Ärendetyp: 6 Diarienummer: 22FMV6381-24 Dokument ID CSEC2022011 Enligt säkerhetsskyddslagen (2018:585) SEKRETESS Enligt offentlighets- och Sekretesslagen (2009:400) 2023-06-22 Försvarets materielverk Swedish Defence Material Administration Swedish Certification Body for IT Security Certification Report - Kyocera ECOSYS MA6000ifx, MA5500ifx, MA4500ifx Issue: 1.0, 2023-jun-22 Authorisation: Jerry Johansson, Lead certifier , CSEC Ärendetyp: 6 Diarienummer: 22FMV6381-24 Dokument ID CSEC2022011 Swedish Certification Body for IT Security Certification Report - Kyocera ECOSYS MA6000ifx, MA5500ifx, MA4500ifx 22FMV6381-24 1.0 2023-06-22 CSEC2022011 2 (17) Table of Contents 1 Executive Summary 3 2 Identification 4 3 Security Policy 5 3.1 User Management 5 3.2 Data Access Control 5 3.3 FAX Data Flow Control 5 3.4 SSD Encryption 5 3.5 Security Management 5 3.6 Network Protection 5 4 Assumptions and Clarification of Scope 6 4.1 Assumptions 6 4.2 Clarification of Scope 6 5 Architectural Information 7 6 Documentation 8 7 IT Product Testing 9 7.1 Developer Testing 9 7.2 Evaluator Testing 9 7.3 Penetration Testing 9 8 Evaluated Configuration 10 9 Results of the Evaluation 11 10 Evaluator Comments and Recommendations 12 11 Glossary 13 12 Bibliography 14 Appendix A Scheme Versions 16 A.1 Scheme/Quality Management System 16 A.2 Scheme Notes 16 Swedish Certification Body for IT Security Certification Report - Kyocera ECOSYS MA6000ifx, MA5500ifx, MA4500ifx 22FMV6381-24 1.0 2023-06-22 CSEC2022011 3 (17) 1 Executive Summary The TOE is the hardware and the firmware of the following Multifunction Printer (MFP) models with SSD: KYOCERA ECOSYS MA6000ifx, MA5500ifx, MA4500ifx, TA Triumph Adler P-6039i MFP, P-5539i MFP, P-4539i MFP, UTAX P-6039i MFP, P-5539i MFP, P-4539i MFP, with system firmware C0V_S0IS.C04.002 In the evaluated configuration, the solid state drive HD-18 (SSD) is installed and is in- cluded in the scope of the TOE. The TOE provides copying, scanning, printing, faxing and boxing (storage). Delivery is done by means of a courier trusted by KYOCERA Document Solutions Inc. with pre-installed firmware and guidance documentation. The SSD is delivered separately. No PP is claimed. The evaluation has been performed by Combitech in their premises in Bromma, Swe- den, and to some extent in the developer's premises in Osaka, Japan. The evaluation was completed on the 2nd of June 2023. The evaluation was conducted in accordance with the requirements of Common Criteria (CC), version 3.1 revision 5, and Common Evaluation Methodology (CEM), version 3.1 revision 5. Combitech AB is a licensed evaluation facility for Common Criteria under the Swedish Common Criteria Evaluation and Certification Scheme. Combitech AB is also accredited by the Swedish accreditation body according to ISO/IEC 17025 for Common Criteria. The certifier monitored the activities of the evaluator by reviewing all successive ver- sions of the evaluation reports. The certifier determined that the evaluation results confirm the security claims in the Security Target (ST) and the Common Methodology for evaluation assurance level EAL 2 augmented by ALC_FLR.2. The technical information in this report is based on the Security Target (ST) and the Final Evaluation Report (FER) produced by Combitech AB. The certification results only apply to the version of the product indicated in the cer- tificate, and on the condition that all the stipulations in the Security Target are met. This certificate is not an endorsement of the IT product by CSEC or any other organ- isation that recognises or gives effect to this certificate, and no warranty of the IT product by CSEC or any other organisation that recognises or gives effect to this certificate is either expressed or implied. Swedish Certification Body for IT Security Certification Report - Kyocera ECOSYS MA6000ifx, MA5500ifx, MA4500ifx 22FMV6381-24 1.0 2023-06-22 CSEC2022011 4 (17) 2 Identification Certification Identification Certification ID CSEC2022011 Name and version of the certified IT product ECOSYS MA6000ifx, ECOSYS MA5500ifx, ECOSYS MA4500ifx (KYOCERA) P-6039i MFP, P-5539i MFP, P-4539i MFP ( TA Triumph Ader/UTAX) all with SSD and with system firmware C0V_S0IS.C04.002 Security Target Identification ECOSYS MA6000ifx, ECOSYS MA5500ifx, ECO- SYS MA4500ifx Series with SSD Security Target EAL EAL 2 + ALC_FLR.2 Sponsor Kyocera Document Solutions Inc. Developer Kyocera Document Solutions Inc. ITSEF Combitech AB Common Criteria version 3.1 release 5 CEM version 3.1 release 5 QMS version QMS 2.4 Scheme Notes Release 20.0 Recognition Scope CCRA, SOGIS, EA/MLA Certification date 2023-06-22 Swedish Certification Body for IT Security Certification Report - Kyocera ECOSYS MA6000ifx, MA5500ifx, MA4500ifx 22FMV6381-24 1.0 2023-06-22 CSEC2022011 5 (17) 3 Security Policy The TOE provides the following security services: - User Management - Data Access Control - FAX Data Flow Control - SSD Encryption - Security Management - Network Protection 3.1 User Management A function that identifies and authenticates users so that only authorized users can use the TOE. When using the TOE from the Operation Panel and Client PCs, a user will be required to enter his/her login user name and login user password for identification and authentication. The User Management Function includes a User Account Lockout Function, which prohibits the users access for a certain period of time if the number of identification and authentication attempts consecutively result in failure, a function, which protects feedback on input of login user password when performing identifica- tion and authentication and a function, which automatically logouts in case no opera- tion has been done for a certain period of time. 3.2 Data Access Control A function that restricts access so that only authorized users can access to Box docu- ment data stored in the TOE. 3.3 FAX Data Flow Control A function that controls not to forward the data received from a public line to the in- ternal network that the TOE is connected. 3.4 SSD Encryption A function that encrypts information assets stored in the SSD in order to prevent leak- age of data stored in the SSD inside the TOE. 3.5 Security Management A function that sets security functions of the TOE. This function can be used only by authorized users. This function can be utilized from an Operation Panel and a Client PC. Operations from a Client PC use a web browser. 3.6 Network Protection A function that protects communication paths to prevent leaking and altering of data by eavesdropping of data in transition over the internal network connected to TOE. This function verifies the propriety of the destination to connect to and protects target- ed information assets by encryption, when using a Scan to Send Function, a Print Function, a Box Function and a BOX Function from a Client PC (web browser), or a Security Management Function from a Client PC (web browser). However, usage of a Print Function directly connected to a MFP is exception. Swedish Certification Body for IT Security Certification Report - Kyocera ECOSYS MA6000ifx, MA5500ifx, MA4500ifx 22FMV6381-24 1.0 2023-06-22 CSEC2022011 6 (17) 4 Assumptions and Clarification of Scope 4.1 Assumptions The Security Target [ST] makes four assumptions on the usage and the operational environment of the TOE. A.ACCESS The hardware and software that the TOE is composed of are located in a protected en- vironment from security invasion such as illegal analysis and alteration. A.NETWORK The TOE is connected to the internal network that is protected from illegal access from the external network. A.USER_EDUCATION The TOE users are aware of the security policies and procedures of their organization, and are educated to follow those policies and procedures. A.DADMIN_TRUST The TOE's administrators are competent to manage devices properly as a device ad- ministrator and have a reliability not to use their privileged access rights for malicious purposes. 4.2 Clarification of Scope The Security Target contains three threats, which have been considered during the evaluation. T.SETTING_DATA Malicious person may have unauthorized access to, to change, or to leak TOE setting data via the operation panel or client PCs. T.IMAGE_DATA Malicious person may illegally access not authorized box document data via the op- eration panel or Client PC and leak or alter them. T.NETWORK Malicious person may illegally eavesdrop or alter document data or TOE setting data on the internal network. The Security Target contains two Organisational Security Policies (OSPs), which have been considered during the evaluation. P.SSD_ENCRYPTION TOE must encrypt document data and TOE setting data stored on SSD. P.FAX_CONTROL TOE must control not to forward the data received from a public line to the internal network that the TOE is connected. Swedish Certification Body for IT Security Certification Report - Kyocera ECOSYS MA6000ifx, MA5500ifx, MA4500ifx 22FMV6381-24 1.0 2023-06-22 CSEC2022011 7 (17) 5 Architectural Information Figure 1. Physical configuration of the TOE The TOE consists of an Operation Panel, a Scanner Unit, a Printer Unit, a Control Board, a SSD hardware, and a firmware. The Operation Panel is the hardware that displays status and results upon receipt of input by the TOE user. The Scanner Unit and the Printer Unit are the hardware that input document into MFP and output as printed material. A Control Board is the circuit board to control entire TOE. A system firmware is in- stalled on a NAND, which is positioned on the Control Board. The Control Board has a Network Interface (NIC), a Local Interface (USB Port), and a Public Switched Tele- phone Networkine Interface (NCU) for the FAX functionality. An ASIC that is also on the Control Board includes a Security Chip, which shares installation of some of the security functions. The Security Chip realizes security arithmetic processing for SSD encryption function. Swedish Certification Body for IT Security Certification Report - Kyocera ECOSYS MA6000ifx, MA5500ifx, MA4500ifx 22FMV6381-24 1.0 2023-06-22 CSEC2022011 8 (17) 6 Documentation For proper configuration into the evaluated configuration, the following guidance documents are available: Notice (KYOCERA) Notice (TA Triumph-Adler/UTAX) ECOSYS MA6000ifx, ECOSYS MA5500ifx, ECOSYS MA4500ifx First Steps Quick Guide ECOSYS MA6000ifx, ECOSYS MA5500ifx, ECOSYS MA4500ifx Operation Guide ECOSYS MA6000ifx, ECOSYS MA5500ifx, ECOSYS MA4500ifx Safety Guide ECOSYS MA6000ifx, ECOSYS MA5500ifx, ECOSYS MA4500ifx FAX Operation Guide Data Encryption/Overwrite Operation Guide Command Center RX User Guide ECOSYS MA6000ifx, ECOSYS MA5500ifx, ECOSYS MA4500ifx, ECOSYS MA4500fx, ECOSYS MA4500ix, ECOSYS MA4500x Printer Driver User Guide KYOCERA Net Direct Print User Guide Swedish Certification Body for IT Security Certification Report - Kyocera ECOSYS MA6000ifx, MA5500ifx, MA4500ifx 22FMV6381-24 1.0 2023-06-22 CSEC2022011 9 (17) 7 IT Product Testing 7.1 Developer Testing The developer performed extensive testing with good coverage of the TSFI on the ECOSYS MA6000ifx, ECOSYS MA5500ifx, ECOSYS MA4500ifx models, with system firmware C0V_S0IS.C04.002 Each of the other models are functionally identical to one of the tested models. The developer testing was performed in the developer's premises in Osaka, Japan. All test results were as expected. 7.2 Evaluator Testing The evaluators' testing was performed in the evaluator's premises in Bromma, Sweden, between 2022-11-20 and 2023-01-13. The MA6000ifx model with system firmware C0V_S0IS.C04.002 was used. More than 50% of the developer tests were repeated. Some complementary tests were run as well. All test results were as expected. 7.3 Penetration Testing The evaluator penetration testing was performed in the evaluator's premises in Brom- ma, Sweden, between 2022-11-21 and 2023-04-14. The MA6000ifx model was used. NMAP was used to perform a series of port scans, NESSUS was used for a vulnerabil- ity scan, Peach fuzzer was used for jpeg fuzzing, and TestSSLServer was used for ver- ifying the selection of TLS cipher suites. The evaluators verified, by testing, that CVE-2022-1026 is not exploitable for the TOE. Also, some negative tests were per- formed as part of the independent testing. No anomalies were encountered and all results were as expected. Swedish Certification Body for IT Security Certification Report - Kyocera ECOSYS MA6000ifx, MA5500ifx, MA4500ifx 22FMV6381-24 1.0 2023-06-22 CSEC2022011 10 (17) 8 Evaluated Configuration In the operational environment of the TOE, the following non-TOE hardware and software is expected: - Client PC with a KX printer driver, a Kyocera TWAIN driver, and a Microsoft Edge web browser - Mail server connected via IPSec with IKE1 - FTP server connected via IPSec with IKE1 In the evaluated configuration: - a solid state disk drive (SSD) HD-18 shall be installed and is included in the scope of the TOE - maintenance interfaces shall not be available Swedish Certification Body for IT Security Certification Report - Kyocera ECOSYS MA6000ifx, MA5500ifx, MA4500ifx 22FMV6381-24 1.0 2023-06-22 CSEC2022011 11 (17) 9 Results of the Evaluation The evaluators applied each work unit of the Common Methodology [CEM] within the scope of the evaluation, and concluded that the TOE meets the security objectives stated in the Security Target [ST] for an attack potential of Basic. The certifier reviewed the work of the evaluators and determined that the evaluation was conducted in accordance with the Common Criteria [CC]. The evaluators' overall verdict is PASS. The verdicts for the assurance classes and components are summarised in the follow- ing table: Assurance Class Name / Assurance Family Name Short name (includ- ing component iden- tifier for assurance families) Verdict Security Target Evaluation ST Introduction Conformance claims Security Problem Definition Security objectives Extended components definition Derived security requirements TOE summary specification ASE ASE_INT.1 ASE_CCL.1 ASE_SPD.1 ASE_OBJ.2 ASE_ECD.1 ASE_REQ.2 ASE_TSS.1 PASS PASS PASS PASS PASS PASS PASS PASS Life-cycle support Use of a CM system Parts of the TOE CM Coverage Delivery procedures Flaw reporting procedures ALC ALC_CMC.2 ALC_CMS.2 ALC_DEL.1 ALC_FLR.2 PASS PASS PASS PASS PASS Development Security architecture description Security-enforcing functional specification Basic design ADV ADV_ARC.1 ADV_FSP.2 ADV_TDS.1 PASS PASS PASS PASS Guidance documents Operational user guidance Preparative procedures AGD AGD_OPE.1 AGD_PRE.1 PASS PASS PASS Tests Evidence of coverage Functional testing Independent testing - sample ATE ATE_COV.1 ATE_FUN.1 ATE_IND.2 PASS PASS PASS PASS Vulnerability Assessment Vulnerability analysis AVA AVA_VAN.2 PASS PASS Swedish Certification Body for IT Security Certification Report - Kyocera ECOSYS MA6000ifx, MA5500ifx, MA4500ifx 22FMV6381-24 1.0 2023-06-22 CSEC2022011 12 (17) 10 Evaluator Comments and Recommendations None. Swedish Certification Body for IT Security Certification Report - Kyocera ECOSYS MA6000ifx, MA5500ifx, MA4500ifx 22FMV6381-24 1.0 2023-06-22 CSEC2022011 13 (17) 11 Glossary CC Common Criteria CEM Common Methodology for Information Technology Security, document describing the methodology used in Common Criteria evaluations CR Change Request CSEC The Swedish CC Certification Body FER Final Evaluation Report SAR Security Assurance Requirements SER Single Evaluation Report SFR Security Functional Requirements ST Security Target, document containing security requirements and specifications , used as the basis of a TOE evaluation TOE Target of Evaluation TSF TOE Security Functions Swedish Certification Body for IT Security Certification Report - Kyocera ECOSYS MA6000ifx, MA5500ifx, MA4500ifx 22FMV6381-24 1.0 2023-06-22 CSEC2022011 14 (17) 12 Bibliography ST ECOSYS MA6000ifx, ECOSYS MA5500ifx, ECOSYS MA4500ifx Series with SSD Security Target, Kyocera Document Solutions Inc., 2023-02-09, document version 1.00, FMV ID 22FMV6381-11 Notice1 Notice (KYOCERA), Kyocera Document Solutions Inc., 2023-02, document version 3VC0V5655001, FMV ID 22FMV6381-11 Notice2 Notice (TA Triumph-Adler/UTAX), Kyocera Document Solutions Inc., 2023-02, document version 3VC0V5656001, FMV ID 22FMV6381-11 QG ECOSYS MA6000ifx, ECOSYS MA5500ifx, ECOSYS MA4500ifx First Steps Quick Guide, Kyocera Document Solutions Inc., 2022-09, document version 3VC0V5602001, FMV ID 22FMV6381-11 OG ECOSYS MA6000ifx, ECOSYS MA5500ifx, ECOSYS MA4500ifx Operation Guide, Kyocera Document Solutions Inc., 2022-09, document version C0VKDEN000, FMV ID 22FMV6381-11 SG ECOSYS MA6000ifx, ECOSYS MA5500ifx, ECOSYS MA4500ifx Safety Guide, Kyocera Document Solutions Inc., 2022-09, document Version 3VC0V5621001, FMV ID 22FMV6381-11 FAX ECOSYS MA6000ifx, ECOSYS MA5500ifx, ECOSYS MA4500ifx FAX Operation Guide, Kyocera Document Solutions Inc., 2022-09, document version C0VKDEN500, FMV ID 22FMV6381-11 DE Data Encryption/Overwrite Operation Guide, Kyocera Document Solutions Inc., 2023-02, document version 3MSC0VKDEN1, FMV ID 22FMV6381-11 CCRX Command Center RX User Guide, Kyocera Document Solutions Inc. 2022-09, document version C0TCCRXKDEN29, FMV ID 22FMV6381-11 PD ECOSYS MA6000ifx, ECOSYS MA5500ifx, ECOSYS MA4500ifx, ECOSYS MA4500fx, ECOSYS MA4500ix, ECOSYS MA4500x Printer Driver User Guide, Kyocera Document Solutions Inc., 2022-07, document version 0C0VBWKDEN820.2022.07, FMV ID 22FMV6381-11 Swedish Certification Body for IT Security Certification Report - Kyocera ECOSYS MA6000ifx, MA5500ifx, MA4500ifx 22FMV6381-24 1.0 2023-06-22 CSEC2022011 15 (17) NDP KYOCERA Net Direct Print User Guide, Kyocera Document Solutions Inc., 2022-09, document version DirectPrintKDEN4.2022.9, FMV ID 22FMV6381-11 EP-002 002 Evaluation and Certification, CSEC, 2021-Oct-26, document version 34.0 CC 3.1 Common Criteria for Information Technology Security Evalua-tion, and Common Methodology for Information Technology Security Evaluation, CCMB-2017-04-001 through 004, document version 3.1 revision 5 Swedish Certification Body for IT Security Certification Report - Kyocera ECOSYS MA6000ifx, MA5500ifx, MA4500ifx 22FMV6381-24 1.0 2023-06-22 CSEC2022011 16 (17) Appendix A Scheme Versions During the certification the following versions of the Swedish Common Criteria Eval- uation and Certification Scheme, and Scheme Notes, have been used. A.1 Scheme/Quality Management System Version Introduced Impact of changes 2.4 2023-06-15 None 2.3.2 2023-04-20 None 2.3 2023-01-26 None 2.2 Application Original version A.2 Scheme Notes Scheme Note Version Subject Applicability SN-15 5.0 Testing Compliant SN-18 3.0 ST requirements Compliant SN-22 4.0 Vulnerability As- sessment Compliant SN-27 1.0 Application Compliant SN-28 1.0 Updated procedures Compliant