3, 'EAL4': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 4, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.3': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 2, 'FAU_GEN.1': 9, 'FAU_SAR.1': 6, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1}, 'FCS': {'FCS_COP.1': 6, 'FCS_COP.1.1': 1, 'FCS_CKM.1': 2, 'FCS_CKM.4': 2}, 'FDP': {'FDP_ACC.1': 21, 'FDP_ACF.1': 16, 'FDP_IFC.2': 7, 'FDP_IFF.1': 7, 'FDP_ITC.1': 1, 'FDP_ITC.2': 1, 'FDP_ACC.1.1': 2, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_IFC.1': 5, 'FDP_IFC.2.1': 1, 'FDP_IFC.2.2': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1}, 'FIA': {'FIA_UAU.1': 3, 'FIA_UID.1': 8, 'FIA_UAU.2': 11, 'FIA_UID.2': 11, 'FIA_UAU.2.1': 1, 'FIA_UID.2.1': 1}, 'FMT': {'FMT_MSA.1': 26, 'FMT_MSA.3': 26, 'FMT_SMF.1': 12, 'FMT_SMR.1': 27, 'FMT_MSA.1.1': 3, 'FMT_MSA.3.1': 3, 'FMT_MSA.3.2': 3, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 2, 'FMT_SMR.1.2': 2}, 'FPT': {'FPT_ITC.1': 6, 'FPT_ITT.1': 6, 'FPT_STM.1': 3, 'FPT_ITC.1.1': 1, 'FPT_ITT.1.1': 1}}, 'cc_claims': {'O': {'O.CONTINUITY': 4, 'O.ACCESS': 7, 'O.ADMIN': 6, 'O.AUDIT': 6, 'O.IDAUTH': 9, 'O.SECURE': 5, 'O.VLAN': 4, 'O.VM': 4, 'O.VSWITCH': 4}, 'T': {'T.AVAILABILITY': 2, 'T.COMINT': 2, 'T.PRIVIL': 2, 'T.VM': 2, 'T.VIRTUAL_NETWORK': 2}, 'A': {'A.NOEVIL': 2, 'A.PHYSCL': 3}, 'OE': {'OE.IDAUTH': 7, 'OE.SEP': 7, 'OE.TIME': 5}}, 'vendor': {'Microsoft': {'Microsoft': 12}, 'Cisco': {'Cisco': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}, 'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 10}}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 4}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 2, 'malfunction': 10}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
vmware-esxi-v40-cert-eng.pdf
. - The st_filename property was set to
vmware-esxi-v40-sec-eng.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['CANADA']
. - The cert_id property was set to
383-4-147
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/vmware-esxi-v40-cert-eng.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/vmware-esxi-v40-sec-eng.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}]}
values discarded.
- The st property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name VMware® ESXi 4.0 Update 1 and vCenter Server 4.0 Update 1 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Operating Systems",
"cert_link": null,
"dgst": "6d943c6a06ed7b36",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "383-4-147",
"cert_lab": [
"CANADA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 3
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"4.0"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2010-12-15",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/vmware-esxi-v40-dec-maint-eng.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/vmware-esxi-v40-sec-eng.pdf",
"maintenance_title": "VMware\u00ae ESXi 4.1 and vCenter Server 4.1"
}
]
},
"manufacturer": "VMware Inc.",
"manufacturer_web": "https://www.vmware.com",
"name": "VMware\u00ae ESXi 4.0 Update 1 and vCenter Server 4.0 Update 1",
"not_valid_after": "2017-05-15",
"not_valid_before": "2010-10-15",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "vmware-esxi-v40-cert-eng.pdf",
"report_frontpage": {
"CA": {
"cert_id": "383-4-147-CR",
"cert_lab": "CANADA"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"CA": {
"383-4-147-CR": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 4,
"EAL 4 augmented": 2,
"EAL 4+": 3,
"EAL4+": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"EWA": {
"EWA-Canada": 4
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 180-3": 1,
"FIPS 186-2": 1,
"FIPS 197": 1,
"FIPS 46-3": 1
},
"ISO": {
"ISO/IEC 17025:2005": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"3DES": {
"3DES": 1,
"Triple-DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/AM_ACPP_Date": "[dd month yyyy]",
"/AM_ACPP_Doc#": "[AM_AMCPP_Doc#]",
"/AM_ACPP_Title": "Assurance Continuity Program Plan (ACPP)",
"/AM_ACPP_Version": "[AM_AMCPP_Version]",
"/AM_IAR_Date": "[dd month yyyy]",
"/AM_IAR_Doc#": "[AM_IAR_Doc#]",
"/AM_IAR_Title": "Assurance Maintenace Impact Analysis Report",
"/AM_IAR_Version": "[AM_IAR_Version]",
"/AM_ST Date": "[dd month yyyy]",
"/AM_ST Title": "[AM_ST Title]",
"/AM_ST Version": "[AM_ST Version]",
"/AM_TOE": "[AM_TOE]",
"/AM_TOE Short": "[AM_TOE Short]",
"/AM_TOE Version": "[AM_TOE Version]",
"/Author": "sjackson",
"/CC Version": "3.1 Revision 3",
"/CC date": "July 2009",
"/CEM Version": "3.1 Revision 3",
"/CEM date": "July 2009",
"/CR_Date": "2 September 2010",
"/CR_Version": "0.3",
"/Client City": "Palo Alto",
"/Client Country": "USA",
"/Client Full Name": "VMware, Inc.",
"/Client Postal Code": "94304",
"/Client Short Name": "VMware",
"/Client State": "CA",
"/Client Street": "3401 Hillview Ave.",
"/CreationDate": "D:20101123115917-05\u002700\u0027",
"/Creator": "Acrobat PDFMaker 9.0 for Word",
"/Developer Long Name": "VMware, Inc.",
"/Developer Short Name": "VMware",
"/EAL Level": "4+",
"/EAL Level Base": "4",
"/EAL Level Text": "4 augmented",
"/EAL Long": "EAL 4 Augmented",
"/EAL Short": "EAL 4+",
"/ER Document Date": "9 September 2009",
"/ER Version": "Version 1.0",
"/ETPlan_Doc#": "1651-000-D003",
"/ETPlan_Title": "Evaluation Test Plan",
"/ETPlan_Version": "0.1",
"/ETPlan_date": "3 August 2010",
"/ETProcRes_Date": "September 2010",
"/ETProcRes_Doc#": "1651-000-D005",
"/ETProcRes_Title": "Evaluation Test Results",
"/ETProcRes_Version": "0.1",
"/ETProc_Date": "13 August 2010",
"/ETProc_Doc#": "1651-000-D004",
"/ETProc_Title": "Evaluation Test Procedures",
"/ETProc_Version": "0.2",
"/ETReport_Date": "1 September 2010",
"/ETReport_Doc#": "1651-000-D002",
"/ETReport_Title": "Evaluation Technical Report",
"/ETReport_TitleShort": "ETR",
"/ETReport_Version": "1.4",
"/EWP_Date": "5 July 2010",
"/EWP_Doc#": "1651-000-D001",
"/EWP_Title": "Evaluation Work Plan for EAL 4+ Common Criteria Evaluation of VMware Incorporated ESX 4.0 and vCenter 4.0, Document No. 1651-000-D001, Version 1.3, 5 July 2010, Common Criteria Evaluation Number: 383-4-145",
"/EWP_Version": "1.3",
"/Eval number": "383-4-145",
"/Eval_End_Date": "22 October 2010",
"/Eval_Start_Date": "1 December 2009",
"/LeadEvaluator": "K. Braun ",
"/LeadEvaluatorInitials": "KB",
"/ModDate": "D:20101123120044-05\u002700\u0027",
"/Producer": "Acrobat Distiller 9.0.0 (Windows)",
"/ProjectManager": "M. Gauvreau",
"/ProjectManagerInitials": "MG",
"/ProjectNumber": "1651",
"/ST_Date": "31 August 2010",
"/ST_Title": "VMware, Inc. VMware\u00ae ESXi 4.0 Update 1 and vCenter Server 4.0 Update 1 Security Target",
"/ST_Version": "1.2",
"/SVC_Date": "5 August 2009",
"/SVC_Doc#": "1610-000-D006",
"/SVC_Title": "Site Visit Checklist",
"/SVC_Version": "1.0",
"/SVR_Date": "5 August 2009",
"/SVR_Doc#": "1610-000-D006",
"/SVR_Title": "Site Visit Report",
"/SVR_Version": "1.0",
"/SV_City": "Palo Alto",
"/Security Classification": "EWA-Canada \u0026 VMware Proprietary",
"/SourceModified": "D:20101123164210",
"/Sponsor": "VMware, Inc.",
"/Sponsor City": "Palo Alto",
"/Sponsor Country": "USA",
"/Sponsor Postal Code": "94304",
"/Sponsor State": "CA",
"/Sponsor Street": "3401 Hillview Ave.",
"/TOE": "VMware\u00ae ESX 4.0 Update 1 and vCenter Server 4.0 Update 1",
"/TOE Short-NoTM": "ESXi and vCenter Server 4.0 Update 1",
"/TOE Version": "4.0 Update 1",
"/TOE with version": "VMware\u00ae ESXi 4.0 Update 1 and vCenter Server 4.0 Update 1",
"/TOE-NoTM": "VMware\u00ae ESX 4.0 Update 1 and vCenter Server 4.0 Update 1",
"/Title": "EAL X+ Evaluation of [Developer Long Name]",
"/_AdHocReviewCycleID": "1598644691",
"/_AuthorEmail": "[email protected]",
"/_AuthorEmailDisplayName": "Reade, Rick A.",
"/_EmailSubject": "CPL post request ... rr",
"pdf_file_size_bytes": 95769,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 17
},
"st_filename": "vmware-esxi-v40-sec-eng.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NOEVIL": 2,
"A.PHYSCL": 3
},
"O": {
"O.ACCESS": 7,
"O.ADMIN": 6,
"O.AUDIT": 6,
"O.CONTINUITY": 4,
"O.IDAUTH": 9,
"O.SECURE": 5,
"O.VLAN": 4,
"O.VM": 4,
"O.VSWITCH": 4
},
"OE": {
"OE.IDAUTH": 7,
"OE.SEP": 7,
"OE.TIME": 5
},
"T": {
"T.AVAILABILITY": 2,
"T.COMINT": 2,
"T.PRIVIL": 2,
"T.VIRTUAL_NETWORK": 2,
"T.VM": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR.2": 4,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL4": 2,
"EAL4+": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 2,
"FAU_GEN.1": 9,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAR.1": 6,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1
},
"FCS": {
"FCS_CKM.1": 2,
"FCS_CKM.4": 2,
"FCS_COP.1": 6,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC.1": 21,
"FDP_ACC.1.1": 2,
"FDP_ACF.1": 16,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 2,
"FDP_IFC.1": 5,
"FDP_IFC.2": 7,
"FDP_IFC.2.1": 1,
"FDP_IFC.2.2": 1,
"FDP_IFF.1": 7,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1,
"FDP_ITC.1": 1,
"FDP_ITC.2": 1
},
"FIA": {
"FIA_UAU.1": 3,
"FIA_UAU.2": 11,
"FIA_UAU.2.1": 1,
"FIA_UID.1": 8,
"FIA_UID.2": 11,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MSA.1": 26,
"FMT_MSA.1.1": 3,
"FMT_MSA.3": 26,
"FMT_MSA.3.1": 3,
"FMT_MSA.3.2": 3,
"FMT_SMF.1": 12,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 27,
"FMT_SMR.1.1": 2,
"FMT_SMR.1.2": 2
},
"FPT": {
"FPT_ITC.1": 6,
"FPT_ITC.1.1": 1,
"FPT_ITT.1": 6,
"FPT_ITT.1.1": 1,
"FPT_STM.1": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 4
}
},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 10
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 10,
"physical tampering": 2
}
},
"standard_id": {},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
},
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 2
},
"Microsoft": {
"Microsoft": 12
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Justin Yu",
"/CreationDate": "D:20100907131759Z",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20101018134341-04\u002700\u0027",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Subject": "ESXi 4.0 Update 1 and vCenter Server 4.0 Update 1",
"/Title": "Security Target",
"pdf_file_size_bytes": 1003281,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.vmware.com/resources/compatibility/search.php",
"mailto:[email protected]",
"http://www.vmware.com/",
"http://www.corsec.com/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 68
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/vmware-esxi-v40-cert-eng.pdf",
"scheme": "CA",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/vmware-esxi-v40-sec-eng.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "61f5c450c65763a7324a7702bb53307a5671313c671951133acd3461b9823827",
"txt_hash": "4a46fc26dffc24ab516b75a143f9b8867d8aa528e827792a6c5e02ff57d2645e"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "8ba313268d00afb713017659c21de44b3fbca99226a9e2b21ecbd2c1dc4fbf50",
"txt_hash": "ad5648bea977f1d0f177570df3ea2cff3a22268ce57cc6b059103b6439495bd4"
}
},
"status": "archived"
}