This page was not yet optimized for use on mobile devices.
Strong Customer Authentication for Apple Pay on MacBookAir 2024 with M3 running macOS Sonoma 14.4
This certificate has known related CVEs, which means that
the certified
product might be vulnerable.
CSV information
Status | active |
---|---|
Valid from | 23.05.2025 |
Valid until | 23.05.2030 |
Scheme | 🇪🇸 ES |
Manufacturer | Apple Inc. |
Category | Other Devices and Systems |
Security level | ALC_FLR.3, ADV_FSP.3, EAL2 |
Heuristics summary
Certificate ID: 2024-11-INF-4471
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
ERROR
Convert pdf to text:
ERROR
Extract keywords:
ERROR
Certification report
Extracted keywords
Security level
EAL2, EAL 1, EAL 4, EAL 2, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ADV_FSP.3, ADV_ARC.1, ADV_TDS.1, AGD_OPE.1, ALC_FLR.3, ALC_CMC.2, ALC_DEL.1, ALC_FLR, ATE_COV.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1Security Functional Requirements (SFR)
FDP_DAU.1, FDP_ACC, FDP_ACF, FDP_ITT.1, FDP_ETC, FDP_ITC.1, FDP_UCT, FDP_UIT, FDP_RIP.1, FIA_UID.2, FIA_UAU.5, FIA_AFL, FIA_UAU.6, FIA_ATD.1, FMT_SMR.1, FMT_MSA.3, FMT_MTD.1, FPR_UNO.1, FPT_ITC.1, FPT_RPL, FTP_ITCCertificates
2024-11-INF-4471- v1Evaluation facilities
Applus LaboratoriesFile metadata
Author | 9308 |
---|---|
Creation date | D:20250704122401+02'00' |
Modification date | D:20250704122401+02'00' |
Pages | 16 |
Creator | Microsoft® Word LTSC |
Producer | Microsoft® Word LTSC |
Security target
Extracted keywords
Symmetric Algorithms
AESSchemes
MACProtocols
TLS 1.2, TLSTrusted Execution Environments
SESecurity level
EAL 2, EAL2, EAL 2 augmentedClaims
D.OS, D.SEP_SE, T.CORRUPT, T.PHYSICAL, T.RECOVER, T.REPLAY, T.SILENT, T.SKIM-, T.USURP, T.SKIMMING, A.DEVICE_AUTH, A.PERSO, A.WATCH_USER, A.NO_EXTERNAL_KEY-, A.NO_EVIL_ROOT_USER, A.NO_EXTERNAL_KEYBOARDSecurity Assurance Requirements (SAR)
ADV_FSP.3, ADV_ARC.1, ADV_TDS.1, ADV_FSP.2, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.3, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1Security Functional Requirements (SFR)
FDP_DAU.1, FDP_DAU.1.1, FDP_DAU.1.2, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_ITT.1, FDP_ITT.1.1, FDP_ETC, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_UCT, FDP_UCT.1, FDP_UIT, FDP_UIT.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.1.1, FDP_ACC.1, FDP_IFC.1, FDP_ETC.2, FIA_UID.2, FIA_UID.2.1, FIA_UAU.2, FIA_UAU.2.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_AFL.1, FIA_AFL, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.6.1, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.1, FIA_UID.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1.1, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.3, FMT_MTD.3.1, FPR_UNO.1, FPR_UNO.1.1, FPT_ITC.1, FPT_ITC.1.1, FPT_RPL, FPT_RPL.1, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1Certification process
out of scope, Element of the device is separately certified according to the Common Criteria and is therefore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by, pected to return to its User. Note: Defending against device re-use after physical compromise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* Strong CustomerStandards
FIPS 140-3, FIPS 140-2File metadata
Creation date | D:20241118103634+01'00' |
---|---|
Modification date | D:20241118103634+01'00' |
Pages | 53 |
Creator | Microsoft® Word 2013 |
Producer | Microsoft® Word 2013 |
Heuristics
Certificate ID: 2024-11-INF-4471
Extracted SARs
ADV_ARC.1, ADV_FSP.3, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2CPE matches
Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-1999-0590 | HIGH | 10.0 | 10.0 | 01.06.2000 04:00 | ||
CVE-2001-0102 | HIGH | 7.2 | 10.0 | 12.02.2001 05:00 | ||
CVE-2023-38709 | HIGH | 7.3 | 3.4 | 04.04.2024 20:15 | ||
CVE-2024-1580 | HIGH | 8.8 | 5.9 | 19.02.2024 11:15 | ||
CVE-2024-23236 | MEDIUM | 5.5 | 3.6 | 14.05.2024 14:58 | ||
CVE-2024-23237 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-23251 | MEDIUM | 4.6 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-23282 | MEDIUM | 5.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-24795 | MEDIUM | 6.3 | 3.4 | 04.04.2024 20:15 | ||
CVE-2024-27795 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27796 | HIGH | 7.8 | 5.9 | 14.05.2024 15:13 | ||
CVE-2024-27798 | HIGH | 7.8 | 5.9 | 14.05.2024 15:13 | ||
CVE-2024-27799 | LOW | 3.3 | 1.4 | 10.06.2024 21:15 | ||
CVE-2024-27800 | MEDIUM | 6.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27801 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27802 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27804 | MEDIUM | 5.5 | 3.6 | 14.05.2024 15:13 | ||
CVE-2024-27805 | MEDIUM | 5.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27806 | MEDIUM | 5.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27808 | HIGH | 8.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27810 | MEDIUM | 5.5 | 3.6 | 14.05.2024 15:13 | ||
CVE-2024-27811 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27813 | HIGH | 8.6 | 6.0 | 14.05.2024 15:13 | ||
CVE-2024-27815 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27816 | MEDIUM | 5.5 | 3.6 | 14.05.2024 15:13 | ||
CVE-2024-27817 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27818 | HIGH | 7.8 | 5.9 | 14.05.2024 15:13 | ||
CVE-2024-27820 | HIGH | 8.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27821 | MEDIUM | 4.7 | 3.6 | 14.05.2024 15:13 | ||
CVE-2024-27822 | HIGH | 7.8 | 5.9 | 14.05.2024 15:13 | ||
CVE-2024-27823 | MEDIUM | 5.9 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27824 | HIGH | 7.8 | 5.9 | 14.05.2024 15:13 | ||
CVE-2024-27825 | HIGH | 7.1 | 5.2 | 14.05.2024 15:13 | ||
CVE-2024-27826 | HIGH | 7.8 | 5.9 | 29.07.2024 23:15 | ||
CVE-2024-27827 | MEDIUM | 5.5 | 3.6 | 14.05.2024 15:13 | ||
CVE-2024-27829 | HIGH | 7.8 | 5.9 | 14.05.2024 15:13 | ||
CVE-2024-27830 | MEDIUM | 6.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27831 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27832 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27834 | MEDIUM | 5.5 | 3.6 | 14.05.2024 15:13 | ||
CVE-2024-27836 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27837 | LOW | 3.3 | 1.4 | 14.05.2024 15:13 | ||
CVE-2024-27838 | MEDIUM | 6.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27841 | MEDIUM | 5.5 | 3.6 | 14.05.2024 15:13 | ||
CVE-2024-27842 | HIGH | 7.8 | 5.9 | 14.05.2024 15:13 | ||
CVE-2024-27843 | HIGH | 7.8 | 5.9 | 14.05.2024 15:13 | ||
CVE-2024-27844 | MEDIUM | 5.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27847 | MEDIUM | 5.5 | 3.6 | 14.05.2024 15:13 | ||
CVE-2024-27848 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27849 | LOW | 3.3 | 1.4 | 28.10.2024 21:15 | ||
CVE-2024-27850 | MEDIUM | 6.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27851 | HIGH | 8.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27855 | HIGH | 8.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27856 | HIGH | 7.8 | 5.9 | 15.01.2025 20:15 | ||
CVE-2024-27857 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27858 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27860 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27861 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27862 | LOW | 2.4 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-27863 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27869 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27871 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27872 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27873 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27875 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27876 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27877 | MEDIUM | 6.1 | 4.2 | 29.07.2024 23:15 | ||
CVE-2024-27878 | MEDIUM | 6.7 | 5.9 | 29.07.2024 23:15 | ||
CVE-2024-27880 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27881 | MEDIUM | 5.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-27882 | MEDIUM | 4.4 | 2.5 | 29.07.2024 23:15 | ||
CVE-2024-27883 | MEDIUM | 4.4 | 2.5 | 29.07.2024 23:15 | ||
CVE-2024-27884 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27885 | MEDIUM | 6.3 | 4.0 | 10.06.2024 21:15 | ||
CVE-2024-40770 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40771 | HIGH | 7.8 | 5.9 | 15.01.2025 20:15 | ||
CVE-2024-40774 | HIGH | 7.1 | 5.2 | 29.07.2024 23:15 | ||
CVE-2024-40775 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40776 | MEDIUM | 4.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40777 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40778 | LOW | 3.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40779 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40780 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40781 | HIGH | 7.8 | 5.9 | 29.07.2024 23:15 | ||
CVE-2024-40782 | MEDIUM | 6.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40783 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40784 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40785 | MEDIUM | 6.1 | 2.7 | 29.07.2024 23:15 | ||
CVE-2024-40787 | HIGH | 7.1 | 5.2 | 29.07.2024 23:15 | ||
CVE-2024-40788 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40789 | MEDIUM | 6.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40791 | LOW | 3.3 | 1.4 | 17.09.2024 00:15 | ||
CVE-2024-40792 | LOW | 3.3 | 1.4 | 28.10.2024 21:15 | ||
CVE-2024-40793 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40794 | MEDIUM | 5.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40795 | LOW | 3.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40796 | MEDIUM | 5.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40797 | MEDIUM | 6.1 | 2.7 | 17.09.2024 00:15 | ||
CVE-2024-40798 | LOW | 3.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40799 | HIGH | 7.1 | 5.2 | 29.07.2024 23:15 | ||
CVE-2024-40800 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40801 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40802 | HIGH | 7.8 | 5.9 | 29.07.2024 23:15 | ||
CVE-2024-40803 | HIGH | 7.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40804 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40805 | HIGH | 7.1 | 5.2 | 29.07.2024 23:15 | ||
CVE-2024-40807 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40809 | HIGH | 7.8 | 5.9 | 29.07.2024 23:15 | ||
CVE-2024-40810 | MEDIUM | 5.5 | 3.6 | 24.10.2024 17:15 | ||
CVE-2024-40811 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40812 | HIGH | 7.8 | 5.9 | 29.07.2024 23:15 | ||
CVE-2024-40814 | HIGH | 7.1 | 5.2 | 29.07.2024 23:15 | ||
CVE-2024-40815 | HIGH | 7.5 | 5.9 | 29.07.2024 23:15 | ||
CVE-2024-40816 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40817 | MEDIUM | 6.1 | 2.7 | 29.07.2024 23:15 | ||
CVE-2024-40818 | MEDIUM | 4.6 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40821 | HIGH | 7.1 | 5.2 | 29.07.2024 23:15 | ||
CVE-2024-40822 | LOW | 2.4 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40823 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40824 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40825 | MEDIUM | 4.4 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40826 | MEDIUM | 6.1 | 4.2 | 17.09.2024 00:15 | ||
CVE-2024-40827 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40828 | HIGH | 7.8 | 5.9 | 29.07.2024 23:15 | ||
CVE-2024-40831 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40832 | LOW | 3.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40833 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40834 | MEDIUM | 4.4 | 2.5 | 29.07.2024 23:15 | ||
CVE-2024-40835 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40836 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40837 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40838 | LOW | 3.3 | 1.4 | 17.09.2024 00:15 | ||
CVE-2024-40841 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40842 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40843 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40844 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40845 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40846 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40847 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40848 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40850 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40854 | MEDIUM | 5.5 | 3.6 | 15.01.2025 20:15 | ||
CVE-2024-40855 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-40856 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40857 | MEDIUM | 6.1 | 2.7 | 17.09.2024 00:15 | ||
CVE-2024-40859 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40860 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40861 | HIGH | 7.8 | 5.9 | 17.09.2024 00:15 | ||
CVE-2024-40866 | MEDIUM | 6.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44122 | HIGH | 8.8 | 6.0 | 28.10.2024 21:15 | ||
CVE-2024-44123 | LOW | 2.3 | 1.4 | 28.10.2024 21:15 | ||
CVE-2024-44125 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44126 | HIGH | 7.8 | 5.9 | 28.10.2024 21:15 | ||
CVE-2024-44128 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44130 | MEDIUM | 4.4 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44131 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44132 | HIGH | 8.8 | 6.0 | 17.09.2024 00:15 | ||
CVE-2024-44133 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44134 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44135 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44137 | MEDIUM | 4.6 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44141 | MEDIUM | 6.8 | 5.9 | 24.10.2024 17:15 | ||
CVE-2024-44144 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44145 | MEDIUM | 6.1 | 5.2 | 28.10.2024 22:15 | ||
CVE-2024-44146 | CRITICAL | 10.0 | 6.0 | 17.09.2024 00:15 | ||
CVE-2024-44148 | CRITICAL | 10.0 | 6.0 | 17.09.2024 00:15 | ||
CVE-2024-44149 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44151 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44152 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44153 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44154 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44155 | MEDIUM | 6.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44156 | HIGH | 7.1 | 5.2 | 28.10.2024 21:15 | ||
CVE-2024-44158 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44159 | HIGH | 7.1 | 5.2 | 28.10.2024 21:15 | ||
CVE-2024-44160 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44161 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44163 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44164 | HIGH | 7.1 | 5.2 | 17.09.2024 00:15 | ||
CVE-2024-44165 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44166 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44167 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44168 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44169 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44170 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44172 | LOW | 3.3 | 1.4 | 27.01.2025 22:15 | ||
CVE-2024-44174 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44175 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44176 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44177 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44178 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44179 | LOW | 2.4 | 1.4 | 10.03.2025 19:15 | ||
CVE-2024-44181 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44182 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44183 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44184 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44185 | MEDIUM | 5.5 | 3.6 | 24.10.2024 17:15 | ||
CVE-2024-44186 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44187 | MEDIUM | 6.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44188 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44189 | HIGH | 7.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44190 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44191 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44192 | MEDIUM | 5.5 | 3.6 | 10.03.2025 19:15 | ||
CVE-2024-44196 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44197 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44198 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44199 | HIGH | 7.1 | 5.2 | 21.03.2025 00:15 | ||
CVE-2024-44201 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-44203 | HIGH | 7.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44205 | MEDIUM | 5.5 | 3.6 | 24.10.2024 17:15 | ||
CVE-2024-44206 | CRITICAL | 9.3 | 4.7 | 24.10.2024 17:15 | ||
CVE-2024-44208 | HIGH | 7.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44213 | MEDIUM | 5.9 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44215 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44216 | MEDIUM | 5.5 | 3.6 | 28.10.2024 22:15 | ||
CVE-2024-44218 | HIGH | 7.8 | 5.9 | 28.10.2024 21:15 | ||
CVE-2024-44220 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-44222 | LOW | 3.3 | 1.4 | 28.10.2024 21:15 | ||
CVE-2024-44224 | HIGH | 7.8 | 5.9 | 12.12.2024 02:15 | ||
CVE-2024-44225 | HIGH | 7.8 | 5.9 | 12.12.2024 02:15 | ||
CVE-2024-44227 | HIGH | 7.5 | 3.6 | 10.03.2025 19:15 | ||
CVE-2024-44232 | MEDIUM | 5.5 | 3.6 | 01.11.2024 21:15 | ||
CVE-2024-44233 | MEDIUM | 5.5 | 3.6 | 01.11.2024 21:15 | ||
CVE-2024-44234 | MEDIUM | 5.5 | 3.6 | 01.11.2024 21:15 | ||
CVE-2024-44236 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44237 | MEDIUM | 5.5 | 3.6 | 28.10.2024 22:15 | ||
CVE-2024-44239 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44240 | MEDIUM | 5.5 | 3.6 | 28.10.2024 22:15 | ||
CVE-2024-44244 | MEDIUM | 4.3 | 1.4 | 28.10.2024 21:15 | ||
CVE-2024-44245 | HIGH | 7.1 | 5.2 | 12.12.2024 02:15 | ||
CVE-2024-44247 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44248 | MEDIUM | 6.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-44253 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44254 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44255 | HIGH | 7.8 | 5.9 | 28.10.2024 21:15 | ||
CVE-2024-44256 | HIGH | 8.6 | 6.0 | 28.10.2024 22:15 | ||
CVE-2024-44257 | MEDIUM | 5.5 | 3.6 | 28.10.2024 22:15 | ||
CVE-2024-44260 | MEDIUM | 4.4 | 3.6 | 28.10.2024 22:15 | ||
CVE-2024-44264 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44265 | LOW | 2.4 | 1.4 | 28.10.2024 21:15 | ||
CVE-2024-44267 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44269 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44270 | HIGH | 8.6 | 4.0 | 28.10.2024 21:15 | ||
CVE-2024-44273 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44275 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44278 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44279 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44280 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44281 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44282 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44283 | MEDIUM | 5.5 | 3.6 | 28.10.2024 22:15 | ||
CVE-2024-44284 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44287 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44289 | HIGH | 7.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44291 | HIGH | 7.8 | 5.9 | 12.12.2024 02:15 | ||
CVE-2024-44294 | MEDIUM | 6.5 | 5.2 | 28.10.2024 21:15 | ||
CVE-2024-44295 | MEDIUM | 5.5 | 3.6 | 28.10.2024 22:15 | ||
CVE-2024-44296 | MEDIUM | 5.4 | 2.5 | 28.10.2024 21:15 | ||
CVE-2024-44297 | MEDIUM | 6.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44300 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-44301 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44302 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44305 | HIGH | 7.8 | 5.9 | 21.03.2025 00:15 | ||
CVE-2024-44306 | HIGH | 7.8 | 5.9 | 20.11.2024 00:15 | ||
CVE-2024-44307 | HIGH | 7.8 | 5.9 | 20.11.2024 00:15 | ||
CVE-2024-44308 | HIGH | 8.8 | 5.9 | 20.11.2024 00:15 | ||
CVE-2024-4558 | CRITICAL | 9.6 | 6.0 | 07.05.2024 19:15 | ||
CVE-2024-54463 | MEDIUM | 5.5 | 3.6 | 10.03.2025 19:15 | ||
CVE-2024-54465 | CRITICAL | 9.8 | 5.9 | 12.12.2024 02:15 | ||
CVE-2024-54466 | MEDIUM | 5.3 | 1.4 | 12.12.2024 02:15 | ||
CVE-2024-54467 | MEDIUM | 6.5 | 3.6 | 10.03.2025 19:15 | ||
CVE-2024-54468 | HIGH | 8.2 | 5.8 | 27.01.2025 22:15 | ||
CVE-2024-54469 | MEDIUM | 5.5 | 3.6 | 10.03.2025 19:15 | ||
CVE-2024-54471 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54473 | MEDIUM | 5.5 | 3.6 | 10.03.2025 19:15 | ||
CVE-2024-54474 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54475 | LOW | 3.3 | 1.4 | 27.01.2025 22:15 | ||
CVE-2024-54476 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54477 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54478 | MEDIUM | 6.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2024-54479 | HIGH | 7.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54484 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54486 | MEDIUM | 6.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54488 | MEDIUM | 5.3 | 1.4 | 27.01.2025 22:15 | ||
CVE-2024-54489 | HIGH | 7.8 | 5.9 | 12.12.2024 02:15 | ||
CVE-2024-54490 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54491 | LOW | 3.3 | 1.4 | 12.12.2024 02:15 | ||
CVE-2024-54492 | MEDIUM | 5.9 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54493 | LOW | 3.3 | 1.4 | 12.12.2024 02:15 | ||
CVE-2024-54494 | MEDIUM | 5.9 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54495 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54497 | MEDIUM | 6.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2024-54498 | HIGH | 8.8 | 6.0 | 12.12.2024 02:15 | ||
CVE-2024-54499 | HIGH | 8.8 | 5.9 | 27.01.2025 22:15 | ||
CVE-2024-54500 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54501 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54504 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54505 | HIGH | 8.8 | 5.9 | 12.12.2024 02:15 | ||
CVE-2024-54506 | CRITICAL | 9.8 | 5.9 | 12.12.2024 02:15 | ||
CVE-2024-54507 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2024-54508 | HIGH | 7.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54509 | HIGH | 7.8 | 5.9 | 27.01.2025 22:15 | ||
CVE-2024-54510 | MEDIUM | 5.1 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54513 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54514 | HIGH | 8.6 | 6.0 | 12.12.2024 02:15 | ||
CVE-2024-54515 | HIGH | 7.8 | 5.9 | 12.12.2024 02:15 | ||
CVE-2024-54516 | LOW | 3.3 | 1.4 | 27.01.2025 22:15 | ||
CVE-2024-54517 | HIGH | 7.8 | 5.9 | 27.01.2025 22:15 | ||
CVE-2024-54518 | MEDIUM | 5.3 | 3.4 | 27.01.2025 22:15 | ||
CVE-2024-54519 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2024-54520 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2024-54522 | HIGH | 7.8 | 5.9 | 27.01.2025 22:15 | ||
CVE-2024-54523 | MEDIUM | 6.3 | 4.0 | 27.01.2025 22:15 | ||
CVE-2024-54525 | HIGH | 8.8 | 5.9 | 17.03.2025 20:15 | ||
CVE-2024-54526 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54527 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54528 | HIGH | 7.1 | 5.2 | 12.12.2024 02:15 | ||
CVE-2024-54529 | HIGH | 7.8 | 5.9 | 12.12.2024 02:15 | ||
CVE-2024-54530 | CRITICAL | 9.1 | 5.2 | 27.01.2025 22:15 | ||
CVE-2024-54531 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54534 | CRITICAL | 9.8 | 5.9 | 12.12.2024 02:15 | ||
CVE-2024-54536 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2024-54537 | HIGH | 8.2 | 5.8 | 27.01.2025 22:15 | ||
CVE-2024-54538 | HIGH | 7.5 | 3.6 | 20.12.2024 01:15 | ||
CVE-2024-54539 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2024-54541 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2024-54542 | CRITICAL | 9.1 | 5.2 | 27.01.2025 22:15 | ||
CVE-2024-54543 | HIGH | 8.8 | 5.9 | 27.01.2025 22:15 | ||
CVE-2024-54546 | HIGH | 7.5 | 3.6 | 10.03.2025 19:15 | ||
CVE-2024-54547 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2024-54549 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2024-54550 | MEDIUM | 4.0 | 1.4 | 27.01.2025 22:15 | ||
CVE-2024-54551 | HIGH | 7.5 | 3.6 | 21.03.2025 00:15 | ||
CVE-2024-54557 | HIGH | 7.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2024-54558 | LOW | 2.8 | 1.4 | 10.03.2025 19:15 | ||
CVE-2024-54559 | MEDIUM | 5.5 | 3.6 | 17.03.2025 20:15 | ||
CVE-2024-54560 | MEDIUM | 5.5 | 3.6 | 10.03.2025 19:15 | ||
CVE-2024-54564 | MEDIUM | 6.5 | 2.5 | 21.03.2025 00:15 | ||
CVE-2024-54565 | MEDIUM | 6.2 | 3.6 | 17.03.2025 20:15 | ||
CVE-2025-24085 | HIGH | 7.8 | 5.9 | 27.01.2025 22:15 | ||
CVE-2025-24086 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24087 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24092 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24093 | CRITICAL | 9.8 | 5.9 | 27.01.2025 22:15 | ||
CVE-2025-24094 | MEDIUM | 4.7 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24096 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24097 | MEDIUM | 5.0 | 3.6 | 31.03.2025 23:15 | ||
CVE-2025-24099 | MEDIUM | 5.1 | 2.5 | 30.01.2025 17:15 | ||
CVE-2025-24100 | LOW | 3.3 | 1.4 | 27.01.2025 22:15 | ||
CVE-2025-24101 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24102 | CRITICAL | 9.8 | 5.9 | 27.01.2025 22:15 | ||
CVE-2025-24103 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24106 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24107 | HIGH | 7.8 | 5.9 | 27.01.2025 22:15 | ||
CVE-2025-24108 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24109 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24112 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24113 | MEDIUM | 4.3 | 1.4 | 27.01.2025 22:15 | ||
CVE-2025-24114 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24115 | MEDIUM | 6.3 | 4.0 | 27.01.2025 22:15 | ||
CVE-2025-24116 | MEDIUM | 4.4 | 2.5 | 27.01.2025 22:15 | ||
CVE-2025-24117 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24118 | HIGH | 7.1 | 5.2 | 27.01.2025 22:15 | ||
CVE-2025-24120 | HIGH | 7.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24121 | LOW | 3.3 | 1.4 | 27.01.2025 22:15 | ||
CVE-2025-24122 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24123 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24124 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24126 | HIGH | 7.3 | 5.2 | 27.01.2025 22:15 | ||
CVE-2025-24127 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24128 | MEDIUM | 4.3 | 1.4 | 27.01.2025 22:15 | ||
CVE-2025-24129 | HIGH | 7.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24130 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24131 | MEDIUM | 6.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24134 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24135 | HIGH | 7.8 | 5.9 | 27.01.2025 22:15 | ||
CVE-2025-24136 | MEDIUM | 4.4 | 2.5 | 27.01.2025 22:15 | ||
CVE-2025-24137 | HIGH | 8.0 | 5.9 | 27.01.2025 22:15 | ||
CVE-2025-24138 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24139 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24140 | MEDIUM | 5.3 | 1.4 | 27.01.2025 22:15 | ||
CVE-2025-24142 | MEDIUM | 5.5 | 3.6 | 12.05.2025 22:15 | ||
CVE-2025-24143 | MEDIUM | 6.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24144 | MEDIUM | 5.5 | 3.6 | 12.05.2025 22:15 | ||
CVE-2025-24145 | LOW | 3.3 | 1.4 | 27.01.2025 22:15 | ||
CVE-2025-24146 | CRITICAL | 9.8 | 5.9 | 27.01.2025 22:15 | ||
CVE-2025-24149 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24150 | HIGH | 8.8 | 5.9 | 27.01.2025 22:15 | ||
CVE-2025-24151 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24152 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24153 | MEDIUM | 6.7 | 5.9 | 27.01.2025 22:15 | ||
CVE-2025-24154 | CRITICAL | 9.1 | 5.2 | 27.01.2025 22:15 | ||
CVE-2025-24155 | MEDIUM | 5.5 | 3.6 | 12.05.2025 22:15 | ||
CVE-2025-24156 | HIGH | 7.8 | 5.9 | 27.01.2025 22:15 | ||
CVE-2025-24158 | MEDIUM | 6.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24159 | HIGH | 7.8 | 5.9 | 27.01.2025 22:15 | ||
CVE-2025-24160 | MEDIUM | 4.3 | 1.4 | 27.01.2025 22:15 | ||
CVE-2025-24161 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24162 | MEDIUM | 6.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24163 | MEDIUM | 5.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24169 | HIGH | 7.5 | 3.6 | 27.01.2025 22:15 | ||
CVE-2025-24174 | HIGH | 7.7 | 5.2 | 27.01.2025 22:15 | ||
CVE-2025-24176 | HIGH | 7.1 | 5.2 | 27.01.2025 22:15 | ||
CVE-2025-24183 | MEDIUM | 5.5 | 3.6 | 19.05.2025 16:15 | ||
CVE-2025-24184 | MEDIUM | 5.5 | 3.6 | 19.05.2025 16:15 | ||
CVE-2025-24185 | MEDIUM | 5.5 | 3.6 | 17.03.2025 20:15 | ||
CVE-2025-24189 | HIGH | 8.8 | 5.9 | 19.05.2025 16:15 | ||
CVE-2025-24191 | MEDIUM | 5.5 | 3.6 | 31.03.2025 23:15 | ||
CVE-2025-24201 | HIGH | 8.8 | 5.9 | 11.03.2025 18:15 | ||
CVE-2025-24204 | CRITICAL | 9.8 | 5.9 | 31.03.2025 23:15 | ||
CVE-2025-24222 | MEDIUM | 6.5 | 3.6 | 12.05.2025 22:15 | ||
CVE-2025-24223 | HIGH | 8.0 | 5.9 | 12.05.2025 22:15 | ||
CVE-2025-24239 | MEDIUM | 6.5 | 3.6 | 31.03.2025 23:15 | ||
CVE-2025-24242 | MEDIUM | 4.4 | 3.6 | 31.03.2025 23:15 | ||
CVE-2025-24245 | CRITICAL | 9.8 | 5.9 | 31.03.2025 23:15 | ||
CVE-2025-24248 | MEDIUM | 5.0 | 3.4 | 31.03.2025 23:15 | ||
CVE-2025-24258 | HIGH | 7.8 | 5.9 | 12.05.2025 22:15 | ||
CVE-2025-24262 | MEDIUM | 5.5 | 3.6 | 31.03.2025 23:15 | ||
CVE-2025-24274 | HIGH | 7.8 | 5.9 | 12.05.2025 22:15 | ||
CVE-2025-24281 | MEDIUM | 5.5 | 3.6 | 31.03.2025 23:15 | ||
CVE-2025-24282 | MEDIUM | 5.5 | 3.6 | 31.03.2025 23:15 | ||
CVE-2025-30440 | MEDIUM | 5.5 | 3.6 | 12.05.2025 22:15 | ||
CVE-2025-30442 | HIGH | 7.8 | 5.9 | 12.05.2025 22:15 | ||
CVE-2025-30448 | CRITICAL | 9.1 | 5.2 | 12.05.2025 22:15 | ||
CVE-2025-30453 | HIGH | 7.8 | 5.9 | 12.05.2025 22:15 | ||
CVE-2025-30458 | CRITICAL | 9.8 | 5.9 | 31.03.2025 23:15 | ||
CVE-2025-30461 | CRITICAL | 9.8 | 5.9 | 31.03.2025 23:15 | ||
CVE-2025-30463 | MEDIUM | 5.5 | 3.6 | 31.03.2025 23:15 | ||
CVE-2025-30466 | CRITICAL | 9.8 | 5.9 | 29.05.2025 22:15 | ||
CVE-2025-30467 | MEDIUM | 4.3 | 1.4 | 31.03.2025 23:15 | ||
CVE-2025-30471 | HIGH | 7.5 | 3.6 | 31.03.2025 23:15 | ||
CVE-2025-31183 | CRITICAL | 9.8 | 5.9 | 31.03.2025 23:15 | ||
CVE-2025-31195 | MEDIUM | 6.3 | 4.0 | 12.05.2025 22:15 | ||
CVE-2025-31196 | MEDIUM | 5.5 | 3.6 | 12.05.2025 22:15 | ||
CVE-2025-31199 | MEDIUM | 5.5 | 3.6 | 29.05.2025 22:15 | ||
CVE-2025-31200 | MEDIUM | 6.8 | 5.2 | 16.04.2025 19:15 | ||
CVE-2025-31201 | HIGH | 7.5 | 5.9 | 16.04.2025 19:15 | ||
CVE-2025-31202 | MEDIUM | 5.5 | 3.6 | 29.04.2025 03:15 | ||
CVE-2025-31203 | MEDIUM | 6.5 | 3.6 | 29.04.2025 03:15 | ||
CVE-2025-31204 | HIGH | 8.8 | 5.9 | 12.05.2025 22:15 | ||
CVE-2025-31205 | MEDIUM | 6.5 | 3.6 | 12.05.2025 22:15 | ||
CVE-2025-31206 | MEDIUM | 4.3 | 1.4 | 12.05.2025 22:15 | ||
CVE-2025-31208 | HIGH | 7.5 | 3.6 | 12.05.2025 22:15 | ||
CVE-2025-31209 | MEDIUM | 6.3 | 3.4 | 12.05.2025 22:15 | ||
CVE-2025-31212 | MEDIUM | 5.5 | 3.6 | 12.05.2025 22:15 | ||
CVE-2025-31213 | HIGH | 7.6 | 4.7 | 12.05.2025 22:15 | ||
CVE-2025-31215 | MEDIUM | 6.5 | 3.6 | 12.05.2025 22:15 | ||
CVE-2025-31217 | MEDIUM | 6.5 | 3.6 | 12.05.2025 22:15 | ||
CVE-2025-31218 | MEDIUM | 6.2 | 3.6 | 12.05.2025 22:15 | ||
CVE-2025-31219 | HIGH | 7.1 | 4.2 | 12.05.2025 22:15 | ||
CVE-2025-31220 | MEDIUM | 5.5 | 3.6 | 12.05.2025 22:15 | ||
CVE-2025-31221 | HIGH | 7.5 | 3.6 | 12.05.2025 22:15 | ||
CVE-2025-31222 | HIGH | 7.8 | 5.9 | 12.05.2025 22:15 | ||
CVE-2025-31223 | HIGH | 8.0 | 5.9 | 12.05.2025 22:15 | ||
CVE-2025-31224 | HIGH | 7.8 | 5.9 | 12.05.2025 22:15 | ||
CVE-2025-31226 | MEDIUM | 5.5 | 3.6 | 12.05.2025 22:15 | ||
CVE-2025-31231 | MEDIUM | 5.5 | 3.6 | 29.05.2025 22:15 | ||
CVE-2025-31232 | HIGH | 7.1 | 4.2 | 12.05.2025 22:15 | ||
CVE-2025-31233 | MEDIUM | 6.3 | 3.4 | 12.05.2025 22:15 | ||
CVE-2025-31234 | HIGH | 8.2 | 4.2 | 12.05.2025 22:15 | ||
CVE-2025-31235 | MEDIUM | 6.5 | 4.0 | 12.05.2025 22:15 | ||
CVE-2025-31236 | MEDIUM | 5.5 | 3.6 | 12.05.2025 22:15 | ||
CVE-2025-31237 | HIGH | 7.5 | 3.6 | 12.05.2025 22:15 | ||
CVE-2025-31238 | HIGH | 7.3 | 3.4 | 12.05.2025 22:15 | ||
CVE-2025-31239 | LOW | 3.3 | 1.4 | 12.05.2025 22:15 | ||
CVE-2025-31240 | HIGH | 7.5 | 3.6 | 12.05.2025 22:15 | ||
CVE-2025-31241 | MEDIUM | 5.3 | 1.4 | 12.05.2025 22:15 | ||
CVE-2025-31242 | MEDIUM | 5.5 | 3.6 | 12.05.2025 22:15 | ||
CVE-2025-31244 | HIGH | 8.8 | 6.0 | 12.05.2025 22:15 | ||
CVE-2025-31245 | MEDIUM | 5.5 | 3.6 | 12.05.2025 22:15 | ||
CVE-2025-31246 | HIGH | 8.8 | 5.9 | 12.05.2025 22:15 | ||
CVE-2025-31247 | HIGH | 7.5 | 3.6 | 12.05.2025 22:15 | ||
CVE-2025-31249 | HIGH | 7.1 | 4.2 | 12.05.2025 22:15 | ||
CVE-2025-31250 | MEDIUM | 5.5 | 3.6 | 12.05.2025 22:15 | ||
CVE-2025-31251 | MEDIUM | 5.5 | 3.6 | 12.05.2025 22:15 | ||
CVE-2025-31256 | MEDIUM | 5.5 | 3.6 | 12.05.2025 22:15 | ||
CVE-2025-31257 | MEDIUM | 4.7 | 1.4 | 12.05.2025 22:15 | ||
CVE-2025-31258 | MEDIUM | 6.5 | 2.5 | 12.05.2025 22:15 | ||
CVE-2025-31259 | HIGH | 7.8 | 5.9 | 12.05.2025 22:15 | ||
CVE-2025-31260 | MEDIUM | 5.5 | 3.6 | 12.05.2025 22:15 | ||
CVE-2025-31262 | MEDIUM | 5.5 | 3.6 | 19.05.2025 16:15 | ||
CVE-2025-31263 | CRITICAL | 9.1 | 5.2 | 29.05.2025 22:15 | ||
CVE-2025-43200 | MEDIUM | 4.8 | 2.5 | 16.06.2025 22:16 |
Showing 5 out of 484.
Similar certificates
Showing 5 out of 7.
Scheme data ?
Product | Strong Customer Authentication for Apple Pay on MacBook Air 2024 with M3 running macOS Sonoma 14.4 | |
---|---|---|
Product Link | https://oc.ccn.cni.es/en/certified-products/certified-products/1046-strong-customer-authentication-for-apple-pay-on-macbook-air-2024-with-m3-running-macos-sonoma-14-4 | |
Category | Otras herramientas | |
Manufacturer | Apple Inc. | |
Certification Date | 23.05.2025 | |
Enhanced | ||
Description | The TOE platform includes the components implementing Strong Customer Authentication (SCA) and Dynamic Linking for Apple Pay. User authentication is managed by the Secure Enclave. The Secure Enclave is a dedicated secure subsystem integrated into Apple systems on chip (SoCs). The Secure Enclave is isolated from the main processor to provide an extra layer of security and is designed to keep sensitive user data secure even when the Application Processor kernel becomes compromised. The macOS operating system also allows the Apple Pay services and other security functions of the TOE to operate. The Secure Element (outside of the TOE) is the secure component holding the Apple Pay secrets and processes the Apple Pay transactions. | |
Category | Otras herramientas | |
Manufacturer | Apple Inc. | |
Type | Product | |
Evaluation Facility | Applus Laboratories | |
Status | Certified | |
Certification Date | 23.05.2025 | |
Cc Version | CC/CEM:2022 Release 1 | |
Level | EAL2 + ADV_FSP.3, ALC_FLR.3 | |
Target Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2183 | |
Cert Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2184 | |
Report Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2185 |
References
No references are available for this certificate.
Updates
-
21.07.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'enhanced': {'__update__': {'cc_version': 'CC/CEM:2022 Release 1'}}}
data.
- The scheme_data property was updated, with the
-
14.07.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2025-24278', 'CVE-2025-31189', 'CVE-2024-40864', 'CVE-2025-24199', 'CVE-2025-24181', 'CVE-2025-24170', 'CVE-2025-24148', 'CVE-2025-24231', 'CVE-2025-24230', 'CVE-2025-24164', 'CVE-2025-30465', 'CVE-2025-30450', 'CVE-2025-24267', 'CVE-2025-24243', 'CVE-2025-24249', 'CVE-2025-24233', 'CVE-2025-24254', 'CVE-2025-24203', 'CVE-2025-24259', 'CVE-2025-30424', 'CVE-2025-24276', 'CVE-2025-24252', 'CVE-2025-24250', 'CVE-2025-24244', 'CVE-2025-24211', 'CVE-2025-24210', 'CVE-2025-31191', 'CVE-2025-24232', 'CVE-2025-24172', 'CVE-2025-30452', 'CVE-2025-31264', 'CVE-2025-24279', 'CVE-2025-24206', 'CVE-2025-24271', 'CVE-2025-24235', 'CVE-2025-24251', 'CVE-2025-24179', 'CVE-2025-24157', 'CVE-2025-24261', 'CVE-2025-31198', 'CVE-2025-24173', 'CVE-2025-24228', 'CVE-2025-31261', 'CVE-2025-30433', 'CVE-2025-24195', 'CVE-2025-24190', 'CVE-2025-24229', 'CVE-2025-30454', 'CVE-2025-24196', 'CVE-2025-31187', 'CVE-2025-30445', 'CVE-2025-24241', 'CVE-2025-24272', 'CVE-2025-24205', 'CVE-2025-24178', 'CVE-2025-24212', 'CVE-2025-30443', 'CVE-2025-24247', 'CVE-2025-24255', 'CVE-2025-24234', 'CVE-2025-30444', 'CVE-2024-54533', 'CVE-2025-30446', 'CVE-2025-30470', 'CVE-2025-24260', 'CVE-2025-30456', 'CVE-2025-24215', 'CVE-2025-24237', 'CVE-2025-24111', 'CVE-2025-30462', 'CVE-2025-30464', 'CVE-2025-30449', 'CVE-2025-24236', 'CVE-2025-24270', 'CVE-2025-31197', 'CVE-2025-24240', 'CVE-2025-24238', 'CVE-2025-30432', 'CVE-2025-24265', 'CVE-2025-31188', 'CVE-2025-30457', 'CVE-2025-30438', 'CVE-2025-24280', 'CVE-2025-24273', 'CVE-2025-24266', 'CVE-2025-30447', 'CVE-2025-24256', 'CVE-2025-24246', 'CVE-2025-31182', 'CVE-2025-30460', 'CVE-2025-24253', 'CVE-2025-24198', 'CVE-2025-30455', 'CVE-2025-31194', 'CVE-2025-24207', 'CVE-2025-24277']}
values discarded.
- The related_cves property was updated, with the
-
07.07.2025 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Strong Customer Authentication for Apple Pay on MacBookAir 2024 with M3 running macOS Sonoma 14.4 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": null,
"dgst": "7f472d3b9c5a3726",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "2024-11-INF-4471",
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:apple:macos:14.4:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"eal": "EAL2",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"14.4"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2024-40861",
"CVE-2025-24174",
"CVE-2025-24096",
"CVE-2024-40795",
"CVE-2024-44172",
"CVE-2024-44257",
"CVE-2024-40811",
"CVE-2024-44216",
"CVE-2025-31183",
"CVE-2025-31215",
"CVE-2024-27805",
"CVE-2024-40783",
"CVE-2024-44267",
"CVE-2025-31260",
"CVE-2024-54473",
"CVE-2025-24109",
"CVE-2024-44151",
"CVE-2024-54527",
"CVE-2024-44282",
"CVE-2024-54522",
"CVE-2024-40801",
"CVE-2024-40826",
"CVE-2024-54516",
"CVE-2024-44220",
"CVE-2024-54518",
"CVE-2024-54479",
"CVE-2024-44239",
"CVE-2024-54520",
"CVE-2025-31213",
"CVE-2025-24140",
"CVE-2025-24144",
"CVE-2024-44144",
"CVE-2025-24281",
"CVE-2024-40779",
"CVE-2024-54557",
"CVE-2025-31249",
"CVE-2024-40782",
"CVE-2025-31247",
"CVE-2024-27823",
"CVE-2024-40821",
"CVE-2024-54513",
"CVE-2024-54478",
"CVE-2025-24201",
"CVE-2024-27843",
"CVE-2024-54510",
"CVE-2024-44189",
"CVE-2025-24118",
"CVE-2024-54560",
"CVE-2024-44301",
"CVE-2024-27813",
"CVE-2024-23251",
"CVE-2024-27802",
"CVE-2024-40784",
"CVE-2024-54526",
"CVE-2025-31224",
"CVE-2025-31262",
"CVE-2024-44196",
"CVE-2024-40807",
"CVE-2025-24245",
"CVE-2024-23236",
"CVE-2025-24183",
"CVE-2024-40855",
"CVE-2024-44306",
"CVE-2024-54469",
"CVE-2024-44305",
"CVE-2024-54468",
"CVE-2024-40810",
"CVE-2024-27800",
"CVE-2025-24239",
"CVE-2024-40792",
"CVE-2024-40866",
"CVE-2024-54542",
"CVE-2024-54530",
"CVE-2025-24160",
"CVE-2024-40831",
"CVE-2024-44123",
"CVE-2024-54499",
"CVE-2024-44203",
"CVE-2024-40805",
"CVE-2025-30453",
"CVE-2024-27818",
"CVE-2024-54466",
"CVE-2025-31257",
"CVE-2024-27877",
"CVE-2024-40804",
"CVE-2024-54474",
"CVE-2024-40775",
"CVE-2024-40828",
"CVE-2024-40842",
"CVE-2025-24145",
"CVE-2024-27882",
"CVE-2024-40774",
"CVE-2024-54491",
"CVE-2024-44159",
"CVE-2024-54538",
"CVE-2024-54506",
"CVE-2025-24120",
"CVE-2024-54546",
"CVE-2025-30467",
"CVE-2001-0102",
"CVE-2025-24127",
"CVE-2024-40854",
"CVE-2024-44247",
"CVE-2025-24274",
"CVE-2024-44153",
"CVE-2025-30466",
"CVE-2025-31199",
"CVE-2024-54529",
"CVE-2024-4558",
"CVE-2024-40777",
"CVE-2025-31231",
"CVE-2024-27850",
"CVE-2024-54528",
"CVE-2024-44148",
"CVE-2024-44233",
"CVE-2024-27885",
"CVE-2024-27804",
"CVE-2024-44201",
"CVE-2024-54525",
"CVE-2025-24191",
"CVE-2025-24129",
"CVE-2024-40836",
"CVE-2024-44175",
"CVE-2024-40827",
"CVE-2024-44174",
"CVE-2024-44237",
"CVE-2024-54492",
"CVE-2025-24137",
"CVE-2024-54565",
"CVE-2024-44297",
"CVE-2025-31244",
"CVE-2024-44302",
"CVE-2024-40796",
"CVE-2025-31222",
"CVE-2025-31195",
"CVE-2024-44170",
"CVE-2024-44222",
"CVE-2024-44269",
"CVE-2025-31218",
"CVE-2024-54549",
"CVE-2024-23237",
"CVE-2024-44152",
"CVE-2024-40812",
"CVE-2025-24086",
"CVE-2024-54507",
"CVE-2025-24138",
"CVE-2024-54508",
"CVE-2025-31233",
"CVE-2024-27861",
"CVE-2025-24150",
"CVE-2025-24130",
"CVE-2025-24085",
"CVE-2025-30448",
"CVE-2024-40778",
"CVE-2024-44133",
"CVE-2025-30463",
"CVE-2024-27825",
"CVE-2025-24156",
"CVE-2024-44244",
"CVE-2025-24107",
"CVE-2024-40802",
"CVE-2025-31235",
"CVE-2024-40791",
"CVE-2024-44236",
"CVE-2024-27881",
"CVE-2024-54501",
"CVE-2024-44198",
"CVE-2024-44270",
"CVE-2024-27806",
"CVE-2024-27836",
"CVE-2025-24242",
"CVE-2024-40846",
"CVE-2024-40787",
"CVE-2024-40834",
"CVE-2024-40859",
"CVE-2024-54514",
"CVE-2024-44296",
"CVE-2025-31226",
"CVE-2024-40797",
"CVE-2024-27851",
"CVE-2025-24143",
"CVE-2025-24113",
"CVE-2024-40847",
"CVE-2024-44176",
"CVE-2025-24136",
"CVE-2024-54475",
"CVE-2025-24100",
"CVE-2024-27826",
"CVE-2025-24087",
"CVE-2024-40835",
"CVE-2024-54490",
"CVE-2025-31259",
"CVE-2025-24116",
"CVE-2025-24176",
"CVE-2025-24106",
"CVE-2024-27860",
"CVE-2024-44137",
"CVE-2024-54498",
"CVE-2024-44284",
"CVE-2024-44146",
"CVE-2025-24135",
"CVE-2025-30458",
"CVE-2024-54505",
"CVE-2024-44264",
"CVE-2024-44184",
"CVE-2024-40856",
"CVE-2024-44145",
"CVE-2024-54471",
"CVE-2024-54550",
"CVE-2025-24121",
"CVE-2024-44254",
"CVE-2024-40823",
"CVE-2024-40843",
"CVE-2024-44227",
"CVE-2024-27801",
"CVE-2024-40816",
"CVE-2024-27858",
"CVE-2024-27837",
"CVE-2024-27869",
"CVE-2025-24114",
"CVE-2025-43200",
"CVE-2025-30461",
"CVE-2024-44160",
"CVE-2025-24149",
"CVE-2025-31221",
"CVE-2025-24101",
"CVE-2024-27871",
"CVE-2024-44225",
"CVE-2024-44156",
"CVE-2025-31236",
"CVE-2024-44169",
"CVE-2025-24103",
"CVE-2024-44155",
"CVE-2024-44178",
"CVE-2024-40848",
"CVE-2024-40844",
"CVE-2025-30440",
"CVE-2025-31240",
"CVE-2024-54564",
"CVE-2024-40860",
"CVE-2024-44224",
"CVE-2024-40776",
"CVE-2025-31258",
"CVE-2024-54493",
"CVE-2025-31245",
"CVE-2024-54517",
"CVE-2024-44213",
"CVE-2025-24097",
"CVE-2024-44197",
"CVE-2024-27798",
"CVE-2024-40818",
"CVE-2024-40824",
"CVE-2024-54541",
"CVE-2024-27838",
"CVE-2024-44128",
"CVE-2024-40781",
"CVE-2024-44273",
"CVE-2024-54515",
"CVE-2025-24108",
"CVE-2024-27855",
"CVE-2024-23282",
"CVE-2024-40838",
"CVE-2024-40798",
"CVE-2024-54519",
"CVE-2024-44164",
"CVE-2024-44287",
"CVE-2025-31220",
"CVE-2024-40814",
"CVE-2024-54484",
"CVE-2025-24115",
"CVE-2024-54537",
"CVE-2024-44291",
"CVE-2024-40794",
"CVE-2024-40780",
"CVE-2025-31242",
"CVE-2024-54531",
"CVE-2024-27876",
"CVE-2025-24162",
"CVE-2024-44181",
"CVE-2024-54536",
"CVE-2025-31209",
"CVE-2025-24153",
"CVE-2025-24099",
"CVE-2024-44307",
"CVE-2025-31251",
"CVE-2024-54494",
"CVE-2025-31234",
"CVE-2024-40817",
"CVE-2025-24158",
"CVE-2024-44134",
"CVE-2025-24128",
"CVE-2025-31223",
"CVE-2024-27832",
"CVE-2025-24102",
"CVE-2024-44232",
"CVE-2024-44186",
"CVE-2024-54534",
"CVE-2024-54543",
"CVE-2024-44265",
"CVE-2023-38709",
"CVE-2025-24126",
"CVE-2024-44177",
"CVE-2025-24131",
"CVE-2024-40793",
"CVE-2024-40832",
"CVE-2024-40789",
"CVE-2025-31204",
"CVE-2024-44218",
"CVE-2024-44234",
"CVE-2025-24159",
"CVE-2024-27817",
"CVE-2024-44190",
"CVE-2025-24161",
"CVE-2025-31206",
"CVE-2024-54497",
"CVE-2024-40771",
"CVE-2025-24122",
"CVE-2025-24184",
"CVE-2024-27841",
"CVE-2024-27834",
"CVE-2024-40799",
"CVE-2024-54476",
"CVE-2024-44192",
"CVE-2024-40815",
"CVE-2024-54551",
"CVE-2024-54558",
"CVE-2024-27875",
"CVE-2024-27795",
"CVE-2024-27811",
"CVE-2024-27857",
"CVE-2024-44185",
"CVE-2025-24248",
"CVE-2024-44206",
"CVE-2024-27816",
"CVE-2024-40825",
"CVE-2024-44245",
"CVE-2024-44188",
"CVE-2024-54463",
"CVE-2025-24124",
"CVE-2025-24189",
"CVE-2024-44126",
"CVE-2024-54547",
"CVE-2024-24795",
"CVE-2024-44122",
"CVE-2024-44280",
"CVE-2024-27856",
"CVE-2024-44167",
"CVE-2025-24204",
"CVE-2024-54488",
"CVE-2024-44179",
"CVE-2024-44163",
"CVE-2025-24223",
"CVE-2024-40822",
"CVE-2025-24112",
"CVE-2025-24134",
"CVE-2024-44131",
"CVE-2024-40850",
"CVE-2024-54539",
"CVE-2024-54504",
"CVE-2025-24154",
"CVE-2024-44125",
"CVE-2025-31219",
"CVE-2025-31239",
"CVE-2025-31250",
"CVE-2024-27884",
"CVE-2024-40845",
"CVE-2024-54500",
"CVE-2025-31201",
"CVE-2024-44182",
"CVE-2024-44300",
"CVE-2025-31263",
"CVE-2024-27842",
"CVE-2024-44168",
"CVE-2025-24093",
"CVE-2024-44158",
"CVE-2025-24123",
"CVE-2024-40800",
"CVE-2024-44183",
"CVE-2024-40833",
"CVE-2024-27830",
"CVE-2024-40770",
"CVE-2025-31217",
"CVE-2024-1580",
"CVE-2025-31212",
"CVE-2024-44294",
"CVE-2024-27822",
"CVE-2024-44141",
"CVE-2024-54465",
"CVE-2024-44199",
"CVE-2024-27862",
"CVE-2024-54559",
"CVE-2024-27824",
"CVE-2024-27815",
"CVE-2024-44149",
"CVE-2025-24117",
"CVE-2024-27844",
"CVE-2025-24142",
"CVE-2025-31203",
"CVE-2024-27827",
"CVE-2024-40803",
"CVE-2024-44187",
"CVE-2024-40788",
"CVE-2024-54477",
"CVE-2024-40809",
"CVE-2025-24152",
"CVE-2025-24169",
"CVE-2024-40841",
"CVE-2025-30442",
"CVE-2025-24163",
"CVE-2024-27810",
"CVE-2024-54495",
"CVE-2024-44208",
"CVE-2025-24139",
"CVE-2025-31238",
"CVE-2025-24185",
"CVE-2024-44240",
"CVE-2024-27883",
"CVE-2024-44154",
"CVE-2024-44253",
"CVE-2024-27799",
"CVE-2024-44308",
"CVE-2024-27849",
"CVE-2024-54486",
"CVE-2025-31208",
"CVE-2024-54509",
"CVE-2024-54467",
"CVE-2025-24155",
"CVE-2024-44260",
"CVE-2024-44130",
"CVE-2025-31241",
"CVE-2024-40785",
"CVE-2024-40837",
"CVE-2024-44295",
"CVE-2024-44256",
"CVE-2025-31246",
"CVE-1999-0590",
"CVE-2024-44132",
"CVE-2024-44165",
"CVE-2024-44255",
"CVE-2025-31200",
"CVE-2025-24092",
"CVE-2024-27880",
"CVE-2024-44248",
"CVE-2025-24094",
"CVE-2024-27872",
"CVE-2025-30471",
"CVE-2025-31256",
"CVE-2024-44279",
"CVE-2024-27848",
"CVE-2024-44135",
"CVE-2024-27878",
"CVE-2025-24262",
"CVE-2024-27873",
"CVE-2024-44205",
"CVE-2024-27796",
"CVE-2024-27847",
"CVE-2024-44278",
"CVE-2024-27829",
"CVE-2024-44281",
"CVE-2024-27821",
"CVE-2025-24258",
"CVE-2025-24222",
"CVE-2025-24282",
"CVE-2025-31232",
"CVE-2024-27863",
"CVE-2024-44161",
"CVE-2024-44275",
"CVE-2024-44166",
"CVE-2025-24146",
"CVE-2024-27831",
"CVE-2024-44191",
"CVE-2025-31202",
"CVE-2025-31196",
"CVE-2024-44283",
"CVE-2024-44215",
"CVE-2024-54489",
"CVE-2025-24151",
"CVE-2024-44289",
"CVE-2025-31205",
"CVE-2024-27808",
"CVE-2024-27820",
"CVE-2024-40857",
"CVE-2025-31237",
"CVE-2024-54523"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "Otras herramientas",
"certification_date": "2025-05-23",
"enhanced": {
"category": "Otras herramientas",
"cc_version": "CC/CEM:2022 Release 1",
"cert_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2184",
"certification_date": "2025-05-23",
"description": "The TOE platform includes the components implementing Strong Customer Authentication (SCA) and Dynamic Linking for Apple Pay. User authentication is managed by the Secure Enclave. The Secure Enclave is a dedicated secure subsystem integrated into Apple systems on chip (SoCs). The Secure Enclave is isolated from the main processor to provide an extra layer of security and is designed to keep sensitive user data secure even when the Application Processor kernel becomes compromised. The macOS operating system also allows the Apple Pay services and other security functions of the TOE to operate. The Secure Element (outside of the TOE) is the secure component holding the Apple Pay secrets and processes the Apple Pay transactions.",
"evaluation_facility": "Applus Laboratories",
"level": "EAL2 + ADV_FSP.3, ALC_FLR.3",
"manufacturer": "Apple Inc.",
"report_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2185",
"status": "Certified",
"target_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2183",
"type": "Product"
},
"manufacturer": "Apple Inc.",
"product": "Strong Customer Authentication for Apple Pay on MacBook Air 2024 with M3 running macOS Sonoma 14.4",
"product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/1046-strong-customer-authentication-for-apple-pay-on-macbook-air-2024-with-m3-running-macos-sonoma-14-4"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Apple Inc.",
"manufacturer_web": null,
"name": "Strong Customer Authentication for Apple Pay on MacBookAir 2024 with M3 running macOS Sonoma 14.4",
"not_valid_after": "2030-05-23",
"not_valid_before": "2025-05-23",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "2024-11 CERTIFICATION REPORT.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"ES": {
"2024-11-INF-4471- v1": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.3": 8,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_DEL.1": 1,
"ALC_FLR": 3,
"ALC_FLR.3": 8
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_INT.1": 1,
"ASE_REQ.2": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 1,
"EAL 4": 2,
"EAL2": 9
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC": 3,
"FDP_ACF": 3,
"FDP_DAU.1": 1,
"FDP_ETC": 1,
"FDP_ITC.1": 1,
"FDP_ITT.1": 1,
"FDP_RIP.1": 1,
"FDP_UCT": 2,
"FDP_UIT": 2
},
"FIA": {
"FIA_AFL": 2,
"FIA_ATD.1": 1,
"FIA_UAU.5": 1,
"FIA_UAU.6": 1,
"FIA_UID.2": 1
},
"FMT": {
"FMT_MSA.3": 1,
"FMT_MTD.1": 1,
"FMT_SMR.1": 1
},
"FPR": {
"FPR_UNO.1": 1
},
"FPT": {
"FPT_ITC.1": 1,
"FPT_RPL": 2
},
"FTP": {
"FTP_ITC": 2
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Applus": {
"Applus Laboratories": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "9308",
"/CreationDate": "D:20250704122401+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word LTSC",
"/ModDate": "D:20250704122401+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word LTSC",
"pdf_file_size_bytes": 518600,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 16
},
"st_filename": "[ST] MacBook_M3_macOS14_SecurityTarget_v8.0.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.DEVICE_AUTH": 3,
"A.NO_EVIL_ROOT_USER": 3,
"A.NO_EXTERNAL_KEY-": 1,
"A.NO_EXTERNAL_KEYBOARD": 1,
"A.PERSO": 4,
"A.WATCH_USER": 4
},
"D": {
"D.OS": 17,
"D.SEP_SE": 3
},
"T": {
"T.CORRUPT": 4,
"T.PHYSICAL": 2,
"T.RECOVER": 4,
"T.REPLAY": 2,
"T.SILENT": 3,
"T.SKIM-": 1,
"T.SKIMMING": 2,
"T.USURP": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 3,
"ADV_FSP.1": 2,
"ADV_FSP.2": 4,
"ADV_FSP.3": 3,
"ADV_TDS.1": 4
},
"AGD": {
"AGD_OPE.1": 4,
"AGD_PRE.1": 4
},
"ALC": {
"ALC_CMC.2": 2,
"ALC_CMS.2": 2,
"ALC_DEL.1": 2,
"ALC_FLR": 1,
"ALC_FLR.3": 3
},
"ASE": {
"ASE_CCL.1": 2,
"ASE_ECD.1": 3,
"ASE_INT.1": 2,
"ASE_OBJ.2": 2,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 1,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_COV.1": 4,
"ATE_FUN.1": 3,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 2 augmented": 1,
"EAL2": 1
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC": 25,
"FDP_ACC.1": 10,
"FDP_ACC.2": 4,
"FDP_ACC.2.1": 1,
"FDP_ACC.2.2": 1,
"FDP_ACF": 23,
"FDP_ACF.1": 12,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_DAU.1": 4,
"FDP_DAU.1.1": 1,
"FDP_DAU.1.2": 1,
"FDP_ETC": 8,
"FDP_ETC.2": 2,
"FDP_ETC.2.1": 2,
"FDP_ETC.2.2": 2,
"FDP_ETC.2.3": 2,
"FDP_ETC.2.4": 2,
"FDP_IFC.1": 9,
"FDP_ITC.1": 4,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITT.1": 4,
"FDP_ITT.1.1": 1,
"FDP_RIP.1": 13,
"FDP_RIP.1.1": 1,
"FDP_SDI.1": 9,
"FDP_SDI.1.1": 1,
"FDP_UCT": 10,
"FDP_UCT.1": 1,
"FDP_UCT.1.1": 1,
"FDP_UIT": 10,
"FDP_UIT.1": 2,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL": 12,
"FIA_AFL.1": 1,
"FIA_AFL.1.1": 3,
"FIA_AFL.1.2": 3,
"FIA_ATD.1": 5,
"FIA_ATD.1.1": 2,
"FIA_SOS.2": 4,
"FIA_SOS.2.1": 1,
"FIA_SOS.2.2": 1,
"FIA_UAU.1": 1,
"FIA_UAU.2": 11,
"FIA_UAU.2.1": 1,
"FIA_UAU.5": 5,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 11,
"FIA_UAU.6.1": 2,
"FIA_UID.1": 1,
"FIA_UID.2": 6,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MSA.1": 6,
"FMT_MSA.1.1": 2,
"FMT_MSA.3": 14,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 4,
"FMT_MTD.1.1": 1,
"FMT_MTD.3": 4,
"FMT_MTD.3.1": 1,
"FMT_SMF.1": 6,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 10,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 16,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_ITC.1": 4,
"FPT_ITC.1.1": 1,
"FPT_RPL": 8,
"FPT_RPL.1": 6
},
"FTP": {
"FTP_ITC": 14,
"FTP_ITC.1": 7,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 4
}
},
"certification_process": {
"OutOfScope": {
"Element of the device is separately certified according to the Common Criteria and is therefore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by": 1,
"out of scope": 2,
"pected to return to its User. Note: Defending against device re-use after physical compromise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* Strong Customer": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 2,
"TLS 1.2": 1
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 1,
"FIPS 140-3": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 4
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20241118103634+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2013",
"/ModDate": "D:20241118103634+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2013",
"pdf_file_size_bytes": 1296359,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://support.apple.com/en-us/HT204587",
"https://checkcoverage.apple.com/",
"https://support.apple.com/HT201222",
"https://support.apple.com/guide/security/welcome/web",
"https://support.apple.com/HT202860",
"https://support.apple.com/HT204899",
"https://support.apple.com/guide/macbook-air",
"https://support.apple.com/HT212190",
"https://support.apple.com/en-us/HT201581",
"https://support.apple.com/HT212225",
"https://lists.apple.com/mailman/listinfo/security-announce/",
"https://support.apple.com/guide/certifications/apple-pay-security-certifications-apc3a0db329f/web",
"https://support.apple.com/HT201220",
"https://support.apple.com/HT201862",
"https://support.apple.com/HT201221",
"https://support.apple.com/en-gb/guide/personal-safety/ipsd0a253dd5/1.0/web/1.0",
"https://www.apple.com/",
"https://support.apple.com/apple-pay",
"https://support.apple.com/HT201260",
"https://support.apple.com/HT201371",
"https://support.apple.com/102664",
"https://support.apple.com/102633",
"https://developer.apple.com/documentation/security/",
"https://support.apple.com/HT201541"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 53
}
},
"protection_profile_links": null,
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/2024-11%20CERTIFICATION%20REPORT.pdf",
"scheme": "ES",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.3",
"ADV_FSP.3",
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/[ST]%20MacBook_M3_macOS14_SecurityTarget_v8.0.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "71c3f8433ad1c9c3ceac924f0d9c39ca3eb36f9c676d51d46345479f1130dd9d",
"txt_hash": "f418d211683df53f0bc39042b3277c0b1344da41ec82958be0f92b8e7ed98407"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "edd6fc17ef47fa46a3b5484383efcdb0df22c86d0dfad5c29dc5e935fcc683af",
"txt_hash": "64066491753b81e5ca54ef1b1fd0f2772c16be1056f2163d3d2151c3c270bf4f"
}
},
"status": "active"
}