Strong Customer Authentication for Apple Pay on MacBook Air 2024 with M3running macOS Sequoia 15.4

Known vulnerabilities detected

Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.

CSV information

Status active
Valid from 16.01.2026
Valid until 16.01.2031
Scheme 🇪🇸 ES
Manufacturer Apple Inc.
Category Other Devices and Systems
Security level ADV_FSP.3, EAL2+, ALC_FLR.3

Heuristics summary

Certificate ID: 2025-11-INF-4674

Certificate

certificate file processing did not finish successfully.
Download pdf: OK
Convert pdf to text: OK
Extract keywords: ERROR

Extracted keywords

Security level
EAL 4, EAL 2, EAL2+
Claims
T.I
Security Assurance Requirements (SAR)
ADV_FSP.3, ALC_FLR.3
Evaluation facilities
Applus Laboratories

Certification report

Extracted keywords

Security level
EAL2, EAL 1, EAL 4, EAL 2, ITSEC Evaluation
Security Assurance Requirements (SAR)
ADV_FSP.3, ADV_ARC.1, ADV_TDS.1, AGD_OPE.1, ALC_FLR.3, ALC_CMC.2, ALC_DEL.1, ALC_FLR, ATE_COV.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1
Security Functional Requirements (SFR)
FDP_DAU.1, FDP_ACC, FDP_ACF, FDP_ITT.1, FDP_ETC, FDP_ITC.1, FDP_UCT, FDP_UIT, FDP_RIP.1, FIA_UID.2, FIA_UAU.5, FIA_AFL, FIA_UAU.6, FIA_ATD.1, FMT_SMR.1, FMT_MSA.3, FMT_MTD.1, FPR_UNO.1, FPT_ITC.1, FPT_RPL, FTP_ITC
Certificates
2025-11-INF-4674- v1
Evaluation facilities
Applus Laboratories

File metadata

Pages 18

Security target

Extracted keywords

Asymmetric Algorithms
ECDH
Schemes
MAC
Protocols
TLS 1.2, TLS

Trusted Execution Environments
SE

Security level
EAL 2, EAL2, EAL 2 augmented
Claims
D.OS, D.SEP_SE, T.CORRUPT, T.PHYSICAL, T.RECOVER, T.REPLAY, T.SILENT, T.SKIM-, T.USURP, T.SKIMMING, A.DEVICE_AUTH, A.PERSO, A.WATCH_USER, A.NO_EXTERNAL_KEY-, A.NO_EVIL_ROOT_USER, A.NO_EXTERNAL_KEYBOARD
Security Assurance Requirements (SAR)
ADV_FSP.3, ADV_ARC.1, ADV_TDS.1, ADV_FSP.2, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.3, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1
Security Functional Requirements (SFR)
FDP_DAU.1, FDP_DAU.1.1, FDP_DAU.1.2, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_ITT.1, FDP_ITT.1.1, FDP_ETC, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_UCT, FDP_UCT.1, FDP_UIT, FDP_UIT.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.1.1, FDP_ACC.1, FDP_IFC.1, FDP_ETC.2, FIA_UID.2, FIA_UID.2.1, FIA_UAU.2, FIA_UAU.2.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_AFL.1, FIA_AFL, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.6.1, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.1, FIA_UID.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1.1, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.3, FMT_MTD.3.1, FPR_UNO.1, FPR_UNO.1.1, FPT_ITC.1, FPT_ITC.1.1, FPT_RPL, FPT_RPL.1, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1

Certification process
out of scope, Element of the device is separately certified according to the Common Criteria and is therefore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by, pected to return to its User. Note: Defending against device re-use after physical compromise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* Strong Customer

Standards
FIPS 140-3

File metadata

Pages 56

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

2025-11-INF-4674

Extracted SARs

ADV_ARC.1, ADV_FSP.3, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2

Related CVEs

ID Links Severity CVSS Score Published on
Base score
CVE-2025-14174
C N
HIGH 8.8 12.12.2025
CVE-2025-24088
C N
HIGH 7.5 15.09.2025
CVE-2025-24142
C N
MEDIUM 5.5 12.05.2025
CVE-2025-24188
C N
MEDIUM 6.5 30.07.2025
CVE-2025-24197
C N
MEDIUM 5.5 15.09.2025
CVE-2025-24222
C N
MEDIUM 6.5 12.05.2025
CVE-2025-24223
C N
HIGH 8.0 12.05.2025
CVE-2025-24224
C N
HIGH 7.5 30.07.2025
CVE-2025-24274
C N
HIGH 7.8 12.05.2025
CVE-2025-30440
C N
MEDIUM 5.5 12.05.2025
CVE-2025-31200
C N
CRITICAL 9.8 16.04.2025
CVE-2025-31201
C N
CRITICAL 9.8 16.04.2025
CVE-2025-31204
C N
HIGH 8.8 12.05.2025
CVE-2025-31205
C N
MEDIUM 6.5 12.05.2025
CVE-2025-31206
C N
MEDIUM 4.3 12.05.2025
CVE-2025-31208
C N
HIGH 7.5 12.05.2025
CVE-2025-31209
C N
MEDIUM 6.3 12.05.2025
CVE-2025-31212
C N
MEDIUM 5.5 12.05.2025
CVE-2025-31213
C N
HIGH 7.6 12.05.2025
CVE-2025-31215
C N
MEDIUM 6.5 12.05.2025
CVE-2025-31217
C N
MEDIUM 6.5 12.05.2025
CVE-2025-31218
C N
MEDIUM 6.2 12.05.2025
CVE-2025-31219
C N
HIGH 7.1 12.05.2025
CVE-2025-31220
C N
MEDIUM 5.5 12.05.2025
CVE-2025-31221
C N
HIGH 7.5 12.05.2025
CVE-2025-31222
C N
HIGH 7.8 12.05.2025
CVE-2025-31223
C N
HIGH 8.0 12.05.2025
CVE-2025-31224
C N
HIGH 7.8 12.05.2025
CVE-2025-31226
C N
MEDIUM 5.5 12.05.2025
CVE-2025-31232
C N
HIGH 7.1 12.05.2025
CVE-2025-31233
C N
MEDIUM 6.3 12.05.2025
CVE-2025-31234
C N
HIGH 8.2 12.05.2025
CVE-2025-31235
C N
MEDIUM 6.5 12.05.2025
CVE-2025-31236
C N
MEDIUM 5.5 12.05.2025
CVE-2025-31237
C N
HIGH 7.5 12.05.2025
CVE-2025-31238
C N
HIGH 7.3 12.05.2025
CVE-2025-31239
C N
MEDIUM 4.3 12.05.2025
CVE-2025-31240
C N
HIGH 7.5 12.05.2025
CVE-2025-31241
C N
MEDIUM 5.3 12.05.2025
CVE-2025-31242
C N
MEDIUM 5.5 12.05.2025
CVE-2025-31243
C N
HIGH 7.8 30.07.2025
CVE-2025-31244
C N
HIGH 8.8 12.05.2025
CVE-2025-31245
C N
MEDIUM 5.5 12.05.2025
CVE-2025-31246
C N
HIGH 8.8 12.05.2025
CVE-2025-31247
C N
HIGH 7.5 12.05.2025
CVE-2025-31248
C N
MEDIUM 5.5 21.11.2025
CVE-2025-31249
C N
HIGH 7.1 12.05.2025
CVE-2025-31250
C N
MEDIUM 5.5 12.05.2025
CVE-2025-31251
C N
MEDIUM 5.5 12.05.2025
CVE-2025-31255
C N
CRITICAL 9.8 15.09.2025
CVE-2025-31256
C N
MEDIUM 5.5 12.05.2025
CVE-2025-31257
C N
MEDIUM 4.7 12.05.2025
CVE-2025-31258
C N
MEDIUM 6.5 12.05.2025
CVE-2025-31259
C N
HIGH 7.8 12.05.2025
CVE-2025-31260
C N
MEDIUM 5.5 12.05.2025
CVE-2025-31266
C N
MEDIUM 4.3 21.11.2025
CVE-2025-31268
C N
MEDIUM 5.5 15.09.2025
CVE-2025-31269
C N
MEDIUM 5.5 15.09.2025
CVE-2025-31270
C N
MEDIUM 5.5 15.09.2025
CVE-2025-31271
C N
HIGH 7.5 15.09.2025
CVE-2025-31273
C N
HIGH 8.8 30.07.2025
CVE-2025-31275
C N
MEDIUM 6.2 30.07.2025
CVE-2025-31277
C N
HIGH 8.8 30.07.2025
CVE-2025-31278
C N
HIGH 8.8 30.07.2025
CVE-2025-31279
C N
CRITICAL 9.8 30.07.2025
CVE-2025-31280
C N
HIGH 7.8 30.07.2025
CVE-2025-31281
C N
CRITICAL 9.1 30.07.2025
CVE-2025-43185
C N
MEDIUM 5.5 30.07.2025
CVE-2025-43186
C N
CRITICAL 9.8 30.07.2025
CVE-2025-43187
C N
HIGH 7.8 29.08.2025
CVE-2025-43188
C N
HIGH 7.8 30.07.2025
CVE-2025-43189
C N
CRITICAL 9.8 30.07.2025
CVE-2025-43190
C N
MEDIUM 5.5 15.09.2025
CVE-2025-43191
C N
MEDIUM 6.2 30.07.2025
CVE-2025-43192
C N
CRITICAL 9.8 30.07.2025
CVE-2025-43193
C N
CRITICAL 9.8 30.07.2025
CVE-2025-43194
C N
CRITICAL 9.8 30.07.2025
CVE-2025-43195
C N
MEDIUM 5.5 30.07.2025
CVE-2025-43196
C N
HIGH 7.8 30.07.2025
CVE-2025-43197
C N
MEDIUM 4.0 30.07.2025
CVE-2025-43198
C N
CRITICAL 9.8 30.07.2025
CVE-2025-43199
C N
CRITICAL 9.8 30.07.2025
CVE-2025-43204
C N
HIGH 7.8 15.09.2025
CVE-2025-43206
C N
MEDIUM 4.0 30.07.2025
CVE-2025-43207
C N
MEDIUM 5.5 15.09.2025
CVE-2025-43208
C N
MEDIUM 5.5 15.09.2025
CVE-2025-43209
C N
CRITICAL 9.8 30.07.2025
CVE-2025-43211
C N
MEDIUM 6.2 30.07.2025
CVE-2025-43212
C N
MEDIUM 6.5 30.07.2025
CVE-2025-43213
C N
MEDIUM 6.5 30.07.2025
CVE-2025-43214
C N
MEDIUM 6.5 30.07.2025
CVE-2025-43215
C N
MEDIUM 5.5 30.07.2025
CVE-2025-43216
C N
MEDIUM 6.5 30.07.2025
CVE-2025-43218
C N
MEDIUM 5.5 30.07.2025
CVE-2025-43220
C N
CRITICAL 9.8 30.07.2025
CVE-2025-43221
C N
HIGH 7.1 30.07.2025
CVE-2025-43222
C N
CRITICAL 9.8 30.07.2025
CVE-2025-43223
C N
HIGH 7.5 30.07.2025
CVE-2025-43224
C N
HIGH 7.1 30.07.2025
CVE-2025-43225
C N
MEDIUM 5.5 30.07.2025
CVE-2025-43226
C N
MEDIUM 4.0 30.07.2025
CVE-2025-43227
C N
HIGH 7.5 30.07.2025
CVE-2025-43229
C N
MEDIUM 6.1 30.07.2025
CVE-2025-43230
C N
MEDIUM 4.0 30.07.2025
CVE-2025-43232
C N
CRITICAL 9.8 30.07.2025
CVE-2025-43233
C N
CRITICAL 9.8 30.07.2025
CVE-2025-43234
C N
CRITICAL 9.8 30.07.2025
CVE-2025-43235
C N
MEDIUM 5.5 30.07.2025
CVE-2025-43237
C N
CRITICAL 9.8 30.07.2025
CVE-2025-43239
C N
HIGH 7.1 30.07.2025
CVE-2025-43240
C N
MEDIUM 6.2 30.07.2025
CVE-2025-43241
C N
MEDIUM 5.5 30.07.2025
CVE-2025-43243
C N
CRITICAL 9.8 30.07.2025
CVE-2025-43244
C N
CRITICAL 9.8 30.07.2025
CVE-2025-43245
C N
CRITICAL 9.8 30.07.2025
CVE-2025-43246
C N
MEDIUM 5.5 30.07.2025
CVE-2025-43247
C N
MEDIUM 5.5 30.07.2025
CVE-2025-43248
C N
HIGH 7.8 30.07.2025
CVE-2025-43249
C N
HIGH 7.8 30.07.2025
CVE-2025-43250
C N
MEDIUM 4.0 30.07.2025
CVE-2025-43251
C N
MEDIUM 5.5 30.07.2025
CVE-2025-43252
C N
MEDIUM 6.5 30.07.2025
CVE-2025-43253
C N
CRITICAL 9.8 30.07.2025
CVE-2025-43254
C N
HIGH 7.1 30.07.2025
CVE-2025-43255
C N
LOW 3.3 29.08.2025
CVE-2025-43256
C N
HIGH 7.8 30.07.2025
CVE-2025-43259
C N
MEDIUM 4.6 30.07.2025
CVE-2025-43260
C N
MEDIUM 5.1 30.07.2025
CVE-2025-43261
C N
CRITICAL 9.8 30.07.2025
CVE-2025-43262
C N
MEDIUM 5.1 15.09.2025
CVE-2025-43265
C N
MEDIUM 4.0 30.07.2025
CVE-2025-43266
C N
MEDIUM 5.1 30.07.2025
CVE-2025-43267
C N
MEDIUM 5.5 30.07.2025
CVE-2025-43268
C N
HIGH 7.8 29.08.2025
CVE-2025-43270
C N
HIGH 8.8 30.07.2025
CVE-2025-43272
C N
MEDIUM 6.5 15.09.2025
CVE-2025-43274
C N
MEDIUM 4.4 30.07.2025
CVE-2025-43275
C N
CRITICAL 9.8 30.07.2025
CVE-2025-43276
C N
MEDIUM 5.3 30.07.2025
CVE-2025-43279
C N
MEDIUM 6.2 15.09.2025
CVE-2025-43281
C N
HIGH 7.8 15.10.2025
CVE-2025-43282
C N
MEDIUM 5.5 15.10.2025
CVE-2025-43283
C N
LOW 3.3 15.09.2025
CVE-2025-43284
C N
MEDIUM 5.5 29.08.2025
CVE-2025-43285
C N
MEDIUM 5.5 15.09.2025
CVE-2025-43286
C N
HIGH 7.8 15.09.2025
CVE-2025-43287
C N
HIGH 7.1 15.09.2025
CVE-2025-43288
C N
MEDIUM 5.5 04.11.2025
CVE-2025-43291
C N
MEDIUM 5.5 15.09.2025
CVE-2025-43292
C N
MEDIUM 5.5 15.09.2025
CVE-2025-43293
C N
MEDIUM 5.5 15.09.2025
CVE-2025-43294
C N
LOW 3.3 15.09.2025
CVE-2025-43295
C N
MEDIUM 5.5 15.09.2025
CVE-2025-43296
C N
MEDIUM 5.5 09.10.2025
CVE-2025-43297
C N
MEDIUM 6.2 15.09.2025
CVE-2025-43298
C N
HIGH 7.8 15.09.2025
CVE-2025-43299
C N
MEDIUM 5.5 15.09.2025
CVE-2025-43301
C N
LOW 3.3 15.09.2025
CVE-2025-43302
C N
MEDIUM 5.5 15.09.2025
CVE-2025-43303
C N
MEDIUM 5.5 15.09.2025
CVE-2025-43304
C N
HIGH 7.0 15.09.2025
CVE-2025-43305
C N
MEDIUM 5.5 15.09.2025
CVE-2025-43307
C N
MEDIUM 4.0 15.09.2025
CVE-2025-43308
C N
MEDIUM 5.3 15.09.2025
CVE-2025-43310
C N
MEDIUM 4.4 15.09.2025
CVE-2025-43311
C N
MEDIUM 5.1 15.09.2025
CVE-2025-43312
C N
MEDIUM 5.5 15.09.2025
CVE-2025-43313
C N
MEDIUM 5.5 15.10.2025
CVE-2025-43314
C N
MEDIUM 5.5 15.09.2025
CVE-2025-43315
C N
MEDIUM 5.5 15.09.2025
CVE-2025-43316
C N
HIGH 7.8 15.09.2025
CVE-2025-43317
C N
MEDIUM 5.5 15.09.2025
CVE-2025-43318
C N
MEDIUM 6.2 15.09.2025
CVE-2025-43319
C N
MEDIUM 5.5 15.09.2025
CVE-2025-43320
C N
HIGH 7.8 12.12.2025
CVE-2025-43321
C N
MEDIUM 5.5 15.09.2025
CVE-2025-43322
C N
MEDIUM 5.5 04.11.2025
CVE-2025-43325
C N
MEDIUM 5.5 15.09.2025
CVE-2025-43326
C N
MEDIUM 5.5 15.09.2025
CVE-2025-43327
C N
MEDIUM 6.5 15.09.2025
CVE-2025-43328
C N
LOW 3.3 15.09.2025
CVE-2025-43329
C N
HIGH 8.8 15.09.2025
CVE-2025-43330
C N
HIGH 8.2 15.09.2025
CVE-2025-43331
C N
MEDIUM 4.0 15.09.2025
CVE-2025-43332
C N
MEDIUM 5.2 15.09.2025
CVE-2025-43333
C N
HIGH 7.8 15.09.2025
CVE-2025-43334
C N
MEDIUM 5.5 04.11.2025
CVE-2025-43335
C N
MEDIUM 5.5 04.11.2025
CVE-2025-43336
C N
MEDIUM 4.4 04.11.2025
CVE-2025-43337
C N
MEDIUM 5.5 15.09.2025
CVE-2025-43340
C N
HIGH 7.8 15.09.2025
CVE-2025-43341
C N
HIGH 7.8 15.09.2025
CVE-2025-43342
C N
CRITICAL 9.8 15.09.2025
CVE-2025-43343
C N
CRITICAL 9.8 15.09.2025
CVE-2025-43344
C N
LOW 3.3 15.09.2025
CVE-2025-43345
C N
MEDIUM 5.5 04.11.2025
CVE-2025-43346
C N
MEDIUM 5.5 15.09.2025
CVE-2025-43347
C N
CRITICAL 9.8 15.09.2025
CVE-2025-43348
C N
MEDIUM 5.5 04.11.2025
CVE-2025-43349
C N
LOW 2.8 15.09.2025
CVE-2025-43351
C N
MEDIUM 5.5 12.12.2025
CVE-2025-43353
C N
MEDIUM 5.5 15.09.2025
CVE-2025-43354
C N
MEDIUM 5.5 15.09.2025
CVE-2025-43355
C N
MEDIUM 5.5 15.09.2025
CVE-2025-43356
C N
MEDIUM 6.5 15.09.2025
CVE-2025-43357
C N
LOW 3.3 15.09.2025
CVE-2025-43358
C N
HIGH 8.8 15.09.2025
CVE-2025-43359
C N
CRITICAL 9.8 15.09.2025
CVE-2025-43361
C N
HIGH 7.8 04.11.2025
CVE-2025-43364
C N
HIGH 7.8 04.11.2025
CVE-2025-43366
C N
MEDIUM 5.5 15.09.2025
CVE-2025-43367
C N
MEDIUM 5.5 15.09.2025
CVE-2025-43368
C N
MEDIUM 4.3 15.09.2025
CVE-2025-43369
C N
MEDIUM 5.5 15.09.2025
CVE-2025-43372
C N
HIGH 7.8 15.09.2025
CVE-2025-43373
C N
HIGH 7.5 04.11.2025
CVE-2025-43374
C N
MEDIUM 4.3 21.11.2025
CVE-2025-43377
C N
MEDIUM 5.5 04.11.2025
CVE-2025-43378
C N
MEDIUM 5.5 04.11.2025
CVE-2025-43379
C N
MEDIUM 5.5 04.11.2025
CVE-2025-43380
C N
MEDIUM 5.5 04.11.2025
CVE-2025-43381
C N
MEDIUM 5.5 12.12.2025
CVE-2025-43382
C N
MEDIUM 5.5 04.11.2025
CVE-2025-43383
C N
MEDIUM 4.3 04.11.2025
CVE-2025-43384
C N
MEDIUM 4.3 04.11.2025
CVE-2025-43385
C N
MEDIUM 4.3 04.11.2025
CVE-2025-43387
C N
HIGH 7.8 04.11.2025
CVE-2025-43388
C N
MEDIUM 5.5 12.12.2025
CVE-2025-43389
C N
MEDIUM 5.5 04.11.2025
CVE-2025-43390
C N
MEDIUM 5.5 04.11.2025
CVE-2025-43391
C N
MEDIUM 5.5 04.11.2025
CVE-2025-43393
C N
MEDIUM 5.2 12.12.2025
CVE-2025-43394
C N
MEDIUM 5.5 04.11.2025
CVE-2025-43395
C N
LOW 3.3 04.11.2025
CVE-2025-43396
C N
MEDIUM 5.5 04.11.2025
CVE-2025-43397
C N
MEDIUM 5.5 04.11.2025
CVE-2025-43398
C N
MEDIUM 5.5 04.11.2025
CVE-2025-43399
C N
HIGH 7.5 04.11.2025
CVE-2025-43400
C N
MEDIUM 6.3 29.09.2025
CVE-2025-43401
C N
HIGH 7.5 04.11.2025
CVE-2025-43402
C N
HIGH 7.8 12.12.2025
CVE-2025-43403
C N
MEDIUM 5.5 11.02.2026
CVE-2025-43404
C N
LOW 3.3 12.12.2025
CVE-2025-43405
C N
HIGH 7.5 04.11.2025
CVE-2025-43406
C N
MEDIUM 5.5 12.12.2025
CVE-2025-43407
C N
HIGH 7.8 04.11.2025
CVE-2025-43408
C N
LOW 2.4 04.11.2025
CVE-2025-43409
C N
MEDIUM 5.5 04.11.2025
CVE-2025-43410
C N
LOW 2.4 12.12.2025
CVE-2025-43411
C N
MEDIUM 5.5 04.11.2025
CVE-2025-43412
C N
MEDIUM 6.3 04.11.2025
CVE-2025-43413
C N
HIGH 7.5 04.11.2025
CVE-2025-43414
C N
MEDIUM 6.2 04.11.2025
CVE-2025-43416
C N
MEDIUM 5.5 12.12.2025
CVE-2025-43420
C N
MEDIUM 4.7 04.11.2025
CVE-2025-43423
C N
LOW 2.0 04.11.2025
CVE-2025-43428
C N
CRITICAL 9.8 17.12.2025
CVE-2025-43445
C N
MEDIUM 4.3 04.11.2025
CVE-2025-43446
C N
MEDIUM 5.5 04.11.2025
CVE-2025-43448
C N
MEDIUM 6.3 04.11.2025
CVE-2025-43461
C N
MEDIUM 5.5 12.12.2025
CVE-2025-43463
C N
MEDIUM 5.5 12.12.2025
CVE-2025-43464
C N
MEDIUM 6.5 12.12.2025
CVE-2025-43465
C N
MEDIUM 5.5 12.12.2025
CVE-2025-43466
C N
MEDIUM 5.5 12.12.2025
CVE-2025-43467
C N
HIGH 7.8 12.12.2025
CVE-2025-43468
C N
MEDIUM 5.5 04.11.2025
CVE-2025-43469
C N
MEDIUM 5.5 04.11.2025
CVE-2025-43470
C N
MEDIUM 5.5 12.12.2025
CVE-2025-43471
C N
MEDIUM 5.5 12.12.2025
CVE-2025-43472
C N
HIGH 7.8 04.11.2025
CVE-2025-43473
C N
MEDIUM 5.5 12.12.2025
CVE-2025-43474
C N
HIGH 7.8 04.11.2025
CVE-2025-43476
C N
HIGH 7.8 04.11.2025
CVE-2025-43477
C N
MEDIUM 5.5 04.11.2025
CVE-2025-43478
C N
MEDIUM 5.5 04.11.2025
CVE-2025-43479
C N
MEDIUM 5.5 04.11.2025
CVE-2025-43481
C N
MEDIUM 5.2 04.11.2025
CVE-2025-43482
C N
MEDIUM 5.5 12.12.2025
CVE-2025-43494
C N
HIGH 7.5 12.12.2025
CVE-2025-43496
C N
HIGH 7.5 04.11.2025
CVE-2025-43497
C N
MEDIUM 5.2 12.12.2025
CVE-2025-43498
C N
MEDIUM 5.5 04.11.2025
CVE-2025-43499
C N
MEDIUM 5.5 04.11.2025
CVE-2025-43501
C N
MEDIUM 4.3 17.12.2025
CVE-2025-43506
C N
HIGH 7.5 12.12.2025
CVE-2025-43509
C N
MEDIUM 5.5 12.12.2025
CVE-2025-43510
C N
HIGH 7.8 12.12.2025
CVE-2025-43512
C N
HIGH 7.8 12.12.2025
CVE-2025-43513
C N
MEDIUM 5.5 12.12.2025
CVE-2025-43514
C N
MEDIUM 5.5 17.12.2025
CVE-2025-43516
C N
LOW 3.3 12.12.2025
CVE-2025-43517
C N
LOW 3.3 12.12.2025
CVE-2025-43518
C N
LOW 3.3 12.12.2025
CVE-2025-43519
C N
MEDIUM 5.5 12.12.2025
CVE-2025-43520
C N
HIGH 7.1 12.12.2025
CVE-2025-43521
C N
MEDIUM 5.5 12.12.2025
CVE-2025-43522
C N
LOW 3.3 12.12.2025
CVE-2025-43523
C N
MEDIUM 5.5 12.12.2025
CVE-2025-43526
C N
CRITICAL 9.8 17.12.2025
CVE-2025-43527
C N
HIGH 7.8 12.12.2025
CVE-2025-43529
C N
HIGH 8.8 17.12.2025
CVE-2025-43530
C N
MEDIUM 5.5 12.12.2025
CVE-2025-43531
C N
LOW 3.1 17.12.2025
CVE-2025-43532
C N
LOW 2.8 12.12.2025
CVE-2025-43533
C N
LOW 3.5 17.12.2025
CVE-2025-43535
C N
MEDIUM 4.3 17.12.2025
CVE-2025-43536
C N
MEDIUM 4.3 17.12.2025
CVE-2025-43539
C N
HIGH 8.8 12.12.2025
CVE-2025-43541
C N
MEDIUM 4.3 17.12.2025
CVE-2025-43542
C N
HIGH 7.5 12.12.2025
CVE-2025-46276
C N
MEDIUM 5.5 12.12.2025
CVE-2025-46277
C N
LOW 3.3 17.12.2025
CVE-2025-46278
C N
MEDIUM 5.5 17.12.2025
CVE-2025-46279
C N
LOW 3.3 17.12.2025
CVE-2025-46281
C N
HIGH 8.8 17.12.2025
CVE-2025-46282
C N
MEDIUM 5.5 17.12.2025
CVE-2025-46283
C N
MEDIUM 5.5 17.12.2025
CVE-2025-46285
C N
HIGH 7.8 12.12.2025
CVE-2025-46287
C N
MEDIUM 6.5 12.12.2025
CVE-2025-46288
C N
MEDIUM 5.5 17.12.2025
CVE-2025-46289
C N
MEDIUM 5.5 12.12.2025
CVE-2025-46290
C N
HIGH 7.5 11.02.2026
CVE-2025-46291
C N
HIGH 7.8 17.12.2025
CVE-2025-46297
C N
MEDIUM 5.5 09.01.2026
CVE-2025-46298
C N
MEDIUM 6.5 09.01.2026
CVE-2025-46299
C N
MEDIUM 4.3 09.01.2026
CVE-2025-46300
C N
MEDIUM 5.7 11.02.2026
CVE-2025-46301
C N
MEDIUM 5.7 11.02.2026
CVE-2025-46302
C N
MEDIUM 5.7 11.02.2026
CVE-2025-46303
C N
MEDIUM 5.7 11.02.2026
CVE-2025-46304
C N
MEDIUM 5.7 11.02.2026
CVE-2025-46305
C N
MEDIUM 5.7 11.02.2026
CVE-2025-46306
C N
MEDIUM 5.5 28.01.2026
CVE-2025-46310
C N
MEDIUM 6.0 11.02.2026
CVE-2025-46316
C N
MEDIUM 4.3 28.01.2026
CVE-2025-6558
C N
HIGH 8.8 15.07.2025
CVE-2026-20601
C N
LOW 3.3 11.02.2026
CVE-2026-20602
C N
MEDIUM 5.5 11.02.2026
CVE-2026-20603
C N
MEDIUM 4.4 11.02.2026
CVE-2026-20605
C N
MEDIUM 4.6 11.02.2026
CVE-2026-20606
C N
HIGH 7.1 11.02.2026
CVE-2026-20608
C N
MEDIUM 5.5 11.02.2026
CVE-2026-20609
C N
MEDIUM 4.4 11.02.2026
CVE-2026-20610
C N
HIGH 7.8 11.02.2026
CVE-2026-20611
C N
HIGH 7.1 11.02.2026
CVE-2026-20612
C N
MEDIUM 5.5 11.02.2026
CVE-2026-20614
C N
HIGH 7.8 11.02.2026
CVE-2026-20618
C N
MEDIUM 5.5 11.02.2026
CVE-2026-20619
C N
MEDIUM 5.5 11.02.2026
CVE-2026-20620
C N
HIGH 7.7 11.02.2026
CVE-2026-20621
C N
MEDIUM 5.5 11.02.2026
CVE-2026-20623
C N
MEDIUM 5.5 11.02.2026
CVE-2026-20624
C N
MEDIUM 5.5 11.02.2026
CVE-2026-20625
C N
MEDIUM 5.5 11.02.2026
CVE-2026-20626
C N
HIGH 7.8 11.02.2026
CVE-2026-20628
C N
HIGH 7.1 11.02.2026
CVE-2026-20629
C N
MEDIUM 5.5 11.02.2026
CVE-2026-20630
C N
MEDIUM 5.5 11.02.2026
CVE-2026-20634
C N
MEDIUM 5.5 11.02.2026
CVE-2026-20635
C N
MEDIUM 4.3 11.02.2026
CVE-2026-20636
C N
MEDIUM 6.5 11.02.2026
CVE-2026-20641
C N
HIGH 7.1 11.02.2026
CVE-2026-20644
C N
MEDIUM 6.5 11.02.2026
CVE-2026-20646
C N
LOW 3.3 11.02.2026
CVE-2026-20647
C N
MEDIUM 5.5 11.02.2026
CVE-2026-20648
C N
MEDIUM 5.5 11.02.2026
CVE-2026-20649
C N
HIGH 7.5 11.02.2026
CVE-2026-20650
C N
HIGH 7.5 11.02.2026
CVE-2026-20652
C N
HIGH 7.5 11.02.2026
CVE-2026-20653
C N
MEDIUM 5.5 11.02.2026
CVE-2026-20654
C N
MEDIUM 5.5 11.02.2026
CVE-2026-20656
C N
LOW 3.3 11.02.2026
CVE-2026-20662
C N
MEDIUM 4.6 11.02.2026
CVE-2026-20666
C N
MEDIUM 5.5 11.02.2026
CVE-2026-20667
C N
HIGH 8.8 11.02.2026
CVE-2026-20669
C N
MEDIUM 5.5 11.02.2026
CVE-2026-20671
C N
LOW 3.1 11.02.2026
CVE-2026-20673
C N
MEDIUM 5.3 11.02.2026
CVE-2026-20675
C N
MEDIUM 5.5 11.02.2026
CVE-2026-20676
C N
MEDIUM 5.3 11.02.2026
CVE-2026-20680
C N
MEDIUM 6.5 11.02.2026
CVE-2026-20681
C N
LOW 3.3 11.02.2026
CVE-2026-20700
C N
HIGH 7.8 11.02.2026
Showing 5 out of 384.

Similar certificates

Name Certificate ID
Strong Customer Authentication for Apple Pay on Mac mini with M4 running macOS Sequoia 15.4, paired with Magic keyboa... ANSSI-CC-2025/36 Compare
Strong Customer Authentication for Apple Pay on Mac mini with M2 Pro and Magic keyboard with Touch ID running macOS S... ANSSI-CC-2024/42 Compare
Strong Customer Authentication for Apple Pay on MacBookAir 2024 with M3 running macOS Sonoma 14.4 2024-11-INF-4471 Compare
Strong Customer Authentication pour Apple Pay sur iPhone SE (2nde génération) avec A13 Bionic exécutant iOS 15.4.1 (V... ANSSI-CC-2023/15 Compare
Strong Customer Authentication for Apple Pay on iPhone 15 Pro with A17 Pro running iOS 17.4(iOS 17.4 (Build 21E219)) ANSSI-CC-2024/40 Compare
Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 17.4(iOS 17.4 ... ANSSI-CC-2024/39 Compare
Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4(watchOS 10.4 (build 21T216)) ANSSI-CC-2024/41 Compare
Strong Customer Authentication for Apple Pay on MacBookAir 2024with M3 running macOS Sonoma 14.4 2024-11-INF-4471 Compare
Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1 2023-9-INF-4307 Compare
Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1 Version 15.4.1 (buil... ANSSI-CC-2023/18 Compare
Strong Customer Authentication pour Apple Pay, sur MacBook Air 2020 avec M1 exécutant macOS Big Sur 11.3.1 ANSSI-CC-2022/44 Compare
Strong Customer Authentication pour Apple Pay sur MacBook Air 2020 avec M1 exécutant macOS Monterey 12.3.1 (Version 1... ANSSI-CC-2023/16 Compare
Showing 5 out of 12.

Scheme data

Product Strong Customer Authentication for Apple Pay on MacBook Air 2024 with M3 running macOS Sequoia 15.4
Product Link https://oc.ccn.cni.es/en/certified-products/certified-products/1084-strong-customer-authentication-for-apple-pay-on-macbook-air-2024-with-m3-running-macos-sequoia-15-4
Category Otras herramientas
Manufacturer Apple Inc.
Certification Date 16.01.2026
Enhanced
Description The TOE platform includes the components implementing Strong Customer Authentication (SCA) and Dynamic Linking for Apple Pay. User authentication is managed by the Secure Enclave. The Secure Enclave is a dedicated secure subsystem integrated into Apple systems on chip (SoCs). The Secure Enclave is isolated from the main processor to provide an extra layer of security and is designed to keep sensitive user data secure even when the Application Processor kernel becomes compromised. MacOS also allows the Apple Pay services and other security functions of the TOE to operate. The Secure Element (outside of the TOE) is the secure component holding the Apple Pay secrets and processes the Apple Pay transactions.
Category Otras herramientas
Manufacturer Apple Inc.
Type Product
Evaluation Facility Applus Laboratories
Status Certified
Certification Date 16.01.2026
Cc Version CC/CEM:2022 Release 1
Level EAL2 + ADV_FSP.3, ALC_FLR.3
Target Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2446
Cert Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2447
Report Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2448

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2025-11_Certificado.pdf",
  "dgst": "c2e0d23f0b5f4231",
  "heuristics": {
    "_type": "sec_certs.sample.cc_eucc_common.Heuristics",
    "annotated_references": null,
    "cert_id": "2025-11-INF-4674",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:o:apple:macos:15.4:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "eal": "EAL2+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "15.4"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2025-43187",
        "CVE-2025-24188",
        "CVE-2025-43322",
        "CVE-2025-43469",
        "CVE-2025-43407",
        "CVE-2025-43232",
        "CVE-2025-43279",
        "CVE-2025-43262",
        "CVE-2025-43372",
        "CVE-2025-43496",
        "CVE-2025-24088",
        "CVE-2025-31235",
        "CVE-2025-43400",
        "CVE-2025-43287",
        "CVE-2026-20625",
        "CVE-2026-20628",
        "CVE-2025-43423",
        "CVE-2025-31273",
        "CVE-2025-43220",
        "CVE-2025-43301",
        "CVE-2025-43358",
        "CVE-2025-43413",
        "CVE-2025-43470",
        "CVE-2025-43299",
        "CVE-2025-43186",
        "CVE-2025-43536",
        "CVE-2026-20649",
        "CVE-2025-24222",
        "CVE-2025-31208",
        "CVE-2025-43479",
        "CVE-2025-43381",
        "CVE-2025-43275",
        "CVE-2025-43384",
        "CVE-2025-31275",
        "CVE-2025-43374",
        "CVE-2025-43268",
        "CVE-2026-20621",
        "CVE-2025-31249",
        "CVE-2025-43272",
        "CVE-2026-20623",
        "CVE-2025-43510",
        "CVE-2025-43445",
        "CVE-2025-43531",
        "CVE-2025-43315",
        "CVE-2025-31268",
        "CVE-2025-43196",
        "CVE-2025-43224",
        "CVE-2026-20647",
        "CVE-2025-43356",
        "CVE-2026-20652",
        "CVE-2025-43227",
        "CVE-2026-20680",
        "CVE-2025-43212",
        "CVE-2025-43207",
        "CVE-2025-43377",
        "CVE-2025-31220",
        "CVE-2025-31217",
        "CVE-2025-43214",
        "CVE-2025-43513",
        "CVE-2025-43411",
        "CVE-2026-20620",
        "CVE-2025-14174",
        "CVE-2025-46281",
        "CVE-2026-20675",
        "CVE-2025-43380",
        "CVE-2025-43428",
        "CVE-2025-46306",
        "CVE-2025-31224",
        "CVE-2025-46305",
        "CVE-2025-43382",
        "CVE-2025-24142",
        "CVE-2026-20606",
        "CVE-2025-43335",
        "CVE-2026-20619",
        "CVE-2025-43517",
        "CVE-2025-43283",
        "CVE-2025-43318",
        "CVE-2025-43410",
        "CVE-2025-46299",
        "CVE-2025-43325",
        "CVE-2025-46300",
        "CVE-2025-46298",
        "CVE-2025-43364",
        "CVE-2025-43221",
        "CVE-2025-43261",
        "CVE-2025-43412",
        "CVE-2025-43252",
        "CVE-2025-43304",
        "CVE-2025-43337",
        "CVE-2025-43188",
        "CVE-2025-43206",
        "CVE-2025-43321",
        "CVE-2025-43281",
        "CVE-2025-43305",
        "CVE-2025-31244",
        "CVE-2025-43409",
        "CVE-2025-31240",
        "CVE-2025-46282",
        "CVE-2025-31206",
        "CVE-2025-43481",
        "CVE-2025-43416",
        "CVE-2026-20614",
        "CVE-2025-43533",
        "CVE-2025-31250",
        "CVE-2025-43331",
        "CVE-2025-43291",
        "CVE-2025-31234",
        "CVE-2025-43293",
        "CVE-2025-43501",
        "CVE-2026-20656",
        "CVE-2025-43233",
        "CVE-2025-43482",
        "CVE-2025-43464",
        "CVE-2025-43296",
        "CVE-2025-43284",
        "CVE-2025-46277",
        "CVE-2025-31232",
        "CVE-2025-43529",
        "CVE-2025-43366",
        "CVE-2025-43494",
        "CVE-2025-43355",
        "CVE-2025-43476",
        "CVE-2026-20626",
        "CVE-2025-43359",
        "CVE-2025-43414",
        "CVE-2025-31209",
        "CVE-2025-43541",
        "CVE-2025-43240",
        "CVE-2026-20666",
        "CVE-2025-31247",
        "CVE-2025-31215",
        "CVE-2025-43253",
        "CVE-2025-43282",
        "CVE-2025-43320",
        "CVE-2025-43311",
        "CVE-2025-43213",
        "CVE-2025-43420",
        "CVE-2025-43295",
        "CVE-2025-43235",
        "CVE-2025-43342",
        "CVE-2025-31255",
        "CVE-2026-20653",
        "CVE-2025-30440",
        "CVE-2025-43397",
        "CVE-2025-31221",
        "CVE-2025-43340",
        "CVE-2025-43237",
        "CVE-2025-43535",
        "CVE-2025-43389",
        "CVE-2025-43373",
        "CVE-2025-46279",
        "CVE-2026-20608",
        "CVE-2025-43247",
        "CVE-2025-31279",
        "CVE-2025-43250",
        "CVE-2025-43404",
        "CVE-2025-31242",
        "CVE-2025-24224",
        "CVE-2025-43532",
        "CVE-2025-43297",
        "CVE-2026-20629",
        "CVE-2026-20648",
        "CVE-2025-43351",
        "CVE-2025-43218",
        "CVE-2025-43349",
        "CVE-2025-43255",
        "CVE-2025-43471",
        "CVE-2025-43332",
        "CVE-2025-43347",
        "CVE-2025-43527",
        "CVE-2025-43341",
        "CVE-2025-46285",
        "CVE-2025-43204",
        "CVE-2026-20667",
        "CVE-2026-20610",
        "CVE-2025-31241",
        "CVE-2025-43519",
        "CVE-2025-43314",
        "CVE-2025-43312",
        "CVE-2025-43256",
        "CVE-2025-43473",
        "CVE-2025-43368",
        "CVE-2025-43406",
        "CVE-2025-24223",
        "CVE-2025-43276",
        "CVE-2025-31223",
        "CVE-2025-43523",
        "CVE-2025-31219",
        "CVE-2025-43193",
        "CVE-2025-31269",
        "CVE-2025-46302",
        "CVE-2025-43497",
        "CVE-2025-43195",
        "CVE-2025-43251",
        "CVE-2025-31212",
        "CVE-2025-31248",
        "CVE-2025-31236",
        "CVE-2025-43330",
        "CVE-2026-20641",
        "CVE-2025-31201",
        "CVE-2025-31246",
        "CVE-2025-43223",
        "CVE-2025-43526",
        "CVE-2025-43542",
        "CVE-2025-43285",
        "CVE-2025-43292",
        "CVE-2025-46291",
        "CVE-2025-43357",
        "CVE-2025-46276",
        "CVE-2026-20644",
        "CVE-2025-43390",
        "CVE-2025-31257",
        "CVE-2026-20646",
        "CVE-2026-20650",
        "CVE-2026-20669",
        "CVE-2025-31204",
        "CVE-2025-43344",
        "CVE-2025-43308",
        "CVE-2025-43461",
        "CVE-2025-43194",
        "CVE-2025-43310",
        "CVE-2025-31281",
        "CVE-2025-43329",
        "CVE-2025-43319",
        "CVE-2025-46304",
        "CVE-2025-43244",
        "CVE-2025-43477",
        "CVE-2025-43317",
        "CVE-2025-43521",
        "CVE-2025-43393",
        "CVE-2025-43520",
        "CVE-2026-20630",
        "CVE-2025-43243",
        "CVE-2025-43516",
        "CVE-2025-43343",
        "CVE-2025-43222",
        "CVE-2025-43225",
        "CVE-2025-43270",
        "CVE-2025-43199",
        "CVE-2025-43506",
        "CVE-2025-43229",
        "CVE-2026-20636",
        "CVE-2025-43336",
        "CVE-2025-43226",
        "CVE-2025-43254",
        "CVE-2025-43394",
        "CVE-2025-31218",
        "CVE-2025-43345",
        "CVE-2025-43379",
        "CVE-2025-43463",
        "CVE-2025-43353",
        "CVE-2025-43383",
        "CVE-2025-31233",
        "CVE-2025-43197",
        "CVE-2025-43316",
        "CVE-2025-46278",
        "CVE-2025-43298",
        "CVE-2026-20618",
        "CVE-2026-20673",
        "CVE-2025-31243",
        "CVE-2025-43248",
        "CVE-2025-31251",
        "CVE-2026-20603",
        "CVE-2025-43215",
        "CVE-2025-43478",
        "CVE-2025-43209",
        "CVE-2025-43246",
        "CVE-2025-43286",
        "CVE-2025-43446",
        "CVE-2025-43472",
        "CVE-2025-43294",
        "CVE-2025-43369",
        "CVE-2025-31239",
        "CVE-2025-31258",
        "CVE-2025-46316",
        "CVE-2025-43361",
        "CVE-2025-43211",
        "CVE-2025-43192",
        "CVE-2025-31270",
        "CVE-2025-31237",
        "CVE-2025-43216",
        "CVE-2025-43399",
        "CVE-2025-43378",
        "CVE-2025-43467",
        "CVE-2025-31200",
        "CVE-2025-43465",
        "CVE-2025-31213",
        "CVE-2025-43249",
        "CVE-2025-43398",
        "CVE-2025-46297",
        "CVE-2025-43266",
        "CVE-2025-43239",
        "CVE-2025-46290",
        "CVE-2025-31205",
        "CVE-2025-43191",
        "CVE-2026-20662",
        "CVE-2026-20605",
        "CVE-2025-43267",
        "CVE-2026-20676",
        "CVE-2025-31222",
        "CVE-2025-43530",
        "CVE-2025-46303",
        "CVE-2026-20612",
        "CVE-2025-43387",
        "CVE-2025-43348",
        "CVE-2025-43354",
        "CVE-2025-43402",
        "CVE-2025-43396",
        "CVE-2025-43391",
        "CVE-2025-31278",
        "CVE-2026-20624",
        "CVE-2025-43260",
        "CVE-2026-20671",
        "CVE-2025-43313",
        "CVE-2025-43234",
        "CVE-2025-43395",
        "CVE-2025-31266",
        "CVE-2026-20635",
        "CVE-2025-31280",
        "CVE-2025-43189",
        "CVE-2025-43208",
        "CVE-2026-20700",
        "CVE-2025-43539",
        "CVE-2025-43326",
        "CVE-2025-43522",
        "CVE-2025-46287",
        "CVE-2025-43403",
        "CVE-2025-43514",
        "CVE-2025-31260",
        "CVE-2025-43346",
        "CVE-2025-43474",
        "CVE-2025-43388",
        "CVE-2025-43230",
        "CVE-2025-43328",
        "CVE-2025-24197",
        "CVE-2025-43401",
        "CVE-2025-24274",
        "CVE-2026-20634",
        "CVE-2025-43512",
        "CVE-2025-43468",
        "CVE-2025-43367",
        "CVE-2025-46301",
        "CVE-2025-46310",
        "CVE-2025-43307",
        "CVE-2025-31271",
        "CVE-2026-20654",
        "CVE-2025-43448",
        "CVE-2025-31245",
        "CVE-2025-43466",
        "CVE-2025-43334",
        "CVE-2025-43185",
        "CVE-2025-43303",
        "CVE-2025-43259",
        "CVE-2025-43518",
        "CVE-2026-20681",
        "CVE-2025-43265",
        "CVE-2025-43241",
        "CVE-2025-46288",
        "CVE-2025-46283",
        "CVE-2026-20601",
        "CVE-2026-20602",
        "CVE-2025-43198",
        "CVE-2025-43499",
        "CVE-2025-43302",
        "CVE-2025-43245",
        "CVE-2025-43327",
        "CVE-2025-31256",
        "CVE-2025-43405",
        "CVE-2025-43498",
        "CVE-2026-20609",
        "CVE-2025-43333",
        "CVE-2025-31226",
        "CVE-2025-46289",
        "CVE-2025-43408",
        "CVE-2025-31277",
        "CVE-2025-43190",
        "CVE-2026-20611",
        "CVE-2025-43274",
        "CVE-2025-43288",
        "CVE-2025-31238",
        "CVE-2025-6558",
        "CVE-2025-43509",
        "CVE-2025-31259",
        "CVE-2025-43385"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Otras herramientas",
      "certification_date": "2026-01-16",
      "enhanced": {
        "category": "Otras herramientas",
        "cc_version": "CC/CEM:2022 Release 1",
        "cert_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2447",
        "certification_date": "2026-01-16",
        "description": "The TOE platform includes the components implementing Strong Customer Authentication (SCA) and Dynamic Linking for Apple Pay. User authentication is managed by the Secure Enclave. The Secure Enclave is a dedicated secure subsystem integrated into Apple systems on chip (SoCs). The Secure Enclave is isolated from the main processor to provide an extra layer of security and is designed to keep sensitive user data secure even when the Application Processor kernel becomes compromised. MacOS also allows the Apple Pay services and other security functions of the TOE to operate. The Secure Element (outside of the TOE) is the secure component holding the Apple Pay secrets and processes the Apple Pay transactions.",
        "evaluation_facility": "Applus Laboratories",
        "level": "EAL2 + ADV_FSP.3, ALC_FLR.3",
        "manufacturer": "Apple Inc.",
        "report_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2448",
        "status": "Certified",
        "target_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2446",
        "type": "Product"
      },
      "manufacturer": "Apple Inc.",
      "product": "Strong Customer Authentication for Apple Pay on MacBook Air 2024 with M3 running macOS Sequoia 15.4",
      "product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/1084-strong-customer-authentication-for-apple-pay-on-macbook-air-2024-with-m3-running-macos-sequoia-15-4"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Apple Inc.",
  "manufacturer_web": "https://www.apple.com/",
  "name": "Strong Customer Authentication for Apple Pay on MacBook Air 2024 with M3running macOS Sequoia 15.4",
  "not_valid_after": "2031-01-16",
  "not_valid_before": "2026-01-16",
  "pdf_data": {
    "_type": "sec_certs.sample.cc_eucc_common.PdfData",
    "cert_filename": "2025-11_Certificado.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "T": {
          "T.I": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.3": 1
        },
        "ALC": {
          "ALC_FLR.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 4": 1,
          "EAL2+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Applus": {
          "Applus Laboratories": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": null,
    "report_filename": "2025-11_INF-4674.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "ES": {
          "2025-11-INF-4674- v1": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.3": 8,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR": 2,
          "ALC_FLR.3": 8
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_INT.1": 1,
          "ASE_REQ.2": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 1,
          "EAL 4": 2,
          "EAL2": 8
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {
        "FDP": {
          "FDP_ACC": 3,
          "FDP_ACF": 3,
          "FDP_DAU.1": 1,
          "FDP_ETC": 1,
          "FDP_ITC.1": 1,
          "FDP_ITT.1": 1,
          "FDP_RIP.1": 1,
          "FDP_UCT": 2,
          "FDP_UIT": 2
        },
        "FIA": {
          "FIA_AFL": 2,
          "FIA_ATD.1": 1,
          "FIA_UAU.5": 1,
          "FIA_UAU.6": 1,
          "FIA_UID.2": 1
        },
        "FMT": {
          "FMT_MSA.3": 1,
          "FMT_MTD.1": 1,
          "FMT_SMR.1": 1
        },
        "FPR": {
          "FPR_UNO.1": 1
        },
        "FPT": {
          "FPT_ITC.1": 1,
          "FPT_RPL": 2
        },
        "FTP": {
          "FTP_ITC": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Applus": {
          "Applus Laboratories": 3
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/CreationDate": "",
      "/Creator": "",
      "/Keywords": "",
      "/ModDate": "",
      "/Producer": "",
      "/Subject": "",
      "/Title": "",
      "/Trapped": "",
      "pdf_file_size_bytes": 446270,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 18
    },
    "st_filename": "2025-11_ST.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.DEVICE_AUTH": 3,
          "A.NO_EVIL_ROOT_USER": 3,
          "A.NO_EXTERNAL_KEY-": 1,
          "A.NO_EXTERNAL_KEYBOARD": 1,
          "A.PERSO": 4,
          "A.WATCH_USER": 4
        },
        "D": {
          "D.OS": 17,
          "D.SEP_SE": 3
        },
        "T": {
          "T.CORRUPT": 4,
          "T.PHYSICAL": 2,
          "T.RECOVER": 4,
          "T.REPLAY": 2,
          "T.SILENT": 3,
          "T.SKIM-": 1,
          "T.SKIMMING": 2,
          "T.USURP": 4
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 3,
          "ADV_FSP.1": 2,
          "ADV_FSP.2": 4,
          "ADV_FSP.3": 3,
          "ADV_TDS.1": 4
        },
        "AGD": {
          "AGD_OPE.1": 4,
          "AGD_PRE.1": 4
        },
        "ALC": {
          "ALC_CMC.2": 2,
          "ALC_CMS.2": 2,
          "ALC_DEL.1": 2,
          "ALC_FLR": 1,
          "ALC_FLR.3": 3
        },
        "ASE": {
          "ASE_CCL.1": 2,
          "ASE_ECD.1": 3,
          "ASE_INT.1": 2,
          "ASE_OBJ.2": 2,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 2
        },
        "ATE": {
          "ATE_COV.1": 4,
          "ATE_FUN.1": 3,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 2 augmented": 1,
          "EAL2": 1
        }
      },
      "cc_sfr": {
        "FDP": {
          "FDP_ACC": 25,
          "FDP_ACC.1": 10,
          "FDP_ACC.2": 4,
          "FDP_ACC.2.1": 1,
          "FDP_ACC.2.2": 1,
          "FDP_ACF": 23,
          "FDP_ACF.1": 12,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_DAU.1": 4,
          "FDP_DAU.1.1": 1,
          "FDP_DAU.1.2": 1,
          "FDP_ETC": 8,
          "FDP_ETC.2": 2,
          "FDP_ETC.2.1": 2,
          "FDP_ETC.2.2": 2,
          "FDP_ETC.2.3": 2,
          "FDP_ETC.2.4": 2,
          "FDP_IFC.1": 9,
          "FDP_ITC.1": 4,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_ITT.1": 4,
          "FDP_ITT.1.1": 1,
          "FDP_RIP.1": 13,
          "FDP_RIP.1.1": 1,
          "FDP_SDI.1": 9,
          "FDP_SDI.1.1": 1,
          "FDP_UCT": 10,
          "FDP_UCT.1": 1,
          "FDP_UCT.1.1": 1,
          "FDP_UIT": 10,
          "FDP_UIT.1": 2,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_AFL": 12,
          "FIA_AFL.1": 1,
          "FIA_AFL.1.1": 3,
          "FIA_AFL.1.2": 3,
          "FIA_ATD.1": 5,
          "FIA_ATD.1.1": 2,
          "FIA_SOS.2": 4,
          "FIA_SOS.2.1": 1,
          "FIA_SOS.2.2": 1,
          "FIA_UAU.1": 1,
          "FIA_UAU.2": 11,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.5": 5,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 11,
          "FIA_UAU.6.1": 2,
          "FIA_UID.1": 1,
          "FIA_UID.2": 6,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MSA.1": 6,
          "FMT_MSA.1.1": 2,
          "FMT_MSA.3": 14,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 4,
          "FMT_MTD.1.1": 1,
          "FMT_MTD.3": 4,
          "FMT_MTD.3.1": 1,
          "FMT_SMF.1": 6,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 10,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO.1": 16,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_ITC.1": 4,
          "FPT_ITC.1.1": 1,
          "FPT_RPL": 8,
          "FPT_RPL.1": 6
        },
        "FTP": {
          "FTP_ITC": 14,
          "FTP_ITC.1": 7,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {
        "OutOfScope": {
          "Element of the device is separately certified according to the Common Criteria and is therefore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by": 1,
          "out of scope": 2,
          "pected to return to its User. Note: Defending against device re-use after physical compromise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* Strong Customer": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 2,
            "TLS 1.2": 1
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-3": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 4
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "",
      "/CreationDate": "",
      "/Creator": "",
      "/Keywords": "",
      "/ModDate": "",
      "/Producer": "",
      "/Subject": "",
      "/Title": "",
      "/Trapped": "",
      "pdf_file_size_bytes": 1053984,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://support.apple.com/en-us/HT204587",
          "https://privacy.apple.com/",
          "https://support.apple.com/HT201220",
          "https://support.apple.com/en-us/HT201581",
          "https://support.apple.com/guide/security/welcome/web",
          "https://support.apple.com/HT212225",
          "https://checkcoverage.apple.com/",
          "https://support.apple.com/HT201862",
          "https://support.apple.com/guide/certifications/apple-pay-security-certifications-apc3a0db329f/web",
          "https://www.apple.com/",
          "https://developer.apple.com/documentation/bundleresources/entitlements/com.apple.developer.in-app-payments",
          "https://support.apple.com/HT206995",
          "https://support.apple.com/HT201371",
          "https://support.apple.com/HT201541",
          "https://support.apple.com/guide/mac-help/welcome/mac",
          "https://support.apple.com/guide/macbook-air",
          "https://support.apple.com/apple-pay",
          "https://lists.apple.com/mailman/listinfo/security-announce/",
          "https://support.apple.com/en-gb/guide/personal-safety/ipsd0a253dd5/1.0/web/1.0",
          "https://support.apple.com/102664",
          "https://support.apple.com/HT204899",
          "https://support.apple.com/102633",
          "https://developer.apple.com/documentation/security/",
          "https://support.apple.com/HT201221",
          "https://www.apple.com/legal/sla/docs/macOSSequoia.pdf",
          "https://apply.applecard.apple/",
          "https://support.apple.com/HT201222",
          "https://support.apple.com/HT201260"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 56
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2025-11_INF-4674.pdf",
  "scheme": "ES",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ADV_FSP.3",
      "ALC_FLR.3",
      "EAL2+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2025-11_ST.pdf",
  "state": {
    "_type": "sec_certs.sample.cc_eucc_common.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": false,
      "json_hash": null,
      "pdf_hash": "f1ca8de9df574dc14636f14444ce121ee484e4c3b298f2b6467b323743c93a9b",
      "txt_hash": "d7e9c0873f789e7a7cb41b0787731e419bb0ae6251c76c792ff1c62b860508ba"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "f422a94cc3e52f5c9a1e29e6f35907db01b7c4b2843cc54fc1c6270b769ebd01",
      "txt_hash": "cf567feca333803de31cea1bb17ffbac7b5b97b534a19b94e7dac4a98c4d112d"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "6cd7860430a7639fe22e534ae2fb828c4a9f1ffdf320014a1acfce96ccc9c373",
      "txt_hash": "636b7b7b4abec6e773f483ac9ae104a196dd1ccd59c7f96828a4228ceb83503a"
    }
  },
  "status": "active"
}