This page was not yet optimized for use on mobile devices.
Microsoft Exchange Server 2010 SP1 Enterprise (English) 64-bit
This certificate has known related CVEs, which means that
the certified
product might be vulnerable.
CSV information ?
Status | archived |
---|---|
Valid from | 16.02.2011 |
Valid until | 13.07.2017 |
Scheme | 🇦🇺 AU |
Manufacturer | Microsoft Corporation |
Category | Other Devices and Systems |
Security level | EAL4+, ALC_FLR.3 |
Heuristics summary ?
Certificate ID: Certificate Number: 2011/72
Certificate ?
Certification report ?
Extracted keywords
Protocols
TLSVendor
Microsoft, Microsoft CorporationSecurity level
EAL4, EAL4+, EAL4 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.3Certificates
Certificate Number: 2011/72Vulnerabilities
CVE-2010-3332Standards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
Title | Certification Report |
---|---|
Subject | Certificate Number: 2011/72 |
Author | roslyn.dinkgreve |
Creation date | D:20110415144320 |
Modification date | D:20110415144320 |
Pages | 25 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
Security target ?
Extracted keywords
Protocols
TLSVendor
MicrosoftSecurity level
EAL4+, EAL4, EAL4 augmentedClaims
O.DAC, O.CONBLK, O.RESTDIST, O.REDUCE_SPAM, O.MAIL_FLOW, O.WIPE, T.UNAUTH_DAC, T.AUTH_DAC, T.UNAUTHUSE, T.SPAM, T.DL_MISUSE, A.COM_PROT, A.INSTALL, A.PLATFORM, A.BLOCKLIST, A.NO_EVIL_ADM, A.PHYS_PROTECT, A.NO_EVIL_ADMIN, OE.PLATFORM, OE.COM_PROT, OE.INSTALL, OE.BLOCKLIST, OE.PHYSICAL, OSP.MAIL_FLOW, OSP.WIPESecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3, ASE_INT, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_REQ, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FDP_IFF, FDP_ACC, FDP_ACF, FDP_IFC, FDP_ACF.1, FDP_ACC.1, FDP_IFF.1, FDP_IFC.1, FIA_SOS.1, FIA_UAU.2, FIA_UID.2, FIA_USB.1, FIA_SOS.1.1, FIA_UAU, FIA_UAU.1, FIA_UAU.2.1, FIA_UID.1, FIA_UID, FIA_UID.2.1, FIA_USB, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_ATD.1, FMT_MOF.1, FMT_SMF.1, FMT_MSA.1, FMT_MSA, FMT_MSA.3, FMT_MOF.1.1, FMT_SMR.1, FMT_SMF.1.1, FMT_MSA.1.1, FMT_MSA.3.2Certification process
out of scope, the device on receipt of the command is dependent on the platform and configuration and considered out of scope. 4.3 Security objectives for the IT environment Identifier Objective statements OE.PLATFORM TheCertification process
out of scope, the device on receipt of the command is dependent on the platform and configuration and considered out of scope. 4.3 Security objectives for the IT environment Identifier Objective statements OE.PLATFORM TheStandards
RFC 2821, RFC 2822File metadata
Title | Exchange 2010 |
---|---|
Subject | EAL4 Security Target |
Author | Aaron Doggett (stratsec) |
Creation date | D:20101223114445+11'00' |
Modification date | D:20101223114445+11'00' |
Pages | 66 |
Creator | Microsoft® Word 2010 |
Producer | Microsoft® Word 2010 |
Heuristics ?
Certificate ID: Certificate Number: 2011/72
Extracted SARs
ASE_ECD.1, ALC_DEL.1, AVA_VAN.3, AGD_PRE.1, ADV_IMP.1, ALC_LCD.1, ADV_FSP.4, ATE_FUN.1, ASE_REQ.2, ALC_CMS.4, ALC_TAT.1, ASE_CCL.1, ASE_OBJ.2, ATE_COV.2, ADV_ARC.1, ALC_FLR.3, ATE_IND.2, ALC_DVS.1, ATE_DPT.1, ASE_SPD.1, AGD_OPE.1, ASE_INT.1, ALC_CMC.4, ASE_TSS.1, ADV_TDS.3CPE matches
- cpe:2.3:a:microsoft:exchange_server:2010:sp1:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp2:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup20:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_10:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_11:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_12:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_13:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_14:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_15:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_16:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_17:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_18:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_19:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_1:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_20:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_21:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_22:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_23:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_24:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_25:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_26:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_27:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_28:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_29:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_2:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_30:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_31:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_3:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_4:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_5:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_6:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_7:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_8:*:*:*:*:*:*
- cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_9:*:*:*:*:*:*
Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-1999-1322 | MEDIUM | 4.6 | 6.4 | 12.11.1998 05:00 | ||
CVE-2000-0216 | MEDIUM | 5.0 | 2.9 | 29.02.2000 05:00 | ||
CVE-2012-4791 | LOW | 3.5 | 2.9 | 12.12.2012 00:55 | ||
CVE-2013-0418 | MEDIUM | 6.8 | 6.4 | 17.01.2013 01:55 | ||
CVE-2013-5072 | MEDIUM | 4.3 | 2.9 | 11.12.2013 00:55 | ||
CVE-2014-6319 | MEDIUM | 5.0 | 2.9 | 11.12.2014 00:59 | ||
CVE-2016-0138 | MEDIUM | 4.3 | 1.4 | 14.09.2016 10:59 | ||
CVE-2017-8621 | MEDIUM | 6.1 | 2.7 | 11.07.2017 21:29 | ||
CVE-2018-0924 | MEDIUM | 6.5 | 3.6 | 14.03.2018 17:29 | ||
CVE-2018-0940 | MEDIUM | 6.5 | 3.6 | 14.03.2018 17:29 | ||
CVE-2018-8151 | MEDIUM | 4.3 | 1.4 | 09.05.2018 19:29 | ||
CVE-2018-8154 | CRITICAL | 9.8 | 5.9 | 09.05.2018 19:29 | ||
CVE-2018-8302 | CRITICAL | 9.8 | 5.9 | 15.08.2018 17:29 | ||
CVE-2019-0724 | HIGH | 8.1 | 5.9 | 05.03.2019 23:29 | ||
CVE-2019-0817 | MEDIUM | 5.4 | 2.5 | 09.04.2019 21:29 | ||
CVE-2019-1084 | MEDIUM | 6.5 | 3.6 | 15.07.2019 19:15 | ||
CVE-2019-1136 | HIGH | 8.1 | 5.9 | 15.07.2019 19:15 | ||
CVE-2020-0688 | HIGH | 8.8 | 5.9 | 11.02.2020 22:15 | ||
CVE-2020-17144 | HIGH | 8.4 | 6.0 | 10.12.2020 00:15 | ||
CVE-2021-26857 | HIGH | 7.8 | 5.9 | 03.03.2021 00:15 |
References ?
No references are available for this certificate.
Updates ?
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e9acfa7611ca40a0e4365d143c6c5ac8213a00879778a96ab9b94ea32f8df5be', 'txt_hash': '47fe88bbc7df67e9471f2b83da23091b6a74621d9d30066bbe863c8784986369'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4a9ec6bc13219418b8ba0b648bbd805a0816074157737ac0288351f1fc5cc367', 'txt_hash': '94cf4714ccaf5e9e6db113cca121a677edd61a7b64ff38a21c5f13fc62cd18f1'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 745978, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 25, '/Title': 'Certification Report', '/Author': 'roslyn.dinkgreve', '/Subject': 'Certificate Number: 2011/72', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20110415144320', '/ModDate': 'D:20110415144320', '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.stratsec.net/Microsoft-Exchange2010-CC-Certification.aspx', 'http://www.dsd.gov.au/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 861830, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 66, '/Title': 'Exchange 2010', '/Author': 'Aaron Doggett (stratsec)', '/Subject': 'EAL4 Security Target', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20101223114445+11'00'", '/ModDate': "D:20101223114445+11'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'AU': {'Certificate Number: 2011/72': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 9, 'EAL4+': 1, 'EAL4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.3': 9}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Microsoft': {'Microsoft': 29, 'Microsoft Corporation': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 7}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {'CVE': {'CVE-2010-3332': 3}}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-001': 2, 'CCMB-2009-07-002': 2, 'CCMB-2009-07-003': 2, 'CCMB-2009-07-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 2, 'EAL4': 11, 'EAL4 augmented': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_FSP.4': 2, 'ADV_IMP.1': 2, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_FLR.3': 8, 'ALC_CMC.4': 2, 'ALC_CMS.4': 2, 'ALC_DEL.1': 2, 'ALC_DVS.1': 2, 'ALC_LCD.1': 2, 'ALC_TAT.1': 2}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_VAN.3': 2}, 'ASE': {'ASE_INT': 2, 'ASE_CCL': 2, 'ASE_SPD': 2, 'ASE_OBJ': 2, 'ASE_REQ': 2, 'ASE_TSS': 2, 'ASE_CCL.1': 2, 'ASE_ECD.1': 2, 'ASE_INT.1': 2, 'ASE_OBJ.2': 2, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2, 'ASE_TSS.1': 2}}, 'cc_sfr': {'FDP': {'FDP_IFF': 70, 'FDP_ACC': 20, 'FDP_ACF': 24, 'FDP_IFC': 39, 'FDP_ACF.1': 5, 'FDP_ACC.1': 7, 'FDP_IFF.1': 10, 'FDP_IFC.1': 12}, 'FIA': {'FIA_SOS.1': 6, 'FIA_UAU.2': 7, 'FIA_UID.2': 4, 'FIA_USB.1': 5, 'FIA_SOS.1.1': 1, 'FIA_UAU': 1, 'FIA_UAU.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.1': 2, 'FIA_UID': 1, 'FIA_UID.2.1': 1, 'FIA_USB': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_ATD.1': 3}, 'FMT': {'FMT_MOF.1': 7, 'FMT_SMF.1': 22, 'FMT_MSA.1': 28, 'FMT_MSA': 62, 'FMT_MSA.3': 15, 'FMT_MOF.1.1': 1, 'FMT_SMR.1': 18, 'FMT_SMF.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.2': 1}}, 'cc_claims': {'O': {'O.DAC': 14, 'O.CONBLK': 6, 'O.RESTDIST': 7, 'O.REDUCE_SPAM': 6, 'O.MAIL_FLOW': 5, 'O.WIPE': 5}, 'T': {'T.UNAUTH_DAC': 3, 'T.AUTH_DAC': 5, 'T.UNAUTHUSE': 2, 'T.SPAM': 7, 'T.DL_MISUSE': 4}, 'A': {'A.COM_PROT': 2, 'A.INSTALL': 2, 'A.PLATFORM': 2, 'A.BLOCKLIST': 2, 'A.NO_EVIL_ADM': 1, 'A.PHYS_PROTECT': 2, 'A.NO_EVIL_ADMIN': 1}, 'OE': {'OE.PLATFORM': 18, 'OE.COM_PROT': 2, 'OE.INSTALL': 3, 'OE.BLOCKLIST': 2, 'OE.PHYSICAL': 2}, 'OSP': {'OSP.MAIL_FLOW': 3, 'OSP.WIPE': 3}}, 'vendor': {'Microsoft': {'Microsoft': 10}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 16}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'RFC': {'RFC 2821': 9, 'RFC 2822': 6}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'the device on receipt of the command is dependent on the platform and configuration and considered out of scope. 4.3 Security objectives for the IT environment Identifier Objective statements OE.PLATFORM The': 1}}}
. - The report_filename property was set to
EFS-T024 CR SP1.pdf
. - The st_filename property was set to
E14_EAL4_ASE_1.0.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
Certificate Number: 2011/72
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFS-T024%20CR%20SP1.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/E14_EAL4_ASE_1.0.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Microsoft Exchange Server 2010 SP1 Enterprise (English) 64-bit was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": null,
"dgst": "be0c7f67702ea646",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "Certificate Number: 2011/72",
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_10:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_17:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_18:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_6:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_29:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_24:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_12:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_31:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_23:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_22:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_27:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_25:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_19:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup20:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_14:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_7:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_20:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_5:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_8:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_15:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_11:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_16:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_9:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_21:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_13:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_30:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_26:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_4:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_28:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"64",
"2010"
]
},
"indirect_transitive_cves": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2019-1136",
"CVE-2017-8621",
"CVE-2013-5072",
"CVE-2012-4791",
"CVE-2018-8154",
"CVE-2019-0724",
"CVE-2018-0940",
"CVE-2013-0418",
"CVE-2018-0924",
"CVE-2016-0138",
"CVE-2000-0216",
"CVE-2020-17144",
"CVE-2020-0688",
"CVE-2018-8302",
"CVE-2019-1084",
"CVE-2018-8151",
"CVE-2014-6319",
"CVE-2021-26857",
"CVE-2019-0817",
"CVE-1999-1322"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Microsoft Corporation",
"manufacturer_web": "https://www.microsoft.com",
"name": "Microsoft Exchange Server 2010 SP1 Enterprise (English) 64-bit",
"not_valid_after": "2017-07-13",
"not_valid_before": "2011-02-16",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "EFS-T024 CR SP1.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"AU": {
"Certificate Number: 2011/72": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.3": 9
}
},
"cc_security_level": {
"EAL": {
"EAL4": 9,
"EAL4 augmented": 1,
"EAL4+": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 7
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 2,
"CCMB-2009-07-002": 2,
"CCMB-2009-07-003": 2,
"CCMB-2009-07-004": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 29,
"Microsoft Corporation": 1
}
},
"vulnerability": {
"CVE": {
"CVE-2010-3332": 3
}
}
},
"report_metadata": {
"/Author": "roslyn.dinkgreve",
"/CreationDate": "D:20110415144320",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20110415144320",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Subject": "Certificate Number: 2011/72",
"/Title": "Certification Report",
"pdf_file_size_bytes": 745978,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.dsd.gov.au/",
"https://www.stratsec.net/Microsoft-Exchange2010-CC-Certification.aspx"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 25
},
"st_filename": "E14_EAL4_ASE_1.0.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.BLOCKLIST": 2,
"A.COM_PROT": 2,
"A.INSTALL": 2,
"A.NO_EVIL_ADM": 1,
"A.NO_EVIL_ADMIN": 1,
"A.PHYS_PROTECT": 2,
"A.PLATFORM": 2
},
"O": {
"O.CONBLK": 6,
"O.DAC": 14,
"O.MAIL_FLOW": 5,
"O.REDUCE_SPAM": 6,
"O.RESTDIST": 7,
"O.WIPE": 5
},
"OE": {
"OE.BLOCKLIST": 2,
"OE.COM_PROT": 2,
"OE.INSTALL": 3,
"OE.PHYSICAL": 2,
"OE.PLATFORM": 18
},
"OSP": {
"OSP.MAIL_FLOW": 3,
"OSP.WIPE": 3
},
"T": {
"T.AUTH_DAC": 5,
"T.DL_MISUSE": 4,
"T.SPAM": 7,
"T.UNAUTHUSE": 2,
"T.UNAUTH_DAC": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 2,
"ADV_FSP.4": 2,
"ADV_IMP.1": 2,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.4": 2,
"ALC_CMS.4": 2,
"ALC_DEL.1": 2,
"ALC_DVS.1": 2,
"ALC_FLR.3": 8,
"ALC_LCD.1": 2,
"ALC_TAT.1": 2
},
"ASE": {
"ASE_CCL": 2,
"ASE_CCL.1": 2,
"ASE_ECD.1": 2,
"ASE_INT": 2,
"ASE_INT.1": 2,
"ASE_OBJ": 2,
"ASE_OBJ.2": 2,
"ASE_REQ": 2,
"ASE_REQ.2": 2,
"ASE_SPD": 2,
"ASE_SPD.1": 2,
"ASE_TSS": 2,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_COV.2": 2,
"ATE_DPT.1": 2,
"ATE_FUN.1": 2,
"ATE_IND.2": 2
},
"AVA": {
"AVA_VAN.3": 2
}
},
"cc_security_level": {
"EAL": {
"EAL4": 11,
"EAL4 augmented": 4,
"EAL4+": 2
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC": 20,
"FDP_ACC.1": 7,
"FDP_ACF": 24,
"FDP_ACF.1": 5,
"FDP_IFC": 39,
"FDP_IFC.1": 12,
"FDP_IFF": 70,
"FDP_IFF.1": 10
},
"FIA": {
"FIA_ATD.1": 3,
"FIA_SOS.1": 6,
"FIA_SOS.1.1": 1,
"FIA_UAU": 1,
"FIA_UAU.1": 1,
"FIA_UAU.2": 7,
"FIA_UAU.2.1": 1,
"FIA_UID": 1,
"FIA_UID.1": 2,
"FIA_UID.2": 4,
"FIA_UID.2.1": 1,
"FIA_USB": 1,
"FIA_USB.1": 5,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MOF.1": 7,
"FMT_MOF.1.1": 1,
"FMT_MSA": 62,
"FMT_MSA.1": 28,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 15,
"FMT_MSA.3.2": 1,
"FMT_SMF.1": 22,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 18
}
},
"certification_process": {
"OutOfScope": {
"out of scope": 1,
"the device on receipt of the command is dependent on the platform and configuration and considered out of scope. 4.3 Security objectives for the IT environment Identifier Objective statements OE.PLATFORM The": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 16
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"RFC": {
"RFC 2821": 9,
"RFC 2822": 6
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 10
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Aaron Doggett (stratsec)",
"/CreationDate": "D:20101223114445+11\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20101223114445+11\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Subject": "EAL4 Security Target",
"/Title": "Exchange 2010",
"pdf_file_size_bytes": 861830,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 66
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFS-T024%20CR%20SP1.pdf",
"scheme": "AU",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"ALC_FLR.3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/E14_EAL4_ASE_1.0.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e9acfa7611ca40a0e4365d143c6c5ac8213a00879778a96ab9b94ea32f8df5be",
"txt_hash": "47fe88bbc7df67e9471f2b83da23091b6a74621d9d30066bbe863c8784986369"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4a9ec6bc13219418b8ba0b648bbd805a0816074157737ac0288351f1fc5cc367",
"txt_hash": "94cf4714ccaf5e9e6db113cca121a677edd61a7b64ff38a21c5f13fc62cd18f1"
}
},
"status": "archived"
}