Microsoft Exchange Server 2010 SP1 Enterprise (English) 64-bit

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status archived
Valid from 16.02.2011
Valid until 13.07.2017
Scheme 🇦🇺 AU
Manufacturer Microsoft Corporation
Category Other Devices and Systems
Security level ALC_FLR.3, EAL4+

Heuristics summary ?

Certificate ID: Certificate Number: 2011/72

Certificate ?

Certification report ?

Extracted keywords

Protocols
TLS

Vendor
Microsoft, Microsoft Corporation

Security level
EAL4, EAL4+, EAL4 augmented
Security Assurance Requirements (SAR)
ALC_FLR.3
Certificates
Certificate Number: 2011/72

Vulnerabilities
CVE-2010-3332

Standards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Title Certification Report
Subject Certificate Number: 2011/72
Author roslyn.dinkgreve
Creation date D:20110415144320
Modification date D:20110415144320
Pages 25
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

Security target ?

Extracted keywords

Protocols
TLS

Vendor
Microsoft

Security level
EAL4+, EAL4, EAL4 augmented
Claims
O.DAC, O.CONBLK, O.RESTDIST, O.REDUCE_SPAM, O.MAIL_FLOW, O.WIPE, T.UNAUTH_DAC, T.AUTH_DAC, T.UNAUTHUSE, T.SPAM, T.DL_MISUSE, A.COM_PROT, A.INSTALL, A.PLATFORM, A.BLOCKLIST, A.NO_EVIL_ADM, A.PHYS_PROTECT, A.NO_EVIL_ADMIN, OE.PLATFORM, OE.COM_PROT, OE.INSTALL, OE.BLOCKLIST, OE.PHYSICAL, OSP.MAIL_FLOW, OSP.WIPE
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3, ASE_INT, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_REQ, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FDP_IFF, FDP_ACC, FDP_ACF, FDP_IFC, FDP_ACF.1, FDP_ACC.1, FDP_IFF.1, FDP_IFC.1, FIA_SOS.1, FIA_UAU.2, FIA_UID.2, FIA_USB.1, FIA_SOS.1.1, FIA_UAU, FIA_UAU.1, FIA_UAU.2.1, FIA_UID.1, FIA_UID, FIA_UID.2.1, FIA_USB, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_ATD.1, FMT_MOF.1, FMT_SMF.1, FMT_MSA.1, FMT_MSA, FMT_MSA.3, FMT_MOF.1.1, FMT_SMR.1, FMT_SMF.1.1, FMT_MSA.1.1, FMT_MSA.3.2
Certification process
out of scope, the device on receipt of the command is dependent on the platform and configuration and considered out of scope. 4.3 Security objectives for the IT environment Identifier Objective statements OE.PLATFORM The

Certification process
out of scope, the device on receipt of the command is dependent on the platform and configuration and considered out of scope. 4.3 Security objectives for the IT environment Identifier Objective statements OE.PLATFORM The

Standards
RFC 2821, RFC 2822

File metadata

Title Exchange 2010
Subject EAL4 Security Target
Author Aaron Doggett (stratsec)
Creation date D:20101223114445+11'00'
Modification date D:20101223114445+11'00'
Pages 66
Creator Microsoft® Word 2010
Producer Microsoft® Word 2010

Heuristics ?

Certificate ID: Certificate Number: 2011/72

Extracted SARs

ALC_LCD.1, ALC_TAT.1, ASE_SPD.1, ASE_REQ.2, ADV_FSP.4, AVA_VAN.3, ADV_IMP.1, ASE_INT.1, ADV_TDS.3, ASE_CCL.1, ALC_CMC.4, AGD_OPE.1, ALC_CMS.4, ALC_DVS.1, ASE_TSS.1, ALC_DEL.1, ATE_DPT.1, ATE_FUN.1, ATE_COV.2, ADV_ARC.1, AGD_PRE.1, ATE_IND.2, ALC_FLR.3, ASE_OBJ.2, ASE_ECD.1

CPE matches

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2012-4791
C M N
LOW 3.5 2.9 12.12.2012 00:55
CVE-2013-0418
C M N
MEDIUM 6.8 6.4 17.01.2013 01:55
CVE-2013-5072
C M N
MEDIUM 4.3 2.9 11.12.2013 00:55
CVE-2014-6319
C M N
MEDIUM 5.0 2.9 11.12.2014 00:59
CVE-2016-0138
C M N
MEDIUM 4.3 1.4 14.09.2016 10:59
CVE-2017-8621
C M N
MEDIUM 6.1 2.7 11.07.2017 21:29
CVE-2018-0924
C M N
MEDIUM 6.5 3.6 14.03.2018 17:29
CVE-2018-0940
C M N
MEDIUM 6.5 3.6 14.03.2018 17:29
CVE-2018-8302
C M N
CRITICAL 9.8 5.9 15.08.2018 17:29
CVE-2019-1084
C M N
MEDIUM 6.5 3.6 15.07.2019 19:15
CVE-2019-1136
C M N
HIGH 8.1 5.9 15.07.2019 19:15
CVE-2020-0688
C M N
HIGH 8.8 5.9 11.02.2020 22:15
CVE-2020-17144
C M N
HIGH 8.4 6.0 10.12.2020 00:15
CVE-2021-26857
C M N
HIGH 7.8 5.9 03.03.2021 00:15

References ?

No references are available for this certificate.

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e9acfa7611ca40a0e4365d143c6c5ac8213a00879778a96ab9b94ea32f8df5be', 'txt_hash': '47fe88bbc7df67e9471f2b83da23091b6a74621d9d30066bbe863c8784986369'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4a9ec6bc13219418b8ba0b648bbd805a0816074157737ac0288351f1fc5cc367', 'txt_hash': '94cf4714ccaf5e9e6db113cca121a677edd61a7b64ff38a21c5f13fc62cd18f1'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 745978, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 25, '/Title': 'Certification Report', '/Author': 'roslyn.dinkgreve', '/Subject': 'Certificate Number: 2011/72', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20110415144320', '/ModDate': 'D:20110415144320', '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.dsd.gov.au/', 'https://www.stratsec.net/Microsoft-Exchange2010-CC-Certification.aspx']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 861830, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 66, '/Title': 'Exchange 2010', '/Author': 'Aaron Doggett (stratsec)', '/Subject': 'EAL4 Security Target', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20101223114445+11'00'", '/ModDate': "D:20101223114445+11'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'AU': {'Certificate Number: 2011/72': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 9, 'EAL4+': 1, 'EAL4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.3': 9}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Microsoft': {'Microsoft': 29, 'Microsoft Corporation': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 7}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {'CVE': {'CVE-2010-3332': 3}}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-001': 2, 'CCMB-2009-07-002': 2, 'CCMB-2009-07-003': 2, 'CCMB-2009-07-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 2, 'EAL4': 11, 'EAL4 augmented': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_FSP.4': 2, 'ADV_IMP.1': 2, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_FLR.3': 8, 'ALC_CMC.4': 2, 'ALC_CMS.4': 2, 'ALC_DEL.1': 2, 'ALC_DVS.1': 2, 'ALC_LCD.1': 2, 'ALC_TAT.1': 2}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_VAN.3': 2}, 'ASE': {'ASE_INT': 2, 'ASE_CCL': 2, 'ASE_SPD': 2, 'ASE_OBJ': 2, 'ASE_REQ': 2, 'ASE_TSS': 2, 'ASE_CCL.1': 2, 'ASE_ECD.1': 2, 'ASE_INT.1': 2, 'ASE_OBJ.2': 2, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2, 'ASE_TSS.1': 2}}, 'cc_sfr': {'FDP': {'FDP_IFF': 70, 'FDP_ACC': 20, 'FDP_ACF': 24, 'FDP_IFC': 39, 'FDP_ACF.1': 5, 'FDP_ACC.1': 7, 'FDP_IFF.1': 10, 'FDP_IFC.1': 12}, 'FIA': {'FIA_SOS.1': 6, 'FIA_UAU.2': 7, 'FIA_UID.2': 4, 'FIA_USB.1': 5, 'FIA_SOS.1.1': 1, 'FIA_UAU': 1, 'FIA_UAU.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.1': 2, 'FIA_UID': 1, 'FIA_UID.2.1': 1, 'FIA_USB': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_ATD.1': 3}, 'FMT': {'FMT_MOF.1': 7, 'FMT_SMF.1': 22, 'FMT_MSA.1': 28, 'FMT_MSA': 62, 'FMT_MSA.3': 15, 'FMT_MOF.1.1': 1, 'FMT_SMR.1': 18, 'FMT_SMF.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.2': 1}}, 'cc_claims': {'O': {'O.DAC': 14, 'O.CONBLK': 6, 'O.RESTDIST': 7, 'O.REDUCE_SPAM': 6, 'O.MAIL_FLOW': 5, 'O.WIPE': 5}, 'T': {'T.UNAUTH_DAC': 3, 'T.AUTH_DAC': 5, 'T.UNAUTHUSE': 2, 'T.SPAM': 7, 'T.DL_MISUSE': 4}, 'A': {'A.COM_PROT': 2, 'A.INSTALL': 2, 'A.PLATFORM': 2, 'A.BLOCKLIST': 2, 'A.NO_EVIL_ADM': 1, 'A.PHYS_PROTECT': 2, 'A.NO_EVIL_ADMIN': 1}, 'OE': {'OE.PLATFORM': 18, 'OE.COM_PROT': 2, 'OE.INSTALL': 3, 'OE.BLOCKLIST': 2, 'OE.PHYSICAL': 2}, 'OSP': {'OSP.MAIL_FLOW': 3, 'OSP.WIPE': 3}}, 'vendor': {'Microsoft': {'Microsoft': 10}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 16}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'RFC': {'RFC 2821': 9, 'RFC 2822': 6}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'the device on receipt of the command is dependent on the platform and configuration and considered out of scope. 4.3 Security objectives for the IT environment Identifier Objective statements OE.PLATFORM The': 1}}}.
    • The report_filename property was set to EFS-T024 CR SP1.pdf.
    • The st_filename property was set to E14_EAL4_ASE_1.0.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to Certificate Number: 2011/72.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFS-T024%20CR%20SP1.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/E14_EAL4_ASE_1.0.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Microsoft Exchange Server 2010 SP1 Enterprise (English) 64-bit was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": null,
  "dgst": "be0c7f67702ea646",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "Certificate Number: 2011/72",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_10:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_17:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_18:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_6:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_29:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_24:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_12:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_31:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_23:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_22:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_27:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_25:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp1:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_19:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup20:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_14:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_7:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_20:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_5:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_8:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_15:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_11:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp2:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_2:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_16:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_9:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_21:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_13:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_30:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_26:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_4:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_1:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_3:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_28:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "64",
        "2010"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2019-1136",
        "CVE-2017-8621",
        "CVE-2013-5072",
        "CVE-2012-4791",
        "CVE-2018-8154",
        "CVE-2019-0724",
        "CVE-2018-0940",
        "CVE-2013-0418",
        "CVE-2018-0924",
        "CVE-2016-0138",
        "CVE-2000-0216",
        "CVE-2020-17144",
        "CVE-2020-0688",
        "CVE-2018-8302",
        "CVE-2019-1084",
        "CVE-2018-8151",
        "CVE-2014-6319",
        "CVE-2021-26857",
        "CVE-2019-0817",
        "CVE-1999-1322"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Microsoft Corporation",
  "manufacturer_web": "https://www.microsoft.com",
  "name": "Microsoft Exchange Server 2010 SP1 Enterprise (English) 64-bit",
  "not_valid_after": "2017-07-13",
  "not_valid_before": "2011-02-16",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "EFS-T024 CR SP1.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "AU": {
          "Certificate Number: 2011/72": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.3": 9
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 9,
          "EAL4 augmented": 1,
          "EAL4+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 7
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2009-07-001": 2,
          "CCMB-2009-07-002": 2,
          "CCMB-2009-07-003": 2,
          "CCMB-2009-07-004": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 29,
          "Microsoft Corporation": 1
        }
      },
      "vulnerability": {
        "CVE": {
          "CVE-2010-3332": 3
        }
      }
    },
    "report_metadata": {
      "/Author": "roslyn.dinkgreve",
      "/CreationDate": "D:20110415144320",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20110415144320",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Subject": "Certificate Number: 2011/72",
      "/Title": "Certification Report",
      "pdf_file_size_bytes": 745978,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.dsd.gov.au/",
          "https://www.stratsec.net/Microsoft-Exchange2010-CC-Certification.aspx"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 25
    },
    "st_filename": "E14_EAL4_ASE_1.0.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.BLOCKLIST": 2,
          "A.COM_PROT": 2,
          "A.INSTALL": 2,
          "A.NO_EVIL_ADM": 1,
          "A.NO_EVIL_ADMIN": 1,
          "A.PHYS_PROTECT": 2,
          "A.PLATFORM": 2
        },
        "O": {
          "O.CONBLK": 6,
          "O.DAC": 14,
          "O.MAIL_FLOW": 5,
          "O.REDUCE_SPAM": 6,
          "O.RESTDIST": 7,
          "O.WIPE": 5
        },
        "OE": {
          "OE.BLOCKLIST": 2,
          "OE.COM_PROT": 2,
          "OE.INSTALL": 3,
          "OE.PHYSICAL": 2,
          "OE.PLATFORM": 18
        },
        "OSP": {
          "OSP.MAIL_FLOW": 3,
          "OSP.WIPE": 3
        },
        "T": {
          "T.AUTH_DAC": 5,
          "T.DL_MISUSE": 4,
          "T.SPAM": 7,
          "T.UNAUTHUSE": 2,
          "T.UNAUTH_DAC": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 2,
          "ADV_FSP.4": 2,
          "ADV_IMP.1": 2,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.4": 2,
          "ALC_CMS.4": 2,
          "ALC_DEL.1": 2,
          "ALC_DVS.1": 2,
          "ALC_FLR.3": 8,
          "ALC_LCD.1": 2,
          "ALC_TAT.1": 2
        },
        "ASE": {
          "ASE_CCL": 2,
          "ASE_CCL.1": 2,
          "ASE_ECD.1": 2,
          "ASE_INT": 2,
          "ASE_INT.1": 2,
          "ASE_OBJ": 2,
          "ASE_OBJ.2": 2,
          "ASE_REQ": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS": 2,
          "ASE_TSS.1": 2
        },
        "ATE": {
          "ATE_COV.2": 2,
          "ATE_DPT.1": 2,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_VAN.3": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 11,
          "EAL4 augmented": 4,
          "EAL4+": 2
        }
      },
      "cc_sfr": {
        "FDP": {
          "FDP_ACC": 20,
          "FDP_ACC.1": 7,
          "FDP_ACF": 24,
          "FDP_ACF.1": 5,
          "FDP_IFC": 39,
          "FDP_IFC.1": 12,
          "FDP_IFF": 70,
          "FDP_IFF.1": 10
        },
        "FIA": {
          "FIA_ATD.1": 3,
          "FIA_SOS.1": 6,
          "FIA_SOS.1.1": 1,
          "FIA_UAU": 1,
          "FIA_UAU.1": 1,
          "FIA_UAU.2": 7,
          "FIA_UAU.2.1": 1,
          "FIA_UID": 1,
          "FIA_UID.1": 2,
          "FIA_UID.2": 4,
          "FIA_UID.2.1": 1,
          "FIA_USB": 1,
          "FIA_USB.1": 5,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MOF.1": 7,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 62,
          "FMT_MSA.1": 28,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 15,
          "FMT_MSA.3.2": 1,
          "FMT_SMF.1": 22,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 18
        }
      },
      "certification_process": {
        "OutOfScope": {
          "out of scope": 1,
          "the device on receipt of the command is dependent on the platform and configuration and considered out of scope. 4.3 Security objectives for the IT environment Identifier Objective statements OE.PLATFORM The": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 16
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "RFC": {
          "RFC 2821": 9,
          "RFC 2822": 6
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 10
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Aaron Doggett (stratsec)",
      "/CreationDate": "D:20101223114445+11\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20101223114445+11\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "/Subject": "EAL4 Security Target",
      "/Title": "Exchange 2010",
      "pdf_file_size_bytes": 861830,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 66
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFS-T024%20CR%20SP1.pdf",
  "scheme": "AU",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_FLR.3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/E14_EAL4_ASE_1.0.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e9acfa7611ca40a0e4365d143c6c5ac8213a00879778a96ab9b94ea32f8df5be",
      "txt_hash": "47fe88bbc7df67e9471f2b83da23091b6a74621d9d30066bbe863c8784986369"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4a9ec6bc13219418b8ba0b648bbd805a0816074157737ac0288351f1fc5cc367",
      "txt_hash": "94cf4714ccaf5e9e6db113cca121a677edd61a7b64ff38a21c5f13fc62cd18f1"
    }
  },
  "status": "archived"
}