Microsoft Exchange Server 2010 SP1 Enterprise (English) 64-bit

Known vulnerabilities detected

Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.

CSV information

Status archived
Valid from 16.02.2011
Valid until 13.07.2017
Scheme 🇦🇺 AU
Manufacturer Microsoft Corporation
Category Other Devices and Systems
Security level ALC_FLR.3, EAL4+

Heuristics summary

Certificate ID: Certificate Number: 2011/72

Certificate

certificate file processing did not finish successfully.
Download pdf: ERROR
Convert pdf to text: ERROR
Extract keywords: ERROR

Certification report

Extracted keywords

Protocols
TLS

Vendor
Microsoft, Microsoft Corporation

Security level
EAL4, EAL4+, EAL4 augmented
Security Assurance Requirements (SAR)
ALC_FLR.3
Certificates
Certificate Number: 2011/72

Vulnerabilities
CVE-2010-3332

Standards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Title Certification Report
Subject Certificate Number: 2011/72
Author roslyn.dinkgreve
Creation date D:20110415144320
Modification date D:20110415144320
Pages 25
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

Security target

Extracted keywords

Protocols
TLS

Vendor
Microsoft

Security level
EAL4+, EAL4, EAL4 augmented
Claims
O.DAC, O.CONBLK, O.RESTDIST, O.REDUCE_SPAM, O.MAIL_FLOW, O.WIPE, T.UNAUTH_DAC, T.AUTH_DAC, T.UNAUTHUSE, T.SPAM, T.DL_MISUSE, A.COM_PROT, A.INSTALL, A.PLATFORM, A.BLOCKLIST, A.NO_EVIL_ADM, A.PHYS_PROTECT, A.NO_EVIL_ADMIN, OE.PLATFORM, OE.COM_PROT, OE.INSTALL, OE.BLOCKLIST, OE.PHYSICAL, OSP.MAIL_FLOW, OSP.WIPE
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3, ASE_INT, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_REQ, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FDP_IFF, FDP_ACC, FDP_ACF, FDP_IFC, FDP_ACF.1, FDP_ACC.1, FDP_IFF.1, FDP_IFC.1, FIA_SOS.1, FIA_UAU.2, FIA_UID.2, FIA_USB.1, FIA_SOS.1.1, FIA_UAU, FIA_UAU.1, FIA_UAU.2.1, FIA_UID.1, FIA_UID, FIA_UID.2.1, FIA_USB, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_ATD.1, FMT_MOF.1, FMT_SMF.1, FMT_MSA.1, FMT_MSA, FMT_MSA.3, FMT_MOF.1.1, FMT_SMR.1, FMT_SMF.1.1, FMT_MSA.1.1, FMT_MSA.3.2

Certification process
out of scope, the device on receipt of the command is dependent on the platform and configuration and considered out of scope. 4.3 Security objectives for the IT environment Identifier Objective statements OE.PLATFORM The

Standards
RFC 2821, RFC 2822

File metadata

Title Exchange 2010
Subject EAL4 Security Target
Author Aaron Doggett (stratsec)
Creation date D:20101223114445+11'00'
Modification date D:20101223114445+11'00'
Pages 66
Creator Microsoft® Word 2010
Producer Microsoft® Word 2010

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

Certificate Number: 2011/72

Extracted SARs

ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.3, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3

CPE matches

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-1999-1322
C N
MEDIUM 4.6 6.4 12.11.1998
CVE-2000-0216
C N
MEDIUM 5.0 2.9 29.02.2000
CVE-2012-4791
C N
LOW 3.5 2.9 12.12.2012
CVE-2013-0418
C N
MEDIUM 6.8 6.4 17.01.2013
CVE-2013-5072
C N
MEDIUM 4.3 2.9 11.12.2013
CVE-2014-6319
C N
MEDIUM 5.0 2.9 11.12.2014
CVE-2016-0138
C N
MEDIUM 4.3 1.4 14.09.2016
CVE-2017-8621
C N
MEDIUM 6.1 2.7 11.07.2017
CVE-2018-0924
C N
MEDIUM 6.5 3.6 14.03.2018
CVE-2018-0940
C N
MEDIUM 6.5 3.6 14.03.2018
CVE-2018-8151
C N
MEDIUM 4.3 1.4 09.05.2018
CVE-2018-8154
C N
CRITICAL 9.8 5.9 09.05.2018
CVE-2018-8302
C N
CRITICAL 9.8 5.9 15.08.2018
CVE-2019-0724
C N
HIGH 8.1 5.9 05.03.2019
CVE-2019-0817
C N
MEDIUM 5.4 2.5 09.04.2019
CVE-2019-1084
C N
MEDIUM 6.5 3.6 15.07.2019
CVE-2019-1136
C N
HIGH 8.1 5.9 15.07.2019
CVE-2020-0688
C N
HIGH 8.8 5.9 11.02.2020
CVE-2020-17144
C N
MEDIUM 6.0 6.4 10.12.2020
CVE-2021-26857
C N
MEDIUM 6.8 6.4 03.03.2021
CVE-2021-26858
C N
MEDIUM 6.8 6.4 03.03.2021
Showing 5 out of 21.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": null,
  "dgst": "be0c7f67702ea646",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "Certificate Number: 2011/72",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_3:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_8:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_13:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_25:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_16:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_29:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_14:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_27:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_23:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_26:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_17:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_18:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_11:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_20:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_12:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup20:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp2:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_28:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_1:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_30:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_24:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_10:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp1:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_7:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_2:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_15:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_4:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_21:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_6:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_5:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_22:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_9:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_31:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_19:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "64",
        "2010"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2019-1136",
        "CVE-2014-6319",
        "CVE-2018-8154",
        "CVE-2016-0138",
        "CVE-2020-0688",
        "CVE-2021-26857",
        "CVE-2013-0418",
        "CVE-2021-26858",
        "CVE-2017-8621",
        "CVE-2018-0940",
        "CVE-2019-0724",
        "CVE-2000-0216",
        "CVE-2018-0924",
        "CVE-2018-8302",
        "CVE-2019-1084",
        "CVE-2012-4791",
        "CVE-2019-0817",
        "CVE-2020-17144",
        "CVE-1999-1322",
        "CVE-2018-8151",
        "CVE-2013-5072"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Microsoft Corporation",
  "manufacturer_web": "https://www.microsoft.com",
  "name": "Microsoft Exchange Server 2010 SP1 Enterprise (English) 64-bit",
  "not_valid_after": "2017-07-13",
  "not_valid_before": "2011-02-16",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "EFS-T024 CR SP1.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "AU": {
          "Certificate Number: 2011/72": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.3": 9
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 9,
          "EAL4 augmented": 1,
          "EAL4+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 7
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2009-07-001": 2,
          "CCMB-2009-07-002": 2,
          "CCMB-2009-07-003": 2,
          "CCMB-2009-07-004": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 29,
          "Microsoft Corporation": 1
        }
      },
      "vulnerability": {
        "CVE": {
          "CVE-2010-3332": 3
        }
      }
    },
    "report_metadata": {
      "/Author": "roslyn.dinkgreve",
      "/CreationDate": "D:20110415144320",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20110415144320",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Subject": "Certificate Number: 2011/72",
      "/Title": "Certification Report",
      "pdf_file_size_bytes": 745978,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.stratsec.net/Microsoft-Exchange2010-CC-Certification.aspx",
          "http://www.dsd.gov.au/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 25
    },
    "st_filename": "E14_EAL4_ASE_1.0.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.BLOCKLIST": 2,
          "A.COM_PROT": 2,
          "A.INSTALL": 2,
          "A.NO_EVIL_ADM": 1,
          "A.NO_EVIL_ADMIN": 1,
          "A.PHYS_PROTECT": 2,
          "A.PLATFORM": 2
        },
        "O": {
          "O.CONBLK": 6,
          "O.DAC": 14,
          "O.MAIL_FLOW": 5,
          "O.REDUCE_SPAM": 6,
          "O.RESTDIST": 7,
          "O.WIPE": 5
        },
        "OE": {
          "OE.BLOCKLIST": 2,
          "OE.COM_PROT": 2,
          "OE.INSTALL": 3,
          "OE.PHYSICAL": 2,
          "OE.PLATFORM": 18
        },
        "OSP": {
          "OSP.MAIL_FLOW": 3,
          "OSP.WIPE": 3
        },
        "T": {
          "T.AUTH_DAC": 5,
          "T.DL_MISUSE": 4,
          "T.SPAM": 7,
          "T.UNAUTHUSE": 2,
          "T.UNAUTH_DAC": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 2,
          "ADV_FSP.4": 2,
          "ADV_IMP.1": 2,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.4": 2,
          "ALC_CMS.4": 2,
          "ALC_DEL.1": 2,
          "ALC_DVS.1": 2,
          "ALC_FLR.3": 8,
          "ALC_LCD.1": 2,
          "ALC_TAT.1": 2
        },
        "ASE": {
          "ASE_CCL": 2,
          "ASE_CCL.1": 2,
          "ASE_ECD.1": 2,
          "ASE_INT": 2,
          "ASE_INT.1": 2,
          "ASE_OBJ": 2,
          "ASE_OBJ.2": 2,
          "ASE_REQ": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS": 2,
          "ASE_TSS.1": 2
        },
        "ATE": {
          "ATE_COV.2": 2,
          "ATE_DPT.1": 2,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_VAN.3": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 11,
          "EAL4 augmented": 4,
          "EAL4+": 2
        }
      },
      "cc_sfr": {
        "FDP": {
          "FDP_ACC": 20,
          "FDP_ACC.1": 7,
          "FDP_ACF": 24,
          "FDP_ACF.1": 5,
          "FDP_IFC": 39,
          "FDP_IFC.1": 12,
          "FDP_IFF": 70,
          "FDP_IFF.1": 10
        },
        "FIA": {
          "FIA_ATD.1": 3,
          "FIA_SOS.1": 6,
          "FIA_SOS.1.1": 1,
          "FIA_UAU": 1,
          "FIA_UAU.1": 1,
          "FIA_UAU.2": 7,
          "FIA_UAU.2.1": 1,
          "FIA_UID": 1,
          "FIA_UID.1": 2,
          "FIA_UID.2": 4,
          "FIA_UID.2.1": 1,
          "FIA_USB": 1,
          "FIA_USB.1": 5,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MOF.1": 7,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 62,
          "FMT_MSA.1": 28,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 15,
          "FMT_MSA.3.2": 1,
          "FMT_SMF.1": 22,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 18
        }
      },
      "certification_process": {
        "OutOfScope": {
          "out of scope": 1,
          "the device on receipt of the command is dependent on the platform and configuration and considered out of scope. 4.3 Security objectives for the IT environment Identifier Objective statements OE.PLATFORM The": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 16
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "RFC": {
          "RFC 2821": 9,
          "RFC 2822": 6
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 10
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Aaron Doggett (stratsec)",
      "/CreationDate": "D:20101223114445+11\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20101223114445+11\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "/Subject": "EAL4 Security Target",
      "/Title": "Exchange 2010",
      "pdf_file_size_bytes": 861830,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 66
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFS-T024%20CR%20SP1.pdf",
  "scheme": "AU",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.3",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/E14_EAL4_ASE_1.0.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e9acfa7611ca40a0e4365d143c6c5ac8213a00879778a96ab9b94ea32f8df5be",
      "txt_hash": "47fe88bbc7df67e9471f2b83da23091b6a74621d9d30066bbe863c8784986369"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4a9ec6bc13219418b8ba0b648bbd805a0816074157737ac0288351f1fc5cc367",
      "txt_hash": "94cf4714ccaf5e9e6db113cca121a677edd61a7b64ff38a21c5f13fc62cd18f1"
    }
  },
  "status": "archived"
}