This page was not yet optimized for use on mobile
devices.
Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1
Known vulnerabilities detected
Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.CSV information
| Status | archived |
|---|---|
| Valid from | 01.10.2012 |
| Valid until | 01.11.2014 |
| Scheme | 🇺🇸 US |
| Manufacturer | Tenable Network Security, Inc. |
| Category | Detection Devices and Systems |
| Security level | EAL2+, ALC_FLR.2 |
| Protection profiles |
Heuristics summary
Certificate ID: CCEVS-VR-VID-10443-2012
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
ERROR
Convert pdf to text:
ERROR
Extract keywords:
ERROR
Certification report
Extracted keywords
Protocols
SSH, SSLVendor
MicrosoftSecurity level
EAL 2, EAL 4, EAL2, EAL2+, EAL 2 augmentedClaims
T.COMINT, T.COMDIS, T.LOSSOF, T.NOHALT, T.PRIVIL, T.IMPCON, T.INFLUX, T.FACCNT, T.SCNCFG, T.SCNMLC, T.SCNVUL, T.FALACT, T.FALREC, T.FALASC, T.MISUSE, T.INADVE, T.MISACT, A.WKSTN, A.OS, A.LOCATE, A.PROTCT, A.MANAGE, A.NOEVIL, A.NOTRST, A.ACCESS, A.ASCOPE, A.DYNMICSecurity Assurance Requirements (SAR)
ALC_FLR.2Certificates
CCEVS-VR-VID10443-2012Side-channel analysis
malfunctionFile metadata
| Title | Validation Report for IronPort Messaging Gateway |
|---|---|
| Subject | Validator Report |
| Keywords | VR |
| Author | Evaluation Team |
| Creation date | D:20121024103543 |
| Modification date | D:20121024103543 |
| Pages | 25 |
| Creator | Microsoft® Office Word 2007 |
| Producer | Microsoft® Office Word 2007 |
Frontpage
| Certificate ID | CCEVS-VR-VID10443-2012 |
|---|---|
| Certified item | Tenable SecurityCenter 4 and Components |
| Certification lab | US NIAP |
Security target
Extracted keywords
Protocols
SSH, SSL, VPNLibraries
OpenSSLSecurity level
EAL2, EAL 2, EAL2 augmented, EAL 2 augmentedClaims
O.PROTCT, O.IDSCAN, O.IDSENS, O.IDANLZ, O.RESPON, O.EADMIN, O.ACCESS, O.IDAUTH, O.OFLOWS, O.AUDITS, O.INTEGR, O.EXPORT, T.COMINT, T.COMDIS, T.LOSSOF, T.NOHALT, T.PRIVIL, T.IMPCON, T.INFLUX, T.FACCNT, T.SCNCFG, T.SCNMLC, T.SCNVUL, T.FALACT, T.FALREC, T.FALASC, T.MISUSE, T.INADVE, T.MISACT, A.ACCESS, A.ASCOPE, A.DYNMIC, A.LOCATE, A.PROTCT, A.MANAGE, A.NOEVIL, A.NOTRST, OE.INSTAL, OE.PHYCAL, OE.CREDEN, OE.TIME, OE.INTROP, OE.PERSON, OE.AUDIT_PROTECTION, OE.AUDIT_SORTSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMS.2, ALC_DEL.1, ALC_CMC.2, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2Security Functional Requirements (SFR)
FAU_GEN, FAU_SAR, FAU_SEL, FAU_STG, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1, FAU_SAR.2, FAU_SEL.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.2, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FAU_STG.4, FAU_STG.4.1, FIA_UAU.2, FIA_AFL, FIA_ATD, FIA_UAU, FIA_UID, FIA_UID.2, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU.2.1, FIA_UID.2.1, FIA_UID.1, FIA_UAU.1, FMT_MOF, FMT_MTD, FMT_SMF, FMT_SMR, FMT_MOF.1, FMT_MDT.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_ITT, FPT_STM.1, FPT_STM.1.1, FPT_ITT.1, FPT_ITT.1.1, FPT_STM, FPT_ITA.1, FPT_ITC.1, FPT_ITI.1Side-channel analysis
malfunctionFile metadata
| Author | ktodd |
|---|---|
| Creation date | D:20121024103427 |
| Modification date | D:20121024103427 |
| Pages | 59 |
| Creator | Microsoft® Office Word 2007 |
| Producer | Microsoft® Office Word 2007 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
CCEVS-VR-VID-10443-2012Extracted SARs
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.2, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2Related CVEs
| ID | Links | Severity | CVSS Score | Published on | ||
|---|---|---|---|---|---|---|
| Base | Exploitability | Impact | ||||
| CVE-2016-1000028 | MEDIUM | 4.8 | 2.7 | 27.12.2019 | ||
| CVE-2016-1000029 | MEDIUM | 4.8 | 2.7 | 27.12.2019 | ||
| CVE-2016-4055 | MEDIUM | 6.5 | 3.6 | 23.01.2017 | ||
| CVE-2016-9260 | MEDIUM | 5.4 | 2.7 | 31.01.2017 | ||
| CVE-2017-18214 | HIGH | 7.5 | 3.6 | 04.03.2018 | ||
| CVE-2017-5179 | MEDIUM | 5.4 | 2.7 | 05.01.2017 | ||
| CVE-2018-1141 | HIGH | 7.0 | 5.9 | 20.03.2018 | ||
| CVE-2018-1147 | MEDIUM | 5.4 | 2.7 | 18.05.2018 | ||
| CVE-2018-1148 | MEDIUM | 6.5 | 3.6 | 18.05.2018 | ||
| CVE-2018-20843 | HIGH | 7.5 | 3.6 | 24.06.2019 | ||
| CVE-2018-5407 | MEDIUM | 4.7 | 3.6 | 15.11.2018 | ||
| CVE-2019-1559 | MEDIUM | 5.9 | 3.6 | 27.02.2019 | ||
| CVE-2019-3923 | MEDIUM | 5.4 | 2.7 | 12.02.2019 | ||
| CVE-2019-3961 | MEDIUM | 6.1 | 2.7 | 25.06.2019 | ||
| CVE-2019-3962 | LOW | 3.3 | 1.4 | 01.07.2019 | ||
| CVE-2019-3982 | MEDIUM | 6.5 | 3.6 | 23.10.2019 | ||
| CVE-2020-5765 | MEDIUM | 5.4 | 2.7 | 15.07.2020 | ||
| CVE-2020-5774 | HIGH | 7.1 | 5.2 | 21.08.2020 | ||
| CVE-2021-20079 | MEDIUM | 6.7 | 5.9 | 29.06.2021 | ||
| CVE-2021-20106 | MEDIUM | 6.5 | 5.9 | 21.07.2021 | ||
| CVE-2021-20135 | MEDIUM | 6.7 | 5.9 | 03.11.2021 | ||
| CVE-2021-3449 | MEDIUM | 5.9 | 3.6 | 25.03.2021 | ||
| CVE-2021-3450 | HIGH | 7.4 | 5.2 | 25.03.2021 | ||
| CVE-2021-45960 | HIGH | 8.8 | 5.9 | 01.01.2022 | ||
| CVE-2021-46143 | HIGH | 7.8 | 5.9 | 06.01.2022 | ||
| CVE-2022-0778 | HIGH | 7.5 | 3.6 | 15.03.2022 | ||
| CVE-2022-22822 | CRITICAL | 9.8 | 5.9 | 10.01.2022 | ||
| CVE-2022-22823 | CRITICAL | 9.8 | 5.9 | 10.01.2022 | ||
| CVE-2022-22824 | CRITICAL | 9.8 | 5.9 | 10.01.2022 | ||
| CVE-2022-22825 | HIGH | 8.8 | 5.9 | 10.01.2022 | ||
| CVE-2022-22826 | HIGH | 8.8 | 5.9 | 10.01.2022 | ||
| CVE-2022-22827 | HIGH | 8.8 | 5.9 | 10.01.2022 | ||
| CVE-2022-23852 | CRITICAL | 9.8 | 5.9 | 24.01.2022 | ||
| CVE-2022-23990 | HIGH | 7.5 | 3.6 | 26.01.2022 | ||
| CVE-2022-28291 | MEDIUM | 6.5 | 3.6 | 17.10.2022 | ||
| CVE-2022-32973 | HIGH | 8.8 | 5.9 | 21.06.2022 | ||
| CVE-2022-32974 | MEDIUM | 6.5 | 3.6 | 21.06.2022 | ||
| CVE-2022-33757 | MEDIUM | 6.5 | 3.6 | 25.10.2022 | ||
| CVE-2022-3499 | MEDIUM | 6.5 | 3.6 | 31.10.2022 | ||
| CVE-2022-4313 | HIGH | 8.8 | 5.9 | 15.03.2023 | ||
| CVE-2023-3251 | MEDIUM | 4.9 | 3.6 | 29.08.2023 | ||
| CVE-2023-3252 | MEDIUM | 6.5 | 5.2 | 29.08.2023 | ||
| CVE-2023-3253 | MEDIUM | 4.3 | 1.4 | 29.08.2023 | ||
| CVE-2023-6062 | MEDIUM | 6.5 | 5.2 | 20.11.2023 | ||
| CVE-2023-6178 | MEDIUM | 6.5 | 5.2 | 20.11.2023 | ||
| CVE-2024-0955 | MEDIUM | 4.8 | 2.7 | 07.02.2024 | ||
| CVE-2024-0971 | MEDIUM | 6.5 | 3.6 | 07.02.2024 | ||
Showing 5 out of 47.
Similar certificates
Showing 5 out of 19.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Detection Devices and Systems",
"cert_link": null,
"dgst": "7a9d9dd29e76bfba",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CCEVS-VR-VID-10443-2012",
"cert_lab": [
"US"
],
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:a:tenable:nessus:4.4.1.15078:*:*:*:*:*:x64:*"
]
},
"direct_transitive_cves": null,
"eal": "EAL2+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"5.0.1",
"2.0.1",
"2.1",
"3.6",
"4.4"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"44cdd911811b36d2"
]
},
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2021-20106",
"CVE-2021-3450",
"CVE-2016-1000028",
"CVE-2019-3962",
"CVE-2022-32974",
"CVE-2018-20843",
"CVE-2024-0955",
"CVE-2018-1147",
"CVE-2016-4055",
"CVE-2022-22822",
"CVE-2021-3449",
"CVE-2021-20135",
"CVE-2023-3252",
"CVE-2022-22824",
"CVE-2023-3253",
"CVE-2022-4313",
"CVE-2016-1000029",
"CVE-2018-1148",
"CVE-2021-20079",
"CVE-2019-3982",
"CVE-2022-3499",
"CVE-2024-0971",
"CVE-2020-5774",
"CVE-2019-1559",
"CVE-2017-18214",
"CVE-2022-22825",
"CVE-2022-22826",
"CVE-2023-6062",
"CVE-2018-5407",
"CVE-2021-46143",
"CVE-2019-3961",
"CVE-2019-3923",
"CVE-2023-6178",
"CVE-2022-33757",
"CVE-2021-45960",
"CVE-2022-22827",
"CVE-2018-1141",
"CVE-2022-22823",
"CVE-2023-3251",
"CVE-2022-23990",
"CVE-2016-9260",
"CVE-2017-5179",
"CVE-2020-5765",
"CVE-2022-0778",
"CVE-2022-32973",
"CVE-2022-23852",
"CVE-2022-28291"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Tenable Network Security, Inc.",
"manufacturer_web": "https://www.tenable.com/",
"name": "Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1",
"not_valid_after": "2014-11-01",
"not_valid_before": "2012-10-01",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "st_vid10443-vr.pdf",
"report_frontpage": {
"US": {
"cert_id": "CCEVS-VR-VID10443-2012",
"cert_item": "Tenable SecurityCenter 4 and Components",
"cert_lab": "US NIAP"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"US": {
"CCEVS-VR-VID10443-2012": 1
}
},
"cc_claims": {
"A": {
"A.ACCESS": 1,
"A.ASCOPE": 1,
"A.DYNMIC": 1,
"A.LOCATE": 1,
"A.MANAGE": 1,
"A.NOEVIL": 1,
"A.NOTRST": 1,
"A.OS": 1,
"A.PROTCT": 1,
"A.WKSTN": 1
},
"T": {
"T.COMDIS": 1,
"T.COMINT": 1,
"T.FACCNT": 1,
"T.FALACT": 1,
"T.FALASC": 1,
"T.FALREC": 1,
"T.IMPCON": 1,
"T.INADVE": 1,
"T.INFLUX": 1,
"T.LOSSOF": 1,
"T.MISACT": 1,
"T.MISUSE": 1,
"T.NOHALT": 1,
"T.PRIVIL": 1,
"T.SCNCFG": 1,
"T.SCNMLC": 1,
"T.SCNVUL": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 4,
"EAL 2 augmented": 3,
"EAL 4": 1,
"EAL2": 1,
"EAL2+": 3
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 1
},
"TLS": {
"SSL": {
"SSL": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 1
}
},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 2
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Evaluation Team",
"/CreationDate": "D:20121024103543",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/Keywords": "VR",
"/ModDate": "D:20121024103543",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Subject": "Validator Report",
"/Title": "Validation Report for IronPort Messaging Gateway",
"pdf_file_size_bytes": 441073,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 25
},
"st_filename": "st_vid10443-st.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ACCESS": 3,
"A.ASCOPE": 3,
"A.DYNMIC": 3,
"A.LOCATE": 3,
"A.MANAGE": 3,
"A.NOEVIL": 3,
"A.NOTRST": 3,
"A.PROTCT": 3
},
"O": {
"O.ACCESS": 12,
"O.AUDITS": 5,
"O.EADMIN": 5,
"O.EXPORT": 3,
"O.IDANLZ": 5,
"O.IDAUTH": 20,
"O.IDSCAN": 7,
"O.IDSENS": 7,
"O.INTEGR": 7,
"O.OFLOWS": 6,
"O.PROTCT": 11,
"O.RESPON": 5
},
"OE": {
"OE.AUDIT_PROTECTION": 4,
"OE.AUDIT_SORT": 2,
"OE.CREDEN": 6,
"OE.INSTAL": 7,
"OE.INTROP": 5,
"OE.PERSON": 5,
"OE.PHYCAL": 6,
"OE.TIME": 4
},
"T": {
"T.COMDIS": 3,
"T.COMINT": 3,
"T.FACCNT": 3,
"T.FALACT": 3,
"T.FALASC": 3,
"T.FALREC": 3,
"T.IMPCON": 3,
"T.INADVE": 3,
"T.INFLUX": 3,
"T.LOSSOF": 3,
"T.MISACT": 3,
"T.MISUSE": 3,
"T.NOHALT": 3,
"T.PRIVIL": 3,
"T.SCNCFG": 3,
"T.SCNMLC": 3,
"T.SCNVUL": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 22,
"ADV_FSP.2": 12,
"ADV_TDS.1": 12
},
"AGD": {
"AGD_OPE.1": 11,
"AGD_PRE.1": 7
},
"ALC": {
"ALC_CMC.2": 8,
"ALC_CMS.2": 8,
"ALC_DEL.1": 6,
"ALC_FLR.2": 22
},
"ATE": {
"ATE_COV.1": 5,
"ATE_FUN.1": 9,
"ATE_IND.2": 8
},
"AVA": {
"AVA_VAN.2": 8
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 2 augmented": 1,
"EAL2": 9,
"EAL2 augmented": 4
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2,
"FAU_GEN.1": 7,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAR": 6,
"FAU_SAR.1": 5,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 6,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 4,
"FAU_SAR.3.1": 1,
"FAU_SEL": 2,
"FAU_SEL.1": 5,
"FAU_SEL.1.1": 1,
"FAU_STG": 4,
"FAU_STG.2": 9,
"FAU_STG.2.1": 1,
"FAU_STG.2.2": 1,
"FAU_STG.2.3": 1,
"FAU_STG.4": 5,
"FAU_STG.4.1": 1
},
"FIA": {
"FIA_AFL": 2,
"FIA_AFL.1": 2,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD": 2,
"FIA_ATD.1": 4,
"FIA_ATD.1.1": 1,
"FIA_UAU": 2,
"FIA_UAU.1": 1,
"FIA_UAU.2": 8,
"FIA_UAU.2.1": 1,
"FIA_UID": 2,
"FIA_UID.1": 1,
"FIA_UID.2": 7,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MDT.1": 1,
"FMT_MOF": 2,
"FMT_MOF.1": 7,
"FMT_MOF.1.1": 1,
"FMT_MTD": 2,
"FMT_MTD.1": 7,
"FMT_MTD.1.1": 1,
"FMT_SMF": 2,
"FMT_SMF.1": 9,
"FMT_SMF.1.1": 1,
"FMT_SMR": 2,
"FMT_SMR.1": 5,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_ITA.1": 2,
"FPT_ITC.1": 2,
"FPT_ITI.1": 2,
"FPT_ITT": 2,
"FPT_ITT.1": 9,
"FPT_ITT.1.1": 1,
"FPT_STM": 1,
"FPT_STM.1": 6,
"FPT_STM.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 2
}
},
"crypto_protocol": {
"SSH": {
"SSH": 18
},
"TLS": {
"SSL": {
"SSL": 20
}
},
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 2
}
},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "ktodd",
"/CreationDate": "D:20121024103427",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20121024103427",
"/Producer": "Microsoft\u00ae Office Word 2007",
"pdf_file_size_bytes": 1188447,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.securityfocus.com/bid/",
"http://nvd.nist.gov/fdcc/download_fdcc.cfm",
"http://cve.mitre.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 59
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_br_v1.7.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.2",
"EAL2+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-st.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "6bbe4e39fb1e3e1496edb10118d6519fe521fc80f7080eb44d7404caa0dbfbb4",
"txt_hash": "0cc9c7cf65c4283fa42658cbdbdf224629263190e3e25cbfe0a0fd5d7e8152ce"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "3b767d5258133c0eb3601092a8cf7081b94bf08c654a872c21fb6c7e48566775",
"txt_hash": "ac95bdcc32b3b1fa5fb3cb004f461c884649a1e12a831f99e30019259a8b5792"
}
},
"status": "archived"
}