Strong Customer Authentication for Apple Pay on MacBookAir 2024 with M3 running macOS Sonoma 14.4

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information

Status active
Valid from 23.05.2025
Valid until 23.05.2030
Scheme 🇪🇸 ES
Manufacturer Apple Inc.
Category Other Devices and Systems
Security level ALC_FLR.3, ADV_FSP.3, EAL2

Heuristics summary

Certificate ID: 2024-11-INF-4471

Certificate

certificate file processing did not finish successfully.
Download pdf: ERROR
Convert pdf to text: ERROR
Extract keywords: ERROR

Certification report

Extracted keywords

Security level
EAL2, EAL 1, EAL 4, EAL 2, ITSEC Evaluation
Security Assurance Requirements (SAR)
ADV_FSP.3, ADV_ARC.1, ADV_TDS.1, AGD_OPE.1, ALC_FLR.3, ALC_CMC.2, ALC_DEL.1, ALC_FLR, ATE_COV.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1
Security Functional Requirements (SFR)
FDP_DAU.1, FDP_ACC, FDP_ACF, FDP_ITT.1, FDP_ETC, FDP_ITC.1, FDP_UCT, FDP_UIT, FDP_RIP.1, FIA_UID.2, FIA_UAU.5, FIA_AFL, FIA_UAU.6, FIA_ATD.1, FMT_SMR.1, FMT_MSA.3, FMT_MTD.1, FPR_UNO.1, FPT_ITC.1, FPT_RPL, FTP_ITC
Certificates
2024-11-INF-4471- v1
Evaluation facilities
Applus Laboratories

File metadata

Author 9308
Creation date D:20250704122401+02'00'
Modification date D:20250704122401+02'00'
Pages 16
Creator Microsoft® Word LTSC
Producer Microsoft® Word LTSC

Security target

Extracted keywords

Symmetric Algorithms
AES
Schemes
MAC
Protocols
TLS 1.2, TLS

Trusted Execution Environments
SE

Security level
EAL 2, EAL2, EAL 2 augmented
Claims
D.OS, D.SEP_SE, T.CORRUPT, T.PHYSICAL, T.RECOVER, T.REPLAY, T.SILENT, T.SKIM-, T.USURP, T.SKIMMING, A.DEVICE_AUTH, A.PERSO, A.WATCH_USER, A.NO_EXTERNAL_KEY-, A.NO_EVIL_ROOT_USER, A.NO_EXTERNAL_KEYBOARD
Security Assurance Requirements (SAR)
ADV_FSP.3, ADV_ARC.1, ADV_TDS.1, ADV_FSP.2, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.3, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1
Security Functional Requirements (SFR)
FDP_DAU.1, FDP_DAU.1.1, FDP_DAU.1.2, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_ITT.1, FDP_ITT.1.1, FDP_ETC, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_UCT, FDP_UCT.1, FDP_UIT, FDP_UIT.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.1.1, FDP_ACC.1, FDP_IFC.1, FDP_ETC.2, FIA_UID.2, FIA_UID.2.1, FIA_UAU.2, FIA_UAU.2.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_AFL.1, FIA_AFL, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.6.1, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.1, FIA_UID.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1.1, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.3, FMT_MTD.3.1, FPR_UNO.1, FPR_UNO.1.1, FPT_ITC.1, FPT_ITC.1.1, FPT_RPL, FPT_RPL.1, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1

Certification process
out of scope, Element of the device is separately certified according to the Common Criteria and is therefore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by, pected to return to its User. Note: Defending against device re-use after physical compromise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* Strong Customer

Standards
FIPS 140-3, FIPS 140-2

File metadata

Creation date D:20241118103634+01'00'
Modification date D:20241118103634+01'00'
Pages 53
Creator Microsoft® Word 2013
Producer Microsoft® Word 2013

Heuristics

Certificate ID: 2024-11-INF-4471

Extracted SARs

ADV_ARC.1, ADV_FSP.3, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-1999-0590
C M N
HIGH 10.0 10.0 01.06.2000 04:00
CVE-2001-0102
C M N
HIGH 7.2 10.0 12.02.2001 05:00
CVE-2023-38709
C M N
HIGH 7.3 3.4 04.04.2024 20:15
CVE-2024-1580
C M N
HIGH 8.8 5.9 19.02.2024 11:15
CVE-2024-23236
C M N
MEDIUM 5.5 3.6 14.05.2024 14:58
CVE-2024-23237
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-23251
C M N
MEDIUM 4.6 3.6 10.06.2024 21:15
CVE-2024-23282
C M N
MEDIUM 5.5 3.6 10.06.2024 21:15
CVE-2024-24795
C M N
MEDIUM 6.3 3.4 04.04.2024 20:15
CVE-2024-27795
C M N
HIGH 7.5 3.6 17.09.2024 00:15
CVE-2024-27796
C M N
HIGH 7.8 5.9 14.05.2024 15:13
CVE-2024-27798
C M N
HIGH 7.8 5.9 14.05.2024 15:13
CVE-2024-27799
C M N
LOW 3.3 1.4 10.06.2024 21:15
CVE-2024-27800
C M N
MEDIUM 6.5 3.6 10.06.2024 21:15
CVE-2024-27801
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27802
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27804
C M N
MEDIUM 5.5 3.6 14.05.2024 15:13
CVE-2024-27805
C M N
MEDIUM 5.5 3.6 10.06.2024 21:15
CVE-2024-27806
C M N
MEDIUM 5.5 3.6 10.06.2024 21:15
CVE-2024-27808
C M N
HIGH 8.8 5.9 10.06.2024 21:15
CVE-2024-27810
C M N
MEDIUM 5.5 3.6 14.05.2024 15:13
CVE-2024-27811
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27813
C M N
HIGH 8.6 6.0 14.05.2024 15:13
CVE-2024-27815
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27816
C M N
MEDIUM 5.5 3.6 14.05.2024 15:13
CVE-2024-27817
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27818
C M N
HIGH 7.8 5.9 14.05.2024 15:13
CVE-2024-27820
C M N
HIGH 8.8 5.9 10.06.2024 21:15
CVE-2024-27821
C M N
MEDIUM 4.7 3.6 14.05.2024 15:13
CVE-2024-27822
C M N
HIGH 7.8 5.9 14.05.2024 15:13
CVE-2024-27823
C M N
MEDIUM 5.9 3.6 29.07.2024 23:15
CVE-2024-27824
C M N
HIGH 7.8 5.9 14.05.2024 15:13
CVE-2024-27825
C M N
HIGH 7.1 5.2 14.05.2024 15:13
CVE-2024-27826
C M N
HIGH 7.8 5.9 29.07.2024 23:15
CVE-2024-27827
C M N
MEDIUM 5.5 3.6 14.05.2024 15:13
CVE-2024-27829
C M N
HIGH 7.8 5.9 14.05.2024 15:13
CVE-2024-27830
C M N
MEDIUM 6.5 3.6 10.06.2024 21:15
CVE-2024-27831
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27832
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27834
C M N
MEDIUM 5.5 3.6 14.05.2024 15:13
CVE-2024-27836
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27837
C M N
LOW 3.3 1.4 14.05.2024 15:13
CVE-2024-27838
C M N
MEDIUM 6.5 3.6 10.06.2024 21:15
CVE-2024-27841
C M N
MEDIUM 5.5 3.6 14.05.2024 15:13
CVE-2024-27842
C M N
HIGH 7.8 5.9 14.05.2024 15:13
CVE-2024-27843
C M N
HIGH 7.8 5.9 14.05.2024 15:13
CVE-2024-27844
C M N
MEDIUM 5.5 3.6 10.06.2024 21:15
CVE-2024-27847
C M N
MEDIUM 5.5 3.6 14.05.2024 15:13
CVE-2024-27848
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27849
C M N
LOW 3.3 1.4 28.10.2024 21:15
CVE-2024-27850
C M N
MEDIUM 6.5 3.6 10.06.2024 21:15
CVE-2024-27851
C M N
HIGH 8.8 5.9 10.06.2024 21:15
CVE-2024-27855
C M N
HIGH 8.8 5.9 10.06.2024 21:15
CVE-2024-27856
C M N
HIGH 7.8 5.9 15.01.2025 20:15
CVE-2024-27857
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27858
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-27860
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-27861
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-27862
C M N
LOW 2.4 1.4 29.07.2024 23:15
CVE-2024-27863
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-27869
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-27871
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-27872
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-27873
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-27875
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-27876
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-27877
C M N
MEDIUM 6.1 4.2 29.07.2024 23:15
CVE-2024-27878
C M N
MEDIUM 6.7 5.9 29.07.2024 23:15
CVE-2024-27880
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-27881
C M N
MEDIUM 5.3 1.4 29.07.2024 23:15
CVE-2024-27882
C M N
MEDIUM 4.4 2.5 29.07.2024 23:15
CVE-2024-27883
C M N
MEDIUM 4.4 2.5 29.07.2024 23:15
CVE-2024-27884
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-27885
C M N
MEDIUM 6.3 4.0 10.06.2024 21:15
CVE-2024-40770
C M N
HIGH 7.5 3.6 17.09.2024 00:15
CVE-2024-40771
C M N
HIGH 7.8 5.9 15.01.2025 20:15
CVE-2024-40774
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40775
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40776
C M N
MEDIUM 4.3 1.4 29.07.2024 23:15
CVE-2024-40777
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40778
C M N
LOW 3.3 1.4 29.07.2024 23:15
CVE-2024-40779
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40780
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40781
C M N
HIGH 7.8 5.9 29.07.2024 23:15
CVE-2024-40782
C M N
MEDIUM 6.5 3.6 29.07.2024 23:15
CVE-2024-40783
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40784
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40785
C M N
MEDIUM 6.1 2.7 29.07.2024 23:15
CVE-2024-40787
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40788
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40789
C M N
MEDIUM 6.5 3.6 29.07.2024 23:15
CVE-2024-40791
C M N
LOW 3.3 1.4 17.09.2024 00:15
CVE-2024-40792
C M N
LOW 3.3 1.4 28.10.2024 21:15
CVE-2024-40793
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40794
C M N
MEDIUM 5.3 1.4 29.07.2024 23:15
CVE-2024-40795
C M N
LOW 3.3 1.4 29.07.2024 23:15
CVE-2024-40796
C M N
MEDIUM 5.3 1.4 29.07.2024 23:15
CVE-2024-40797
C M N
MEDIUM 6.1 2.7 17.09.2024 00:15
CVE-2024-40798
C M N
LOW 3.3 1.4 29.07.2024 23:15
CVE-2024-40799
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40800
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40801
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40802
C M N
HIGH 7.8 5.9 29.07.2024 23:15
CVE-2024-40803
C M N
HIGH 7.5 3.6 29.07.2024 23:15
CVE-2024-40804
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40805
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40807
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40809
C M N
HIGH 7.8 5.9 29.07.2024 23:15
CVE-2024-40810
C M N
MEDIUM 5.5 3.6 24.10.2024 17:15
CVE-2024-40811
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40812
C M N
HIGH 7.8 5.9 29.07.2024 23:15
CVE-2024-40814
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40815
C M N
HIGH 7.5 5.9 29.07.2024 23:15
CVE-2024-40816
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40817
C M N
MEDIUM 6.1 2.7 29.07.2024 23:15
CVE-2024-40818
C M N
MEDIUM 4.6 3.6 29.07.2024 23:15
CVE-2024-40821
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40822
C M N
LOW 2.4 1.4 29.07.2024 23:15
CVE-2024-40823
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40824
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40825
C M N
MEDIUM 4.4 3.6 17.09.2024 00:15
CVE-2024-40826
C M N
MEDIUM 6.1 4.2 17.09.2024 00:15
CVE-2024-40827
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40828
C M N
HIGH 7.8 5.9 29.07.2024 23:15
CVE-2024-40831
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40832
C M N
LOW 3.3 1.4 29.07.2024 23:15
CVE-2024-40833
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40834
C M N
MEDIUM 4.4 2.5 29.07.2024 23:15
CVE-2024-40835
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40836
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40837
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40838
C M N
LOW 3.3 1.4 17.09.2024 00:15
CVE-2024-40841
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40842
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40843
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40844
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40845
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40846
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40847
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40848
C M N
HIGH 7.5 3.6 17.09.2024 00:15
CVE-2024-40850
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40854
C M N
MEDIUM 5.5 3.6 15.01.2025 20:15
CVE-2024-40855
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-40856
C M N
HIGH 7.5 3.6 17.09.2024 00:15
CVE-2024-40857
C M N
MEDIUM 6.1 2.7 17.09.2024 00:15
CVE-2024-40859
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40860
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40861
C M N
HIGH 7.8 5.9 17.09.2024 00:15
CVE-2024-40866
C M N
MEDIUM 6.5 3.6 17.09.2024 00:15
CVE-2024-44122
C M N
HIGH 8.8 6.0 28.10.2024 21:15
CVE-2024-44123
C M N
LOW 2.3 1.4 28.10.2024 21:15
CVE-2024-44125
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44126
C M N
HIGH 7.8 5.9 28.10.2024 21:15
CVE-2024-44128
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44130
C M N
MEDIUM 4.4 3.6 17.09.2024 00:15
CVE-2024-44131
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44132
C M N
HIGH 8.8 6.0 17.09.2024 00:15
CVE-2024-44133
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44134
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44135
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44137
C M N
MEDIUM 4.6 3.6 28.10.2024 21:15
CVE-2024-44141
C M N
MEDIUM 6.8 5.9 24.10.2024 17:15
CVE-2024-44144
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44145
C M N
MEDIUM 6.1 5.2 28.10.2024 22:15
CVE-2024-44146
C M N
CRITICAL 10.0 6.0 17.09.2024 00:15
CVE-2024-44148
C M N
CRITICAL 10.0 6.0 17.09.2024 00:15
CVE-2024-44149
C M N
HIGH 7.5 3.6 17.09.2024 00:15
CVE-2024-44151
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44152
C M N
HIGH 7.5 3.6 17.09.2024 00:15
CVE-2024-44153
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44154
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44155
C M N
MEDIUM 6.5 3.6 28.10.2024 21:15
CVE-2024-44156
C M N
HIGH 7.1 5.2 28.10.2024 21:15
CVE-2024-44158
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44159
C M N
HIGH 7.1 5.2 28.10.2024 21:15
CVE-2024-44160
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44161
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44163
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44164
C M N
HIGH 7.1 5.2 17.09.2024 00:15
CVE-2024-44165
C M N
HIGH 7.5 3.6 17.09.2024 00:15
CVE-2024-44166
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44167
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44168
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44169
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44170
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44172
C M N
LOW 3.3 1.4 27.01.2025 22:15
CVE-2024-44174
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44175
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44176
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44177
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44178
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44179
C M N
LOW 2.4 1.4 10.03.2025 19:15
CVE-2024-44181
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44182
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44183
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44184
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44185
C M N
MEDIUM 5.5 3.6 24.10.2024 17:15
CVE-2024-44186
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44187
C M N
MEDIUM 6.5 3.6 17.09.2024 00:15
CVE-2024-44188
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44189
C M N
HIGH 7.5 3.6 17.09.2024 00:15
CVE-2024-44190
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44191
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44192
C M N
MEDIUM 5.5 3.6 10.03.2025 19:15
CVE-2024-44196
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44197
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44198
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44199
C M N
HIGH 7.1 5.2 21.03.2025 00:15
CVE-2024-44201
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-44203
C M N
HIGH 7.5 3.6 28.10.2024 21:15
CVE-2024-44205
C M N
MEDIUM 5.5 3.6 24.10.2024 17:15
CVE-2024-44206
C M N
CRITICAL 9.3 4.7 24.10.2024 17:15
CVE-2024-44208
C M N
HIGH 7.5 3.6 28.10.2024 21:15
CVE-2024-44213
C M N
MEDIUM 5.9 3.6 28.10.2024 21:15
CVE-2024-44215
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44216
C M N
MEDIUM 5.5 3.6 28.10.2024 22:15
CVE-2024-44218
C M N
HIGH 7.8 5.9 28.10.2024 21:15
CVE-2024-44220
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-44222
C M N
LOW 3.3 1.4 28.10.2024 21:15
CVE-2024-44224
C M N
HIGH 7.8 5.9 12.12.2024 02:15
CVE-2024-44225
C M N
HIGH 7.8 5.9 12.12.2024 02:15
CVE-2024-44227
C M N
HIGH 7.5 3.6 10.03.2025 19:15
CVE-2024-44232
C M N
MEDIUM 5.5 3.6 01.11.2024 21:15
CVE-2024-44233
C M N
MEDIUM 5.5 3.6 01.11.2024 21:15
CVE-2024-44234
C M N
MEDIUM 5.5 3.6 01.11.2024 21:15
CVE-2024-44236
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44237
C M N
MEDIUM 5.5 3.6 28.10.2024 22:15
CVE-2024-44239
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44240
C M N
MEDIUM 5.5 3.6 28.10.2024 22:15
CVE-2024-44244
C M N
MEDIUM 4.3 1.4 28.10.2024 21:15
CVE-2024-44245
C M N
HIGH 7.1 5.2 12.12.2024 02:15
CVE-2024-44247
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44248
C M N
MEDIUM 6.5 3.6 12.12.2024 02:15
CVE-2024-44253
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44254
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44255
C M N
HIGH 7.8 5.9 28.10.2024 21:15
CVE-2024-44256
C M N
HIGH 8.6 6.0 28.10.2024 22:15
CVE-2024-44257
C M N
MEDIUM 5.5 3.6 28.10.2024 22:15
CVE-2024-44260
C M N
MEDIUM 4.4 3.6 28.10.2024 22:15
CVE-2024-44264
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44265
C M N
LOW 2.4 1.4 28.10.2024 21:15
CVE-2024-44267
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44269
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44270
C M N
HIGH 8.6 4.0 28.10.2024 21:15
CVE-2024-44273
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44275
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44278
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44279
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44280
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44281
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44282
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44283
C M N
MEDIUM 5.5 3.6 28.10.2024 22:15
CVE-2024-44284
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44287
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44289
C M N
HIGH 7.5 3.6 28.10.2024 21:15
CVE-2024-44291
C M N
HIGH 7.8 5.9 12.12.2024 02:15
CVE-2024-44294
C M N
MEDIUM 6.5 5.2 28.10.2024 21:15
CVE-2024-44295
C M N
MEDIUM 5.5 3.6 28.10.2024 22:15
CVE-2024-44296
C M N
MEDIUM 5.4 2.5 28.10.2024 21:15
CVE-2024-44297
C M N
MEDIUM 6.5 3.6 28.10.2024 21:15
CVE-2024-44300
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-44301
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44302
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44305
C M N
HIGH 7.8 5.9 21.03.2025 00:15
CVE-2024-44306
C M N
HIGH 7.8 5.9 20.11.2024 00:15
CVE-2024-44307
C M N
HIGH 7.8 5.9 20.11.2024 00:15
CVE-2024-44308
C M N
HIGH 8.8 5.9 20.11.2024 00:15
CVE-2024-4558
C M N
CRITICAL 9.6 6.0 07.05.2024 19:15
CVE-2024-54463
C M N
MEDIUM 5.5 3.6 10.03.2025 19:15
CVE-2024-54465
C M N
CRITICAL 9.8 5.9 12.12.2024 02:15
CVE-2024-54466
C M N
MEDIUM 5.3 1.4 12.12.2024 02:15
CVE-2024-54467
C M N
MEDIUM 6.5 3.6 10.03.2025 19:15
CVE-2024-54468
C M N
HIGH 8.2 5.8 27.01.2025 22:15
CVE-2024-54469
C M N
MEDIUM 5.5 3.6 10.03.2025 19:15
CVE-2024-54471
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54473
C M N
MEDIUM 5.5 3.6 10.03.2025 19:15
CVE-2024-54474
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54475
C M N
LOW 3.3 1.4 27.01.2025 22:15
CVE-2024-54476
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54477
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54478
C M N
MEDIUM 6.5 3.6 27.01.2025 22:15
CVE-2024-54479
C M N
HIGH 7.5 3.6 12.12.2024 02:15
CVE-2024-54484
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54486
C M N
MEDIUM 6.5 3.6 12.12.2024 02:15
CVE-2024-54488
C M N
MEDIUM 5.3 1.4 27.01.2025 22:15
CVE-2024-54489
C M N
HIGH 7.8 5.9 12.12.2024 02:15
CVE-2024-54490
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54491
C M N
LOW 3.3 1.4 12.12.2024 02:15
CVE-2024-54492
C M N
MEDIUM 5.9 3.6 12.12.2024 02:15
CVE-2024-54493
C M N
LOW 3.3 1.4 12.12.2024 02:15
CVE-2024-54494
C M N
MEDIUM 5.9 3.6 12.12.2024 02:15
CVE-2024-54495
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54497
C M N
MEDIUM 6.5 3.6 27.01.2025 22:15
CVE-2024-54498
C M N
HIGH 8.8 6.0 12.12.2024 02:15
CVE-2024-54499
C M N
HIGH 8.8 5.9 27.01.2025 22:15
CVE-2024-54500
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54501
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54504
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54505
C M N
HIGH 8.8 5.9 12.12.2024 02:15
CVE-2024-54506
C M N
CRITICAL 9.8 5.9 12.12.2024 02:15
CVE-2024-54507
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2024-54508
C M N
HIGH 7.5 3.6 12.12.2024 02:15
CVE-2024-54509
C M N
HIGH 7.8 5.9 27.01.2025 22:15
CVE-2024-54510
C M N
MEDIUM 5.1 3.6 12.12.2024 02:15
CVE-2024-54513
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54514
C M N
HIGH 8.6 6.0 12.12.2024 02:15
CVE-2024-54515
C M N
HIGH 7.8 5.9 12.12.2024 02:15
CVE-2024-54516
C M N
LOW 3.3 1.4 27.01.2025 22:15
CVE-2024-54517
C M N
HIGH 7.8 5.9 27.01.2025 22:15
CVE-2024-54518
C M N
MEDIUM 5.3 3.4 27.01.2025 22:15
CVE-2024-54519
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2024-54520
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2024-54522
C M N
HIGH 7.8 5.9 27.01.2025 22:15
CVE-2024-54523
C M N
MEDIUM 6.3 4.0 27.01.2025 22:15
CVE-2024-54525
C M N
HIGH 8.8 5.9 17.03.2025 20:15
CVE-2024-54526
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54527
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54528
C M N
HIGH 7.1 5.2 12.12.2024 02:15
CVE-2024-54529
C M N
HIGH 7.8 5.9 12.12.2024 02:15
CVE-2024-54530
C M N
CRITICAL 9.1 5.2 27.01.2025 22:15
CVE-2024-54531
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54534
C M N
CRITICAL 9.8 5.9 12.12.2024 02:15
CVE-2024-54536
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2024-54537
C M N
HIGH 8.2 5.8 27.01.2025 22:15
CVE-2024-54538
C M N
HIGH 7.5 3.6 20.12.2024 01:15
CVE-2024-54539
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2024-54541
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2024-54542
C M N
CRITICAL 9.1 5.2 27.01.2025 22:15
CVE-2024-54543
C M N
HIGH 8.8 5.9 27.01.2025 22:15
CVE-2024-54546
C M N
HIGH 7.5 3.6 10.03.2025 19:15
CVE-2024-54547
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2024-54549
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2024-54550
C M N
MEDIUM 4.0 1.4 27.01.2025 22:15
CVE-2024-54551
C M N
HIGH 7.5 3.6 21.03.2025 00:15
CVE-2024-54557
C M N
HIGH 7.5 3.6 27.01.2025 22:15
CVE-2024-54558
C M N
LOW 2.8 1.4 10.03.2025 19:15
CVE-2024-54559
C M N
MEDIUM 5.5 3.6 17.03.2025 20:15
CVE-2024-54560
C M N
MEDIUM 5.5 3.6 10.03.2025 19:15
CVE-2024-54564
C M N
MEDIUM 6.5 2.5 21.03.2025 00:15
CVE-2024-54565
C M N
MEDIUM 6.2 3.6 17.03.2025 20:15
CVE-2025-24085
C M N
HIGH 7.8 5.9 27.01.2025 22:15
CVE-2025-24086
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2025-24087
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2025-24092
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2025-24093
C M N
CRITICAL 9.8 5.9 27.01.2025 22:15
CVE-2025-24094
C M N
MEDIUM 4.7 3.6 27.01.2025 22:15
CVE-2025-24096
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2025-24097
C M N
MEDIUM 5.0 3.6 31.03.2025 23:15
CVE-2025-24099
C M N
MEDIUM 5.1 2.5 30.01.2025 17:15
CVE-2025-24100
C M N
LOW 3.3 1.4 27.01.2025 22:15
CVE-2025-24101
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2025-24102
C M N
CRITICAL 9.8 5.9 27.01.2025 22:15
CVE-2025-24103
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2025-24106
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2025-24107
C M N
HIGH 7.8 5.9 27.01.2025 22:15
CVE-2025-24108
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2025-24109
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2025-24112
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2025-24113
C M N
MEDIUM 4.3 1.4 27.01.2025 22:15
CVE-2025-24114
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2025-24115
C M N
MEDIUM 6.3 4.0 27.01.2025 22:15
CVE-2025-24116
C M N
MEDIUM 4.4 2.5 27.01.2025 22:15
CVE-2025-24117
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2025-24118
C M N
HIGH 7.1 5.2 27.01.2025 22:15
CVE-2025-24120
C M N
HIGH 7.5 3.6 27.01.2025 22:15
CVE-2025-24121
C M N
LOW 3.3 1.4 27.01.2025 22:15
CVE-2025-24122
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2025-24123
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2025-24124
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2025-24126
C M N
HIGH 7.3 5.2 27.01.2025 22:15
CVE-2025-24127
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2025-24128
C M N
MEDIUM 4.3 1.4 27.01.2025 22:15
CVE-2025-24129
C M N
HIGH 7.5 3.6 27.01.2025 22:15
CVE-2025-24130
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2025-24131
C M N
MEDIUM 6.5 3.6 27.01.2025 22:15
CVE-2025-24134
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2025-24135
C M N
HIGH 7.8 5.9 27.01.2025 22:15
CVE-2025-24136
C M N
MEDIUM 4.4 2.5 27.01.2025 22:15
CVE-2025-24137
C M N
HIGH 8.0 5.9 27.01.2025 22:15
CVE-2025-24138
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2025-24139
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2025-24140
C M N
MEDIUM 5.3 1.4 27.01.2025 22:15
CVE-2025-24142
C M N
MEDIUM 5.5 3.6 12.05.2025 22:15
CVE-2025-24143
C M N
MEDIUM 6.5 3.6 27.01.2025 22:15
CVE-2025-24144
C M N
MEDIUM 5.5 3.6 12.05.2025 22:15
CVE-2025-24145
C M N
LOW 3.3 1.4 27.01.2025 22:15
CVE-2025-24146
C M N
CRITICAL 9.8 5.9 27.01.2025 22:15
CVE-2025-24149
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2025-24150
C M N
HIGH 8.8 5.9 27.01.2025 22:15
CVE-2025-24151
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2025-24152
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2025-24153
C M N
MEDIUM 6.7 5.9 27.01.2025 22:15
CVE-2025-24154
C M N
CRITICAL 9.1 5.2 27.01.2025 22:15
CVE-2025-24155
C M N
MEDIUM 5.5 3.6 12.05.2025 22:15
CVE-2025-24156
C M N
HIGH 7.8 5.9 27.01.2025 22:15
CVE-2025-24158
C M N
MEDIUM 6.5 3.6 27.01.2025 22:15
CVE-2025-24159
C M N
HIGH 7.8 5.9 27.01.2025 22:15
CVE-2025-24160
C M N
MEDIUM 4.3 1.4 27.01.2025 22:15
CVE-2025-24161
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2025-24162
C M N
MEDIUM 6.5 3.6 27.01.2025 22:15
CVE-2025-24163
C M N
MEDIUM 5.5 3.6 27.01.2025 22:15
CVE-2025-24169
C M N
HIGH 7.5 3.6 27.01.2025 22:15
CVE-2025-24174
C M N
HIGH 7.7 5.2 27.01.2025 22:15
CVE-2025-24176
C M N
HIGH 7.1 5.2 27.01.2025 22:15
CVE-2025-24183
C M N
MEDIUM 5.5 3.6 19.05.2025 16:15
CVE-2025-24184
C M N
MEDIUM 5.5 3.6 19.05.2025 16:15
CVE-2025-24185
C M N
MEDIUM 5.5 3.6 17.03.2025 20:15
CVE-2025-24189
C M N
HIGH 8.8 5.9 19.05.2025 16:15
CVE-2025-24191
C M N
MEDIUM 5.5 3.6 31.03.2025 23:15
CVE-2025-24201
C M N
HIGH 8.8 5.9 11.03.2025 18:15
CVE-2025-24204
C M N
CRITICAL 9.8 5.9 31.03.2025 23:15
CVE-2025-24222
C M N
MEDIUM 6.5 3.6 12.05.2025 22:15
CVE-2025-24223
C M N
HIGH 8.0 5.9 12.05.2025 22:15
CVE-2025-24239
C M N
MEDIUM 6.5 3.6 31.03.2025 23:15
CVE-2025-24242
C M N
MEDIUM 4.4 3.6 31.03.2025 23:15
CVE-2025-24245
C M N
CRITICAL 9.8 5.9 31.03.2025 23:15
CVE-2025-24248
C M N
MEDIUM 5.0 3.4 31.03.2025 23:15
CVE-2025-24258
C M N
HIGH 7.8 5.9 12.05.2025 22:15
CVE-2025-24262
C M N
MEDIUM 5.5 3.6 31.03.2025 23:15
CVE-2025-24274
C M N
HIGH 7.8 5.9 12.05.2025 22:15
CVE-2025-24281
C M N
MEDIUM 5.5 3.6 31.03.2025 23:15
CVE-2025-24282
C M N
MEDIUM 5.5 3.6 31.03.2025 23:15
CVE-2025-30440
C M N
MEDIUM 5.5 3.6 12.05.2025 22:15
CVE-2025-30442
C M N
HIGH 7.8 5.9 12.05.2025 22:15
CVE-2025-30448
C M N
CRITICAL 9.1 5.2 12.05.2025 22:15
CVE-2025-30453
C M N
HIGH 7.8 5.9 12.05.2025 22:15
CVE-2025-30458
C M N
CRITICAL 9.8 5.9 31.03.2025 23:15
CVE-2025-30461
C M N
CRITICAL 9.8 5.9 31.03.2025 23:15
CVE-2025-30463
C M N
MEDIUM 5.5 3.6 31.03.2025 23:15
CVE-2025-30466
C M N
CRITICAL 9.8 5.9 29.05.2025 22:15
CVE-2025-30467
C M N
MEDIUM 4.3 1.4 31.03.2025 23:15
CVE-2025-30471
C M N
HIGH 7.5 3.6 31.03.2025 23:15
CVE-2025-31183
C M N
CRITICAL 9.8 5.9 31.03.2025 23:15
CVE-2025-31195
C M N
MEDIUM 6.3 4.0 12.05.2025 22:15
CVE-2025-31196
C M N
MEDIUM 5.5 3.6 12.05.2025 22:15
CVE-2025-31199
C M N
MEDIUM 5.5 3.6 29.05.2025 22:15
CVE-2025-31200
C M N
MEDIUM 6.8 5.2 16.04.2025 19:15
CVE-2025-31201
C M N
HIGH 7.5 5.9 16.04.2025 19:15
CVE-2025-31202
C M N
MEDIUM 5.5 3.6 29.04.2025 03:15
CVE-2025-31203
C M N
MEDIUM 6.5 3.6 29.04.2025 03:15
CVE-2025-31204
C M N
HIGH 8.8 5.9 12.05.2025 22:15
CVE-2025-31205
C M N
MEDIUM 6.5 3.6 12.05.2025 22:15
CVE-2025-31206
C M N
MEDIUM 4.3 1.4 12.05.2025 22:15
CVE-2025-31208
C M N
HIGH 7.5 3.6 12.05.2025 22:15
CVE-2025-31209
C M N
MEDIUM 6.3 3.4 12.05.2025 22:15
CVE-2025-31212
C M N
MEDIUM 5.5 3.6 12.05.2025 22:15
CVE-2025-31213
C M N
HIGH 7.6 4.7 12.05.2025 22:15
CVE-2025-31215
C M N
MEDIUM 6.5 3.6 12.05.2025 22:15
CVE-2025-31217
C M N
MEDIUM 6.5 3.6 12.05.2025 22:15
CVE-2025-31218
C M N
MEDIUM 6.2 3.6 12.05.2025 22:15
CVE-2025-31219
C M N
HIGH 7.1 4.2 12.05.2025 22:15
CVE-2025-31220
C M N
MEDIUM 5.5 3.6 12.05.2025 22:15
CVE-2025-31221
C M N
HIGH 7.5 3.6 12.05.2025 22:15
CVE-2025-31222
C M N
HIGH 7.8 5.9 12.05.2025 22:15
CVE-2025-31223
C M N
HIGH 8.0 5.9 12.05.2025 22:15
CVE-2025-31224
C M N
HIGH 7.8 5.9 12.05.2025 22:15
CVE-2025-31226
C M N
MEDIUM 5.5 3.6 12.05.2025 22:15
CVE-2025-31231
C M N
MEDIUM 5.5 3.6 29.05.2025 22:15
CVE-2025-31232
C M N
HIGH 7.1 4.2 12.05.2025 22:15
CVE-2025-31233
C M N
MEDIUM 6.3 3.4 12.05.2025 22:15
CVE-2025-31234
C M N
HIGH 8.2 4.2 12.05.2025 22:15
CVE-2025-31235
C M N
MEDIUM 6.5 4.0 12.05.2025 22:15
CVE-2025-31236
C M N
MEDIUM 5.5 3.6 12.05.2025 22:15
CVE-2025-31237
C M N
HIGH 7.5 3.6 12.05.2025 22:15
CVE-2025-31238
C M N
HIGH 7.3 3.4 12.05.2025 22:15
CVE-2025-31239
C M N
LOW 3.3 1.4 12.05.2025 22:15
CVE-2025-31240
C M N
HIGH 7.5 3.6 12.05.2025 22:15
CVE-2025-31241
C M N
MEDIUM 5.3 1.4 12.05.2025 22:15
CVE-2025-31242
C M N
MEDIUM 5.5 3.6 12.05.2025 22:15
CVE-2025-31244
C M N
HIGH 8.8 6.0 12.05.2025 22:15
CVE-2025-31245
C M N
MEDIUM 5.5 3.6 12.05.2025 22:15
CVE-2025-31246
C M N
HIGH 8.8 5.9 12.05.2025 22:15
CVE-2025-31247
C M N
HIGH 7.5 3.6 12.05.2025 22:15
CVE-2025-31249
C M N
HIGH 7.1 4.2 12.05.2025 22:15
CVE-2025-31250
C M N
MEDIUM 5.5 3.6 12.05.2025 22:15
CVE-2025-31251
C M N
MEDIUM 5.5 3.6 12.05.2025 22:15
CVE-2025-31256
C M N
MEDIUM 5.5 3.6 12.05.2025 22:15
CVE-2025-31257
C M N
MEDIUM 4.7 1.4 12.05.2025 22:15
CVE-2025-31258
C M N
MEDIUM 6.5 2.5 12.05.2025 22:15
CVE-2025-31259
C M N
HIGH 7.8 5.9 12.05.2025 22:15
CVE-2025-31260
C M N
MEDIUM 5.5 3.6 12.05.2025 22:15
CVE-2025-31262
C M N
MEDIUM 5.5 3.6 19.05.2025 16:15
CVE-2025-31263
C M N
CRITICAL 9.1 5.2 29.05.2025 22:15
CVE-2025-43200
C M N
MEDIUM 4.8 2.5 16.06.2025 22:16
Showing 5 out of 484.

Scheme data ?

Product Strong Customer Authentication for Apple Pay on MacBook Air 2024 with M3 running macOS Sonoma 14.4
Product Link https://oc.ccn.cni.es/en/certified-products/certified-products/1046-strong-customer-authentication-for-apple-pay-on-macbook-air-2024-with-m3-running-macos-sonoma-14-4
Category Otras herramientas
Manufacturer Apple Inc.
Certification Date 23.05.2025
Enhanced
Description The TOE platform includes the components implementing Strong Customer Authentication (SCA) and Dynamic Linking for Apple Pay. User authentication is managed by the Secure Enclave. The Secure Enclave is a dedicated secure subsystem integrated into Apple systems on chip (SoCs). The Secure Enclave is isolated from the main processor to provide an extra layer of security and is designed to keep sensitive user data secure even when the Application Processor kernel becomes compromised. The macOS operating system also allows the Apple Pay services and other security functions of the TOE to operate. The Secure Element (outside of the TOE) is the secure component holding the Apple Pay secrets and processes the Apple Pay transactions.
Category Otras herramientas
Manufacturer Apple Inc.
Type Product
Evaluation Facility Applus Laboratories
Status Certified
Certification Date 23.05.2025
Cc Version CC/CEM:2022 Release 1
Level EAL2 + ADV_FSP.3, ALC_FLR.3
Target Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2183
Cert Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2184
Report Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2185

References

No references are available for this certificate.

Updates

  • 21.07.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'enhanced': {'__update__': {'cc_version': 'CC/CEM:2022 Release 1'}}} data.
  • 14.07.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2025-24278', 'CVE-2025-31189', 'CVE-2024-40864', 'CVE-2025-24199', 'CVE-2025-24181', 'CVE-2025-24170', 'CVE-2025-24148', 'CVE-2025-24231', 'CVE-2025-24230', 'CVE-2025-24164', 'CVE-2025-30465', 'CVE-2025-30450', 'CVE-2025-24267', 'CVE-2025-24243', 'CVE-2025-24249', 'CVE-2025-24233', 'CVE-2025-24254', 'CVE-2025-24203', 'CVE-2025-24259', 'CVE-2025-30424', 'CVE-2025-24276', 'CVE-2025-24252', 'CVE-2025-24250', 'CVE-2025-24244', 'CVE-2025-24211', 'CVE-2025-24210', 'CVE-2025-31191', 'CVE-2025-24232', 'CVE-2025-24172', 'CVE-2025-30452', 'CVE-2025-31264', 'CVE-2025-24279', 'CVE-2025-24206', 'CVE-2025-24271', 'CVE-2025-24235', 'CVE-2025-24251', 'CVE-2025-24179', 'CVE-2025-24157', 'CVE-2025-24261', 'CVE-2025-31198', 'CVE-2025-24173', 'CVE-2025-24228', 'CVE-2025-31261', 'CVE-2025-30433', 'CVE-2025-24195', 'CVE-2025-24190', 'CVE-2025-24229', 'CVE-2025-30454', 'CVE-2025-24196', 'CVE-2025-31187', 'CVE-2025-30445', 'CVE-2025-24241', 'CVE-2025-24272', 'CVE-2025-24205', 'CVE-2025-24178', 'CVE-2025-24212', 'CVE-2025-30443', 'CVE-2025-24247', 'CVE-2025-24255', 'CVE-2025-24234', 'CVE-2025-30444', 'CVE-2024-54533', 'CVE-2025-30446', 'CVE-2025-30470', 'CVE-2025-24260', 'CVE-2025-30456', 'CVE-2025-24215', 'CVE-2025-24237', 'CVE-2025-24111', 'CVE-2025-30462', 'CVE-2025-30464', 'CVE-2025-30449', 'CVE-2025-24236', 'CVE-2025-24270', 'CVE-2025-31197', 'CVE-2025-24240', 'CVE-2025-24238', 'CVE-2025-30432', 'CVE-2025-24265', 'CVE-2025-31188', 'CVE-2025-30457', 'CVE-2025-30438', 'CVE-2025-24280', 'CVE-2025-24273', 'CVE-2025-24266', 'CVE-2025-30447', 'CVE-2025-24256', 'CVE-2025-24246', 'CVE-2025-31182', 'CVE-2025-30460', 'CVE-2025-24253', 'CVE-2025-24198', 'CVE-2025-30455', 'CVE-2025-31194', 'CVE-2025-24207', 'CVE-2025-24277']} values discarded.
  • 07.07.2025 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Strong Customer Authentication for Apple Pay on MacBookAir 2024 with M3 running macOS Sonoma 14.4 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": null,
  "dgst": "7f472d3b9c5a3726",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "2024-11-INF-4471",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:o:apple:macos:14.4:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "eal": "EAL2",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "14.4"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2024-40861",
        "CVE-2025-24174",
        "CVE-2025-24096",
        "CVE-2024-40795",
        "CVE-2024-44172",
        "CVE-2024-44257",
        "CVE-2024-40811",
        "CVE-2024-44216",
        "CVE-2025-31183",
        "CVE-2025-31215",
        "CVE-2024-27805",
        "CVE-2024-40783",
        "CVE-2024-44267",
        "CVE-2025-31260",
        "CVE-2024-54473",
        "CVE-2025-24109",
        "CVE-2024-44151",
        "CVE-2024-54527",
        "CVE-2024-44282",
        "CVE-2024-54522",
        "CVE-2024-40801",
        "CVE-2024-40826",
        "CVE-2024-54516",
        "CVE-2024-44220",
        "CVE-2024-54518",
        "CVE-2024-54479",
        "CVE-2024-44239",
        "CVE-2024-54520",
        "CVE-2025-31213",
        "CVE-2025-24140",
        "CVE-2025-24144",
        "CVE-2024-44144",
        "CVE-2025-24281",
        "CVE-2024-40779",
        "CVE-2024-54557",
        "CVE-2025-31249",
        "CVE-2024-40782",
        "CVE-2025-31247",
        "CVE-2024-27823",
        "CVE-2024-40821",
        "CVE-2024-54513",
        "CVE-2024-54478",
        "CVE-2025-24201",
        "CVE-2024-27843",
        "CVE-2024-54510",
        "CVE-2024-44189",
        "CVE-2025-24118",
        "CVE-2024-54560",
        "CVE-2024-44301",
        "CVE-2024-27813",
        "CVE-2024-23251",
        "CVE-2024-27802",
        "CVE-2024-40784",
        "CVE-2024-54526",
        "CVE-2025-31224",
        "CVE-2025-31262",
        "CVE-2024-44196",
        "CVE-2024-40807",
        "CVE-2025-24245",
        "CVE-2024-23236",
        "CVE-2025-24183",
        "CVE-2024-40855",
        "CVE-2024-44306",
        "CVE-2024-54469",
        "CVE-2024-44305",
        "CVE-2024-54468",
        "CVE-2024-40810",
        "CVE-2024-27800",
        "CVE-2025-24239",
        "CVE-2024-40792",
        "CVE-2024-40866",
        "CVE-2024-54542",
        "CVE-2024-54530",
        "CVE-2025-24160",
        "CVE-2024-40831",
        "CVE-2024-44123",
        "CVE-2024-54499",
        "CVE-2024-44203",
        "CVE-2024-40805",
        "CVE-2025-30453",
        "CVE-2024-27818",
        "CVE-2024-54466",
        "CVE-2025-31257",
        "CVE-2024-27877",
        "CVE-2024-40804",
        "CVE-2024-54474",
        "CVE-2024-40775",
        "CVE-2024-40828",
        "CVE-2024-40842",
        "CVE-2025-24145",
        "CVE-2024-27882",
        "CVE-2024-40774",
        "CVE-2024-54491",
        "CVE-2024-44159",
        "CVE-2024-54538",
        "CVE-2024-54506",
        "CVE-2025-24120",
        "CVE-2024-54546",
        "CVE-2025-30467",
        "CVE-2001-0102",
        "CVE-2025-24127",
        "CVE-2024-40854",
        "CVE-2024-44247",
        "CVE-2025-24274",
        "CVE-2024-44153",
        "CVE-2025-30466",
        "CVE-2025-31199",
        "CVE-2024-54529",
        "CVE-2024-4558",
        "CVE-2024-40777",
        "CVE-2025-31231",
        "CVE-2024-27850",
        "CVE-2024-54528",
        "CVE-2024-44148",
        "CVE-2024-44233",
        "CVE-2024-27885",
        "CVE-2024-27804",
        "CVE-2024-44201",
        "CVE-2024-54525",
        "CVE-2025-24191",
        "CVE-2025-24129",
        "CVE-2024-40836",
        "CVE-2024-44175",
        "CVE-2024-40827",
        "CVE-2024-44174",
        "CVE-2024-44237",
        "CVE-2024-54492",
        "CVE-2025-24137",
        "CVE-2024-54565",
        "CVE-2024-44297",
        "CVE-2025-31244",
        "CVE-2024-44302",
        "CVE-2024-40796",
        "CVE-2025-31222",
        "CVE-2025-31195",
        "CVE-2024-44170",
        "CVE-2024-44222",
        "CVE-2024-44269",
        "CVE-2025-31218",
        "CVE-2024-54549",
        "CVE-2024-23237",
        "CVE-2024-44152",
        "CVE-2024-40812",
        "CVE-2025-24086",
        "CVE-2024-54507",
        "CVE-2025-24138",
        "CVE-2024-54508",
        "CVE-2025-31233",
        "CVE-2024-27861",
        "CVE-2025-24150",
        "CVE-2025-24130",
        "CVE-2025-24085",
        "CVE-2025-30448",
        "CVE-2024-40778",
        "CVE-2024-44133",
        "CVE-2025-30463",
        "CVE-2024-27825",
        "CVE-2025-24156",
        "CVE-2024-44244",
        "CVE-2025-24107",
        "CVE-2024-40802",
        "CVE-2025-31235",
        "CVE-2024-40791",
        "CVE-2024-44236",
        "CVE-2024-27881",
        "CVE-2024-54501",
        "CVE-2024-44198",
        "CVE-2024-44270",
        "CVE-2024-27806",
        "CVE-2024-27836",
        "CVE-2025-24242",
        "CVE-2024-40846",
        "CVE-2024-40787",
        "CVE-2024-40834",
        "CVE-2024-40859",
        "CVE-2024-54514",
        "CVE-2024-44296",
        "CVE-2025-31226",
        "CVE-2024-40797",
        "CVE-2024-27851",
        "CVE-2025-24143",
        "CVE-2025-24113",
        "CVE-2024-40847",
        "CVE-2024-44176",
        "CVE-2025-24136",
        "CVE-2024-54475",
        "CVE-2025-24100",
        "CVE-2024-27826",
        "CVE-2025-24087",
        "CVE-2024-40835",
        "CVE-2024-54490",
        "CVE-2025-31259",
        "CVE-2025-24116",
        "CVE-2025-24176",
        "CVE-2025-24106",
        "CVE-2024-27860",
        "CVE-2024-44137",
        "CVE-2024-54498",
        "CVE-2024-44284",
        "CVE-2024-44146",
        "CVE-2025-24135",
        "CVE-2025-30458",
        "CVE-2024-54505",
        "CVE-2024-44264",
        "CVE-2024-44184",
        "CVE-2024-40856",
        "CVE-2024-44145",
        "CVE-2024-54471",
        "CVE-2024-54550",
        "CVE-2025-24121",
        "CVE-2024-44254",
        "CVE-2024-40823",
        "CVE-2024-40843",
        "CVE-2024-44227",
        "CVE-2024-27801",
        "CVE-2024-40816",
        "CVE-2024-27858",
        "CVE-2024-27837",
        "CVE-2024-27869",
        "CVE-2025-24114",
        "CVE-2025-43200",
        "CVE-2025-30461",
        "CVE-2024-44160",
        "CVE-2025-24149",
        "CVE-2025-31221",
        "CVE-2025-24101",
        "CVE-2024-27871",
        "CVE-2024-44225",
        "CVE-2024-44156",
        "CVE-2025-31236",
        "CVE-2024-44169",
        "CVE-2025-24103",
        "CVE-2024-44155",
        "CVE-2024-44178",
        "CVE-2024-40848",
        "CVE-2024-40844",
        "CVE-2025-30440",
        "CVE-2025-31240",
        "CVE-2024-54564",
        "CVE-2024-40860",
        "CVE-2024-44224",
        "CVE-2024-40776",
        "CVE-2025-31258",
        "CVE-2024-54493",
        "CVE-2025-31245",
        "CVE-2024-54517",
        "CVE-2024-44213",
        "CVE-2025-24097",
        "CVE-2024-44197",
        "CVE-2024-27798",
        "CVE-2024-40818",
        "CVE-2024-40824",
        "CVE-2024-54541",
        "CVE-2024-27838",
        "CVE-2024-44128",
        "CVE-2024-40781",
        "CVE-2024-44273",
        "CVE-2024-54515",
        "CVE-2025-24108",
        "CVE-2024-27855",
        "CVE-2024-23282",
        "CVE-2024-40838",
        "CVE-2024-40798",
        "CVE-2024-54519",
        "CVE-2024-44164",
        "CVE-2024-44287",
        "CVE-2025-31220",
        "CVE-2024-40814",
        "CVE-2024-54484",
        "CVE-2025-24115",
        "CVE-2024-54537",
        "CVE-2024-44291",
        "CVE-2024-40794",
        "CVE-2024-40780",
        "CVE-2025-31242",
        "CVE-2024-54531",
        "CVE-2024-27876",
        "CVE-2025-24162",
        "CVE-2024-44181",
        "CVE-2024-54536",
        "CVE-2025-31209",
        "CVE-2025-24153",
        "CVE-2025-24099",
        "CVE-2024-44307",
        "CVE-2025-31251",
        "CVE-2024-54494",
        "CVE-2025-31234",
        "CVE-2024-40817",
        "CVE-2025-24158",
        "CVE-2024-44134",
        "CVE-2025-24128",
        "CVE-2025-31223",
        "CVE-2024-27832",
        "CVE-2025-24102",
        "CVE-2024-44232",
        "CVE-2024-44186",
        "CVE-2024-54534",
        "CVE-2024-54543",
        "CVE-2024-44265",
        "CVE-2023-38709",
        "CVE-2025-24126",
        "CVE-2024-44177",
        "CVE-2025-24131",
        "CVE-2024-40793",
        "CVE-2024-40832",
        "CVE-2024-40789",
        "CVE-2025-31204",
        "CVE-2024-44218",
        "CVE-2024-44234",
        "CVE-2025-24159",
        "CVE-2024-27817",
        "CVE-2024-44190",
        "CVE-2025-24161",
        "CVE-2025-31206",
        "CVE-2024-54497",
        "CVE-2024-40771",
        "CVE-2025-24122",
        "CVE-2025-24184",
        "CVE-2024-27841",
        "CVE-2024-27834",
        "CVE-2024-40799",
        "CVE-2024-54476",
        "CVE-2024-44192",
        "CVE-2024-40815",
        "CVE-2024-54551",
        "CVE-2024-54558",
        "CVE-2024-27875",
        "CVE-2024-27795",
        "CVE-2024-27811",
        "CVE-2024-27857",
        "CVE-2024-44185",
        "CVE-2025-24248",
        "CVE-2024-44206",
        "CVE-2024-27816",
        "CVE-2024-40825",
        "CVE-2024-44245",
        "CVE-2024-44188",
        "CVE-2024-54463",
        "CVE-2025-24124",
        "CVE-2025-24189",
        "CVE-2024-44126",
        "CVE-2024-54547",
        "CVE-2024-24795",
        "CVE-2024-44122",
        "CVE-2024-44280",
        "CVE-2024-27856",
        "CVE-2024-44167",
        "CVE-2025-24204",
        "CVE-2024-54488",
        "CVE-2024-44179",
        "CVE-2024-44163",
        "CVE-2025-24223",
        "CVE-2024-40822",
        "CVE-2025-24112",
        "CVE-2025-24134",
        "CVE-2024-44131",
        "CVE-2024-40850",
        "CVE-2024-54539",
        "CVE-2024-54504",
        "CVE-2025-24154",
        "CVE-2024-44125",
        "CVE-2025-31219",
        "CVE-2025-31239",
        "CVE-2025-31250",
        "CVE-2024-27884",
        "CVE-2024-40845",
        "CVE-2024-54500",
        "CVE-2025-31201",
        "CVE-2024-44182",
        "CVE-2024-44300",
        "CVE-2025-31263",
        "CVE-2024-27842",
        "CVE-2024-44168",
        "CVE-2025-24093",
        "CVE-2024-44158",
        "CVE-2025-24123",
        "CVE-2024-40800",
        "CVE-2024-44183",
        "CVE-2024-40833",
        "CVE-2024-27830",
        "CVE-2024-40770",
        "CVE-2025-31217",
        "CVE-2024-1580",
        "CVE-2025-31212",
        "CVE-2024-44294",
        "CVE-2024-27822",
        "CVE-2024-44141",
        "CVE-2024-54465",
        "CVE-2024-44199",
        "CVE-2024-27862",
        "CVE-2024-54559",
        "CVE-2024-27824",
        "CVE-2024-27815",
        "CVE-2024-44149",
        "CVE-2025-24117",
        "CVE-2024-27844",
        "CVE-2025-24142",
        "CVE-2025-31203",
        "CVE-2024-27827",
        "CVE-2024-40803",
        "CVE-2024-44187",
        "CVE-2024-40788",
        "CVE-2024-54477",
        "CVE-2024-40809",
        "CVE-2025-24152",
        "CVE-2025-24169",
        "CVE-2024-40841",
        "CVE-2025-30442",
        "CVE-2025-24163",
        "CVE-2024-27810",
        "CVE-2024-54495",
        "CVE-2024-44208",
        "CVE-2025-24139",
        "CVE-2025-31238",
        "CVE-2025-24185",
        "CVE-2024-44240",
        "CVE-2024-27883",
        "CVE-2024-44154",
        "CVE-2024-44253",
        "CVE-2024-27799",
        "CVE-2024-44308",
        "CVE-2024-27849",
        "CVE-2024-54486",
        "CVE-2025-31208",
        "CVE-2024-54509",
        "CVE-2024-54467",
        "CVE-2025-24155",
        "CVE-2024-44260",
        "CVE-2024-44130",
        "CVE-2025-31241",
        "CVE-2024-40785",
        "CVE-2024-40837",
        "CVE-2024-44295",
        "CVE-2024-44256",
        "CVE-2025-31246",
        "CVE-1999-0590",
        "CVE-2024-44132",
        "CVE-2024-44165",
        "CVE-2024-44255",
        "CVE-2025-31200",
        "CVE-2025-24092",
        "CVE-2024-27880",
        "CVE-2024-44248",
        "CVE-2025-24094",
        "CVE-2024-27872",
        "CVE-2025-30471",
        "CVE-2025-31256",
        "CVE-2024-44279",
        "CVE-2024-27848",
        "CVE-2024-44135",
        "CVE-2024-27878",
        "CVE-2025-24262",
        "CVE-2024-27873",
        "CVE-2024-44205",
        "CVE-2024-27796",
        "CVE-2024-27847",
        "CVE-2024-44278",
        "CVE-2024-27829",
        "CVE-2024-44281",
        "CVE-2024-27821",
        "CVE-2025-24258",
        "CVE-2025-24222",
        "CVE-2025-24282",
        "CVE-2025-31232",
        "CVE-2024-27863",
        "CVE-2024-44161",
        "CVE-2024-44275",
        "CVE-2024-44166",
        "CVE-2025-24146",
        "CVE-2024-27831",
        "CVE-2024-44191",
        "CVE-2025-31202",
        "CVE-2025-31196",
        "CVE-2024-44283",
        "CVE-2024-44215",
        "CVE-2024-54489",
        "CVE-2025-24151",
        "CVE-2024-44289",
        "CVE-2025-31205",
        "CVE-2024-27808",
        "CVE-2024-27820",
        "CVE-2024-40857",
        "CVE-2025-31237",
        "CVE-2024-54523"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Otras herramientas",
      "certification_date": "2025-05-23",
      "enhanced": {
        "category": "Otras herramientas",
        "cc_version": "CC/CEM:2022 Release 1",
        "cert_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2184",
        "certification_date": "2025-05-23",
        "description": "The TOE platform includes the components implementing Strong Customer Authentication (SCA) and Dynamic Linking for Apple Pay. User authentication is managed by the Secure Enclave. The Secure Enclave is a dedicated secure subsystem integrated into Apple systems on chip (SoCs). The Secure Enclave is isolated from the main processor to provide an extra layer of security and is designed to keep sensitive user data secure even when the Application Processor kernel becomes compromised. The macOS operating system also allows the Apple Pay services and other security functions of the TOE to operate. The Secure Element (outside of the TOE) is the secure component holding the Apple Pay secrets and processes the Apple Pay transactions.",
        "evaluation_facility": "Applus Laboratories",
        "level": "EAL2 + ADV_FSP.3, ALC_FLR.3",
        "manufacturer": "Apple Inc.",
        "report_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2185",
        "status": "Certified",
        "target_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2183",
        "type": "Product"
      },
      "manufacturer": "Apple Inc.",
      "product": "Strong Customer Authentication for Apple Pay on MacBook Air 2024 with M3 running macOS Sonoma 14.4",
      "product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/1046-strong-customer-authentication-for-apple-pay-on-macbook-air-2024-with-m3-running-macos-sonoma-14-4"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Apple Inc.",
  "manufacturer_web": null,
  "name": "Strong Customer Authentication for Apple Pay on MacBookAir 2024 with M3 running macOS Sonoma 14.4",
  "not_valid_after": "2030-05-23",
  "not_valid_before": "2025-05-23",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "2024-11 CERTIFICATION REPORT.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "ES": {
          "2024-11-INF-4471- v1": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.3": 8,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR": 3,
          "ALC_FLR.3": 8
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_INT.1": 1,
          "ASE_REQ.2": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 1,
          "EAL 4": 2,
          "EAL2": 9
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {
        "FDP": {
          "FDP_ACC": 3,
          "FDP_ACF": 3,
          "FDP_DAU.1": 1,
          "FDP_ETC": 1,
          "FDP_ITC.1": 1,
          "FDP_ITT.1": 1,
          "FDP_RIP.1": 1,
          "FDP_UCT": 2,
          "FDP_UIT": 2
        },
        "FIA": {
          "FIA_AFL": 2,
          "FIA_ATD.1": 1,
          "FIA_UAU.5": 1,
          "FIA_UAU.6": 1,
          "FIA_UID.2": 1
        },
        "FMT": {
          "FMT_MSA.3": 1,
          "FMT_MTD.1": 1,
          "FMT_SMR.1": 1
        },
        "FPR": {
          "FPR_UNO.1": 1
        },
        "FPT": {
          "FPT_ITC.1": 1,
          "FPT_RPL": 2
        },
        "FTP": {
          "FTP_ITC": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Applus": {
          "Applus Laboratories": 3
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "9308",
      "/CreationDate": "D:20250704122401+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word LTSC",
      "/ModDate": "D:20250704122401+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word LTSC",
      "pdf_file_size_bytes": 518600,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 16
    },
    "st_filename": "[ST] MacBook_M3_macOS14_SecurityTarget_v8.0.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.DEVICE_AUTH": 3,
          "A.NO_EVIL_ROOT_USER": 3,
          "A.NO_EXTERNAL_KEY-": 1,
          "A.NO_EXTERNAL_KEYBOARD": 1,
          "A.PERSO": 4,
          "A.WATCH_USER": 4
        },
        "D": {
          "D.OS": 17,
          "D.SEP_SE": 3
        },
        "T": {
          "T.CORRUPT": 4,
          "T.PHYSICAL": 2,
          "T.RECOVER": 4,
          "T.REPLAY": 2,
          "T.SILENT": 3,
          "T.SKIM-": 1,
          "T.SKIMMING": 2,
          "T.USURP": 4
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 3,
          "ADV_FSP.1": 2,
          "ADV_FSP.2": 4,
          "ADV_FSP.3": 3,
          "ADV_TDS.1": 4
        },
        "AGD": {
          "AGD_OPE.1": 4,
          "AGD_PRE.1": 4
        },
        "ALC": {
          "ALC_CMC.2": 2,
          "ALC_CMS.2": 2,
          "ALC_DEL.1": 2,
          "ALC_FLR": 1,
          "ALC_FLR.3": 3
        },
        "ASE": {
          "ASE_CCL.1": 2,
          "ASE_ECD.1": 3,
          "ASE_INT.1": 2,
          "ASE_OBJ.2": 2,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 2
        },
        "ATE": {
          "ATE_COV.1": 4,
          "ATE_FUN.1": 3,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 2 augmented": 1,
          "EAL2": 1
        }
      },
      "cc_sfr": {
        "FDP": {
          "FDP_ACC": 25,
          "FDP_ACC.1": 10,
          "FDP_ACC.2": 4,
          "FDP_ACC.2.1": 1,
          "FDP_ACC.2.2": 1,
          "FDP_ACF": 23,
          "FDP_ACF.1": 12,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_DAU.1": 4,
          "FDP_DAU.1.1": 1,
          "FDP_DAU.1.2": 1,
          "FDP_ETC": 8,
          "FDP_ETC.2": 2,
          "FDP_ETC.2.1": 2,
          "FDP_ETC.2.2": 2,
          "FDP_ETC.2.3": 2,
          "FDP_ETC.2.4": 2,
          "FDP_IFC.1": 9,
          "FDP_ITC.1": 4,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_ITT.1": 4,
          "FDP_ITT.1.1": 1,
          "FDP_RIP.1": 13,
          "FDP_RIP.1.1": 1,
          "FDP_SDI.1": 9,
          "FDP_SDI.1.1": 1,
          "FDP_UCT": 10,
          "FDP_UCT.1": 1,
          "FDP_UCT.1.1": 1,
          "FDP_UIT": 10,
          "FDP_UIT.1": 2,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_AFL": 12,
          "FIA_AFL.1": 1,
          "FIA_AFL.1.1": 3,
          "FIA_AFL.1.2": 3,
          "FIA_ATD.1": 5,
          "FIA_ATD.1.1": 2,
          "FIA_SOS.2": 4,
          "FIA_SOS.2.1": 1,
          "FIA_SOS.2.2": 1,
          "FIA_UAU.1": 1,
          "FIA_UAU.2": 11,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.5": 5,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 11,
          "FIA_UAU.6.1": 2,
          "FIA_UID.1": 1,
          "FIA_UID.2": 6,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MSA.1": 6,
          "FMT_MSA.1.1": 2,
          "FMT_MSA.3": 14,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 4,
          "FMT_MTD.1.1": 1,
          "FMT_MTD.3": 4,
          "FMT_MTD.3.1": 1,
          "FMT_SMF.1": 6,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 10,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO.1": 16,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_ITC.1": 4,
          "FPT_ITC.1.1": 1,
          "FPT_RPL": 8,
          "FPT_RPL.1": 6
        },
        "FTP": {
          "FTP_ITC": 14,
          "FTP_ITC.1": 7,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {
        "OutOfScope": {
          "Element of the device is separately certified according to the Common Criteria and is therefore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by": 1,
          "out of scope": 2,
          "pected to return to its User. Note: Defending against device re-use after physical compromise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* Strong Customer": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 2,
            "TLS 1.2": 1
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS 140-3": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 4
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20241118103634+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2013",
      "/ModDate": "D:20241118103634+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2013",
      "pdf_file_size_bytes": 1296359,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://support.apple.com/en-us/HT204587",
          "https://checkcoverage.apple.com/",
          "https://support.apple.com/HT201222",
          "https://support.apple.com/guide/security/welcome/web",
          "https://support.apple.com/HT202860",
          "https://support.apple.com/HT204899",
          "https://support.apple.com/guide/macbook-air",
          "https://support.apple.com/HT212190",
          "https://support.apple.com/en-us/HT201581",
          "https://support.apple.com/HT212225",
          "https://lists.apple.com/mailman/listinfo/security-announce/",
          "https://support.apple.com/guide/certifications/apple-pay-security-certifications-apc3a0db329f/web",
          "https://support.apple.com/HT201220",
          "https://support.apple.com/HT201862",
          "https://support.apple.com/HT201221",
          "https://support.apple.com/en-gb/guide/personal-safety/ipsd0a253dd5/1.0/web/1.0",
          "https://www.apple.com/",
          "https://support.apple.com/apple-pay",
          "https://support.apple.com/HT201260",
          "https://support.apple.com/HT201371",
          "https://support.apple.com/102664",
          "https://support.apple.com/102633",
          "https://developer.apple.com/documentation/security/",
          "https://support.apple.com/HT201541"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 53
    }
  },
  "protection_profile_links": null,
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/2024-11%20CERTIFICATION%20REPORT.pdf",
  "scheme": "ES",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.3",
      "ADV_FSP.3",
      "EAL2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/[ST]%20MacBook_M3_macOS14_SecurityTarget_v8.0.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "71c3f8433ad1c9c3ceac924f0d9c39ca3eb36f9c676d51d46345479f1130dd9d",
      "txt_hash": "f418d211683df53f0bc39042b3277c0b1344da41ec82958be0f92b8e7ed98407"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "edd6fc17ef47fa46a3b5484383efcdb0df22c86d0dfad5c29dc5e935fcc683af",
      "txt_hash": "64066491753b81e5ca54ef1b1fd0f2772c16be1056f2163d3d2151c3c270bf4f"
    }
  },
  "status": "active"
}