Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1 , macOS Ventura 13.3.1 (build 22E261) ( ANSSI-CC-2023/61)
CSV information ?
Status | active |
---|---|
Valid from | 28.12.2023 |
Valid until | 28.12.2028 |
Scheme | 🇫🇷 FR |
Manufacturer | Apple Inc. |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL2+, ADV_FSP.3 |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL2Security Assurance Requirements (SAR)
ADV_FSP.3Certificates
ANSSI-CC-2023/61Evaluation facilities
THALES/CNESFile metadata
Creation date | D:20240222154936+01'00' |
---|---|
Modification date | D:20240222155209+01'00' |
Pages | 2 |
Creator | Acrobat PDFMaker 23 pour Word |
Producer | Adobe PDF Library 23.1.175 |
Certification report ?
Extracted keywords
Security level
EAL2, EAL4, EAL2 augmented, ITSEC E3 BasicSecurity Assurance Requirements (SAR)
ADV_FSP.3, ALC_FLRCertificates
ANSSI-CC-2023/61Evaluation facilities
THALES/CNESStandards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
Creation date | D:20240222155049+01'00' |
---|---|
Modification date | D:20240222155208+01'00' |
Pages | 13 |
Creator | Acrobat PDFMaker 23 pour Word |
Producer | Adobe PDF Library 23.1.175 |
Security target ?
Extracted keywords
Symmetric Algorithms
AESSchemes
MACProtocols
TLSTrusted Execution Environments
SESecurity level
EAL 2, EAL2, EAL 2 augmentedClaims
D.OS, D.SEP_SE, T.COR-, T.PHYSI-, T.RE-, T.REPLAY, T.SILENT, T.SKIM-, T.USURP, T.SKIMMING, T.RECOVER, T.CORRUPT, T.PHYSICAL, A.DEVICE_AUTH, A.PERSO, A.WATCH_USER, A.NO_EVIL_ROOT_USERSecurity Assurance Requirements (SAR)
ADV_FSP, ADV_ARC.1, ADV_FSP.3, ADV_TDS.1, ADV_FSP.2, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1Security Functional Requirements (SFR)
FDP_DAU.1, FDP_DAU.1.1, FDP_DAU.1.2, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_ETC, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_ITT, FDP_ITT.1.1, FDP_UCT, FDP_UCT.1, FDP_UIT, FDP_UIT.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.1.1, FDP_ACC.1, FDP_IFC.1, FDP_ETC.2, FIA_UID.2, FIA_UID.2.1, FIA_UAU.2, FIA_UAU.2.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_AFL.1, FIA_AFL, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.6.1, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.1, FIA_UID.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1.1, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.3, FMT_MTD.3.1, FPR_UNO.1, FPR_UNO.1.1, FPT_ITC.1, FPT_ITC.1.1, FPT_RPL, FPT_RPL.1, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1Certification process
out of scope, Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by, to re- turn to its User. Note: Defending against device re-use after physical compromise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.Keyboard_Secret D.SEP_Watch* StrongStandards
FIPS 140-3, FIPS 140-2File metadata
Title | Microsoft Word - [ST] Macmini_M2_Keyboard_macOS13_SecurityTarget_v1.5.docx |
---|---|
Creation date | D:20231108164206Z |
Modification date | D:20231108164224Z |
Pages | 51 |
Creator | Word |
Producer | Adobe Mac PDF Plug-in |
Heuristics ?
Extracted SARs
ASE_CCL.1, ALC_DEL.1, ATE_FUN.1, ATE_IND.2, ASE_TSS.1, ADV_ARC.1, ADV_TDS.1, ATE_COV.1, ASE_SPD.1, ASE_REQ.2, AGD_OPE.1, ASE_ECD.1, ALC_CMS.2, ALC_CMC.2, AVA_VAN.2, ASE_INT.1, AGD_PRE.1, ASE_OBJ.2, ADV_FSP.3Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-1999-0590 | HIGH | 10.0 | 10.0 | 01.06.2000 04:00 | ||
CVE-2001-0102 | HIGH | 7.2 | 10.0 | 12.02.2001 05:00 | ||
CVE-2022-3970 | HIGH | 8.8 | 5.9 | 13.11.2022 08:15 | ||
CVE-2023-22809 | HIGH | 7.8 | 5.9 | 18.01.2023 17:15 | ||
CVE-2023-23495 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:18 | ||
CVE-2023-27930 | HIGH | 7.8 | 5.9 | 23.06.2023 18:15 | ||
CVE-2023-27940 | MEDIUM | 6.3 | 4.0 | 23.06.2023 18:15 | ||
CVE-2023-28191 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-28202 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-28204 | MEDIUM | 6.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-28205 | HIGH | 8.8 | 5.9 | 10.04.2023 19:15 | ||
CVE-2023-28206 | HIGH | 8.6 | 6.0 | 10.04.2023 19:15 | ||
CVE-2023-28319 | HIGH | 7.5 | 3.6 | 26.05.2023 21:15 | ||
CVE-2023-28320 | MEDIUM | 5.9 | 3.6 | 26.05.2023 21:15 | ||
CVE-2023-28321 | MEDIUM | 5.9 | 3.6 | 26.05.2023 21:15 | ||
CVE-2023-28322 | LOW | 3.7 | 1.4 | 26.05.2023 21:15 | ||
CVE-2023-29497 | LOW | 3.3 | 1.4 | 27.09.2023 15:18 | ||
CVE-2023-2953 | HIGH | 7.5 | 3.6 | 30.05.2023 22:15 | ||
CVE-2023-30774 | MEDIUM | 5.5 | 3.6 | 19.05.2023 15:15 | ||
CVE-2023-32352 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32355 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32357 | HIGH | 7.1 | 5.2 | 23.06.2023 18:15 | ||
CVE-2023-32360 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32361 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:18 | ||
CVE-2023-32363 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32364 | HIGH | 8.6 | 6.0 | 27.07.2023 01:15 | ||
CVE-2023-32367 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32368 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32369 | MEDIUM | 6.0 | 4.0 | 23.06.2023 18:15 | ||
CVE-2023-32371 | MEDIUM | 6.3 | 4.0 | 23.06.2023 18:15 | ||
CVE-2023-32372 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32373 | HIGH | 8.8 | 5.9 | 23.06.2023 18:15 | ||
CVE-2023-32375 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32376 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32377 | HIGH | 7.8 | 5.9 | 27.09.2023 15:18 | ||
CVE-2023-32379 | HIGH | 7.8 | 5.9 | 06.09.2023 02:15 | ||
CVE-2023-32380 | HIGH | 7.8 | 5.9 | 23.06.2023 18:15 | ||
CVE-2023-32381 | HIGH | 7.8 | 5.9 | 27.07.2023 00:15 | ||
CVE-2023-32382 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32383 | HIGH | 7.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-32384 | HIGH | 7.8 | 5.9 | 23.06.2023 18:15 | ||
CVE-2023-32385 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32386 | LOW | 3.3 | 1.4 | 23.06.2023 18:15 | ||
CVE-2023-32387 | CRITICAL | 9.8 | 5.9 | 23.06.2023 18:15 | ||
CVE-2023-32388 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32389 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32390 | LOW | 2.4 | 1.4 | 23.06.2023 18:15 | ||
CVE-2023-32391 | MEDIUM | 4.6 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32392 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32394 | LOW | 2.4 | 1.4 | 23.06.2023 18:15 | ||
CVE-2023-32395 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32396 | HIGH | 7.8 | 5.9 | 27.09.2023 15:18 | ||
CVE-2023-32397 | HIGH | 7.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32398 | HIGH | 7.8 | 5.9 | 23.06.2023 18:15 | ||
CVE-2023-32399 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32400 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32401 | HIGH | 7.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-32402 | MEDIUM | 6.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32403 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32404 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32405 | HIGH | 7.8 | 5.9 | 23.06.2023 18:15 | ||
CVE-2023-32407 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32408 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32409 | HIGH | 8.6 | 4.0 | 23.06.2023 18:15 | ||
CVE-2023-32410 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32411 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32412 | CRITICAL | 9.8 | 5.9 | 23.06.2023 18:15 | ||
CVE-2023-32413 | HIGH | 7.0 | 5.9 | 23.06.2023 18:15 | ||
CVE-2023-32414 | HIGH | 8.6 | 6.0 | 23.06.2023 18:15 | ||
CVE-2023-32415 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32416 | MEDIUM | 5.5 | 3.6 | 27.07.2023 01:15 | ||
CVE-2023-32418 | HIGH | 7.8 | 5.9 | 27.07.2023 01:15 | ||
CVE-2023-32420 | HIGH | 7.1 | 5.2 | 23.06.2023 18:15 | ||
CVE-2023-32421 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:18 | ||
CVE-2023-32422 | MEDIUM | 5.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32423 | MEDIUM | 6.5 | 3.6 | 23.06.2023 18:15 | ||
CVE-2023-32428 | HIGH | 7.8 | 5.9 | 06.09.2023 02:15 | ||
CVE-2023-32429 | MEDIUM | 5.5 | 3.6 | 27.07.2023 01:15 | ||
CVE-2023-32432 | MEDIUM | 5.5 | 3.6 | 06.09.2023 02:15 | ||
CVE-2023-32433 | HIGH | 7.8 | 5.9 | 27.07.2023 00:15 | ||
CVE-2023-32434 | HIGH | 7.8 | 5.9 | 23.06.2023 18:15 | ||
CVE-2023-32439 | HIGH | 8.8 | 5.9 | 23.06.2023 18:15 | ||
CVE-2023-32441 | HIGH | 7.8 | 5.9 | 27.07.2023 01:15 | ||
CVE-2023-32442 | MEDIUM | 5.5 | 3.6 | 27.07.2023 01:15 | ||
CVE-2023-32443 | HIGH | 8.1 | 5.2 | 27.07.2023 01:15 | ||
CVE-2023-32444 | HIGH | 7.5 | 3.6 | 28.07.2023 05:15 | ||
CVE-2023-32445 | MEDIUM | 6.1 | 2.7 | 28.07.2023 05:15 | ||
CVE-2023-32654 | MEDIUM | 6.5 | 3.6 | 28.07.2023 05:15 | ||
CVE-2023-32734 | HIGH | 7.8 | 5.9 | 27.07.2023 01:15 | ||
CVE-2023-34241 | HIGH | 7.1 | 5.2 | 22.06.2023 23:15 | ||
CVE-2023-34352 | MEDIUM | 5.3 | 1.4 | 06.09.2023 02:15 | ||
CVE-2023-34425 | CRITICAL | 9.8 | 5.9 | 28.07.2023 05:15 | ||
CVE-2023-35074 | HIGH | 8.8 | 5.9 | 27.09.2023 15:18 | ||
CVE-2023-35983 | MEDIUM | 5.5 | 3.6 | 27.07.2023 00:15 | ||
CVE-2023-35984 | MEDIUM | 4.3 | 3.4 | 27.09.2023 15:18 | ||
CVE-2023-35990 | LOW | 3.3 | 1.4 | 27.09.2023 15:18 | ||
CVE-2023-35993 | HIGH | 7.8 | 5.9 | 27.07.2023 01:15 | ||
CVE-2023-36495 | CRITICAL | 9.8 | 5.9 | 28.07.2023 05:15 | ||
CVE-2023-36854 | HIGH | 7.8 | 5.9 | 27.07.2023 00:15 | ||
CVE-2023-36862 | MEDIUM | 5.5 | 3.6 | 27.07.2023 00:15 | ||
CVE-2023-37285 | CRITICAL | 9.8 | 5.9 | 28.07.2023 05:15 | ||
CVE-2023-37448 | LOW | 3.3 | 1.4 | 27.09.2023 15:18 | ||
CVE-2023-37450 | HIGH | 8.8 | 5.9 | 27.07.2023 00:15 | ||
CVE-2023-38133 | MEDIUM | 6.5 | 3.6 | 27.07.2023 00:15 | ||
CVE-2023-38258 | MEDIUM | 5.5 | 3.6 | 27.07.2023 01:15 | ||
CVE-2023-38259 | MEDIUM | 5.5 | 3.6 | 27.07.2023 01:15 | ||
CVE-2023-38261 | HIGH | 7.8 | 5.9 | 27.07.2023 01:15 | ||
CVE-2023-38403 | HIGH | 7.5 | 3.6 | 17.07.2023 21:15 | ||
CVE-2023-38410 | HIGH | 7.8 | 5.9 | 27.07.2023 00:15 | ||
CVE-2023-38421 | MEDIUM | 5.5 | 3.6 | 27.07.2023 01:15 | ||
CVE-2023-38424 | HIGH | 7.8 | 5.9 | 27.07.2023 01:15 | ||
CVE-2023-38425 | HIGH | 7.2 | 5.9 | 27.07.2023 01:15 | ||
CVE-2023-38564 | HIGH | 7.5 | 3.6 | 27.07.2023 01:15 | ||
CVE-2023-38565 | HIGH | 7.8 | 5.9 | 27.07.2023 01:15 | ||
CVE-2023-38571 | HIGH | 7.5 | 3.6 | 28.07.2023 05:15 | ||
CVE-2023-38572 | HIGH | 7.5 | 3.6 | 27.07.2023 01:15 | ||
CVE-2023-38580 | HIGH | 7.8 | 5.9 | 27.07.2023 01:15 | ||
CVE-2023-38586 | CRITICAL | 10.0 | 6.0 | 27.09.2023 15:18 | ||
CVE-2023-38590 | HIGH | 8.8 | 5.9 | 28.07.2023 05:15 | ||
CVE-2023-38592 | HIGH | 8.8 | 5.9 | 28.07.2023 05:15 | ||
CVE-2023-38593 | MEDIUM | 5.5 | 3.6 | 27.07.2023 01:15 | ||
CVE-2023-38594 | HIGH | 8.8 | 5.9 | 27.07.2023 00:15 | ||
CVE-2023-38595 | HIGH | 8.8 | 5.9 | 27.07.2023 01:15 | ||
CVE-2023-38596 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:18 | ||
CVE-2023-38597 | HIGH | 8.8 | 5.9 | 27.07.2023 00:15 | ||
CVE-2023-38598 | CRITICAL | 9.8 | 5.9 | 28.07.2023 05:15 | ||
CVE-2023-38599 | MEDIUM | 6.5 | 3.6 | 28.07.2023 05:15 | ||
CVE-2023-38600 | HIGH | 8.8 | 5.9 | 27.07.2023 01:15 | ||
CVE-2023-38601 | HIGH | 7.5 | 3.6 | 28.07.2023 05:15 | ||
CVE-2023-38602 | MEDIUM | 5.5 | 3.6 | 27.07.2023 01:15 | ||
CVE-2023-38603 | HIGH | 7.5 | 3.6 | 27.07.2023 01:15 | ||
CVE-2023-38604 | CRITICAL | 9.8 | 5.9 | 28.07.2023 05:15 | ||
CVE-2023-38605 | LOW | 3.3 | 1.4 | 06.09.2023 21:15 | ||
CVE-2023-38606 | MEDIUM | 5.5 | 3.6 | 27.07.2023 00:15 | ||
CVE-2023-38607 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-38608 | MEDIUM | 5.5 | 3.6 | 27.07.2023 01:15 | ||
CVE-2023-38609 | HIGH | 7.5 | 3.6 | 28.07.2023 05:15 | ||
CVE-2023-38610 | HIGH | 7.1 | 5.2 | 10.01.2024 22:15 | ||
CVE-2023-38611 | HIGH | 8.8 | 5.9 | 27.07.2023 01:15 | ||
CVE-2023-38612 | LOW | 3.3 | 1.4 | 10.01.2024 22:15 | ||
CVE-2023-38615 | HIGH | 7.8 | 5.9 | 27.09.2023 15:18 | ||
CVE-2023-38616 | HIGH | 7.0 | 5.9 | 06.09.2023 21:15 | ||
CVE-2023-39233 | MEDIUM | 6.5 | 3.6 | 27.09.2023 15:18 | ||
CVE-2023-39434 | HIGH | 8.8 | 5.9 | 27.09.2023 15:18 | ||
CVE-2023-40384 | LOW | 3.3 | 1.4 | 27.09.2023 15:19 | ||
CVE-2023-40385 | MEDIUM | 6.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-40386 | LOW | 3.3 | 1.4 | 27.09.2023 15:19 | ||
CVE-2023-40388 | MEDIUM | 4.3 | 1.4 | 27.09.2023 15:19 | ||
CVE-2023-40389 | MEDIUM | 5.5 | 3.6 | 10.06.2024 20:15 | ||
CVE-2023-40390 | MEDIUM | 5.5 | 3.6 | 28.03.2024 16:15 | ||
CVE-2023-40391 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40392 | LOW | 3.3 | 1.4 | 06.09.2023 21:15 | ||
CVE-2023-40393 | HIGH | 7.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-40395 | LOW | 3.3 | 1.4 | 27.09.2023 15:19 | ||
CVE-2023-40397 | CRITICAL | 9.8 | 5.9 | 06.09.2023 21:15 | ||
CVE-2023-40399 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40400 | CRITICAL | 9.8 | 5.9 | 27.09.2023 15:19 | ||
CVE-2023-40401 | HIGH | 7.5 | 3.6 | 25.10.2023 19:15 | ||
CVE-2023-40402 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40403 | MEDIUM | 6.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40406 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40407 | HIGH | 7.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40409 | HIGH | 7.8 | 5.9 | 27.09.2023 15:19 | ||
CVE-2023-40410 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40411 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-40412 | HIGH | 7.8 | 5.9 | 27.09.2023 15:19 | ||
CVE-2023-40413 | MEDIUM | 5.5 | 3.6 | 25.10.2023 19:15 | ||
CVE-2023-40414 | CRITICAL | 9.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-40416 | MEDIUM | 6.5 | 3.6 | 25.10.2023 19:15 | ||
CVE-2023-40417 | MEDIUM | 5.4 | 2.5 | 27.09.2023 15:19 | ||
CVE-2023-40420 | MEDIUM | 6.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40421 | MEDIUM | 5.5 | 3.6 | 25.10.2023 19:15 | ||
CVE-2023-40422 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40423 | HIGH | 7.8 | 5.9 | 25.10.2023 19:15 | ||
CVE-2023-40424 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40426 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40427 | LOW | 3.3 | 1.4 | 27.09.2023 15:19 | ||
CVE-2023-40429 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40430 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-40432 | HIGH | 7.8 | 5.9 | 27.09.2023 15:19 | ||
CVE-2023-40434 | LOW | 3.3 | 1.4 | 27.09.2023 15:19 | ||
CVE-2023-40436 | CRITICAL | 9.1 | 5.2 | 27.09.2023 15:19 | ||
CVE-2023-40437 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-40438 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-40439 | LOW | 3.3 | 1.4 | 10.01.2024 22:15 | ||
CVE-2023-40441 | MEDIUM | 6.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40448 | HIGH | 8.6 | 4.0 | 27.09.2023 15:19 | ||
CVE-2023-40449 | MEDIUM | 5.5 | 3.6 | 25.10.2023 19:15 | ||
CVE-2023-40450 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-40452 | HIGH | 7.1 | 5.2 | 27.09.2023 15:19 | ||
CVE-2023-40454 | HIGH | 7.1 | 5.2 | 27.09.2023 15:19 | ||
CVE-2023-40455 | CRITICAL | 10.0 | 6.0 | 27.09.2023 15:19 | ||
CVE-2023-40528 | MEDIUM | 5.5 | 3.6 | 23.01.2024 01:15 | ||
CVE-2023-40541 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-41060 | HIGH | 8.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-41063 | HIGH | 7.8 | 5.9 | 27.09.2023 15:19 | ||
CVE-2023-41064 | HIGH | 7.8 | 5.9 | 07.09.2023 18:15 | ||
CVE-2023-41065 | LOW | 3.3 | 1.4 | 27.09.2023 15:19 | ||
CVE-2023-41066 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-41067 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-41070 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-41071 | HIGH | 7.8 | 5.9 | 27.09.2023 15:19 | ||
CVE-2023-41073 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-41074 | HIGH | 8.8 | 5.9 | 27.09.2023 15:19 | ||
CVE-2023-41077 | MEDIUM | 5.5 | 3.6 | 25.10.2023 19:15 | ||
CVE-2023-41078 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-41079 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-41232 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-41254 | MEDIUM | 5.5 | 3.6 | 25.10.2023 19:15 | ||
CVE-2023-41968 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-41975 | MEDIUM | 4.3 | 1.4 | 25.10.2023 19:15 | ||
CVE-2023-41979 | MEDIUM | 4.7 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-41980 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-41981 | MEDIUM | 4.4 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-41984 | HIGH | 7.8 | 5.9 | 27.09.2023 15:19 | ||
CVE-2023-41986 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-41987 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-41991 | MEDIUM | 5.5 | 3.6 | 21.09.2023 19:15 | ||
CVE-2023-41992 | HIGH | 7.8 | 5.9 | 21.09.2023 19:15 | ||
CVE-2023-41993 | HIGH | 8.8 | 5.9 | 21.09.2023 19:15 | ||
CVE-2023-41994 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-41995 | HIGH | 7.8 | 5.9 | 27.09.2023 15:19 | ||
CVE-2023-41996 | MEDIUM | 5.5 | 3.6 | 27.09.2023 15:19 | ||
CVE-2023-42826 | HIGH | 7.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-42828 | HIGH | 7.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-42829 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-42831 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-42832 | HIGH | 7.0 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-42833 | HIGH | 8.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-42841 | HIGH | 7.8 | 5.9 | 25.10.2023 19:15 | ||
CVE-2023-42844 | HIGH | 7.5 | 3.6 | 25.10.2023 19:15 | ||
CVE-2023-42849 | MEDIUM | 6.5 | 3.6 | 25.10.2023 19:15 | ||
CVE-2023-42854 | MEDIUM | 5.5 | 3.6 | 25.10.2023 19:15 | ||
CVE-2023-42856 | HIGH | 7.8 | 5.9 | 25.10.2023 19:15 | ||
CVE-2023-42866 | HIGH | 8.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-42869 | HIGH | 7.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-42870 | HIGH | 7.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-42871 | HIGH | 7.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-42872 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-42876 | HIGH | 7.1 | 5.2 | 10.01.2024 22:15 | ||
CVE-2023-42881 | HIGH | 7.8 | 5.9 | 23.01.2024 01:15 | ||
CVE-2023-42884 | MEDIUM | 5.5 | 3.6 | 12.12.2023 01:15 | ||
CVE-2023-42886 | HIGH | 7.8 | 5.9 | 12.12.2023 01:15 | ||
CVE-2023-42887 | MEDIUM | 6.3 | 4.0 | 23.01.2024 01:15 | ||
CVE-2023-42888 | MEDIUM | 5.5 | 3.6 | 23.01.2024 01:15 | ||
CVE-2023-42891 | MEDIUM | 5.5 | 3.6 | 12.12.2023 01:15 | ||
CVE-2023-42892 | HIGH | 7.8 | 5.9 | 28.03.2024 16:15 | ||
CVE-2023-42893 | MEDIUM | 5.5 | 3.6 | 28.03.2024 16:15 | ||
CVE-2023-42894 | MEDIUM | 5.5 | 3.6 | 12.12.2023 01:15 | ||
CVE-2023-42896 | MEDIUM | 5.5 | 3.6 | 28.03.2024 16:15 | ||
CVE-2023-42899 | HIGH | 7.8 | 5.9 | 12.12.2023 01:15 | ||
CVE-2023-42913 | HIGH | 8.8 | 5.9 | 28.03.2024 16:15 | ||
CVE-2023-42914 | MEDIUM | 6.3 | 4.0 | 12.12.2023 01:15 | ||
CVE-2023-42919 | MEDIUM | 5.5 | 3.6 | 12.12.2023 01:15 | ||
CVE-2023-42922 | MEDIUM | 5.5 | 3.6 | 12.12.2023 01:15 | ||
CVE-2023-42924 | MEDIUM | 5.5 | 3.6 | 12.12.2023 01:15 | ||
CVE-2023-42925 | LOW | 3.3 | 1.4 | 29.07.2024 21:15 | ||
CVE-2023-42929 | MEDIUM | 5.5 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-42930 | MEDIUM | 5.5 | 3.6 | 28.03.2024 16:15 | ||
CVE-2023-42931 | HIGH | 7.8 | 5.9 | 28.03.2024 16:15 | ||
CVE-2023-42932 | MEDIUM | 5.5 | 3.6 | 12.12.2023 01:15 | ||
CVE-2023-42933 | HIGH | 7.8 | 5.9 | 10.01.2024 22:15 | ||
CVE-2023-42934 | MEDIUM | 4.2 | 3.6 | 10.01.2024 22:15 | ||
CVE-2023-42935 | MEDIUM | 5.5 | 3.6 | 23.01.2024 01:15 | ||
CVE-2023-42936 | MEDIUM | 5.5 | 3.6 | 28.03.2024 16:15 | ||
CVE-2023-42937 | MEDIUM | 5.5 | 3.6 | 23.01.2024 01:15 | ||
CVE-2023-42943 | MEDIUM | 5.5 | 3.6 | 29.07.2024 21:15 | ||
CVE-2023-42947 | HIGH | 8.6 | 6.0 | 28.03.2024 16:15 | ||
CVE-2023-42948 | LOW | 3.3 | 1.4 | 29.07.2024 21:15 | ||
CVE-2023-42949 | LOW | 3.3 | 1.4 | 29.07.2024 21:15 | ||
CVE-2023-42957 | LOW | 3.3 | 1.4 | 29.07.2024 21:15 | ||
CVE-2023-4733 | HIGH | 7.8 | 5.9 | 04.09.2023 14:15 | ||
CVE-2023-4734 | HIGH | 7.8 | 5.9 | 02.09.2023 18:15 | ||
CVE-2023-4750 | HIGH | 7.8 | 5.9 | 04.09.2023 14:15 | ||
CVE-2023-4752 | HIGH | 7.8 | 5.9 | 04.09.2023 14:15 | ||
CVE-2023-4781 | HIGH | 7.8 | 5.9 | 05.09.2023 19:15 | ||
CVE-2024-23203 | HIGH | 7.5 | 3.6 | 23.01.2024 01:15 | ||
CVE-2024-23204 | HIGH | 7.5 | 3.6 | 23.01.2024 01:15 | ||
CVE-2024-23206 | MEDIUM | 6.5 | 3.6 | 23.01.2024 01:15 | ||
CVE-2024-23207 | MEDIUM | 5.5 | 3.6 | 23.01.2024 01:15 | ||
CVE-2024-23209 | HIGH | 8.8 | 5.9 | 23.01.2024 01:15 | ||
CVE-2024-23212 | HIGH | 7.8 | 5.9 | 23.01.2024 01:15 | ||
CVE-2024-23222 | HIGH | 8.8 | 5.9 | 23.01.2024 01:15 | ||
CVE-2024-23224 | MEDIUM | 5.5 | 3.6 | 23.01.2024 01:15 | ||
CVE-2024-23225 | HIGH | 7.8 | 5.9 | 05.03.2024 20:16 | ||
CVE-2024-23237 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-23261 | HIGH | 7.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-23266 | MEDIUM | 5.5 | 3.6 | 08.03.2024 02:15 | ||
CVE-2024-23267 | MEDIUM | 5.5 | 3.6 | 08.03.2024 02:15 | ||
CVE-2024-23268 | HIGH | 7.8 | 5.9 | 08.03.2024 02:15 | ||
CVE-2024-23270 | HIGH | 7.8 | 5.9 | 08.03.2024 02:15 | ||
CVE-2024-23272 | MEDIUM | 5.5 | 3.6 | 08.03.2024 02:15 | ||
CVE-2024-23274 | HIGH | 7.8 | 5.9 | 08.03.2024 02:15 | ||
CVE-2024-23275 | MEDIUM | 4.7 | 3.6 | 08.03.2024 02:15 | ||
CVE-2024-23276 | HIGH | 7.8 | 5.9 | 08.03.2024 02:15 | ||
CVE-2024-23296 | HIGH | 7.8 | 5.9 | 05.03.2024 20:16 | ||
CVE-2024-23299 | HIGH | 8.6 | 6.0 | 10.06.2024 20:15 | ||
CVE-2024-27792 | MEDIUM | 5.5 | 3.6 | 10.06.2024 20:15 | ||
CVE-2024-27795 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27799 | LOW | 3.3 | 1.4 | 10.06.2024 21:15 | ||
CVE-2024-27800 | MEDIUM | 6.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27802 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27805 | MEDIUM | 5.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27806 | MEDIUM | 5.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27809 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27817 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27823 | MEDIUM | 5.9 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27831 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27836 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27840 | MEDIUM | 6.3 | 4.0 | 10.06.2024 21:15 | ||
CVE-2024-27849 | LOW | 3.3 | 1.4 | 28.10.2024 21:15 | ||
CVE-2024-27853 | MEDIUM | 4.4 | 2.5 | 29.07.2024 23:15 | ||
CVE-2024-27855 | HIGH | 8.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27858 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27860 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27861 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27863 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27871 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27872 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27873 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27875 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27877 | MEDIUM | 6.1 | 4.2 | 29.07.2024 23:15 | ||
CVE-2024-27880 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27881 | MEDIUM | 5.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-27882 | MEDIUM | 4.4 | 2.5 | 29.07.2024 23:15 | ||
CVE-2024-27883 | MEDIUM | 4.4 | 2.5 | 29.07.2024 23:15 | ||
CVE-2024-27884 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27885 | MEDIUM | 6.3 | 4.0 | 10.06.2024 21:15 | ||
CVE-2024-27887 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40770 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40774 | HIGH | 7.1 | 5.2 | 29.07.2024 23:15 | ||
CVE-2024-40775 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40776 | MEDIUM | 4.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40778 | LOW | 3.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40779 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40780 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40785 | MEDIUM | 6.1 | 2.7 | 29.07.2024 23:15 | ||
CVE-2024-40786 | HIGH | 7.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40787 | HIGH | 7.1 | 5.2 | 29.07.2024 23:15 | ||
CVE-2024-40788 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40789 | MEDIUM | 6.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40791 | LOW | 3.3 | 1.4 | 17.09.2024 00:15 | ||
CVE-2024-40792 | LOW | 3.3 | 1.4 | 28.10.2024 21:15 | ||
CVE-2024-40793 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40794 | MEDIUM | 5.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40795 | LOW | 3.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40796 | MEDIUM | 5.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40797 | MEDIUM | 6.1 | 2.7 | 17.09.2024 00:15 | ||
CVE-2024-40798 | LOW | 3.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40799 | HIGH | 7.1 | 5.2 | 29.07.2024 23:15 | ||
CVE-2024-40801 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40803 | HIGH | 7.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40804 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40806 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40807 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40809 | HIGH | 7.8 | 5.9 | 29.07.2024 23:15 | ||
CVE-2024-40810 | MEDIUM | 5.5 | 3.6 | 24.10.2024 17:15 | ||
CVE-2024-40815 | HIGH | 7.5 | 5.9 | 29.07.2024 23:15 | ||
CVE-2024-40816 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40817 | MEDIUM | 6.1 | 2.7 | 29.07.2024 23:15 | ||
CVE-2024-40818 | MEDIUM | 4.6 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40822 | LOW | 2.4 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40823 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40826 | MEDIUM | 6.1 | 4.2 | 17.09.2024 00:15 | ||
CVE-2024-40827 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40831 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40832 | LOW | 3.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40833 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40834 | MEDIUM | 4.4 | 2.5 | 29.07.2024 23:15 | ||
CVE-2024-40835 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40837 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40838 | LOW | 3.3 | 1.4 | 17.09.2024 00:15 | ||
CVE-2024-40842 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40843 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40844 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40845 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40846 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40847 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40848 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40850 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40855 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-40856 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40857 | MEDIUM | 6.1 | 2.7 | 17.09.2024 00:15 | ||
CVE-2024-40859 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40860 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40866 | MEDIUM | 6.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44122 | HIGH | 8.8 | 6.0 | 28.10.2024 21:15 | ||
CVE-2024-44123 | LOW | 2.3 | 1.4 | 28.10.2024 21:15 | ||
CVE-2024-44125 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44126 | HIGH | 7.8 | 5.9 | 28.10.2024 21:15 | ||
CVE-2024-44128 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44129 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44130 | MEDIUM | 4.4 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44131 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44133 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44134 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44135 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44137 | MEDIUM | 4.6 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44144 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44146 | CRITICAL | 10.0 | 6.0 | 17.09.2024 00:15 | ||
CVE-2024-44148 | CRITICAL | 10.0 | 6.0 | 17.09.2024 00:15 | ||
CVE-2024-44149 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44151 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44152 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44153 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44154 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44155 | MEDIUM | 6.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44156 | HIGH | 7.1 | 5.2 | 28.10.2024 21:15 | ||
CVE-2024-44158 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44159 | HIGH | 7.1 | 5.2 | 28.10.2024 21:15 | ||
CVE-2024-44161 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44163 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44164 | HIGH | 7.1 | 5.2 | 17.09.2024 00:15 | ||
CVE-2024-44165 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44166 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44168 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44170 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44174 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44175 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44176 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44177 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44178 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44181 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44182 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44183 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44184 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44185 | MEDIUM | 5.5 | 3.6 | 24.10.2024 17:15 | ||
CVE-2024-44186 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44187 | MEDIUM | 6.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44188 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44189 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44190 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44191 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44198 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44203 | HIGH | 7.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44205 | MEDIUM | 5.5 | 3.6 | 24.10.2024 17:15 | ||
CVE-2024-44206 | MEDIUM | 5.4 | 2.5 | 24.10.2024 17:15 | ||
CVE-2024-44208 | HIGH | 7.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44213 | MEDIUM | 5.9 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44215 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44218 | HIGH | 7.8 | 5.9 | 28.10.2024 21:15 | ||
CVE-2024-44222 | LOW | 3.3 | 1.4 | 28.10.2024 21:15 | ||
CVE-2024-44232 | MEDIUM | 5.5 | 3.6 | 01.11.2024 21:15 | ||
CVE-2024-44233 | MEDIUM | 5.5 | 3.6 | 01.11.2024 21:15 | ||
CVE-2024-44234 | MEDIUM | 5.5 | 3.6 | 01.11.2024 21:15 | ||
CVE-2024-44236 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44239 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44247 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44253 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44254 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44255 | HIGH | 7.8 | 5.9 | 28.10.2024 21:15 | ||
CVE-2024-44264 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44265 | LOW | 2.4 | 1.4 | 28.10.2024 21:15 | ||
CVE-2024-44267 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44269 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44270 | HIGH | 8.6 | 4.0 | 28.10.2024 21:15 | ||
CVE-2024-44273 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44281 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44282 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44284 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44287 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44289 | HIGH | 7.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44294 | MEDIUM | 6.5 | 5.2 | 28.10.2024 21:15 | ||
CVE-2024-44297 | MEDIUM | 6.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44302 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 |
Similar certificates
Scheme data ?
Product | Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1 macOS Ventura 13.3.1 (build 22E261) | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-mac-mini-m2-and-magic-keyboard-touch-id | |
Description | Le produit évalué est « Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1, macOS Ventura 13.3.1 (build 22E261) » développé par APPLE INC. | |
Sponsor | APPLE INC. | |
Developer | APPLE INC. | |
Cert Id | ANSSI-CC-2023/61 | |
Level | EAL2+ | |
Expiration Date | 28.12.2028 | |
Enhanced | ||
Cert Id | ANSSI-CC-2023/61 | |
Certification Date | 28.12.2023 | |
Expiration Date | 28.12.2028 | |
Category | Divers | |
Cc Version | Critères Communs version 3.1r5 | |
Developer | APPLE INC. | |
Sponsor | APPLE INC. | |
Evaluation Facility | THALES / CNES | |
Level | EAL2+ | |
Protection Profile | ||
Mutual Recognition | CCRA SOG-IS | |
Augmented | ADV_FSP.3 | |
Report Link | https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_61en.pdf | |
Target Link | https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_61en.pdf | |
Cert Link | https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_61en.pdf |
References ?
No references are available for this certificate.
Updates ?
-
12.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2024-44247', 'CVE-2024-44264', 'CVE-2024-44302', 'CVE-2024-44281', 'CVE-2024-44253', 'CVE-2024-44282', 'CVE-2024-44267', 'CVE-2024-44273', 'CVE-2024-44233', 'CVE-2024-44218', 'CVE-2024-27849', 'CVE-2024-44213', 'CVE-2024-44287', 'CVE-2024-44234', 'CVE-2024-44203', 'CVE-2024-44270', 'CVE-2024-44215', 'CVE-2024-44236', 'CVE-2024-44255', 'CVE-2024-44269', 'CVE-2024-44265', 'CVE-2024-44239', 'CVE-2024-44254', 'CVE-2024-44222', 'CVE-2024-44232', 'CVE-2024-44175', 'CVE-2024-44284']}
values added.
- The related_cves property was updated, with the
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'expiration_date': '2028-12-28', 'enhanced': {'__update__': {'certification_date': '2023-12-28', 'expiration_date': '2028-12-28', 'mutual_recognition': 'CCRA SOG-IS'}}}
data.
- The scheme_data property was updated, with the
-
30.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2024-44185', 'CVE-2024-44289', 'CVE-2024-40855', 'CVE-2024-44155', 'CVE-2024-44126', 'CVE-2024-44294', 'CVE-2024-44156', 'CVE-2024-44297', 'CVE-2024-44159', 'CVE-2024-44122', 'CVE-2024-40810', 'CVE-2024-44174', 'CVE-2024-44206', 'CVE-2024-44208', 'CVE-2024-44144', 'CVE-2024-44123', 'CVE-2024-44205', 'CVE-2024-44137', 'CVE-2024-40792']}
values added.
- The related_cves property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was set to
{'_type': 'Set', 'elements': ['cpe:2.3:o:apple:macos:13.3.1:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:13.3:*:*:*:*:*:*:*']}
. - The related_cves property was set to
{'_type': 'Set', 'elements': ['CVE-2023-40417', 'CVE-2024-23207', 'CVE-2024-44163', 'CVE-2023-38600', 'CVE-2023-41065', 'CVE-2024-23276', 'CVE-2024-40801', 'CVE-2023-38603', 'CVE-2023-28320', 'CVE-2023-38133', 'CVE-2023-32388', 'CVE-2023-42937', 'CVE-2024-40857', 'CVE-2023-41060', 'CVE-2023-41987', 'CVE-2024-23275', 'CVE-2024-27863', 'CVE-2024-40795', 'CVE-2024-23268', 'CVE-2023-32357', 'CVE-2023-35993', 'CVE-2023-42935', 'CVE-2024-44149', 'CVE-2024-44198', 'CVE-2024-27884', 'CVE-2023-42949', 'CVE-2024-40827', 'CVE-2024-40791', 'CVE-2023-32397', 'CVE-2023-38594', 'CVE-2023-32415', 'CVE-2023-40409', 'CVE-2024-27853', 'CVE-2023-41070', 'CVE-2023-38593', 'CVE-2023-40413', 'CVE-2024-40847', 'CVE-2024-27873', 'CVE-2024-27831', 'CVE-2023-40455', 'CVE-2024-27840', 'CVE-2024-40856', 'CVE-2023-42876', 'CVE-2023-32360', 'CVE-2023-41975', 'CVE-2023-36495', 'CVE-2024-40798', 'CVE-2023-32371', 'CVE-2024-27805', 'CVE-2023-41074', 'CVE-2023-32411', 'CVE-2023-40403', 'CVE-2024-44153', 'CVE-2023-41993', 'CVE-2024-44131', 'CVE-2023-40416', 'CVE-2023-28322', 'CVE-2023-36854', 'CVE-2024-23204', 'CVE-2023-38595', 'CVE-2023-28204', 'CVE-2023-32376', 'CVE-2024-40776', 'CVE-2023-38604', 'CVE-2024-23206', 'CVE-2023-41995', 'CVE-2023-40401', 'CVE-2023-37285', 'CVE-2023-40438', 'CVE-2024-40845', 'CVE-2023-32420', 'CVE-2024-44191', 'CVE-2023-42884', 'CVE-2023-32382', 'CVE-2024-40842', 'CVE-2024-40823', 'CVE-2023-32398', 'CVE-2023-38571', 'CVE-2024-40780', 'CVE-2024-44186', 'CVE-2023-38607', 'CVE-2024-40835', 'CVE-2023-32385', 'CVE-2024-27877', 'CVE-2023-32379', 'CVE-2023-42931', 'CVE-2023-40449', 'CVE-2024-44164', 'CVE-2023-37450', 'CVE-2023-32392', 'CVE-2024-27887', 'CVE-2023-42924', 'CVE-2023-42919', 'CVE-2023-32364', 'CVE-2023-42929', 'CVE-2023-23495', 'CVE-2023-32429', 'CVE-2023-34425', 'CVE-2023-42828', 'CVE-2023-40384', 'CVE-2023-40390', 'CVE-2023-38612', 'CVE-2023-40407', 'CVE-2023-42826', 'CVE-2023-32414', 'CVE-2024-23203', 'CVE-2024-27860', 'CVE-2023-40395', 'CVE-2024-44178', 'CVE-2023-32387', 'CVE-2023-42870', 'CVE-2024-40837', 'CVE-2023-41968', 'CVE-2023-40424', 'CVE-2024-23261', 'CVE-2024-40817', 'CVE-2023-40452', 'CVE-2023-32368', 'CVE-2024-23272', 'CVE-2023-40528', 'CVE-2023-40436', 'CVE-2023-32404', 'CVE-2024-23270', 'CVE-2023-32399', 'CVE-2023-40421', 'CVE-2024-40818', 'CVE-2023-42925', 'CVE-2023-32441', 'CVE-2024-44168', 'CVE-2023-40385', 'CVE-2023-37448', 'CVE-2024-44183', 'CVE-2023-32402', 'CVE-2024-23212', 'CVE-2023-42932', 'CVE-2024-40774', 'CVE-2023-32413', 'CVE-2023-38572', 'CVE-2024-40804', 'CVE-2023-41986', 'CVE-2024-44151', 'CVE-2023-40450', 'CVE-2023-41079', 'CVE-2024-44188', 'CVE-2023-28319', 'CVE-2023-40410', 'CVE-2023-40386', 'CVE-2024-44166', 'CVE-2023-28205', 'CVE-2024-27800', 'CVE-2023-32421', 'CVE-2023-42831', 'CVE-2023-28191', 'CVE-2023-32407', 'CVE-2023-32391', 'CVE-2023-28321', 'CVE-2024-27809', 'CVE-2023-40448', 'CVE-2023-32367', 'CVE-2023-32363', 'CVE-2024-44187', 'CVE-2024-40850', 'CVE-2024-40831', 'CVE-2024-40807', 'CVE-2023-42943', 'CVE-2023-42849', 'CVE-2024-40843', 'CVE-2024-23266', 'CVE-2023-32444', 'CVE-2023-40441', 'CVE-2023-41066', 'CVE-2023-35074', 'CVE-2023-41071', 'CVE-2024-44181', 'CVE-2023-41996', 'CVE-2023-30774', 'CVE-2024-27883', 'CVE-2023-40393', 'CVE-2023-28202', 'CVE-2023-42866', 'CVE-2023-32401', 'CVE-2024-40785', 'CVE-2023-38605', 'CVE-2023-32369', 'CVE-2023-32372', 'CVE-2023-42891', 'CVE-2023-42936', 'CVE-2023-40426', 'CVE-2023-40414', 'CVE-2023-40437', 'CVE-2023-40389', 'CVE-2023-38599', 'CVE-2023-41254', 'CVE-2023-42947', 'CVE-2023-41984', 'CVE-2023-42856', 'CVE-2024-44133', 'CVE-2023-32423', 'CVE-2023-42893', 'CVE-2023-32409', 'CVE-2023-38403', 'CVE-2024-40815', 'CVE-2024-40779', 'CVE-2024-23222', 'CVE-2023-35984', 'CVE-2001-0102', 'CVE-2023-29497', 'CVE-2023-38564', 'CVE-2023-40420', 'CVE-2024-27875', 'CVE-2023-41232', 'CVE-2024-44165', 'CVE-2023-32352', 'CVE-2023-41063', 'CVE-2023-32395', 'CVE-2023-32355', 'CVE-2023-38615', 'CVE-2024-40822', 'CVE-2023-40400', 'CVE-2024-44161', 'CVE-2023-35983', 'CVE-2023-42888', 'CVE-2023-41991', 'CVE-2023-40399', 'CVE-2023-40427', 'CVE-2023-42948', 'CVE-2023-40388', 'CVE-2024-23299', 'CVE-2023-40439', 'CVE-2023-42896', 'CVE-2023-38596', 'CVE-2024-44182', 'CVE-2024-44135', 'CVE-2023-32377', 'CVE-2024-40775', 'CVE-2024-44190', 'CVE-2023-41992', 'CVE-2023-40391', 'CVE-2024-23296', 'CVE-2023-32408', 'CVE-2023-32405', 'CVE-2023-40423', 'CVE-2023-27930', 'CVE-2023-32654', 'CVE-2023-42892', 'CVE-2023-41980', 'CVE-2023-38610', 'CVE-2023-38602', 'CVE-2024-44125', 'CVE-2023-41077', 'CVE-2024-40848', 'CVE-2023-38565', 'CVE-2024-27880', 'CVE-2023-22809', 'CVE-2023-34352', 'CVE-2024-40789', 'CVE-2024-40809', 'CVE-2023-40541', 'CVE-2024-27817', 'CVE-2023-41078', 'CVE-2024-23274', 'CVE-2023-38609', 'CVE-2023-42833', 'CVE-2023-38590', 'CVE-2023-41073', 'CVE-2024-40866', 'CVE-2024-27881', 'CVE-2023-41064', 'CVE-2024-40787', 'CVE-2023-32373', 'CVE-2024-40793', 'CVE-2024-23267', 'CVE-2024-27823', 'CVE-2024-40859', 'CVE-2023-32394', 'CVE-2023-40397', 'CVE-2023-40402', 'CVE-2023-38586', 'CVE-2023-42957', 'CVE-2024-40803', 'CVE-2023-32428', 'CVE-2024-27836', 'CVE-2024-40806', 'CVE-2024-40833', 'CVE-2023-42886', 'CVE-2023-40411', 'CVE-2023-34241', 'CVE-2023-42841', 'CVE-2023-42829', 'CVE-2024-27792', 'CVE-2024-40832', 'CVE-2023-40429', 'CVE-2023-32416', 'CVE-2024-27855', 'CVE-2024-44170', 'CVE-2023-42922', 'CVE-2024-27802', 'CVE-2024-44130', 'CVE-2023-35990', 'CVE-2023-4733', 'CVE-2023-41067', 'CVE-2023-42872', 'CVE-2024-23209', 'CVE-2023-32734', 'CVE-2024-27885', 'CVE-2023-32418', 'CVE-2023-42894', 'CVE-2023-41979', 'CVE-1999-0590', 'CVE-2023-32412', 'CVE-2023-32422', 'CVE-2023-40454', 'CVE-2023-38611', 'CVE-2023-32375', 'CVE-2023-4734', 'CVE-2024-44148', 'CVE-2024-44154', 'CVE-2023-38258', 'CVE-2023-38410', 'CVE-2023-4750', 'CVE-2024-44152', 'CVE-2024-44176', 'CVE-2024-40846', 'CVE-2023-32396', 'CVE-2024-27872', 'CVE-2024-40838', 'CVE-2023-32403', 'CVE-2023-40434', 'CVE-2024-27795', 'CVE-2023-42933', 'CVE-2024-44134', 'CVE-2023-38608', 'CVE-2024-23225', 'CVE-2023-42934', 'CVE-2023-38601', 'CVE-2023-38598', 'CVE-2023-40432', 'CVE-2023-38592', 'CVE-2023-32381', 'CVE-2023-32380', 'CVE-2023-32445', 'CVE-2023-40430', 'CVE-2023-28206', 'CVE-2023-32433', 'CVE-2024-40826', 'CVE-2024-40860', 'CVE-2023-42832', 'CVE-2024-27882', 'CVE-2024-27799', 'CVE-2024-40778', 'CVE-2024-44128', 'CVE-2024-40770', 'CVE-2023-42854', 'CVE-2023-42930', 'CVE-2023-32390', 'CVE-2023-32443', 'CVE-2023-38606', 'CVE-2024-40797', 'CVE-2023-32386', 'CVE-2024-40816', 'CVE-2023-39434', 'CVE-2023-38261', 'CVE-2023-32384', 'CVE-2023-32400', 'CVE-2023-32439', 'CVE-2023-40422', 'CVE-2023-32442', 'CVE-2023-40412', 'CVE-2024-27871', 'CVE-2024-40796', 'CVE-2024-44177', 'CVE-2023-4752', 'CVE-2023-38421', 'CVE-2023-41981', 'CVE-2023-42844', 'CVE-2023-36862', 'CVE-2024-27806', 'CVE-2023-42899', 'CVE-2024-27858', 'CVE-2023-39233', 'CVE-2024-44189', 'CVE-2023-32434', 'CVE-2024-23224', 'CVE-2023-40392', 'CVE-2023-42881', 'CVE-2023-27940', 'CVE-2023-32383', 'CVE-2023-42887', 'CVE-2023-38597', 'CVE-2023-32389', 'CVE-2024-40786', 'CVE-2023-42913', 'CVE-2023-38425', 'CVE-2023-4781', 'CVE-2024-44146', 'CVE-2023-38616', 'CVE-2024-44184', 'CVE-2023-42869', 'CVE-2023-32361', 'CVE-2023-38424', 'CVE-2023-41994', 'CVE-2023-32410', 'CVE-2024-23237', 'CVE-2023-38580', 'CVE-2024-27861', 'CVE-2024-40788', 'CVE-2023-38259', 'CVE-2022-3970', 'CVE-2023-42914', 'CVE-2024-44129', 'CVE-2024-40844', 'CVE-2023-2953', 'CVE-2024-44158', 'CVE-2024-40834', 'CVE-2024-40799', 'CVE-2023-42871', 'CVE-2024-40794', 'CVE-2023-40406', 'CVE-2023-32432']}
. - The scheme_data property was set to
{'product': 'Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1 macOS Ventura 13.3.1 (build 22E261)', 'url': 'https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-mac-mini-m2-and-magic-keyboard-touch-id', 'description': 'Le produit évalué est « Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1, macOS Ventura 13.3.1 (build 22E261) » développé par APPLE INC.', 'sponsor': 'APPLE INC.', 'developer': 'APPLE INC.', 'cert_id': 'ANSSI-CC-2023/61', 'level': 'EAL2+', 'expiration_date': '28 Décembre 2028', 'enhanced': {'cert_id': 'ANSSI-CC-2023/61', 'certification_date': '28/12/2023', 'expiration_date': '28/12/2028', 'category': 'Divers', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'APPLE INC.', 'sponsor': 'APPLE INC.', 'evaluation_facility': 'THALES / CNES', 'level': 'EAL2+', 'protection_profile': '', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ADV_FSP.3', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_61en.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_61en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_61en.pdf'}}
.
- The cpe_matches property was set to
-
02.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e2ce81c073ea3d6f4b5b0fa8962b1889260c8e7eb293c3760bd60011a5032949', 'txt_hash': 'a6cd365236aa1a5ecedfb11531f99c1581659e19f1a77698a403b81b075b9ade'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f9904c33a3da40eceacbea0a231cfd0a52340cb34599c1a160574f96336ebf57', 'txt_hash': '964e8be87743c7c4d6827e3dfc178ca3755d651db7b5797d8209c52c1fffe466'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 2390078, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 51, '/CreationDate': 'D:20231108164206Z', '/Creator': 'Word', '/ModDate': 'D:20231108164224Z', '/Producer': 'Adobe Mac PDF Plug-in', '/Title': 'Microsoft Word - [ST] Macmini_M2_Keyboard_macOS13_SecurityTarget_v1.5.docx', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 136188, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20240222154936+01'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20240222155209+01'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL2': 1, 'EAL 2 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_FSP': 1, 'ADV_ARC.1': 3, 'ADV_FSP.3': 2, 'ADV_TDS.1': 4, 'ADV_FSP.2': 4, 'ADV_FSP.1': 2}, 'AGD': {'AGD_OPE.1': 4, 'AGD_PRE.1': 4}, 'ALC': {'ALC_CMC.2': 2, 'ALC_CMS.2': 2, 'ALC_DEL.1': 2}, 'ATE': {'ATE_COV.1': 4, 'ATE_FUN.1': 3, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 2}, 'ASE': {'ASE_CCL.1': 2, 'ASE_ECD.1': 3, 'ASE_INT.1': 2, 'ASE_OBJ.2': 2, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2, 'ASE_TSS.1': 2, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FDP': {'FDP_DAU.1': 4, 'FDP_DAU.1.1': 1, 'FDP_DAU.1.2': 1, 'FDP_ACC': 25, 'FDP_ACC.2': 4, 'FDP_ACF': 23, 'FDP_ACF.1': 12, 'FDP_ETC': 8, 'FDP_ETC.2.1': 2, 'FDP_ETC.2.2': 2, 'FDP_ETC.2.3': 2, 'FDP_ETC.2.4': 2, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_ITC': 4, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_ITT': 8, 'FDP_ITT.1.1': 2, 'FDP_UCT': 10, 'FDP_UCT.1': 1, 'FDP_UIT': 10, 'FDP_UIT.1': 2, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_RIP.1': 13, 'FDP_RIP.1.1': 1, 'FDP_SDI.1': 9, 'FDP_SDI.1.1': 1, 'FDP_ACC.1': 13, 'FDP_IFC.1': 10, 'FDP_ETC.2': 2}, 'FIA': {'FIA_UID.2': 6, 'FIA_UID.2.1': 1, 'FIA_UAU.2': 11, 'FIA_UAU.2.1': 1, 'FIA_UAU.5': 5, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6': 11, 'FIA_AFL.1': 3, 'FIA_AFL': 7, 'FIA_AFL.1.1': 3, 'FIA_AFL.1.2': 3, 'FIA_UAU.6.1': 2, 'FIA_ATD.1': 5, 'FIA_ATD.1.1': 2, 'FIA_SOS.2': 4, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_UAU.1': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_SMR.1': 10, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 6, 'FMT_SMF.1.1': 1, 'FMT_MSA.1': 6, 'FMT_MSA.3': 11, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.1.1': 2, 'FMT_MTD.1': 4, 'FMT_MTD.1.1': 1, 'FMT_MTD.3': 4, 'FMT_MTD.3.1': 1}, 'FPR': {'FPR_UNO.1': 17, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_ITC.1': 4, 'FPT_ITC.1.1': 1, 'FPT_RPL': 10, 'FPT_RPL.1': 4}, 'FTP': {'FTP_ITC': 14, 'FTP_ITC.1': 7, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 4}}, 'cc_claims': {'D': {'D.OS': 17, 'D.SEP_SE': 3}, 'T': {'T.COR-': 1, 'T.PHYSI-': 1, 'T.RE-': 1, 'T.REPLAY': 2, 'T.SILENT': 2, 'T.SKIM-': 1, 'T.USURP': 2, 'T.SKIMMING': 1, 'T.RECOVER': 1, 'T.CORRUPT': 1, 'T.PHYSICAL': 1}, 'A': {'A.DEVICE_AUTH': 3, 'A.PERSO': 3, 'A.WATCH_USER': 3, 'A.NO_EVIL_ROOT_USER': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 3}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 4}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-3': 1, 'FIPS 140-2': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by': 1, 'to re- turn to its User. Note: Defending against device re-use after physical compromise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.Keyboard_Secret D.SEP_Watch* Strong': 1}}}
. - The cert_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2023/61': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 2}}, 'cc_sar': {'ADV': {'ADV_FSP.3': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Thales': {'THALES/CNES': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
ANSSI-cible-CC-2023_61en.pdf
. - The cert_filename property was set to
certificat-CC-2023_61en.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]}
values added.
- The st property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_61en.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_61en.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The cert_metadata property was set to
None
. - The cert_keywords property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1 macOS Ventura 13.3.1 (build 22E261)', 'url': 'https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-mac-mini-m2-and-magic-keyboard-touch-id', 'description': 'Le produit évalué est « Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1, macOS Ventura 13.3.1 (build 22E261) » développé par APPLE INC.', 'sponsor': 'APPLE INC.', 'developer': 'APPLE INC.', 'cert_id': 'ANSSI-CC-2023/61', 'level': 'EAL2+', 'expiration_date': '28 Décembre 2028', 'enhanced': {'cert_id': 'ANSSI-CC-2023/61', 'certification_date': '28/12/2023', 'expiration_date': '28/12/2028', 'category': 'Divers', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'APPLE INC.', 'sponsor': 'APPLE INC.', 'evaluation_facility': 'THALES / CNES', 'level': 'EAL2+', 'protection_profile': '', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ADV_FSP.3', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_61en.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_61en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_61en.pdf'}}
.
- The cert property was updated, with the
-
31.07.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1 , macOS Ventura 13.3.1 (build 22E261) ( ANSSI-CC-2023/61) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_61en.pdf",
"dgst": "7ace7bd5d375474d",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2023/61",
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:apple:macos:13.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:13.3:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"13.3.1"
]
},
"indirect_transitive_cves": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2024-40775",
"CVE-2024-44264",
"CVE-2023-28191",
"CVE-2024-44267",
"CVE-2023-39233",
"CVE-2024-44213",
"CVE-2023-38593",
"CVE-2023-32428",
"CVE-2023-32368",
"CVE-2024-23274",
"CVE-2024-40846",
"CVE-2024-27884",
"CVE-2024-44168",
"CVE-2023-40449",
"CVE-2024-44206",
"CVE-2024-23209",
"CVE-2024-40770",
"CVE-2023-38603",
"CVE-2024-44222",
"CVE-2023-40438",
"CVE-2023-40388",
"CVE-2024-44161",
"CVE-2023-32386",
"CVE-2023-41065",
"CVE-2024-44215",
"CVE-2023-32408",
"CVE-2024-27795",
"CVE-2024-44270",
"CVE-2024-27872",
"CVE-2023-38586",
"CVE-2024-40831",
"CVE-2023-38259",
"CVE-2024-44247",
"CVE-2023-38616",
"CVE-2023-40454",
"CVE-2023-40439",
"CVE-2023-38594",
"CVE-2023-32734",
"CVE-2023-40384",
"CVE-2023-32429",
"CVE-2023-28202",
"CVE-2024-44128",
"CVE-2024-40823",
"CVE-2023-32445",
"CVE-2024-40806",
"CVE-2023-28320",
"CVE-2024-27831",
"CVE-2023-40414",
"CVE-2023-40393",
"CVE-2023-35990",
"CVE-2023-32375",
"CVE-2023-32377",
"CVE-2024-40816",
"CVE-2023-42936",
"CVE-2024-40847",
"CVE-2023-40452",
"CVE-2023-40429",
"CVE-2024-44144",
"CVE-2023-32409",
"CVE-2023-42884",
"CVE-2024-44130",
"CVE-2024-40799",
"CVE-2023-42947",
"CVE-2024-40845",
"CVE-2024-44208",
"CVE-2023-32363",
"CVE-2024-44255",
"CVE-2023-32654",
"CVE-2024-27809",
"CVE-2023-41992",
"CVE-2023-34352",
"CVE-2023-32360",
"CVE-2024-40796",
"CVE-2024-44156",
"CVE-2024-40832",
"CVE-2023-42829",
"CVE-2023-32398",
"CVE-2023-42849",
"CVE-2023-32412",
"CVE-2023-42948",
"CVE-2023-36495",
"CVE-2024-44178",
"CVE-2023-32397",
"CVE-2023-42887",
"CVE-2024-44188",
"CVE-2024-44181",
"CVE-2024-27805",
"CVE-2023-32392",
"CVE-2023-41078",
"CVE-2024-44198",
"CVE-2023-40390",
"CVE-2023-40448",
"CVE-2024-44131",
"CVE-2024-44203",
"CVE-2024-40809",
"CVE-2023-38595",
"CVE-2024-44253",
"CVE-2024-23266",
"CVE-2024-40798",
"CVE-2023-41984",
"CVE-2023-32391",
"CVE-2024-44153",
"CVE-2023-32410",
"CVE-2023-41067",
"CVE-2024-23222",
"CVE-2024-44239",
"CVE-2024-27885",
"CVE-2023-41066",
"CVE-2023-38602",
"CVE-2023-32352",
"CVE-2023-4733",
"CVE-2024-40860",
"CVE-2024-44205",
"CVE-2024-40817",
"CVE-2024-44287",
"CVE-2023-32407",
"CVE-2024-23270",
"CVE-2023-32405",
"CVE-2023-32372",
"CVE-2024-44184",
"CVE-2024-23261",
"CVE-2023-40441",
"CVE-2023-40397",
"CVE-2023-41995",
"CVE-2023-42826",
"CVE-2023-40413",
"CVE-2023-38572",
"CVE-2024-40837",
"CVE-2023-42881",
"CVE-2024-44269",
"CVE-2023-32444",
"CVE-2023-40412",
"CVE-2024-40797",
"CVE-2023-41975",
"CVE-2023-40434",
"CVE-2024-40794",
"CVE-2023-42933",
"CVE-2024-40843",
"CVE-2024-44174",
"CVE-2023-42856",
"CVE-2024-40826",
"CVE-2023-38261",
"CVE-2024-23276",
"CVE-2023-35074",
"CVE-2023-40403",
"CVE-2023-40417",
"CVE-2024-44165",
"CVE-2023-42828",
"CVE-2023-38564",
"CVE-2023-32434",
"CVE-2023-42925",
"CVE-2023-41980",
"CVE-2023-32402",
"CVE-2023-36862",
"CVE-2023-27930",
"CVE-2024-44134",
"CVE-2023-35983",
"CVE-2024-40778",
"CVE-2023-40409",
"CVE-2023-32432",
"CVE-2024-40789",
"CVE-2024-44284",
"CVE-2024-23268",
"CVE-2023-41254",
"CVE-2023-37448",
"CVE-2023-32355",
"CVE-2023-38612",
"CVE-2024-44265",
"CVE-2023-32442",
"CVE-2024-44289",
"CVE-2023-42924",
"CVE-2024-44159",
"CVE-2023-27940",
"CVE-2024-23267",
"CVE-2024-40866",
"CVE-2023-40437",
"CVE-2024-23207",
"CVE-2023-40399",
"CVE-2023-38421",
"CVE-2024-40835",
"CVE-2023-42937",
"CVE-2023-4781",
"CVE-2024-44163",
"CVE-2023-38565",
"CVE-2023-32385",
"CVE-2024-40815",
"CVE-2024-40810",
"CVE-2024-23204",
"CVE-2024-40857",
"CVE-2024-27849",
"CVE-2023-42919",
"CVE-2024-40807",
"CVE-2024-44297",
"CVE-2024-44186",
"CVE-2023-32381",
"CVE-2024-44175",
"CVE-2023-38425",
"CVE-2023-32383",
"CVE-2024-44191",
"CVE-2023-42929",
"CVE-2024-23212",
"CVE-2023-42831",
"CVE-2024-27799",
"CVE-2023-38604",
"CVE-2024-40842",
"CVE-2024-44125",
"CVE-2023-23495",
"CVE-2023-40389",
"CVE-2023-41986",
"CVE-2001-0102",
"CVE-2023-41987",
"CVE-2024-40833",
"CVE-2024-44135",
"CVE-2023-38571",
"CVE-2023-32423",
"CVE-2022-3970",
"CVE-2023-41994",
"CVE-2023-38410",
"CVE-2023-38611",
"CVE-2023-32439",
"CVE-2024-40793",
"CVE-2024-44281",
"CVE-2023-42870",
"CVE-2023-32400",
"CVE-2023-42943",
"CVE-2024-40827",
"CVE-2023-28204",
"CVE-2023-32415",
"CVE-2023-42957",
"CVE-2024-44123",
"CVE-2023-38607",
"CVE-2024-27875",
"CVE-2024-40791",
"CVE-2023-32373",
"CVE-2024-44232",
"CVE-2023-42934",
"CVE-2023-42833",
"CVE-2023-41979",
"CVE-2024-44254",
"CVE-2023-38258",
"CVE-2023-30774",
"CVE-2024-27823",
"CVE-2024-44158",
"CVE-2023-38598",
"CVE-2023-40430",
"CVE-2024-44182",
"CVE-2024-44126",
"CVE-2024-44122",
"CVE-2024-44189",
"CVE-2023-32395",
"CVE-2023-42841",
"CVE-2024-27853",
"CVE-2023-42930",
"CVE-2024-27883",
"CVE-2023-32382",
"CVE-2024-27877",
"CVE-2023-32396",
"CVE-2023-32380",
"CVE-2023-32411",
"CVE-2024-44218",
"CVE-2024-40859",
"CVE-2024-40834",
"CVE-2023-41996",
"CVE-2023-2953",
"CVE-2023-41063",
"CVE-2023-40395",
"CVE-2024-23296",
"CVE-2024-44151",
"CVE-2024-40795",
"CVE-2023-32441",
"CVE-2023-4734",
"CVE-2023-42866",
"CVE-2023-41073",
"CVE-2024-27863",
"CVE-2023-42896",
"CVE-2023-32399",
"CVE-2023-40391",
"CVE-2024-27860",
"CVE-2024-44154",
"CVE-2024-40856",
"CVE-2024-40822",
"CVE-2023-32421",
"CVE-2023-38606",
"CVE-2023-40423",
"CVE-2024-27792",
"CVE-2023-42872",
"CVE-2024-40792",
"CVE-2023-32418",
"CVE-2023-42949",
"CVE-2023-41968",
"CVE-2024-44273",
"CVE-2024-40779",
"CVE-2023-40411",
"CVE-2023-38596",
"CVE-2023-40420",
"CVE-2023-34241",
"CVE-2024-27840",
"CVE-2024-44164",
"CVE-2024-40776",
"CVE-2023-42871",
"CVE-2024-44234",
"CVE-2024-27800",
"CVE-2023-40432",
"CVE-2024-40788",
"CVE-2024-23203",
"CVE-2024-27817",
"CVE-2024-44148",
"CVE-2023-32364",
"CVE-2024-44233",
"CVE-2024-27880",
"CVE-1999-0590",
"CVE-2024-40801",
"CVE-2023-38590",
"CVE-2024-40787",
"CVE-2023-38580",
"CVE-2023-32369",
"CVE-2023-38403",
"CVE-2023-28206",
"CVE-2023-41079",
"CVE-2023-40401",
"CVE-2023-28319",
"CVE-2023-40427",
"CVE-2023-38599",
"CVE-2023-32388",
"CVE-2023-32414",
"CVE-2023-42893",
"CVE-2023-42891",
"CVE-2024-40780",
"CVE-2023-36854",
"CVE-2023-42892",
"CVE-2023-32384",
"CVE-2024-23299",
"CVE-2024-23206",
"CVE-2023-37285",
"CVE-2023-41060",
"CVE-2023-42869",
"CVE-2024-40855",
"CVE-2023-35993",
"CVE-2024-27858",
"CVE-2024-27881",
"CVE-2023-32357",
"CVE-2023-42913",
"CVE-2023-32403",
"CVE-2023-32367",
"CVE-2023-37450",
"CVE-2024-27806",
"CVE-2023-28321",
"CVE-2024-27802",
"CVE-2023-40436",
"CVE-2023-22809",
"CVE-2024-44137",
"CVE-2023-32390",
"CVE-2023-41071",
"CVE-2023-42876",
"CVE-2024-27873",
"CVE-2023-38605",
"CVE-2024-40786",
"CVE-2024-40774",
"CVE-2023-42888",
"CVE-2023-38133",
"CVE-2023-40406",
"CVE-2023-42914",
"CVE-2023-40402",
"CVE-2023-32394",
"CVE-2023-32376",
"CVE-2023-32361",
"CVE-2023-38597",
"CVE-2023-42894",
"CVE-2024-44185",
"CVE-2023-32416",
"CVE-2023-42886",
"CVE-2023-32401",
"CVE-2024-27855",
"CVE-2024-44133",
"CVE-2023-39434",
"CVE-2023-29497",
"CVE-2023-41070",
"CVE-2024-40838",
"CVE-2023-32404",
"CVE-2023-32389",
"CVE-2023-40410",
"CVE-2023-4752",
"CVE-2023-32420",
"CVE-2023-32379",
"CVE-2023-40416",
"CVE-2023-42899",
"CVE-2024-23272",
"CVE-2024-44236",
"CVE-2023-38424",
"CVE-2023-41232",
"CVE-2023-42854",
"CVE-2023-38601",
"CVE-2023-41981",
"CVE-2024-40848",
"CVE-2024-27836",
"CVE-2023-41064",
"CVE-2024-44166",
"CVE-2024-44282",
"CVE-2023-28322",
"CVE-2024-27882",
"CVE-2024-27861",
"CVE-2023-32422",
"CVE-2023-42832",
"CVE-2024-23224",
"CVE-2023-4750",
"CVE-2024-27871",
"CVE-2023-41991",
"CVE-2023-42922",
"CVE-2023-32443",
"CVE-2024-27887",
"CVE-2023-38608",
"CVE-2024-40804",
"CVE-2023-42935",
"CVE-2023-40455",
"CVE-2023-40421",
"CVE-2024-44187",
"CVE-2024-44152",
"CVE-2024-23275",
"CVE-2024-44177",
"CVE-2023-32371",
"CVE-2023-35984",
"CVE-2023-42931",
"CVE-2024-44155",
"CVE-2024-44129",
"CVE-2023-38592",
"CVE-2023-40424",
"CVE-2023-42844",
"CVE-2024-40785",
"CVE-2023-40407",
"CVE-2024-44294",
"CVE-2023-40392",
"CVE-2024-40844",
"CVE-2023-40528",
"CVE-2023-40400",
"CVE-2023-40450",
"CVE-2024-44149",
"CVE-2023-40541",
"CVE-2024-40803",
"CVE-2023-41074",
"CVE-2024-23225",
"CVE-2024-40850",
"CVE-2023-32413",
"CVE-2024-40818",
"CVE-2024-23237",
"CVE-2023-40422",
"CVE-2024-44170",
"CVE-2023-42932",
"CVE-2024-44190",
"CVE-2023-41077",
"CVE-2024-44302",
"CVE-2023-38615",
"CVE-2023-41993",
"CVE-2023-32433",
"CVE-2023-38600",
"CVE-2023-28205",
"CVE-2024-44146",
"CVE-2024-44176",
"CVE-2023-40426",
"CVE-2023-32387",
"CVE-2023-34425",
"CVE-2023-38609",
"CVE-2023-40385",
"CVE-2023-38610",
"CVE-2024-44183",
"CVE-2023-40386"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "ANSSI-CC-2023/61",
"description": "Le produit \u00e9valu\u00e9 est \u00ab Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1, macOS Ventura 13.3.1 (build 22E261) \u00bb d\u00e9velopp\u00e9 par APPLE INC.",
"developer": "APPLE INC.",
"enhanced": {
"augmented": "ADV_FSP.3",
"category": "Divers",
"cc_version": "Crit\u00e8res Communs version 3.1r5",
"cert_id": "ANSSI-CC-2023/61",
"cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_61en.pdf",
"certification_date": "2023-12-28",
"developer": "APPLE INC.",
"evaluation_facility": "THALES / CNES",
"expiration_date": "2028-12-28",
"level": "EAL2+",
"mutual_recognition": "CCRA SOG-IS",
"protection_profile": "",
"report_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_61en.pdf",
"sponsor": "APPLE INC.",
"target_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_61en.pdf"
},
"expiration_date": "2028-12-28",
"level": "EAL2+",
"product": "Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1 macOS Ventura 13.3.1 (build 22E261)",
"sponsor": "APPLE INC.",
"url": "https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-mac-mini-m2-and-magic-keyboard-touch-id"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Apple Inc.",
"manufacturer_web": "https://www.apple.com/",
"name": "Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1 , macOS Ventura 13.3.1 (build 22E261) ( ANSSI-CC-2023/61)",
"not_valid_after": "2028-12-28",
"not_valid_before": "2023-12-28",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "certificat-CC-2023_61en.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2023/61": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 2
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Thales": {
"THALES/CNES": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20240222154936+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 23 pour Word",
"/Keywords": "",
"/ModDate": "D:20240222155209+01\u002700\u0027",
"/Producer": "Adobe PDF Library 23.1.175",
"pdf_file_size_bytes": 136188,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "ANSSI-CC-2023_61en.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2023/61": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.3": 1
},
"ALC": {
"ALC_FLR": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 3,
"EAL2 augmented": 1,
"EAL4": 1
},
"ITSEC": {
"ITSEC E3 Basic": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Thales": {
"THALES/CNES": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20240222155049+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 23 pour Word",
"/Keywords": "",
"/ModDate": "D:20240222155208+01\u002700\u0027",
"/Producer": "Adobe PDF Library 23.1.175",
"pdf_file_size_bytes": 396092,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ssi.gouv.fr/",
"mailto:[email protected]",
"http://www.commoncriteriaportal.org/",
"http://www.sogis.eu/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 13
},
"st_filename": "ANSSI-cible-CC-2023_61en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.DEVICE_AUTH": 3,
"A.NO_EVIL_ROOT_USER": 2,
"A.PERSO": 3,
"A.WATCH_USER": 3
},
"D": {
"D.OS": 17,
"D.SEP_SE": 3
},
"T": {
"T.COR-": 1,
"T.CORRUPT": 1,
"T.PHYSI-": 1,
"T.PHYSICAL": 1,
"T.RE-": 1,
"T.RECOVER": 1,
"T.REPLAY": 2,
"T.SILENT": 2,
"T.SKIM-": 1,
"T.SKIMMING": 1,
"T.USURP": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 3,
"ADV_FSP": 1,
"ADV_FSP.1": 2,
"ADV_FSP.2": 4,
"ADV_FSP.3": 2,
"ADV_TDS.1": 4
},
"AGD": {
"AGD_OPE.1": 4,
"AGD_PRE.1": 4
},
"ALC": {
"ALC_CMC.2": 2,
"ALC_CMS.2": 2,
"ALC_DEL.1": 2
},
"ASE": {
"ASE_CCL.1": 2,
"ASE_ECD.1": 3,
"ASE_INT.1": 2,
"ASE_OBJ.2": 2,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_COV.1": 4,
"ATE_FUN.1": 3,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 2 augmented": 1,
"EAL2": 1
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC": 25,
"FDP_ACC.1": 13,
"FDP_ACC.2": 4,
"FDP_ACC.2.1": 1,
"FDP_ACC.2.2": 1,
"FDP_ACF": 23,
"FDP_ACF.1": 12,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_DAU.1": 4,
"FDP_DAU.1.1": 1,
"FDP_DAU.1.2": 1,
"FDP_ETC": 8,
"FDP_ETC.2": 2,
"FDP_ETC.2.1": 2,
"FDP_ETC.2.2": 2,
"FDP_ETC.2.3": 2,
"FDP_ETC.2.4": 2,
"FDP_IFC.1": 10,
"FDP_ITC": 4,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITT": 8,
"FDP_ITT.1.1": 2,
"FDP_RIP.1": 13,
"FDP_RIP.1.1": 1,
"FDP_SDI.1": 9,
"FDP_SDI.1.1": 1,
"FDP_UCT": 10,
"FDP_UCT.1": 1,
"FDP_UCT.1.1": 1,
"FDP_UIT": 10,
"FDP_UIT.1": 2,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL": 7,
"FIA_AFL.1": 3,
"FIA_AFL.1.1": 3,
"FIA_AFL.1.2": 3,
"FIA_ATD.1": 5,
"FIA_ATD.1.1": 2,
"FIA_SOS.2": 4,
"FIA_SOS.2.1": 1,
"FIA_SOS.2.2": 1,
"FIA_UAU.1": 1,
"FIA_UAU.2": 11,
"FIA_UAU.2.1": 1,
"FIA_UAU.5": 5,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 11,
"FIA_UAU.6.1": 2,
"FIA_UID.1": 1,
"FIA_UID.2": 6,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MSA.1": 6,
"FMT_MSA.1.1": 2,
"FMT_MSA.3": 11,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 4,
"FMT_MTD.1.1": 1,
"FMT_MTD.3": 4,
"FMT_MTD.3.1": 1,
"FMT_SMF.1": 6,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 10,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 17,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_ITC.1": 4,
"FPT_ITC.1.1": 1,
"FPT_RPL": 10,
"FPT_RPL.1": 4
},
"FTP": {
"FTP_ITC": 14,
"FTP_ITC.1": 7,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 4
}
},
"certification_process": {
"OutOfScope": {
"Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by": 1,
"out of scope": 2,
"to re- turn to its User. Note: Defending against device re-use after physical compromise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.Keyboard_Secret D.SEP_Watch* Strong": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 3
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 1,
"FIPS 140-3": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 4
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20231108164206Z",
"/Creator": "Word",
"/ModDate": "D:20231108164224Z",
"/Producer": "Adobe Mac PDF Plug-in",
"/Title": "Microsoft Word - [ST] Macmini_M2_Keyboard_macOS13_SecurityTarget_v1.5.docx",
"pdf_file_size_bytes": 2390078,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 51
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_61en.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ADV_FSP.3",
"EAL2+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_61en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f9904c33a3da40eceacbea0a231cfd0a52340cb34599c1a160574f96336ebf57",
"txt_hash": "964e8be87743c7c4d6827e3dfc178ca3755d651db7b5797d8209c52c1fffe466"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "1aa2706b18f951f16655b8e5d76bb670d733f005b0144e5478c3756a92853151",
"txt_hash": "bedda77fe46aa241810159a366524aebfeefca15fd147bf8e3125949a7a5b3ff"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e2ce81c073ea3d6f4b5b0fa8962b1889260c8e7eb293c3760bd60011a5032949",
"txt_hash": "a6cd365236aa1a5ecedfb11531f99c1581659e19f1a77698a403b81b075b9ade"
}
},
"status": "active"
}