Red Hat Virtualization v4.3

Known vulnerabilities detected

Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.

CSV information

Status active
Valid from 18.01.2022
Valid until 18.01.2027
Scheme 🇮🇹 IT
Manufacturer Red Hat, Inc.
Category Other Devices and Systems
Security level ALC_FLR.3, EAL2+

Heuristics summary

Certificate ID: OCSI/CERT/ATS/08/2020/RC

Certificate

certificate could not be downloaded, no link is available.

Certification report

Extracted keywords

Hash functions
SHA-256

Security level
EAL2+, EAL4, EAL2, EAL2 augmented
Claims
O.J
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_FLR, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FDP_HBI_EXT.1, FDP_PPR_EXT.1, FDP_RIP_EXT.1, FDP_RIP_EXT.2, FDP_VMS_EXT.1, FDP_VNC_EXT.1, FIA_AFL_EXT.1, FIA_PMG_EXT.1, FIA_UIA_EXT.1, FMT_MOF_EXT.1, FMT_MSA_EXT.1, FMT_SMO_EXT.1, FPT_DVD_EXT.1, FPT_EEM_EXT.1, FPT_HAS_EXT.1, FPT_RDM_EXT.1, FPT_VDP_EXT.1, FPT_VIV_EXT.1, FTP_UIF_EXT.1, FTP_UIF_EXT.2
Certificates
OCSI/CERT/ATS/08/2020/RC
Evaluation facilities
atsec

Standards
ISO/IEC 15408, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title Certification Report "Red Hat Virtualization v4.3"
Author OCSI
Creation date D:20220118094204+00'00'
Modification date D:20220118094204+00'00'
Pages 29
Creator Microsoft Word

Security target

Extracted keywords

Protocols
SSH, TLS

Security level
EAL2
Claims
O.VM_ISOLATION, O.VMM_INTEGRITY, O.PLATFORM_INTEGRITY, O.MANAGEMENT_ACCESS, O.AUDIT, O.CORRECTLY_APPLIED_CONFIGURATION, O.RESOURCE_ALLOCATION, T.UNAUTHORIZED_MODIFICATION, T.PLATFORM_COMPROMISE, T.UNAUTHORIZED_ACCESS, A.PLATFORM_INTEGRITY, A.PHYSICAL, A.TRUSTED_ADMIN, A.NON_MALICIOUS_USER, OE.PHYSICAL, OE.TRUSTED_ADMIN, OE.NON_MALICIOUS_USER, OE.PLATFORM_INTEGRITY
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_SAR.1, FAU_STG.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FDP_HBI_EXT, FDP_PPR_EXT, FDP_RIP, FDP_VMS_EXT, FDP_VNC_EXT, FDP_HBI_EXT.1, FDP_HBI_EXT.1.1, FDP_PPR_EXT.1, FDP_PPR_EXT.1.1, FDP_PPR_EXT.1.2, FDP_PPR_EXT.1.3, FDP_RIP_EXT.1, FDP_RIP_EXT.2, FDP_RIP_EXT.1.1, FDP_RIP_EXT.2.1, FDP_VMS_EXT.1, FDP_VMS_EXT.1.1, FDP_VMS_EXT.1.2, FDP_VMS_EXT.1.3, FDP_VNC_EXT.1, FDP_VNC_EXT.1.1, FDP_VNC_EXT.1.2, FIA_AFL, FIA_PMG_EXT, FIA_UIA_EXT, FIA_AFL_EXT.1, FIA_AFL_EXT.1.1, FIA_AFL_EXT.1.2, FIA_PMG_EXT.1, FIA_PMG_EXT.1.1, FIA_UIA_EXT.1, FIA_UIA_EXT.1.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FMT_MOF, FMT_MSA, FMT_SMO_EXT, FMT_MOF_EXT.1, FMT_MSA_EXT.1, FMT_MOF_EXT.1.1, FMT_MSA_EXT.1.1, FMT_MSA_EXT.1.2, FMT_SMO_EXT.1, FMT_SMO_EXT.1.1, FPT_DVD_EXT, FPT_EEM_EXT, FPT_HAS_EXT, FPT_RDM_EXT, FPT_VDP_EXT, FPT_VIV_EXT, FPT_DVD_EXT.1, FPT_DVD_EXT.1.1, FPT_EEM_EXT.1, FPT_EEM_EXT.1.1, FPT_HAS_EXT.1, FPT_HAS_EXT.1.1, FPT_HAS_EXT.1.2, FPT_RDM_EXT.1, FPT_RDM_EXT.1.1, FPT_RDM_EXT.1.2, FPT_VDP_EXT.1, FPT_VDP_EXT.1.1, FPT_VDP_EXT.1.2, FPT_VIV_EXT.1, FPT_VIV_EXT.1.1, FPT_VIV_EXT.1.2, FPT_STM.1, FPT_STM.1.1, FTP_UIF_EXT, FTP_UIF_EXT.1, FTP_UIF_EXT.2, FTP_UIF_EXT.1.1, FTP_UIF_EXT.2.1

Side-channel analysis
side-channels

File metadata

Title RHV_ST_2.3
Subject Security Target for Red Hat Virtualization 4.3
Author Red Hat
Creation date D:20211209072021Z00'00'
Modification date D:20211209072021Z00'00'
Pages 64
Creator Word
Producer macOS Version 11.6 (Build 20G165) Quartz PDFContext

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

OCSI/CERT/ATS/08/2020/RC

Extracted SARs

ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2018-16881
C N
HIGH 7.5 3.6 25.01.2019
CVE-2018-17958
C N
HIGH 7.5 3.6 09.10.2018
CVE-2018-17963
C N
CRITICAL 9.8 5.9 09.10.2018
CVE-2018-3639
C N
MEDIUM 5.5 3.6 22.05.2018
CVE-2019-10166
C N
HIGH 7.8 5.9 02.08.2019
CVE-2019-10167
C N
HIGH 7.8 5.9 02.08.2019
CVE-2019-10168
C N
HIGH 7.8 5.9 02.08.2019
CVE-2019-10194
C N
MEDIUM 5.5 3.6 11.07.2019
CVE-2019-10744
C N
CRITICAL 9.1 5.2 26.07.2019
CVE-2019-11358
C N
MEDIUM 6.1 2.7 20.04.2019
CVE-2019-19336
C N
MEDIUM 6.1 2.7 19.03.2020
CVE-2019-8331
C N
MEDIUM 6.1 2.7 20.02.2019
Showing 5 out of 12.

Scheme data

Title Red Hat Virtualization v4.3
Supplier Red Hat, Inc.
Level EAL2+
Certification Date 18.01.2022
Report Link It https://www.ocsi.gov.it/documenti/certificazioni/redhat/rhv/rc_red_hat_virtualization_43_v1.0_it.pdf
Report Link En https://www.ocsi.gov.it/documenti/certificazioni/redhat/rhv/cr_red_hat_virtualization_43_v1.0_en.pdf
Target Link https://www.ocsi.gov.it/documenti/certificazioni/redhat/rhv/st_red_hat_virtualization_43_v2.3.pdf

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": null,
  "dgst": "b702b2e7f406bd67",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "OCSI/CERT/ATS/08/2020/RC",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:o:redhat:virtualization:4.3:*:*:*:*:*:*:*",
        "cpe:2.3:a:redhat:virtualization:4.3:*:*:*:*:*:*:*",
        "cpe:2.3:a:redhat:virtualization_manager:4.3:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "eal": "EAL2+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.3"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2019-10168",
        "CVE-2018-17963",
        "CVE-2019-10194",
        "CVE-2019-19336",
        "CVE-2019-10166",
        "CVE-2019-11358",
        "CVE-2019-10744",
        "CVE-2019-8331",
        "CVE-2018-17958",
        "CVE-2019-10167",
        "CVE-2018-16881",
        "CVE-2018-3639"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "certification_date": "2022-01-18",
      "level": "EAL2+",
      "report_link_en": "https://www.ocsi.gov.it/documenti/certificazioni/redhat/rhv/cr_red_hat_virtualization_43_v1.0_en.pdf",
      "report_link_it": "https://www.ocsi.gov.it/documenti/certificazioni/redhat/rhv/rc_red_hat_virtualization_43_v1.0_it.pdf",
      "supplier": "Red Hat, Inc.",
      "target_link": "https://www.ocsi.gov.it/documenti/certificazioni/redhat/rhv/st_red_hat_virtualization_43_v2.3.pdf",
      "title": "Red Hat Virtualization v4.3"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Red Hat, Inc.",
  "manufacturer_web": "https://www.redhat.com",
  "name": "Red Hat Virtualization v4.3",
  "not_valid_after": "2027-01-18",
  "not_valid_before": "2022-01-18",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "cr_red_hat_virtualization_43_en.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "IT": {
          "OCSI/CERT/ATS/08/2020/RC": 29
        }
      },
      "cc_claims": {
        "O": {
          "O.J": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR": 1,
          "ALC_FLR.3": 7
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 8,
          "EAL2 augmented": 3,
          "EAL2+": 1,
          "EAL4": 1
        }
      },
      "cc_sfr": {
        "FDP": {
          "FDP_HBI_EXT.1": 1,
          "FDP_PPR_EXT.1": 1,
          "FDP_RIP_EXT.1": 1,
          "FDP_RIP_EXT.2": 1,
          "FDP_VMS_EXT.1": 1,
          "FDP_VNC_EXT.1": 1
        },
        "FIA": {
          "FIA_AFL_EXT.1": 1,
          "FIA_PMG_EXT.1": 1,
          "FIA_UIA_EXT.1": 1
        },
        "FMT": {
          "FMT_MOF_EXT.1": 3,
          "FMT_MSA_EXT.1": 1,
          "FMT_SMO_EXT.1": 1
        },
        "FPT": {
          "FPT_DVD_EXT.1": 1,
          "FPT_EEM_EXT.1": 1,
          "FPT_HAS_EXT.1": 1,
          "FPT_RDM_EXT.1": 1,
          "FPT_VDP_EXT.1": 1,
          "FPT_VIV_EXT.1": 1
        },
        "FTP": {
          "FTP_UIF_EXT.1": 1,
          "FTP_UIF_EXT.2": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "atsec": {
          "atsec": 4
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "ISO": {
          "ISO/IEC 15408": 6
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "OCSI",
      "/CreationDate": "D:20220118094204+00\u002700\u0027",
      "/Creator": "Microsoft Word",
      "/ModDate": "D:20220118094204+00\u002700\u0027",
      "/Title": "Certification Report \"Red Hat Virtualization v4.3\"",
      "pdf_file_size_bytes": 598121,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 29
    },
    "st_filename": "st_red_hat_virtualization_43_v2.3.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.NON_MALICIOUS_USER": 3,
          "A.PHYSICAL": 3,
          "A.PLATFORM_INTEGRITY": 3,
          "A.TRUSTED_ADMIN": 3
        },
        "O": {
          "O.AUDIT": 8,
          "O.CORRECTLY_APPLIED_CONFIGURATION": 5,
          "O.MANAGEMENT_ACCESS": 12,
          "O.PLATFORM_INTEGRITY": 14,
          "O.RESOURCE_ALLOCATION": 6,
          "O.VMM_INTEGRITY": 14,
          "O.VM_ISOLATION": 16
        },
        "OE": {
          "OE.NON_MALICIOUS_USER": 3,
          "OE.PHYSICAL": 3,
          "OE.PLATFORM_INTEGRITY": 3,
          "OE.TRUSTED_ADMIN": 3
        },
        "T": {
          "T.PLATFORM_COMPROMISE": 3,
          "T.UNAUTHORIZED_ACCESS": 3,
          "T.UNAUTHORIZED_MODIFICATION": 4
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR.3": 5
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 6
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_GEN.1": 9,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_SAR.1": 7,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_STG.1": 6,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1
        },
        "FDP": {
          "FDP_HBI_EXT": 2,
          "FDP_HBI_EXT.1": 10,
          "FDP_HBI_EXT.1.1": 2,
          "FDP_PPR_EXT": 2,
          "FDP_PPR_EXT.1": 13,
          "FDP_PPR_EXT.1.1": 2,
          "FDP_PPR_EXT.1.2": 2,
          "FDP_PPR_EXT.1.3": 2,
          "FDP_RIP": 2,
          "FDP_RIP_EXT.1": 11,
          "FDP_RIP_EXT.1.1": 2,
          "FDP_RIP_EXT.2": 11,
          "FDP_RIP_EXT.2.1": 2,
          "FDP_VMS_EXT": 2,
          "FDP_VMS_EXT.1": 12,
          "FDP_VMS_EXT.1.1": 6,
          "FDP_VMS_EXT.1.2": 3,
          "FDP_VMS_EXT.1.3": 3,
          "FDP_VNC_EXT": 2,
          "FDP_VNC_EXT.1": 13,
          "FDP_VNC_EXT.1.1": 3,
          "FDP_VNC_EXT.1.2": 3
        },
        "FIA": {
          "FIA_AFL": 2,
          "FIA_AFL_EXT.1": 10,
          "FIA_AFL_EXT.1.1": 2,
          "FIA_AFL_EXT.1.2": 2,
          "FIA_PMG_EXT": 2,
          "FIA_PMG_EXT.1": 10,
          "FIA_PMG_EXT.1.1": 2,
          "FIA_UAU.5": 9,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UIA_EXT": 2,
          "FIA_UIA_EXT.1": 10,
          "FIA_UIA_EXT.1.1": 2
        },
        "FMT": {
          "FMT_MOF": 2,
          "FMT_MOF_EXT.1": 13,
          "FMT_MOF_EXT.1.1": 2,
          "FMT_MSA": 2,
          "FMT_MSA_EXT.1": 13,
          "FMT_MSA_EXT.1.1": 2,
          "FMT_MSA_EXT.1.2": 2,
          "FMT_SMO_EXT": 2,
          "FMT_SMO_EXT.1": 10,
          "FMT_SMO_EXT.1.1": 2
        },
        "FPT": {
          "FPT_DVD_EXT": 2,
          "FPT_DVD_EXT.1": 12,
          "FPT_DVD_EXT.1.1": 2,
          "FPT_EEM_EXT": 2,
          "FPT_EEM_EXT.1": 12,
          "FPT_EEM_EXT.1.1": 2,
          "FPT_HAS_EXT": 2,
          "FPT_HAS_EXT.1": 12,
          "FPT_HAS_EXT.1.1": 2,
          "FPT_HAS_EXT.1.2": 2,
          "FPT_RDM_EXT": 2,
          "FPT_RDM_EXT.1": 10,
          "FPT_RDM_EXT.1.1": 2,
          "FPT_RDM_EXT.1.2": 2,
          "FPT_STM.1": 8,
          "FPT_STM.1.1": 1,
          "FPT_VDP_EXT": 2,
          "FPT_VDP_EXT.1": 12,
          "FPT_VDP_EXT.1.1": 2,
          "FPT_VDP_EXT.1.2": 3,
          "FPT_VIV_EXT": 2,
          "FPT_VIV_EXT.1": 12,
          "FPT_VIV_EXT.1.1": 2,
          "FPT_VIV_EXT.1.2": 3
        },
        "FTP": {
          "FTP_UIF_EXT": 2,
          "FTP_UIF_EXT.1": 10,
          "FTP_UIF_EXT.1.1": 2,
          "FTP_UIF_EXT.2": 10,
          "FTP_UIF_EXT.2.1": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 10
        },
        "TLS": {
          "TLS": {
            "TLS": 1
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "SCA": {
          "side-channels": 3
        }
      },
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Red Hat",
      "/CreationDate": "D:20211209072021Z00\u002700\u0027",
      "/Creator": "Word",
      "/ModDate": "D:20211209072021Z00\u002700\u0027",
      "/Producer": "macOS Version 11.6 (Build 20G165) Quartz PDFContext",
      "/Subject": "Security Target for Red Hat Virtualization 4.3",
      "/Title": "RHV_ST_2.3",
      "pdf_file_size_bytes": 802160,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 64
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_red_hat_virtualization_43_en.pdf",
  "scheme": "IT",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.3",
      "EAL2+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_red_hat_virtualization_43_v2.3.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "3a55a799723fe684a7a8b505c018a3f4ffa2588a2e4cb4111d36abca42f23143",
      "txt_hash": "05cb0c699dd111fc18cf3c661a2e802de20a8629a818d151634a1e8cdd6b03f2"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "5266235d93dc33426d7c1c0fb8b793662afcb776a6db9394470b6f56cd326433",
      "txt_hash": "3b00bc8e0d02b87db0a9386330b3c48f2deab9487de1086726c0f748efb5e988"
    }
  },
  "status": "active"
}