Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1

Known vulnerabilities detected

Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.

CSV information

Status archived
Valid from 01.10.2012
Valid until 01.11.2014
Scheme 🇺🇸 US
Manufacturer Tenable Network Security, Inc.
Category Detection Devices and Systems
Security level EAL2+, ALC_FLR.2
Protection profiles

Heuristics summary

Certificate ID: CCEVS-VR-VID-10443-2012

Certificate

certificate file processing did not finish successfully.
Download pdf: ERROR
Convert pdf to text: ERROR
Extract keywords: ERROR

Certification report

Extracted keywords

Protocols
SSH, SSL

Vendor
Microsoft

Security level
EAL 2, EAL 4, EAL2, EAL2+, EAL 2 augmented
Claims
T.COMINT, T.COMDIS, T.LOSSOF, T.NOHALT, T.PRIVIL, T.IMPCON, T.INFLUX, T.FACCNT, T.SCNCFG, T.SCNMLC, T.SCNVUL, T.FALACT, T.FALREC, T.FALASC, T.MISUSE, T.INADVE, T.MISACT, A.WKSTN, A.OS, A.LOCATE, A.PROTCT, A.MANAGE, A.NOEVIL, A.NOTRST, A.ACCESS, A.ASCOPE, A.DYNMIC
Security Assurance Requirements (SAR)
ALC_FLR.2
Certificates
CCEVS-VR-VID10443-2012

Side-channel analysis
malfunction

File metadata

Title Validation Report for IronPort Messaging Gateway
Subject Validator Report
Keywords VR
Author Evaluation Team
Creation date D:20121024103543
Modification date D:20121024103543
Pages 25
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

Frontpage

Certificate ID CCEVS-VR-VID10443-2012
Certified item Tenable SecurityCenter 4 and Components
Certification lab US NIAP

Security target

Extracted keywords

Protocols
SSH, SSL, VPN
Libraries
OpenSSL

Security level
EAL2, EAL 2, EAL2 augmented, EAL 2 augmented
Claims
O.PROTCT, O.IDSCAN, O.IDSENS, O.IDANLZ, O.RESPON, O.EADMIN, O.ACCESS, O.IDAUTH, O.OFLOWS, O.AUDITS, O.INTEGR, O.EXPORT, T.COMINT, T.COMDIS, T.LOSSOF, T.NOHALT, T.PRIVIL, T.IMPCON, T.INFLUX, T.FACCNT, T.SCNCFG, T.SCNMLC, T.SCNVUL, T.FALACT, T.FALREC, T.FALASC, T.MISUSE, T.INADVE, T.MISACT, A.ACCESS, A.ASCOPE, A.DYNMIC, A.LOCATE, A.PROTCT, A.MANAGE, A.NOEVIL, A.NOTRST, OE.INSTAL, OE.PHYCAL, OE.CREDEN, OE.TIME, OE.INTROP, OE.PERSON, OE.AUDIT_PROTECTION, OE.AUDIT_SORT
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMS.2, ALC_DEL.1, ALC_CMC.2, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2
Security Functional Requirements (SFR)
FAU_GEN, FAU_SAR, FAU_SEL, FAU_STG, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1, FAU_SAR.2, FAU_SEL.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.2, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FAU_STG.4, FAU_STG.4.1, FIA_UAU.2, FIA_AFL, FIA_ATD, FIA_UAU, FIA_UID, FIA_UID.2, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU.2.1, FIA_UID.2.1, FIA_UID.1, FIA_UAU.1, FMT_MOF, FMT_MTD, FMT_SMF, FMT_SMR, FMT_MOF.1, FMT_MDT.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_ITT, FPT_STM.1, FPT_STM.1.1, FPT_ITT.1, FPT_ITT.1.1, FPT_STM, FPT_ITA.1, FPT_ITC.1, FPT_ITI.1

Side-channel analysis
malfunction

File metadata

Author ktodd
Creation date D:20121024103427
Modification date D:20121024103427
Pages 59
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

CCEVS-VR-VID-10443-2012

Extracted SARs

ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.2, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2016-1000028
C N
MEDIUM 4.8 2.7 27.12.2019
CVE-2016-1000029
C N
MEDIUM 4.8 2.7 27.12.2019
CVE-2016-4055
C N
MEDIUM 6.5 3.6 23.01.2017
CVE-2016-9260
C N
MEDIUM 5.4 2.7 31.01.2017
CVE-2017-18214
C N
HIGH 7.5 3.6 04.03.2018
CVE-2017-5179
C N
MEDIUM 5.4 2.7 05.01.2017
CVE-2018-1141
C N
HIGH 7.0 5.9 20.03.2018
CVE-2018-1147
C N
MEDIUM 5.4 2.7 18.05.2018
CVE-2018-1148
C N
MEDIUM 6.5 3.6 18.05.2018
CVE-2018-20843
C N
HIGH 7.5 3.6 24.06.2019
CVE-2018-5407
C N
MEDIUM 4.7 3.6 15.11.2018
CVE-2019-1559
C N
MEDIUM 5.9 3.6 27.02.2019
CVE-2019-3923
C N
MEDIUM 5.4 2.7 12.02.2019
CVE-2019-3961
C N
MEDIUM 6.1 2.7 25.06.2019
CVE-2019-3962
C N
LOW 3.3 1.4 01.07.2019
CVE-2019-3982
C N
MEDIUM 6.5 3.6 23.10.2019
CVE-2020-5765
C N
MEDIUM 5.4 2.7 15.07.2020
CVE-2020-5774
C N
HIGH 7.1 5.2 21.08.2020
CVE-2021-20079
C N
MEDIUM 6.7 5.9 29.06.2021
CVE-2021-20106
C N
MEDIUM 6.5 5.9 21.07.2021
CVE-2021-20135
C N
MEDIUM 6.7 5.9 03.11.2021
CVE-2021-3449
C N
MEDIUM 5.9 3.6 25.03.2021
CVE-2021-3450
C N
HIGH 7.4 5.2 25.03.2021
CVE-2021-45960
C N
HIGH 8.8 5.9 01.01.2022
CVE-2021-46143
C N
HIGH 7.8 5.9 06.01.2022
CVE-2022-0778
C N
HIGH 7.5 3.6 15.03.2022
CVE-2022-22822
C N
CRITICAL 9.8 5.9 10.01.2022
CVE-2022-22823
C N
CRITICAL 9.8 5.9 10.01.2022
CVE-2022-22824
C N
CRITICAL 9.8 5.9 10.01.2022
CVE-2022-22825
C N
HIGH 8.8 5.9 10.01.2022
CVE-2022-22826
C N
HIGH 8.8 5.9 10.01.2022
CVE-2022-22827
C N
HIGH 8.8 5.9 10.01.2022
CVE-2022-23852
C N
CRITICAL 9.8 5.9 24.01.2022
CVE-2022-23990
C N
HIGH 7.5 3.6 26.01.2022
CVE-2022-28291
C N
MEDIUM 6.5 3.6 17.10.2022
CVE-2022-32973
C N
HIGH 8.8 5.9 21.06.2022
CVE-2022-32974
C N
MEDIUM 6.5 3.6 21.06.2022
CVE-2022-33757
C N
MEDIUM 6.5 3.6 25.10.2022
CVE-2022-3499
C N
MEDIUM 6.5 3.6 31.10.2022
CVE-2022-4313
C N
HIGH 8.8 5.9 15.03.2023
CVE-2023-3251
C N
MEDIUM 4.9 3.6 29.08.2023
CVE-2023-3252
C N
MEDIUM 6.5 5.2 29.08.2023
CVE-2023-3253
C N
MEDIUM 4.3 1.4 29.08.2023
CVE-2023-6062
C N
MEDIUM 6.5 5.2 20.11.2023
CVE-2023-6178
C N
MEDIUM 6.5 5.2 20.11.2023
CVE-2024-0955
C N
MEDIUM 4.8 2.7 07.02.2024
CVE-2024-0971
C N
MEDIUM 6.5 3.6 07.02.2024
Showing 5 out of 47.

Similar certificates

Name Certificate ID
Tenable Security Center 3.2 (SC3) with 3D Tool 1.2 (3DT), Log Correlation Engine 2.0.2 (LCE), Passive Vulnerability S... CCEVS-VR-VID-10273-2010 Compare
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3... BSI-DSZ-CC-0772-2014 Compare
secunet konnektor 2.0.0 und 2.1.0, Version 5.70.4:2.0.0 und 5.70.4:2.1.0 BSI-DSZ-CC-1044-V8-2025 Compare
SecureSwitch® Fiber Optic Switch Models 1:1, 2:1, 3:1, 4:1, 5:1, 6:1, 7:1, 8:1 Rev A 383-4-410 Compare
Market Central SecureSwitch® Fiber Optic Switch Models: A, B, C, D, 1:1, 2:1, 3:1, 4:1, 5:1, 6:1, 7:1 and 8:1 383-4-506 Compare
SAMSUNG S3FV9QM / S3FV9QK référence : S3FV9QM/S3FV9QK rev3_TRCv1.0_PKALibv1.4-GUIv1.38a_DTRNGlibv2.0/3.0-Iv1.2_BLv2.1... ANSSI-CC-2017/16 Compare
Ricoh imagio MP C5002A SP/C4002A SP all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Net... JISEC-CC-CRP-C0354 Compare
Ricoh imagio MP C3302 SP/C3302 SPF/C2802 SP/C2802 SPF all of above with Facsimile Function Version: - Software: Syste... JISEC-CC-CRP-C0352 Compare
Ricoh imagio MP C5002 SP/C5002 SPF/C4002 SP/C4002 SPF all of above with Facsimile Function Version: - Software: Syste... JISEC-CC-CRP-C0356 Compare
Northern Light Video Conferencing System (NLVC) consist of NLVC Client version 6.3.0.0, NLVC Server Webadmin Tool ver... ISCB-5-RPT-C034-CR-v1a Compare
eEye Retina Enterprise Suite, comprising the following eEye components: Retina Network Security Scanner Version 5.4.2... CCEVS-VR-0043-2007 Compare
secunet konnektor 2.0.0 und 2.0.1, Version 5.50.1:2.0.0 und 5.50.1:2.0.1 BSI-DSZ-CC-1044-V7-2023 Compare
NXP JCOP6.x on SN200.C04 Secure Element, versions JCOP6.0 R1.13.0 "SN200", JCOP6.1 R1.04.0 "SN200", JCOP6.1 R1.04.0 "... NSCIB-CC-2300044-02-CR Compare
Ricoh imagio MP 5002/4002 all of above with Printer/Scanner/Facsimile Functions Version: - Software: System/Copy 1.00... JISEC-CC-CRP-C0346 Compare
Xerox WorkCentre 7346 Version: Controller+PS ROM Ver. 1.223.4, IOT ROM Ver 3.2.0, IIT ROM Ver 20.4.3, ADF ROM Ver 11.6.5 JISEC-CC-CRP-C0169 Compare
Utimaco CryptoServer Se-Series Gen2 CP5, versions: CryptoServer CP5 Se12 5.1.2.0, CryptoServer CP5 Se52 5.1.2.0, Cryp... NSCIB-CC-2300142-02-CR Compare
Cryptek Inc. DiamondTEK (DiamondCentral (NSC Application S/W version 2.4.0.5, NSD-Prime F/W version 2.4.0.3) and NSD ... CCEVS-VR-0054-2006 Compare
EMC® Ionix™ for IT Operations Intelligence (SMARTS®) - SAM 8.1.1, IP 8.1.1, NPM 3.1, SIA 2.3.1.1, EISM 3.0, SAM Adapters 1.3 383-4-187 Compare
McAfee Threat Intelligence Exchange 2.0.0 and Data Exchange Layer 3.0.0 with ePolicy Orchestrator 5.3.2 383-4-396 Compare
Showing 5 out of 19.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Detection Devices and Systems",
  "cert_link": null,
  "dgst": "7a9d9dd29e76bfba",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-VID-10443-2012",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:a:tenable:nessus:4.4.1.15078:*:*:*:*:*:x64:*"
      ]
    },
    "direct_transitive_cves": null,
    "eal": "EAL2+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.0.1",
        "2.0.1",
        "2.1",
        "3.6",
        "4.4"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "44cdd911811b36d2"
      ]
    },
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2021-20106",
        "CVE-2021-3450",
        "CVE-2016-1000028",
        "CVE-2019-3962",
        "CVE-2022-32974",
        "CVE-2018-20843",
        "CVE-2024-0955",
        "CVE-2018-1147",
        "CVE-2016-4055",
        "CVE-2022-22822",
        "CVE-2021-3449",
        "CVE-2021-20135",
        "CVE-2023-3252",
        "CVE-2022-22824",
        "CVE-2023-3253",
        "CVE-2022-4313",
        "CVE-2016-1000029",
        "CVE-2018-1148",
        "CVE-2021-20079",
        "CVE-2019-3982",
        "CVE-2022-3499",
        "CVE-2024-0971",
        "CVE-2020-5774",
        "CVE-2019-1559",
        "CVE-2017-18214",
        "CVE-2022-22825",
        "CVE-2022-22826",
        "CVE-2023-6062",
        "CVE-2018-5407",
        "CVE-2021-46143",
        "CVE-2019-3961",
        "CVE-2019-3923",
        "CVE-2023-6178",
        "CVE-2022-33757",
        "CVE-2021-45960",
        "CVE-2022-22827",
        "CVE-2018-1141",
        "CVE-2022-22823",
        "CVE-2023-3251",
        "CVE-2022-23990",
        "CVE-2016-9260",
        "CVE-2017-5179",
        "CVE-2020-5765",
        "CVE-2022-0778",
        "CVE-2022-32973",
        "CVE-2022-23852",
        "CVE-2022-28291"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Tenable Network Security, Inc.",
  "manufacturer_web": "https://www.tenable.com/",
  "name": "Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1",
  "not_valid_after": "2014-11-01",
  "not_valid_before": "2012-10-01",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "st_vid10443-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-VID10443-2012",
        "cert_item": "Tenable SecurityCenter 4 and Components",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID10443-2012": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.ACCESS": 1,
          "A.ASCOPE": 1,
          "A.DYNMIC": 1,
          "A.LOCATE": 1,
          "A.MANAGE": 1,
          "A.NOEVIL": 1,
          "A.NOTRST": 1,
          "A.OS": 1,
          "A.PROTCT": 1,
          "A.WKSTN": 1
        },
        "T": {
          "T.COMDIS": 1,
          "T.COMINT": 1,
          "T.FACCNT": 1,
          "T.FALACT": 1,
          "T.FALASC": 1,
          "T.FALREC": 1,
          "T.IMPCON": 1,
          "T.INADVE": 1,
          "T.INFLUX": 1,
          "T.LOSSOF": 1,
          "T.MISACT": 1,
          "T.MISUSE": 1,
          "T.NOHALT": 1,
          "T.PRIVIL": 1,
          "T.SCNCFG": 1,
          "T.SCNMLC": 1,
          "T.SCNVUL": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 4,
          "EAL 2 augmented": 3,
          "EAL 4": 1,
          "EAL2": 1,
          "EAL2+": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 1
        },
        "TLS": {
          "SSL": {
            "SSL": 2
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "malfunction": 1
        }
      },
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 2
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Evaluation Team",
      "/CreationDate": "D:20121024103543",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/Keywords": "VR",
      "/ModDate": "D:20121024103543",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Subject": "Validator Report",
      "/Title": "Validation Report for IronPort Messaging Gateway",
      "pdf_file_size_bytes": 441073,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 25
    },
    "st_filename": "st_vid10443-st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ACCESS": 3,
          "A.ASCOPE": 3,
          "A.DYNMIC": 3,
          "A.LOCATE": 3,
          "A.MANAGE": 3,
          "A.NOEVIL": 3,
          "A.NOTRST": 3,
          "A.PROTCT": 3
        },
        "O": {
          "O.ACCESS": 12,
          "O.AUDITS": 5,
          "O.EADMIN": 5,
          "O.EXPORT": 3,
          "O.IDANLZ": 5,
          "O.IDAUTH": 20,
          "O.IDSCAN": 7,
          "O.IDSENS": 7,
          "O.INTEGR": 7,
          "O.OFLOWS": 6,
          "O.PROTCT": 11,
          "O.RESPON": 5
        },
        "OE": {
          "OE.AUDIT_PROTECTION": 4,
          "OE.AUDIT_SORT": 2,
          "OE.CREDEN": 6,
          "OE.INSTAL": 7,
          "OE.INTROP": 5,
          "OE.PERSON": 5,
          "OE.PHYCAL": 6,
          "OE.TIME": 4
        },
        "T": {
          "T.COMDIS": 3,
          "T.COMINT": 3,
          "T.FACCNT": 3,
          "T.FALACT": 3,
          "T.FALASC": 3,
          "T.FALREC": 3,
          "T.IMPCON": 3,
          "T.INADVE": 3,
          "T.INFLUX": 3,
          "T.LOSSOF": 3,
          "T.MISACT": 3,
          "T.MISUSE": 3,
          "T.NOHALT": 3,
          "T.PRIVIL": 3,
          "T.SCNCFG": 3,
          "T.SCNMLC": 3,
          "T.SCNVUL": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 22,
          "ADV_FSP.2": 12,
          "ADV_TDS.1": 12
        },
        "AGD": {
          "AGD_OPE.1": 11,
          "AGD_PRE.1": 7
        },
        "ALC": {
          "ALC_CMC.2": 8,
          "ALC_CMS.2": 8,
          "ALC_DEL.1": 6,
          "ALC_FLR.2": 22
        },
        "ATE": {
          "ATE_COV.1": 5,
          "ATE_FUN.1": 9,
          "ATE_IND.2": 8
        },
        "AVA": {
          "AVA_VAN.2": 8
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 2 augmented": 1,
          "EAL2": 9,
          "EAL2 augmented": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 2,
          "FAU_GEN.1": 7,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_SAR": 6,
          "FAU_SAR.1": 5,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 6,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3": 4,
          "FAU_SAR.3.1": 1,
          "FAU_SEL": 2,
          "FAU_SEL.1": 5,
          "FAU_SEL.1.1": 1,
          "FAU_STG": 4,
          "FAU_STG.2": 9,
          "FAU_STG.2.1": 1,
          "FAU_STG.2.2": 1,
          "FAU_STG.2.3": 1,
          "FAU_STG.4": 5,
          "FAU_STG.4.1": 1
        },
        "FIA": {
          "FIA_AFL": 2,
          "FIA_AFL.1": 2,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 2,
          "FIA_ATD.1": 4,
          "FIA_ATD.1.1": 1,
          "FIA_UAU": 2,
          "FIA_UAU.1": 1,
          "FIA_UAU.2": 8,
          "FIA_UAU.2.1": 1,
          "FIA_UID": 2,
          "FIA_UID.1": 1,
          "FIA_UID.2": 7,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MDT.1": 1,
          "FMT_MOF": 2,
          "FMT_MOF.1": 7,
          "FMT_MOF.1.1": 1,
          "FMT_MTD": 2,
          "FMT_MTD.1": 7,
          "FMT_MTD.1.1": 1,
          "FMT_SMF": 2,
          "FMT_SMF.1": 9,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 2,
          "FMT_SMR.1": 5,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_ITA.1": 2,
          "FPT_ITC.1": 2,
          "FPT_ITI.1": 2,
          "FPT_ITT": 2,
          "FPT_ITT.1": 9,
          "FPT_ITT.1.1": 1,
          "FPT_STM": 1,
          "FPT_STM.1": 6,
          "FPT_STM.1.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 2
        }
      },
      "crypto_protocol": {
        "SSH": {
          "SSH": 18
        },
        "TLS": {
          "SSL": {
            "SSL": 20
          }
        },
        "VPN": {
          "VPN": 1
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "malfunction": 2
        }
      },
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "ktodd",
      "/CreationDate": "D:20121024103427",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20121024103427",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "pdf_file_size_bytes": 1188447,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.securityfocus.com/bid/",
          "http://nvd.nist.gov/fdcc/download_fdcc.cfm",
          "http://cve.mitre.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 59
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_br_v1.7.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.2",
      "EAL2+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "6bbe4e39fb1e3e1496edb10118d6519fe521fc80f7080eb44d7404caa0dbfbb4",
      "txt_hash": "0cc9c7cf65c4283fa42658cbdbdf224629263190e3e25cbfe0a0fd5d7e8152ce"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "3b767d5258133c0eb3601092a8cf7081b94bf08c654a872c21fb6c7e48566775",
      "txt_hash": "ac95bdcc32b3b1fa5fb3cb004f461c884649a1e12a831f99e30019259a8b5792"
    }
  },
  "status": "archived"
}