Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1iOS 16.4.1 (build 20E252) (ANSSI-CC-2023/58)

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status active
Valid from 28.12.2023
Valid until 28.12.2028
Scheme 🇫🇷 FR
Manufacturer Apple Inc.
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ADV_FSP.3, EAL2+

Heuristics summary ?

Certificate ID: ANSSI-CC-2023/58

Certificate ?

Extracted keywords

Trusted Execution Environments
SE

Security level
EAL2
Security Assurance Requirements (SAR)
ADV_FSP.3
Certificates
ANSSI-CC-2023/58
Evaluation facilities
THALES/CNES

File metadata

Creation date D:20240222154440+01'00'
Modification date D:20240222155211+01'00'
Pages 2
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

Certification report ?

Extracted keywords

Trusted Execution Environments
SE

Security level
EAL2, EAL4, EAL2 augmented, ITSEC E3 Basic
Security Assurance Requirements (SAR)
ADV_FSP.3, ALC_FLR
Certificates
ANSSI-CC-2023/58
Evaluation facilities
THALES/CNES

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Creation date D:20240222154309+01'00'
Modification date D:20240222155212+01'00'
Pages 13
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

Security target ?

Extracted keywords

Symmetric Algorithms
AES
Asymmetric Algorithms
ECDH
Schemes
MAC
Protocols
TLS
Elliptic Curves
P-256

Trusted Execution Environments
SE

Security level
EAL 2, EAL2, EAL 2 augmented
Claims
D.OS, D.SEP_SE, T.COR-, T.PHYSI-, T.RECOVER, T.REPLAY, T.SILENT, T.SKIM-, T.USURP, T.SKIMMING, T.CORRUPT, T.PHYSICAL, A.DEVICE_AUTH, A.PERSO, A.CDCVM, A.DE-, OE.CDCVM
Security Assurance Requirements (SAR)
ADV_FSP, ADV_ARC.1, ADV_FSP.3, ADV_TDS.1, ADV_FSP.2, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1
Security Functional Requirements (SFR)
FDP_DAU.1, FDP_DAU.1.1, FDP_DAU.1.2, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_ITT.1, FDP_ITT.1.1, FDP_ETC, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_UCT, FDP_UCT.1, FDP_UIT, FDP_UIT.1, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.1.1, FDP_ACC.1, FDP_IFC.1, FDP_ETC.2, FIA_UID.2, FIA_UID.2.1, FIA_UAU.2, FIA_UAU.2.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_AFL.1, FIA_AFL, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.6.1, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU.1, FIA_UID.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1.1, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.3, FMT_MTD.3.1, FPR_UNO.1, FPR_UNO.1.1, FPT_ITC.1, FPT_ITC.1.1, FPT_RPL, FPT_RPL.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Certification process
out of scope, Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by, to return to its User. Note: Defending against device re-use after physical com- promise is out of scope. D.User_Passcode D.User_Bio D.Card_Data T.RECOVER Card Re- covery An attacker attempts to recover

Certification process
out of scope, Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by, to return to its User. Note: Defending against device re-use after physical com- promise is out of scope. D.User_Passcode D.User_Bio D.Card_Data T.RECOVER Card Re- covery An attacker attempts to recover

Standards
FIPS 140-3

File metadata

Title Microsoft Word - [ST] iPhone_A15Bionic_iPhoneSE3_iOS16_SecurityTarget_v1.4.docx
Creation date D:20231108181326Z
Modification date D:20231108181351Z
Pages 51
Creator Word
Producer Adobe Mac PDF Plug-in

Heuristics ?

Certificate ID: ANSSI-CC-2023/58

Extracted SARs

ALC_CMC.2, ADV_FSP.3, ASE_CCL.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, AGD_OPE.1, ADV_TDS.1, ALC_CMS.2, ASE_OBJ.2, ATE_IND.2, ALC_DEL.1, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, AGD_PRE.1, ASE_ECD.1, ASE_SPD.1, AVA_VAN.2

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2022-3970
C M N
HIGH 8.8 5.9 13.11.2022 08:15
CVE-2023-27930
C M N
HIGH 7.8 5.9 23.06.2023 18:15
CVE-2023-28191
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-28202
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-28204
C M N
MEDIUM 6.5 3.6 23.06.2023 18:15
CVE-2023-32352
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32354
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32357
C M N
HIGH 7.1 5.2 23.06.2023 18:15
CVE-2023-32359
C M N
HIGH 7.5 3.6 25.10.2023 19:15
CVE-2023-32361
C M N
MEDIUM 5.5 3.6 27.09.2023 15:18
CVE-2023-32365
C M N
LOW 2.4 1.4 23.06.2023 18:15
CVE-2023-32367
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32368
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32371
C M N
MEDIUM 6.3 4.0 23.06.2023 18:15
CVE-2023-32372
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32373
C M N
HIGH 8.8 5.9 23.06.2023 18:15
CVE-2023-32376
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32381
C M N
HIGH 7.8 5.9 27.07.2023 00:15
CVE-2023-32384
C M N
HIGH 7.8 5.9 23.06.2023 18:15
CVE-2023-32385
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32388
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32389
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32390
C M N
LOW 2.4 1.4 23.06.2023 18:15
CVE-2023-32391
C M N
MEDIUM 4.6 3.6 23.06.2023 18:15
CVE-2023-32392
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32394
C M N
LOW 2.4 1.4 23.06.2023 18:15
CVE-2023-32396
C M N
HIGH 7.8 5.9 27.09.2023 15:18
CVE-2023-32398
C M N
HIGH 7.8 5.9 23.06.2023 18:15
CVE-2023-32399
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32400
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32402
C M N
MEDIUM 6.5 3.6 23.06.2023 18:15
CVE-2023-32403
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32404
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32407
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32408
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32409
C M N
HIGH 8.6 4.0 23.06.2023 18:15
CVE-2023-32411
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32412
C M N
CRITICAL 9.8 5.9 23.06.2023 18:15
CVE-2023-32413
C M N
HIGH 7.0 5.9 23.06.2023 18:15
CVE-2023-32415
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32416
C M N
MEDIUM 5.5 3.6 27.07.2023 01:15
CVE-2023-32419
C M N
CRITICAL 9.8 5.9 23.06.2023 18:15
CVE-2023-32420
C M N
HIGH 7.1 5.2 23.06.2023 18:15
CVE-2023-32422
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32423
C M N
MEDIUM 6.5 3.6 23.06.2023 18:15
CVE-2023-32425
C M N
HIGH 7.8 5.9 06.09.2023 02:15
CVE-2023-32428
C M N
HIGH 7.8 5.9 06.09.2023 02:15
CVE-2023-32432
C M N
MEDIUM 5.5 3.6 06.09.2023 02:15
CVE-2023-32433
C M N
HIGH 7.8 5.9 27.07.2023 00:15
CVE-2023-32434
C M N
HIGH 7.8 5.9 23.06.2023 18:15
CVE-2023-32437
C M N
HIGH 8.6 6.0 27.07.2023 00:15
CVE-2023-32439
C M N
HIGH 8.8 5.9 23.06.2023 18:15
CVE-2023-32441
C M N
HIGH 7.8 5.9 27.07.2023 01:15
CVE-2023-32445
C M N
MEDIUM 6.1 2.7 28.07.2023 05:15
CVE-2023-32734
C M N
HIGH 7.8 5.9 27.07.2023 01:15
CVE-2023-34352
C M N
MEDIUM 5.3 1.4 06.09.2023 02:15
CVE-2023-34425
C M N
CRITICAL 9.8 5.9 28.07.2023 05:15
CVE-2023-35074
C M N
HIGH 8.8 5.9 27.09.2023 15:18
CVE-2023-35984
C M N
MEDIUM 4.3 3.4 27.09.2023 15:18
CVE-2023-35990
C M N
LOW 3.3 1.4 27.09.2023 15:18
CVE-2023-35993
C M N
HIGH 7.8 5.9 27.07.2023 01:15
CVE-2023-36495
C M N
CRITICAL 9.8 5.9 28.07.2023 05:15
CVE-2023-37450
C M N
HIGH 8.8 5.9 27.07.2023 00:15
CVE-2023-38133
C M N
MEDIUM 6.5 3.6 27.07.2023 00:15
CVE-2023-38136
C M N
HIGH 7.8 5.9 27.07.2023 01:15
CVE-2023-38261
C M N
HIGH 7.8 5.9 27.07.2023 01:15
CVE-2023-38410
C M N
HIGH 7.8 5.9 27.07.2023 00:15
CVE-2023-38424
C M N
HIGH 7.8 5.9 27.07.2023 01:15
CVE-2023-38425
C M N
HIGH 7.2 5.9 27.07.2023 01:15
CVE-2023-38565
C M N
HIGH 7.8 5.9 27.07.2023 01:15
CVE-2023-38572
C M N
HIGH 7.5 3.6 27.07.2023 01:15
CVE-2023-38580
C M N
HIGH 7.8 5.9 27.07.2023 01:15
CVE-2023-38590
C M N
HIGH 8.8 5.9 28.07.2023 05:15
CVE-2023-38592
C M N
HIGH 8.8 5.9 28.07.2023 05:15
CVE-2023-38593
C M N
MEDIUM 5.5 3.6 27.07.2023 01:15
CVE-2023-38594
C M N
HIGH 8.8 5.9 27.07.2023 00:15
CVE-2023-38595
C M N
HIGH 8.8 5.9 27.07.2023 01:15
CVE-2023-38596
C M N
MEDIUM 5.5 3.6 27.09.2023 15:18
CVE-2023-38597
C M N
HIGH 8.8 5.9 27.07.2023 00:15
CVE-2023-38598
C M N
CRITICAL 9.8 5.9 28.07.2023 05:15
CVE-2023-38599
C M N
MEDIUM 6.5 3.6 28.07.2023 05:15
CVE-2023-38600
C M N
HIGH 8.8 5.9 27.07.2023 01:15
CVE-2023-38603
C M N
HIGH 7.5 3.6 27.07.2023 01:15
CVE-2023-38604
C M N
CRITICAL 9.8 5.9 28.07.2023 05:15
CVE-2023-38605
C M N
LOW 3.3 1.4 06.09.2023 21:15
CVE-2023-38606
C M N
MEDIUM 5.5 3.6 27.07.2023 00:15
CVE-2023-38610
C M N
HIGH 7.1 5.2 10.01.2024 22:15
CVE-2023-38611
C M N
HIGH 8.8 5.9 27.07.2023 01:15
CVE-2023-38612
C M N
LOW 3.3 1.4 10.01.2024 22:15
CVE-2023-39434
C M N
HIGH 8.8 5.9 27.09.2023 15:18
CVE-2023-40384
C M N
LOW 3.3 1.4 27.09.2023 15:19
CVE-2023-40385
C M N
MEDIUM 6.5 3.6 10.01.2024 22:15
CVE-2023-40391
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-40392
C M N
LOW 3.3 1.4 06.09.2023 21:15
CVE-2023-40394
C M N
LOW 3.3 1.4 10.01.2024 22:15
CVE-2023-40395
C M N
LOW 3.3 1.4 27.09.2023 15:19
CVE-2023-40399
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-40400
C M N
CRITICAL 9.8 5.9 27.09.2023 15:19
CVE-2023-40403
C M N
MEDIUM 6.5 3.6 27.09.2023 15:19
CVE-2023-40408
C M N
MEDIUM 5.3 1.4 25.10.2023 19:15
CVE-2023-40409
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-40410
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-40412
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-40413
C M N
MEDIUM 5.5 3.6 25.10.2023 19:15
CVE-2023-40414
C M N
CRITICAL 9.8 5.9 10.01.2024 22:15
CVE-2023-40416
C M N
MEDIUM 6.5 3.6 25.10.2023 19:15
CVE-2023-40417
C M N
MEDIUM 5.4 2.5 27.09.2023 15:19
CVE-2023-40419
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-40420
C M N
MEDIUM 6.5 3.6 27.09.2023 15:19
CVE-2023-40423
C M N
HIGH 7.8 5.9 25.10.2023 19:15
CVE-2023-40424
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-40427
C M N
LOW 3.3 1.4 27.09.2023 15:19
CVE-2023-40428
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-40429
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-40431
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-40432
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-40434
C M N
LOW 3.3 1.4 27.09.2023 15:19
CVE-2023-40437
C M N
MEDIUM 5.5 3.6 10.01.2024 22:15
CVE-2023-40438
C M N
MEDIUM 5.5 3.6 10.01.2024 22:15
CVE-2023-40439
C M N
LOW 3.3 1.4 10.01.2024 22:15
CVE-2023-40441
C M N
MEDIUM 6.5 3.6 27.09.2023 15:19
CVE-2023-40442
C M N
LOW 3.3 1.4 12.09.2023 00:15
CVE-2023-40443
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-40446
C M N
HIGH 7.8 5.9 12.12.2023 01:15
CVE-2023-40447
C M N
HIGH 8.8 5.9 25.10.2023 19:15
CVE-2023-40448
C M N
HIGH 8.6 4.0 27.09.2023 15:19
CVE-2023-40449
C M N
MEDIUM 5.5 3.6 25.10.2023 19:15
CVE-2023-40452
C M N
HIGH 7.1 5.2 27.09.2023 15:19
CVE-2023-40454
C M N
HIGH 7.1 5.2 27.09.2023 15:19
CVE-2023-40456
C M N
LOW 3.3 1.4 27.09.2023 15:19
CVE-2023-40520
C M N
LOW 3.3 1.4 27.09.2023 15:19
CVE-2023-40528
C M N
MEDIUM 5.5 3.6 23.01.2024 01:15
CVE-2023-40529
C M N
LOW 2.4 1.4 10.01.2024 22:15
CVE-2023-41060
C M N
HIGH 8.8 5.9 10.01.2024 22:15
CVE-2023-41061
C M N
HIGH 7.8 5.9 07.09.2023 18:15
CVE-2023-41063
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-41064
C M N
HIGH 7.8 5.9 07.09.2023 18:15
CVE-2023-41065
C M N
LOW 3.3 1.4 27.09.2023 15:19
CVE-2023-41068
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-41069
C M N
MEDIUM 5.5 3.6 10.01.2024 22:15
CVE-2023-41070
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-41071
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-41073
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-41074
C M N
HIGH 8.8 5.9 27.09.2023 15:19
CVE-2023-41174
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-41232
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-41254
C M N
MEDIUM 5.5 3.6 25.10.2023 19:15
CVE-2023-41968
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-41974
C M N
HIGH 7.8 5.9 10.01.2024 22:15
CVE-2023-41976
C M N
HIGH 8.8 5.9 25.10.2023 19:15
CVE-2023-41977
C M N
MEDIUM 4.3 1.4 25.10.2023 19:15
CVE-2023-41980
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-41981
C M N
MEDIUM 4.4 3.6 27.09.2023 15:19
CVE-2023-41982
C M N
MEDIUM 4.6 3.6 25.10.2023 19:15
CVE-2023-41983
C M N
MEDIUM 6.5 3.6 25.10.2023 19:15
CVE-2023-41984
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-41986
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-41991
C M N
MEDIUM 5.5 3.6 21.09.2023 19:15
CVE-2023-41992
C M N
HIGH 7.8 5.9 21.09.2023 19:15
CVE-2023-41993
C M N
HIGH 8.8 5.9 21.09.2023 19:15
CVE-2023-41995
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-41997
C M N
MEDIUM 4.6 3.6 25.10.2023 19:15
CVE-2023-42824
C M N
HIGH 7.8 5.9 04.10.2023 19:15
CVE-2023-42833
C M N
HIGH 8.8 5.9 10.01.2024 22:15
CVE-2023-42841
C M N
HIGH 7.8 5.9 25.10.2023 19:15
CVE-2023-42846
C M N
MEDIUM 5.3 1.4 25.10.2023 19:15
CVE-2023-42849
C M N
MEDIUM 6.5 3.6 25.10.2023 19:15
CVE-2023-42852
C M N
HIGH 8.8 5.9 25.10.2023 19:15
CVE-2023-42857
C M N
LOW 3.3 1.4 25.10.2023 19:15
CVE-2023-42866
C M N
HIGH 8.8 5.9 10.01.2024 22:15
CVE-2023-42869
C M N
HIGH 7.5 3.6 10.01.2024 22:15
CVE-2023-42870
C M N
HIGH 7.8 5.9 10.01.2024 22:15
CVE-2023-42871
C M N
HIGH 7.8 5.9 10.01.2024 22:15
CVE-2023-42872
C M N
MEDIUM 5.5 3.6 10.01.2024 22:15
CVE-2023-42883
C M N
MEDIUM 5.5 3.6 12.12.2023 01:15
CVE-2023-42884
C M N
MEDIUM 5.5 3.6 12.12.2023 01:15
CVE-2023-42888
C M N
MEDIUM 5.5 3.6 23.01.2024 01:15
CVE-2023-42890
C M N
HIGH 8.8 5.9 12.12.2023 01:15
CVE-2023-42893
C M N
MEDIUM 5.5 3.6 28.03.2024 16:15
CVE-2023-42896
C M N
MEDIUM 5.5 3.6 28.03.2024 16:15
CVE-2023-42899
C M N
HIGH 7.8 5.9 12.12.2023 01:15
CVE-2023-42914
C M N
MEDIUM 6.3 4.0 12.12.2023 01:15
CVE-2023-42916
C M N
MEDIUM 6.5 3.6 30.11.2023 23:15
CVE-2023-42917
C M N
HIGH 8.8 5.9 30.11.2023 23:15
CVE-2023-42919
C M N
MEDIUM 5.5 3.6 12.12.2023 01:15
CVE-2023-42922
C M N
MEDIUM 5.5 3.6 12.12.2023 01:15
CVE-2023-42923
C M N
MEDIUM 5.3 1.4 12.12.2023 01:15
CVE-2023-42925
C M N
LOW 3.3 1.4 29.07.2024 21:15
CVE-2023-42934
C M N
MEDIUM 4.2 3.6 10.01.2024 22:15
CVE-2023-42936
C M N
MEDIUM 5.5 3.6 28.03.2024 16:15
CVE-2023-42937
C M N
MEDIUM 5.5 3.6 23.01.2024 01:15
CVE-2023-42941
C M N
MEDIUM 4.8 3.6 10.01.2024 22:15
CVE-2023-42947
C M N
HIGH 8.6 6.0 28.03.2024 16:15
CVE-2023-42949
C M N
LOW 3.3 1.4 29.07.2024 21:15
CVE-2023-42950
C M N
HIGH 8.8 5.9 28.03.2024 16:15
CVE-2023-42956
C M N
MEDIUM 6.5 3.6 28.03.2024 16:15
CVE-2023-42957
C M N
LOW 3.3 1.4 29.07.2024 21:15
CVE-2023-42962
C M N
HIGH 7.5 3.6 28.03.2024 16:15
CVE-2023-45866
C M N
MEDIUM 6.3 3.4 08.12.2023 06:15
CVE-2024-23206
C M N
MEDIUM 6.5 3.6 23.01.2024 01:15
CVE-2024-23208
C M N
HIGH 7.8 5.9 23.01.2024 01:15
CVE-2024-23210
C M N
LOW 3.3 1.4 23.01.2024 01:15
CVE-2024-23211
C M N
LOW 3.3 1.4 23.01.2024 01:15
CVE-2024-23212
C M N
HIGH 7.8 5.9 23.01.2024 01:15
CVE-2024-23213
C M N
HIGH 8.8 5.9 23.01.2024 01:15
CVE-2024-23214
C M N
HIGH 8.8 5.9 23.01.2024 01:15
CVE-2024-23215
C M N
MEDIUM 5.5 3.6 23.01.2024 01:15
CVE-2024-23217
C M N
LOW 3.3 1.4 23.01.2024 01:15
CVE-2024-23218
C M N
MEDIUM 5.9 3.6 23.01.2024 01:15
CVE-2024-23219
C M N
MEDIUM 6.2 3.6 23.01.2024 01:15
CVE-2024-23222
C M N
HIGH 8.8 5.9 23.01.2024 01:15
CVE-2024-23223
C M N
MEDIUM 6.2 3.6 23.01.2024 01:15
CVE-2024-23225
C M N
HIGH 7.8 5.9 05.03.2024 20:16
CVE-2024-23251
C M N
MEDIUM 4.6 3.6 10.06.2024 21:15
CVE-2024-23270
C M N
HIGH 7.8 5.9 08.03.2024 02:15
CVE-2024-23273
C M N
MEDIUM 4.3 1.4 08.03.2024 02:15
CVE-2024-23282
C M N
MEDIUM 5.5 3.6 10.06.2024 21:15
CVE-2024-23296
C M N
HIGH 7.8 5.9 05.03.2024 20:16
CVE-2024-27799
C M N
LOW 3.3 1.4 10.06.2024 21:15
CVE-2024-27800
C M N
MEDIUM 6.5 3.6 10.06.2024 21:15
CVE-2024-27801
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27802
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27805
C M N
MEDIUM 5.5 3.6 10.06.2024 21:15
CVE-2024-27806
C M N
MEDIUM 5.5 3.6 10.06.2024 21:15
CVE-2024-27807
C M N
MEDIUM 4.3 1.4 10.06.2024 21:15
CVE-2024-27808
C M N
HIGH 8.8 5.9 10.06.2024 21:15
CVE-2024-27811
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27815
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27817
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27819
C M N
LOW 2.4 1.4 10.06.2024 21:15
CVE-2024-27820
C M N
HIGH 8.8 5.9 10.06.2024 21:15
CVE-2024-27823
C M N
MEDIUM 5.9 3.6 29.07.2024 23:15
CVE-2024-27828
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27830
C M N
MEDIUM 6.5 3.6 10.06.2024 21:15
CVE-2024-27831
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27832
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27833
C M N
HIGH 8.8 5.9 10.06.2024 21:15
CVE-2024-27836
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27838
C M N
MEDIUM 6.5 3.6 10.06.2024 21:15
CVE-2024-27840
C M N
MEDIUM 6.3 4.0 10.06.2024 21:15
CVE-2024-27845
C M N
LOW 3.3 1.4 10.06.2024 21:15
CVE-2024-27848
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27850
C M N
MEDIUM 6.5 3.6 10.06.2024 21:15
CVE-2024-27851
C M N
HIGH 8.8 5.9 10.06.2024 21:15
CVE-2024-27855
C M N
HIGH 8.8 5.9 10.06.2024 21:15
CVE-2024-27857
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27863
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-27871
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-27873
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-27880
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-27884
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40774
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40776
C M N
MEDIUM 4.3 1.4 29.07.2024 23:15
CVE-2024-40778
C M N
LOW 3.3 1.4 29.07.2024 23:15
CVE-2024-40779
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40780
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40785
C M N
MEDIUM 6.1 2.7 29.07.2024 23:15
CVE-2024-40786
C M N
HIGH 7.5 3.6 29.07.2024 23:15
CVE-2024-40787
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40788
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40789
C M N
MEDIUM 6.5 3.6 29.07.2024 23:15
CVE-2024-40791
C M N
LOW 3.3 1.4 17.09.2024 00:15
CVE-2024-40793
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40794
C M N
MEDIUM 5.3 1.4 29.07.2024 23:15
CVE-2024-40795
C M N
LOW 3.3 1.4 29.07.2024 23:15
CVE-2024-40796
C M N
MEDIUM 5.3 1.4 29.07.2024 23:15
CVE-2024-40798
C M N
LOW 3.3 1.4 29.07.2024 23:15
CVE-2024-40799
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40806
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40809
C M N
HIGH 7.8 5.9 29.07.2024 23:15
CVE-2024-40812
C M N
HIGH 7.8 5.9 29.07.2024 23:15
CVE-2024-40813
C M N
MEDIUM 4.6 3.6 29.07.2024 23:15
CVE-2024-40815
C M N
HIGH 7.5 5.9 29.07.2024 23:15
CVE-2024-40818
C M N
MEDIUM 4.6 3.6 29.07.2024 23:15
CVE-2024-40822
C M N
LOW 2.4 1.4 29.07.2024 23:15
CVE-2024-40826
C M N
MEDIUM 6.1 4.2 17.09.2024 00:15
CVE-2024-40830
C M N
LOW 3.3 1.4 17.09.2024 00:15
CVE-2024-40833
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40835
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40840
C M N
MEDIUM 4.6 3.6 17.09.2024 00:15
CVE-2024-40844
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40850
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40856
C M N
HIGH 7.5 3.6 17.09.2024 00:15
CVE-2024-40857
C M N
MEDIUM 6.1 2.7 17.09.2024 00:15
CVE-2024-40863
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44124
C M N
MEDIUM 6.5 3.6 17.09.2024 00:15
CVE-2024-44131
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44139
C M N
LOW 2.4 1.4 17.09.2024 00:15
CVE-2024-44158
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44164
C M N
HIGH 7.1 5.2 17.09.2024 00:15
CVE-2024-44165
C M N
HIGH 7.5 3.6 17.09.2024 00:15
CVE-2024-44170
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44171
C M N
MEDIUM 4.6 3.6 17.09.2024 00:15
CVE-2024-44176
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44180
C M N
LOW 2.4 1.4 17.09.2024 00:15
CVE-2024-44183
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44184
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44187
C M N
MEDIUM 6.5 3.6 17.09.2024 00:15
CVE-2024-44191
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44198
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44204
C M N
MEDIUM 5.5 3.6 04.10.2024 00:15
CVE-2024-44207
C M N
MEDIUM 4.3 1.4 04.10.2024 00:15

Similar certificates

Name Certificate ID
Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1Version iOS 16.4.1 (build 20E252) ( ANSSI-CC-2023/59) ANSSI-CC-2023/59 Compare
Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1 Version 15.4.1 (build 19E258) ANSSI-CC-2023/18 Compare
Strong Customer Authentication pour Apple Pay sur iPhone SE (2nde génération) avec A13 Bionic exécutant iOS 15.4.1 (Version 15.4.1 (build 19E258)) ANSSI-CC-2023/15 Compare
Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4(watchOS 9.4 (build 20T253)) ( ANSSI-CC-2023/60) ANSSI-CC-2023/60 Compare
Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1 , macOS Ventura 13.3.1 (build 22E261) ( ANSSI-CC-2023/61) ANSSI-CC-2023/61 Compare
Strong Customer Authentication pour Apple Pay sur MacBook Air 2020 avec M1 exécutant macOS Monterey 12.3.1 (Version 12.3.1 (build 21E258)) ANSSI-CC-2023/16 Compare
Strong customer authentication pour Apple Pay sur Apple Watch série 4 exécutant watchOS 7.4.1 (Version 18T201) ANSSI-CC-2023/13 Compare
Strong Customer Authentication pour Apple Pay sur Apple Watch avec S7 exécutant watchOS 8.5.1 (Version 8.5.1 (build 19T252)) ANSSI-CC-2023/17 Compare
Strong Customer Authentication pour Apple Pay sur iPhone (SoC A12 Bionic) exécutant iOS 14.5.1 Version 18E212 ANSSI-CC-2022/04 Compare
Strong Customer Authentication pour Apple Pay sur iPhone SE (de seconde génération) exécutant iOS 14.5.1 Version 18E212 ANSSI-CC-2022/05 Compare
Strong Customer Authentication pour Apple Pay sur Mac mini avec M1 et Magic keyboard avec Touch ID, exécutant macOS Monterey 12.3.1 (Version 12.3.1 (build 21E258)) ANSSI-CC-2023/19 Compare
IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-2023/57 ) ANSSI-CC-2023/57 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration Version 4.1.1.52 ( ANSSI-CC-2023/68) ANSSI-CC-2023/68 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in SSCD configuration Version 4.1.1.52 (ANSSI-CC-2023/69) ANSSI-CC-2023/69 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO BAC configuration Version 4.1.1.52 ( ANSSI-CC-2023/67) ANSSI-CC-2023/67 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration (Version 4.0.1.52) (ANSSI-CC-2023/11-R01) ANSSI-CC-2023/11-R01 Compare
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH(Version 4.1.0.2) ( ANSSI-CC-2023/30 ) ANSSI-CC-2023/30 Compare
ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01) ANSSI-CC-2023/12-R01 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO BAC configuration (Version 4.0.1.52) ( ANSSI-CC-2023/10-R01 ) ANSSI-CC-2023/10-R01 Compare
Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 ) ANSSI-CC-2023/42 Compare
eTravel 3.1 BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/34 ) ANSSI-CC-2023/34 Compare
eTravel 3.1 EAC on SAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/36 ) ANSSI-CC-2023/36 Compare
eTravel 3.1 EAC on BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/35 ) ANSSI-CC-2023/35 Compare
Strong Customer Authentication pour Apple Pay, sur MacBook Air 2020 avec M1 exécutant macOS Big Sur 11.3.1 ANSSI-CC-2022/44 Compare
Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1 2023-9-INF-4307 Compare
MultiApp V5.1 Java Card Virtual Machine Version 5.1 (ANSSI-CC-2023/45) ANSSI-CC-2023/45 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/54) ANSSI-CC-2023/54 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/56) ANSSI-CC-2023/56 Compare
eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated(version 2.3.0.1) ( ANSSI-CC-2023/55 ) ANSSI-CC-2023/55 Compare
Showing 5 out of 29.

Scheme data ?

Product Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1 (iOS 16.4.1 (build 20E252))
Url https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-iphone-se-3rd-generation-a15-bionic
Description Le produit évalué est « Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1, iOS 16.4.1 (build 20E252) » développé par APPLE INC.
Sponsor APPLE INC.
Developer APPLE INC.
Cert Id ANSSI-CC-2023/58
Level EAL2+
Expiration Date 28 Décembre 2028
Enhanced
Cert Id ANSSI-CC-2023/58
Certification Date 28/12/2023
Expiration Date 28/12/2028
Category Divers
Cc Version Critères Communs version 3.1r5
Developer APPLE INC.
Sponsor APPLE INC.
Evaluation Facility THALES / CNES
Level EAL2+
Protection Profile
Mutual Recognition CCRA SOG-IS
Augmented ADV_FSP.3
Report Link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_58en.pdf
Target Link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_58en.pdf
Cert Link https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_58en.pdf

References ?

No references are available for this certificate.

Updates ?

  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:o:apple:iphone_os:16.4.1:*:*:*:*:*:*:*']}.
    • The related_cves property was set to {'_type': 'Set', 'elements': ['CVE-2023-40431', 'CVE-2023-32361', 'CVE-2023-40399', 'CVE-2024-27871', 'CVE-2023-41069', 'CVE-2024-27811', 'CVE-2024-27808', 'CVE-2023-34352', 'CVE-2024-27857', 'CVE-2023-35990', 'CVE-2024-27806', 'CVE-2024-23225', 'CVE-2024-40840', 'CVE-2024-40806', 'CVE-2024-40798', 'CVE-2023-35984', 'CVE-2023-40432', 'CVE-2023-32368', 'CVE-2024-44170', 'CVE-2023-42957', 'CVE-2023-42841', 'CVE-2023-42871', 'CVE-2023-40391', 'CVE-2023-40419', 'CVE-2023-32384', 'CVE-2024-44204', 'CVE-2023-38600', 'CVE-2023-41981', 'CVE-2023-42914', 'CVE-2023-32422', 'CVE-2023-40452', 'CVE-2023-38593', 'CVE-2023-32428', 'CVE-2024-27840', 'CVE-2023-42922', 'CVE-2024-27819', 'CVE-2023-38611', 'CVE-2023-40409', 'CVE-2024-44158', 'CVE-2024-44139', 'CVE-2023-41982', 'CVE-2023-32434', 'CVE-2024-27815', 'CVE-2023-41063', 'CVE-2024-27828', 'CVE-2024-40856', 'CVE-2024-27845', 'CVE-2023-41980', 'CVE-2024-23218', 'CVE-2024-40799', 'CVE-2024-44180', 'CVE-2023-42936', 'CVE-2023-40438', 'CVE-2023-32413', 'CVE-2023-40439', 'CVE-2024-44191', 'CVE-2023-32419', 'CVE-2023-32396', 'CVE-2024-27799', 'CVE-2024-23208', 'CVE-2023-41992', 'CVE-2024-40815', 'CVE-2024-44164', 'CVE-2024-23282', 'CVE-2023-32372', 'CVE-2024-23222', 'CVE-2023-32392', 'CVE-2024-40796', 'CVE-2023-42956', 'CVE-2023-42919', 'CVE-2023-32432', 'CVE-2023-38572', 'CVE-2024-44131', 'CVE-2023-40446', 'CVE-2023-40414', 'CVE-2023-28204', 'CVE-2023-38594', 'CVE-2023-38592', 'CVE-2024-44171', 'CVE-2024-27807', 'CVE-2023-38599', 'CVE-2023-40395', 'CVE-2023-32371', 'CVE-2023-28191', 'CVE-2024-40863', 'CVE-2023-40400', 'CVE-2023-42925', 'CVE-2023-42890', 'CVE-2023-40416', 'CVE-2024-40835', 'CVE-2024-23210', 'CVE-2023-32441', 'CVE-2023-40456', 'CVE-2023-41061', 'CVE-2023-32388', 'CVE-2023-42934', 'CVE-2023-40403', 'CVE-2023-42869', 'CVE-2024-40850', 'CVE-2023-40423', 'CVE-2023-37450', 'CVE-2024-44187', 'CVE-2024-27832', 'CVE-2023-32357', 'CVE-2024-27873', 'CVE-2023-38425', 'CVE-2024-27880', 'CVE-2023-42883', 'CVE-2024-40844', 'CVE-2024-27855', 'CVE-2023-40447', 'CVE-2023-38595', 'CVE-2023-32411', 'CVE-2023-32403', 'CVE-2023-42866', 'CVE-2023-41991', 'CVE-2023-32445', 'CVE-2024-40787', 'CVE-2024-23273', 'CVE-2023-32402', 'CVE-2024-27848', 'CVE-2024-44207', 'CVE-2024-44183', 'CVE-2023-38596', 'CVE-2023-32423', 'CVE-2024-27801', 'CVE-2023-42846', 'CVE-2024-23214', 'CVE-2023-32412', 'CVE-2024-40809', 'CVE-2023-32385', 'CVE-2023-41071', 'CVE-2023-40434', 'CVE-2023-41064', 'CVE-2023-40394', 'CVE-2023-41995', 'CVE-2024-40776', 'CVE-2023-40528', 'CVE-2023-41976', 'CVE-2023-42888', 'CVE-2023-32439', 'CVE-2023-38598', 'CVE-2023-32416', 'CVE-2022-3970', 'CVE-2023-41068', 'CVE-2023-40454', 'CVE-2024-44176', 'CVE-2023-32354', 'CVE-2023-32415', 'CVE-2023-40392', 'CVE-2023-42824', 'CVE-2023-42884', 'CVE-2023-45866', 'CVE-2023-41074', 'CVE-2023-32359', 'CVE-2023-42899', 'CVE-2023-42893', 'CVE-2023-38136', 'CVE-2023-40428', 'CVE-2023-40384', 'CVE-2024-23223', 'CVE-2024-23212', 'CVE-2023-38133', 'CVE-2023-38410', 'CVE-2024-23270', 'CVE-2024-27800', 'CVE-2024-40791', 'CVE-2024-27851', 'CVE-2024-27831', 'CVE-2023-40429', 'CVE-2024-40813', 'CVE-2023-42857', 'CVE-2024-27802', 'CVE-2023-34425', 'CVE-2023-41997', 'CVE-2023-42852', 'CVE-2023-32398', 'CVE-2023-41254', 'CVE-2023-32400', 'CVE-2024-40833', 'CVE-2023-40448', 'CVE-2024-23217', 'CVE-2023-32391', 'CVE-2024-40818', 'CVE-2023-42950', 'CVE-2024-40795', 'CVE-2024-23219', 'CVE-2024-44165', 'CVE-2023-32365', 'CVE-2024-23215', 'CVE-2024-40794', 'CVE-2023-42870', 'CVE-2024-27820', 'CVE-2023-32367', 'CVE-2023-42941', 'CVE-2023-38597', 'CVE-2023-41065', 'CVE-2023-32390', 'CVE-2023-41174', 'CVE-2024-44198', 'CVE-2024-23206', 'CVE-2024-40789', 'CVE-2024-40830', 'CVE-2023-38565', 'CVE-2024-27833', 'CVE-2023-40417', 'CVE-2023-32425', 'CVE-2024-40857', 'CVE-2023-32734', 'CVE-2023-38590', 'CVE-2023-42896', 'CVE-2024-27823', 'CVE-2024-40822', 'CVE-2024-40785', 'CVE-2023-40437', 'CVE-2023-38604', 'CVE-2024-40779', 'CVE-2024-40826', 'CVE-2023-42937', 'CVE-2024-27838', 'CVE-2023-38603', 'CVE-2023-41983', 'CVE-2023-40420', 'CVE-2023-42923', 'CVE-2024-40793', 'CVE-2023-28202', 'CVE-2024-40788', 'CVE-2023-41993', 'CVE-2023-32420', 'CVE-2024-27884', 'CVE-2023-41977', 'CVE-2024-27817', 'CVE-2023-41232', 'CVE-2024-40778', 'CVE-2023-27930', 'CVE-2023-41984', 'CVE-2023-32408', 'CVE-2023-40520', 'CVE-2023-38612', 'CVE-2023-41986', 'CVE-2024-44184', 'CVE-2023-32409', 'CVE-2024-40786', 'CVE-2023-32394', 'CVE-2024-27805', 'CVE-2023-32407', 'CVE-2023-40412', 'CVE-2023-40441', 'CVE-2024-40774', 'CVE-2023-41060', 'CVE-2023-38261', 'CVE-2023-32399', 'CVE-2023-42849', 'CVE-2023-39434', 'CVE-2023-42949', 'CVE-2024-27830', 'CVE-2023-40410', 'CVE-2023-32381', 'CVE-2024-27836', 'CVE-2023-42833', 'CVE-2023-32437', 'CVE-2023-40408', 'CVE-2023-32389', 'CVE-2023-32433', 'CVE-2023-41073', 'CVE-2023-42916', 'CVE-2023-38605', 'CVE-2024-23211', 'CVE-2023-32376', 'CVE-2023-38610', 'CVE-2023-42947', 'CVE-2023-42917', 'CVE-2024-23251', 'CVE-2023-40424', 'CVE-2024-40812', 'CVE-2023-40443', 'CVE-2023-40442', 'CVE-2023-41974', 'CVE-2023-41070', 'CVE-2024-23213', 'CVE-2023-36495', 'CVE-2023-40529', 'CVE-2023-42872', 'CVE-2024-27863', 'CVE-2023-32352', 'CVE-2023-35074', 'CVE-2023-40427', 'CVE-2023-42962', 'CVE-2024-44124', 'CVE-2023-38424', 'CVE-2023-40449', 'CVE-2023-32373', 'CVE-2023-38606', 'CVE-2024-27850', 'CVE-2023-40413', 'CVE-2024-40780', 'CVE-2023-38580', 'CVE-2023-35993', 'CVE-2024-23296', 'CVE-2023-32404', 'CVE-2023-40385', 'CVE-2023-41968']}.
    • The scheme_data property was set to {'product': 'Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1 (iOS 16.4.1 (build 20E252))', 'url': 'https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-iphone-se-3rd-generation-a15-bionic', 'description': 'Le produit évalué est « Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1, iOS 16.4.1 (build 20E252) » développé par APPLE INC.', 'sponsor': 'APPLE INC.', 'developer': 'APPLE INC.', 'cert_id': 'ANSSI-CC-2023/58', 'level': 'EAL2+', 'expiration_date': '28 Décembre 2028', 'enhanced': {'cert_id': 'ANSSI-CC-2023/58', 'certification_date': '28/12/2023', 'expiration_date': '28/12/2028', 'category': 'Divers', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'APPLE INC.', 'sponsor': 'APPLE INC.', 'evaluation_facility': 'THALES / CNES', 'level': 'EAL2+', 'protection_profile': '', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ADV_FSP.3', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_58en.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_58en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_58en.pdf'}}.
  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '26c0804b543be2fcfd21ebba6f61d67ab3a2210e1ad677b066559fbeb4ddd088', 'txt_hash': '195057752a39cb59cdd8d30e8f4016804141ba865d6b474fce016369226d4a33'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'aa1308aebbe2495a638eab65bd5e80db992bed1e7718aa13053a75e4cbdfe30c', 'txt_hash': '5ed497c7602db8e0121211a132cad0cf0313a2fcb02e53227b0a7b2dc56c748c'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 2448380, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 51, '/CreationDate': 'D:20231108181326Z', '/Creator': 'Word', '/ModDate': 'D:20231108181351Z', '/Producer': 'Adobe Mac PDF Plug-in', '/Title': 'Microsoft Word - [ST] iPhone_A15Bionic_iPhoneSE3_iOS16_SecurityTarget_v1.4.docx', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 138204, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20240222154440+01'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20240222155211+01'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL2': 1, 'EAL 2 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_FSP': 1, 'ADV_ARC.1': 3, 'ADV_FSP.3': 2, 'ADV_TDS.1': 4, 'ADV_FSP.2': 4, 'ADV_FSP.1': 2}, 'AGD': {'AGD_OPE.1': 4, 'AGD_PRE.1': 4}, 'ALC': {'ALC_CMC.2': 2, 'ALC_CMS.2': 2, 'ALC_DEL.1': 2}, 'ATE': {'ATE_COV.1': 4, 'ATE_FUN.1': 3, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 2}, 'ASE': {'ASE_CCL.1': 2, 'ASE_ECD.1': 3, 'ASE_INT.1': 2, 'ASE_OBJ.2': 2, 'ASE_REQ.2': 2, 'ASE_SPD.1': 1, 'ASE_TSS.1': 2, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FDP': {'FDP_DAU.1': 4, 'FDP_DAU.1.1': 1, 'FDP_DAU.1.2': 1, 'FDP_ACC': 23, 'FDP_ACC.2': 4, 'FDP_ACF': 19, 'FDP_ACF.1': 12, 'FDP_ITT.1': 4, 'FDP_ITT.1.1': 1, 'FDP_ETC': 8, 'FDP_ETC.2.1': 2, 'FDP_ETC.2.2': 2, 'FDP_ETC.2.3': 2, 'FDP_ETC.2.4': 2, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_ITC': 5, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_UCT': 4, 'FDP_UCT.1': 1, 'FDP_UIT': 4, 'FDP_UIT.1': 2, 'FDP_RIP.1': 15, 'FDP_RIP.1.1': 1, 'FDP_SDI.1': 10, 'FDP_SDI.1.1': 1, 'FDP_ACC.1': 9, 'FDP_IFC.1': 7, 'FDP_ETC.2': 2}, 'FIA': {'FIA_UID.2': 6, 'FIA_UID.2.1': 1, 'FIA_UAU.2': 11, 'FIA_UAU.2.1': 1, 'FIA_UAU.5': 5, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6': 11, 'FIA_AFL.1': 3, 'FIA_AFL': 7, 'FIA_AFL.1.1': 3, 'FIA_AFL.1.2': 3, 'FIA_UAU.6.1': 2, 'FIA_ATD.1': 4, 'FIA_ATD.1.1': 2, 'FIA_UAU.1': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_SMR.1': 10, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 6, 'FMT_SMF.1.1': 1, 'FMT_MSA.1': 5, 'FMT_MSA.3': 11, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.1.1': 2, 'FMT_MTD.1': 4, 'FMT_MTD.1.1': 1, 'FMT_MTD.3': 4, 'FMT_MTD.3.1': 1}, 'FPR': {'FPR_UNO.1': 11, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_ITC.1': 4, 'FPT_ITC.1.1': 1, 'FPT_RPL': 4, 'FPT_RPL.1': 2}, 'FTP': {'FTP_ITC': 6, 'FTP_ITC.1': 5, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.OS': 17, 'D.SEP_SE': 3}, 'T': {'T.COR-': 1, 'T.PHYSI-': 1, 'T.RECOVER': 2, 'T.REPLAY': 2, 'T.SILENT': 2, 'T.SKIM-': 1, 'T.USURP': 2, 'T.SKIMMING': 1, 'T.CORRUPT': 1, 'T.PHYSICAL': 1}, 'A': {'A.DEVICE_AUTH': 2, 'A.PERSO': 3, 'A.CDCVM': 3, 'A.DE-': 1}, 'OE': {'OE.CDCVM': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 3}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {'NIST': {'P-256': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 66}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-3': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by': 1, 'to return to its User. Note: Defending against device re-use after physical com- promise is out of scope. D.User_Passcode D.User_Bio D.Card_Data T.RECOVER Card Re- covery An attacker attempts to recover': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2023/58': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 2}}, 'cc_sar': {'ADV': {'ADV_FSP.3': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Thales': {'THALES/CNES': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to ANSSI-cible-CC-2023_58en.pdf.
    • The cert_filename property was set to certificat-CC-2023_58en.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_58en.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_58en.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1 (iOS 16.4.1 (build 20E252))', 'url': 'https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-iphone-se-3rd-generation-a15-bionic', 'description': 'Le produit évalué est « Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1, iOS 16.4.1 (build 20E252) » développé par APPLE INC.', 'sponsor': 'APPLE INC.', 'developer': 'APPLE INC.', 'cert_id': 'ANSSI-CC-2023/58', 'level': 'EAL2+', 'expiration_date': '28 Décembre 2028', 'enhanced': {'cert_id': 'ANSSI-CC-2023/58', 'certification_date': '28/12/2023', 'expiration_date': '28/12/2028', 'category': 'Divers', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'APPLE INC.', 'sponsor': 'APPLE INC.', 'evaluation_facility': 'THALES / CNES', 'level': 'EAL2+', 'protection_profile': '', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ADV_FSP.3', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_58en.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_58en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_58en.pdf'}}.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1iOS 16.4.1 (build 20E252) (ANSSI-CC-2023/58) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_58en.pdf",
  "dgst": "a5696b3d01538604",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2023/58",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:o:apple:iphone_os:16.4.1:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "16.4.1"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2023-41065",
        "CVE-2023-32428",
        "CVE-2023-28204",
        "CVE-2023-42947",
        "CVE-2023-40446",
        "CVE-2023-32385",
        "CVE-2024-44184",
        "CVE-2024-27808",
        "CVE-2024-40795",
        "CVE-2023-34352",
        "CVE-2023-40528",
        "CVE-2023-32404",
        "CVE-2023-42917",
        "CVE-2023-38611",
        "CVE-2024-40850",
        "CVE-2023-41982",
        "CVE-2023-42957",
        "CVE-2023-32415",
        "CVE-2023-35074",
        "CVE-2024-40785",
        "CVE-2024-44207",
        "CVE-2023-32441",
        "CVE-2023-40429",
        "CVE-2023-42941",
        "CVE-2023-45866",
        "CVE-2024-27811",
        "CVE-2023-32400",
        "CVE-2023-32423",
        "CVE-2024-23211",
        "CVE-2023-41980",
        "CVE-2023-32371",
        "CVE-2023-41232",
        "CVE-2023-37450",
        "CVE-2023-38598",
        "CVE-2023-38605",
        "CVE-2023-42937",
        "CVE-2023-42950",
        "CVE-2024-44187",
        "CVE-2023-41977",
        "CVE-2024-27840",
        "CVE-2023-41974",
        "CVE-2024-23270",
        "CVE-2023-41993",
        "CVE-2024-44124",
        "CVE-2023-40420",
        "CVE-2024-27799",
        "CVE-2023-38565",
        "CVE-2023-38133",
        "CVE-2023-35990",
        "CVE-2023-42841",
        "CVE-2023-42956",
        "CVE-2024-27806",
        "CVE-2024-40798",
        "CVE-2024-44198",
        "CVE-2023-32419",
        "CVE-2023-40520",
        "CVE-2024-40835",
        "CVE-2023-32409",
        "CVE-2023-42919",
        "CVE-2024-40830",
        "CVE-2024-27863",
        "CVE-2023-38612",
        "CVE-2023-42846",
        "CVE-2023-40410",
        "CVE-2023-42824",
        "CVE-2023-40391",
        "CVE-2024-27807",
        "CVE-2023-42869",
        "CVE-2024-23214",
        "CVE-2024-27815",
        "CVE-2023-42922",
        "CVE-2024-44131",
        "CVE-2023-38424",
        "CVE-2024-40793",
        "CVE-2023-42870",
        "CVE-2024-40822",
        "CVE-2024-44139",
        "CVE-2024-40826",
        "CVE-2024-23222",
        "CVE-2024-27820",
        "CVE-2024-40815",
        "CVE-2024-23210",
        "CVE-2023-32420",
        "CVE-2023-40384",
        "CVE-2023-32396",
        "CVE-2024-23225",
        "CVE-2024-27884",
        "CVE-2023-32359",
        "CVE-2024-27817",
        "CVE-2024-27832",
        "CVE-2023-40456",
        "CVE-2023-41074",
        "CVE-2023-42916",
        "CVE-2023-32389",
        "CVE-2023-32434",
        "CVE-2024-44183",
        "CVE-2023-42833",
        "CVE-2023-32432",
        "CVE-2023-40431",
        "CVE-2023-32433",
        "CVE-2024-23217",
        "CVE-2023-32390",
        "CVE-2023-32399",
        "CVE-2024-23215",
        "CVE-2023-41063",
        "CVE-2023-38604",
        "CVE-2023-42923",
        "CVE-2023-40408",
        "CVE-2024-40840",
        "CVE-2024-40778",
        "CVE-2023-32372",
        "CVE-2023-38595",
        "CVE-2023-41073",
        "CVE-2023-32425",
        "CVE-2023-32407",
        "CVE-2023-32368",
        "CVE-2023-38597",
        "CVE-2023-28202",
        "CVE-2024-40780",
        "CVE-2023-40412",
        "CVE-2023-42884",
        "CVE-2023-34425",
        "CVE-2024-40806",
        "CVE-2024-40779",
        "CVE-2023-40454",
        "CVE-2023-38425",
        "CVE-2023-32388",
        "CVE-2023-32403",
        "CVE-2023-32376",
        "CVE-2023-42888",
        "CVE-2023-42936",
        "CVE-2023-27930",
        "CVE-2024-40863",
        "CVE-2023-42883",
        "CVE-2023-42866",
        "CVE-2023-40529",
        "CVE-2023-42896",
        "CVE-2023-40432",
        "CVE-2023-40442",
        "CVE-2023-32411",
        "CVE-2024-27880",
        "CVE-2023-40437",
        "CVE-2023-35984",
        "CVE-2023-40394",
        "CVE-2024-44170",
        "CVE-2024-40774",
        "CVE-2024-40796",
        "CVE-2023-40441",
        "CVE-2024-40791",
        "CVE-2024-23251",
        "CVE-2024-44191",
        "CVE-2024-40856",
        "CVE-2023-38410",
        "CVE-2023-32408",
        "CVE-2024-40799",
        "CVE-2024-27823",
        "CVE-2023-32365",
        "CVE-2024-40844",
        "CVE-2023-38136",
        "CVE-2023-38572",
        "CVE-2024-27873",
        "CVE-2023-41070",
        "CVE-2024-23206",
        "CVE-2024-44176",
        "CVE-2023-32391",
        "CVE-2024-44165",
        "CVE-2023-40452",
        "CVE-2023-41976",
        "CVE-2024-23208",
        "CVE-2023-40423",
        "CVE-2024-23223",
        "CVE-2023-41991",
        "CVE-2024-27871",
        "CVE-2023-32352",
        "CVE-2023-32361",
        "CVE-2024-40857",
        "CVE-2023-40449",
        "CVE-2023-40439",
        "CVE-2023-42849",
        "CVE-2023-32367",
        "CVE-2023-32439",
        "CVE-2023-40438",
        "CVE-2023-40448",
        "CVE-2024-23218",
        "CVE-2023-41174",
        "CVE-2023-41061",
        "CVE-2023-41984",
        "CVE-2024-23282",
        "CVE-2024-44171",
        "CVE-2023-32412",
        "CVE-2024-40789",
        "CVE-2024-40813",
        "CVE-2023-32413",
        "CVE-2023-40443",
        "CVE-2023-41986",
        "CVE-2023-38593",
        "CVE-2023-42890",
        "CVE-2024-27828",
        "CVE-2023-40416",
        "CVE-2023-42871",
        "CVE-2023-40427",
        "CVE-2023-32384",
        "CVE-2023-41983",
        "CVE-2023-40419",
        "CVE-2023-42872",
        "CVE-2023-32381",
        "CVE-2023-42857",
        "CVE-2023-32392",
        "CVE-2023-38592",
        "CVE-2023-42934",
        "CVE-2023-40424",
        "CVE-2023-41060",
        "CVE-2024-40818",
        "CVE-2023-40447",
        "CVE-2023-40428",
        "CVE-2024-40786",
        "CVE-2023-40414",
        "CVE-2023-32398",
        "CVE-2024-27851",
        "CVE-2023-32394",
        "CVE-2023-41997",
        "CVE-2024-27805",
        "CVE-2024-27857",
        "CVE-2024-44204",
        "CVE-2024-27836",
        "CVE-2023-40399",
        "CVE-2023-42962",
        "CVE-2024-23273",
        "CVE-2024-27838",
        "CVE-2023-41071",
        "CVE-2023-38600",
        "CVE-2023-38590",
        "CVE-2024-23212",
        "CVE-2024-23296",
        "CVE-2023-32416",
        "CVE-2023-40434",
        "CVE-2023-38596",
        "CVE-2024-27845",
        "CVE-2024-40788",
        "CVE-2023-41064",
        "CVE-2023-32354",
        "CVE-2023-41254",
        "CVE-2023-32734",
        "CVE-2023-40385",
        "CVE-2022-3970",
        "CVE-2024-27801",
        "CVE-2024-40833",
        "CVE-2023-41981",
        "CVE-2023-42949",
        "CVE-2023-40392",
        "CVE-2023-38599",
        "CVE-2023-41068",
        "CVE-2023-42852",
        "CVE-2023-38610",
        "CVE-2024-27848",
        "CVE-2024-40787",
        "CVE-2023-40400",
        "CVE-2023-40417",
        "CVE-2024-27819",
        "CVE-2024-40812",
        "CVE-2023-42914",
        "CVE-2023-40403",
        "CVE-2023-41995",
        "CVE-2024-27850",
        "CVE-2023-40409",
        "CVE-2023-38261",
        "CVE-2023-41968",
        "CVE-2024-44180",
        "CVE-2023-41069",
        "CVE-2024-40794",
        "CVE-2023-38603",
        "CVE-2023-40395",
        "CVE-2024-27833",
        "CVE-2024-40809",
        "CVE-2023-32422",
        "CVE-2024-23219",
        "CVE-2023-42899",
        "CVE-2024-27855",
        "CVE-2024-40776",
        "CVE-2023-42893",
        "CVE-2023-41992",
        "CVE-2023-35993",
        "CVE-2023-38594",
        "CVE-2023-38580",
        "CVE-2023-32437",
        "CVE-2023-39434",
        "CVE-2024-44164",
        "CVE-2023-32373",
        "CVE-2024-44158",
        "CVE-2023-42925",
        "CVE-2023-28191",
        "CVE-2023-38606",
        "CVE-2023-32402",
        "CVE-2023-32445",
        "CVE-2024-27802",
        "CVE-2024-27830",
        "CVE-2023-36495",
        "CVE-2024-27800",
        "CVE-2023-32357",
        "CVE-2024-23213",
        "CVE-2024-27831",
        "CVE-2023-40413"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "ANSSI-CC-2023/58",
      "description": "Le produit \u00e9valu\u00e9 est \u00ab Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1, iOS 16.4.1 (build 20E252) \u00bb d\u00e9velopp\u00e9 par APPLE INC.",
      "developer": "APPLE INC.",
      "enhanced": {
        "augmented": "ADV_FSP.3",
        "category": "Divers",
        "cc_version": "Crit\u00e8res Communs version 3.1r5",
        "cert_id": "ANSSI-CC-2023/58",
        "cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_58en.pdf",
        "certification_date": "28/12/2023",
        "developer": "APPLE INC.",
        "evaluation_facility": "THALES / CNES",
        "expiration_date": "28/12/2028",
        "level": "EAL2+",
        "mutual_recognition": "CCRA\n                          SOG-IS",
        "protection_profile": "",
        "report_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_58en.pdf",
        "sponsor": "APPLE INC.",
        "target_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_58en.pdf"
      },
      "expiration_date": "28 D\u00e9cembre 2028",
      "level": "EAL2+",
      "product": "Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1 (iOS 16.4.1 (build 20E252))",
      "sponsor": "APPLE INC.",
      "url": "https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-iphone-se-3rd-generation-a15-bionic"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Apple Inc.",
  "manufacturer_web": "https://www.apple.com/",
  "name": "Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1iOS 16.4.1 (build 20E252) (ANSSI-CC-2023/58)",
  "not_valid_after": "2028-12-28",
  "not_valid_before": "2023-12-28",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "certificat-CC-2023_58en.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2023/58": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 2
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Thales": {
          "THALES/CNES": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20240222154440+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20240222155211+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 138204,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "ANSSI-CC-2023_58en.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2023/58": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.3": 1
        },
        "ALC": {
          "ALC_FLR": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 3,
          "EAL2 augmented": 1,
          "EAL4": 1
        },
        "ITSEC": {
          "ITSEC E3 Basic": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Thales": {
          "THALES/CNES": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 12
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20240222154309+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20240222155212+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 453717,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "http://www.ssi.gouv.fr/",
          "http://www.sogis.eu/",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 13
    },
    "st_filename": "ANSSI-cible-CC-2023_58en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CDCVM": 3,
          "A.DE-": 1,
          "A.DEVICE_AUTH": 2,
          "A.PERSO": 3
        },
        "D": {
          "D.OS": 17,
          "D.SEP_SE": 3
        },
        "OE": {
          "OE.CDCVM": 3
        },
        "T": {
          "T.COR-": 1,
          "T.CORRUPT": 1,
          "T.PHYSI-": 1,
          "T.PHYSICAL": 1,
          "T.RECOVER": 2,
          "T.REPLAY": 2,
          "T.SILENT": 2,
          "T.SKIM-": 1,
          "T.SKIMMING": 1,
          "T.USURP": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 3,
          "ADV_FSP": 1,
          "ADV_FSP.1": 2,
          "ADV_FSP.2": 4,
          "ADV_FSP.3": 2,
          "ADV_TDS.1": 4
        },
        "AGD": {
          "AGD_OPE.1": 4,
          "AGD_PRE.1": 4
        },
        "ALC": {
          "ALC_CMC.2": 2,
          "ALC_CMS.2": 2,
          "ALC_DEL.1": 2
        },
        "ASE": {
          "ASE_CCL.1": 2,
          "ASE_ECD.1": 3,
          "ASE_INT.1": 2,
          "ASE_OBJ.2": 2,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 2
        },
        "ATE": {
          "ATE_COV.1": 4,
          "ATE_FUN.1": 3,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 2 augmented": 1,
          "EAL2": 1
        }
      },
      "cc_sfr": {
        "FDP": {
          "FDP_ACC": 23,
          "FDP_ACC.1": 9,
          "FDP_ACC.2": 4,
          "FDP_ACC.2.1": 1,
          "FDP_ACC.2.2": 1,
          "FDP_ACF": 19,
          "FDP_ACF.1": 12,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_DAU.1": 4,
          "FDP_DAU.1.1": 1,
          "FDP_DAU.1.2": 1,
          "FDP_ETC": 8,
          "FDP_ETC.2": 2,
          "FDP_ETC.2.1": 2,
          "FDP_ETC.2.2": 2,
          "FDP_ETC.2.3": 2,
          "FDP_ETC.2.4": 2,
          "FDP_IFC.1": 7,
          "FDP_ITC": 5,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_ITT.1": 4,
          "FDP_ITT.1.1": 1,
          "FDP_RIP.1": 15,
          "FDP_RIP.1.1": 1,
          "FDP_SDI.1": 10,
          "FDP_SDI.1.1": 1,
          "FDP_UCT": 4,
          "FDP_UCT.1": 1,
          "FDP_UIT": 4,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_AFL": 7,
          "FIA_AFL.1": 3,
          "FIA_AFL.1.1": 3,
          "FIA_AFL.1.2": 3,
          "FIA_ATD.1": 4,
          "FIA_ATD.1.1": 2,
          "FIA_UAU.1": 1,
          "FIA_UAU.2": 11,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.5": 5,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 11,
          "FIA_UAU.6.1": 2,
          "FIA_UID.1": 1,
          "FIA_UID.2": 6,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MSA.1": 5,
          "FMT_MSA.1.1": 2,
          "FMT_MSA.3": 11,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 4,
          "FMT_MTD.1.1": 1,
          "FMT_MTD.3": 4,
          "FMT_MTD.3.1": 1,
          "FMT_SMF.1": 6,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 10,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO.1": 11,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_ITC.1": 4,
          "FPT_ITC.1.1": 1,
          "FPT_RPL": 4,
          "FPT_RPL.1": 2
        },
        "FTP": {
          "FTP_ITC": 6,
          "FTP_ITC.1": 5,
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {
        "OutOfScope": {
          "Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by": 1,
          "out of scope": 2,
          "to return to its User. Note: Defending against device re-use after physical com- promise is out of scope. D.User_Passcode D.User_Bio D.Card_Data T.RECOVER Card Re- covery An attacker attempts to recover": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 3
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 2
        }
      },
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-3": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 66
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20231108181326Z",
      "/Creator": "Word",
      "/ModDate": "D:20231108181351Z",
      "/Producer": "Adobe Mac PDF Plug-in",
      "/Title": "Microsoft Word - [ST] iPhone_A15Bionic_iPhoneSE3_iOS16_SecurityTarget_v1.4.docx",
      "pdf_file_size_bytes": 2448380,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 51
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_58en.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ADV_FSP.3",
      "EAL2+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_58en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "aa1308aebbe2495a638eab65bd5e80db992bed1e7718aa13053a75e4cbdfe30c",
      "txt_hash": "5ed497c7602db8e0121211a132cad0cf0313a2fcb02e53227b0a7b2dc56c748c"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "14df361cd1dca720cf1ee0b52c5e1c240be46753fa00cacc4bc3b026cb34a295",
      "txt_hash": "07c310aa55f4c1fcdc4dacba2631a1261617724d162b09969db735d1fe3d8149"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "26c0804b543be2fcfd21ebba6f61d67ab3a2210e1ad677b066559fbeb4ddd088",
      "txt_hash": "195057752a39cb59cdd8d30e8f4016804141ba865d6b474fce016369226d4a33"
    }
  },
  "status": "active"
}