This page was not yet optimized for use on mobile
devices.
Strong Customer Authentication for Apple Pay on MacBook Air 2024 with M3running macOS Sequoia 15.4
Known vulnerabilities detected
Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.CSV information
| Status | active |
|---|---|
| Valid from | 16.01.2026 |
| Valid until | 16.01.2031 |
| Scheme | 🇪🇸 ES |
| Manufacturer | Apple Inc. |
| Category | Other Devices and Systems |
| Security level | EAL2+, ALC_FLR.3, ADV_FSP.3 |
Heuristics summary
Certificate ID: 2025-11-INF-4674
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Security level
EAL 4, EAL 2, EAL2+Claims
T.ISecurity Assurance Requirements (SAR)
ADV_FSP.3, ALC_FLR.3Evaluation facilities
Applus LaboratoriesCertification report
Extracted keywords
Security level
EAL2, EAL 1, EAL 4, EAL 2, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ADV_FSP.3, ADV_ARC.1, ADV_TDS.1, AGD_OPE.1, ALC_FLR.3, ALC_CMC.2, ALC_DEL.1, ALC_FLR, ATE_COV.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1Security Functional Requirements (SFR)
FDP_DAU.1, FDP_ACC, FDP_ACF, FDP_ITT.1, FDP_ETC, FDP_ITC.1, FDP_UCT, FDP_UIT, FDP_RIP.1, FIA_UID.2, FIA_UAU.5, FIA_AFL, FIA_UAU.6, FIA_ATD.1, FMT_SMR.1, FMT_MSA.3, FMT_MTD.1, FPR_UNO.1, FPT_ITC.1, FPT_RPL, FTP_ITCCertificates
2025-11-INF-4674- v1Evaluation facilities
Applus LaboratoriesFile metadata
| Pages | 18 |
|---|
Security target
Extracted keywords
Asymmetric Algorithms
ECDHSchemes
MACProtocols
TLS 1.2, TLSTrusted Execution Environments
SESecurity level
EAL 2, EAL2, EAL 2 augmentedClaims
D.OS, D.SEP_SE, T.CORRUPT, T.PHYSICAL, T.RECOVER, T.REPLAY, T.SILENT, T.SKIM-, T.USURP, T.SKIMMING, A.DEVICE_AUTH, A.PERSO, A.WATCH_USER, A.NO_EXTERNAL_KEY-, A.NO_EVIL_ROOT_USER, A.NO_EXTERNAL_KEYBOARDSecurity Assurance Requirements (SAR)
ADV_FSP.3, ADV_ARC.1, ADV_TDS.1, ADV_FSP.2, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.3, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1Security Functional Requirements (SFR)
FDP_DAU.1, FDP_DAU.1.1, FDP_DAU.1.2, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_ITT.1, FDP_ITT.1.1, FDP_ETC, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_UCT, FDP_UCT.1, FDP_UIT, FDP_UIT.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.1.1, FDP_ACC.1, FDP_IFC.1, FDP_ETC.2, FIA_UID.2, FIA_UID.2.1, FIA_UAU.2, FIA_UAU.2.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_AFL.1, FIA_AFL, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.6.1, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.1, FIA_UID.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1.1, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.3, FMT_MTD.3.1, FPR_UNO.1, FPR_UNO.1.1, FPT_ITC.1, FPT_ITC.1.1, FPT_RPL, FPT_RPL.1, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1Certification process
out of scope, Element of the device is separately certified according to the Common Criteria and is therefore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by, pected to return to its User. Note: Defending against device re-use after physical compromise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* Strong CustomerStandards
FIPS 140-3File metadata
| Pages | 56 |
|---|
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
2025-11-INF-4674Extracted SARs
ADV_ARC.1, ADV_FSP.3, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2CPE matches
Related CVEs
| ID | Links | Severity | CVSS Score | Published on |
|---|---|---|---|---|
| Base score | ||||
| CVE-1999-0590 | HIGH | 10.0 | 01.06.2000 | |
| CVE-2001-0102 | HIGH | 7.2 | 12.02.2001 | |
| CVE-2025-14174 | HIGH | 8.8 | 12.12.2025 | |
| CVE-2025-24088 | HIGH | 7.5 | 15.09.2025 | |
| CVE-2025-24142 | MEDIUM | 5.5 | 12.05.2025 | |
| CVE-2025-24188 | MEDIUM | 6.5 | 30.07.2025 | |
| CVE-2025-24197 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-24222 | MEDIUM | 6.5 | 12.05.2025 | |
| CVE-2025-24223 | HIGH | 8.0 | 12.05.2025 | |
| CVE-2025-24224 | HIGH | 7.5 | 30.07.2025 | |
| CVE-2025-24274 | HIGH | 7.8 | 12.05.2025 | |
| CVE-2025-30440 | MEDIUM | 5.5 | 12.05.2025 | |
| CVE-2025-31200 | CRITICAL | 9.8 | 16.04.2025 | |
| CVE-2025-31201 | CRITICAL | 9.8 | 16.04.2025 | |
| CVE-2025-31204 | HIGH | 8.8 | 12.05.2025 | |
| CVE-2025-31205 | MEDIUM | 6.5 | 12.05.2025 | |
| CVE-2025-31206 | MEDIUM | 4.3 | 12.05.2025 | |
| CVE-2025-31208 | HIGH | 7.5 | 12.05.2025 | |
| CVE-2025-31209 | MEDIUM | 6.3 | 12.05.2025 | |
| CVE-2025-31212 | MEDIUM | 5.5 | 12.05.2025 | |
| CVE-2025-31213 | HIGH | 7.6 | 12.05.2025 | |
| CVE-2025-31215 | MEDIUM | 6.5 | 12.05.2025 | |
| CVE-2025-31217 | MEDIUM | 6.5 | 12.05.2025 | |
| CVE-2025-31218 | MEDIUM | 6.2 | 12.05.2025 | |
| CVE-2025-31219 | HIGH | 7.1 | 12.05.2025 | |
| CVE-2025-31220 | MEDIUM | 5.5 | 12.05.2025 | |
| CVE-2025-31221 | HIGH | 7.5 | 12.05.2025 | |
| CVE-2025-31222 | HIGH | 7.8 | 12.05.2025 | |
| CVE-2025-31223 | HIGH | 8.0 | 12.05.2025 | |
| CVE-2025-31224 | HIGH | 7.8 | 12.05.2025 | |
| CVE-2025-31226 | MEDIUM | 5.5 | 12.05.2025 | |
| CVE-2025-31232 | HIGH | 7.1 | 12.05.2025 | |
| CVE-2025-31233 | MEDIUM | 6.3 | 12.05.2025 | |
| CVE-2025-31234 | HIGH | 8.2 | 12.05.2025 | |
| CVE-2025-31235 | MEDIUM | 6.5 | 12.05.2025 | |
| CVE-2025-31236 | MEDIUM | 5.5 | 12.05.2025 | |
| CVE-2025-31237 | HIGH | 7.5 | 12.05.2025 | |
| CVE-2025-31238 | HIGH | 7.3 | 12.05.2025 | |
| CVE-2025-31239 | MEDIUM | 4.3 | 12.05.2025 | |
| CVE-2025-31240 | HIGH | 7.5 | 12.05.2025 | |
| CVE-2025-31241 | MEDIUM | 5.3 | 12.05.2025 | |
| CVE-2025-31242 | MEDIUM | 5.5 | 12.05.2025 | |
| CVE-2025-31243 | HIGH | 7.8 | 30.07.2025 | |
| CVE-2025-31244 | HIGH | 8.8 | 12.05.2025 | |
| CVE-2025-31245 | MEDIUM | 5.5 | 12.05.2025 | |
| CVE-2025-31246 | HIGH | 8.8 | 12.05.2025 | |
| CVE-2025-31247 | HIGH | 7.5 | 12.05.2025 | |
| CVE-2025-31248 | MEDIUM | 5.5 | 21.11.2025 | |
| CVE-2025-31249 | HIGH | 7.1 | 12.05.2025 | |
| CVE-2025-31250 | MEDIUM | 5.5 | 12.05.2025 | |
| CVE-2025-31251 | MEDIUM | 5.5 | 12.05.2025 | |
| CVE-2025-31255 | CRITICAL | 9.8 | 15.09.2025 | |
| CVE-2025-31256 | MEDIUM | 5.5 | 12.05.2025 | |
| CVE-2025-31257 | MEDIUM | 4.7 | 12.05.2025 | |
| CVE-2025-31258 | MEDIUM | 6.5 | 12.05.2025 | |
| CVE-2025-31259 | HIGH | 7.8 | 12.05.2025 | |
| CVE-2025-31260 | MEDIUM | 5.5 | 12.05.2025 | |
| CVE-2025-31266 | MEDIUM | 4.3 | 21.11.2025 | |
| CVE-2025-31268 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-31269 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-31270 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-31271 | HIGH | 7.5 | 15.09.2025 | |
| CVE-2025-31273 | HIGH | 8.8 | 30.07.2025 | |
| CVE-2025-31275 | MEDIUM | 6.2 | 30.07.2025 | |
| CVE-2025-31277 | HIGH | 8.8 | 30.07.2025 | |
| CVE-2025-31278 | HIGH | 8.8 | 30.07.2025 | |
| CVE-2025-31279 | CRITICAL | 9.8 | 30.07.2025 | |
| CVE-2025-31280 | HIGH | 7.8 | 30.07.2025 | |
| CVE-2025-31281 | CRITICAL | 9.1 | 30.07.2025 | |
| CVE-2025-43185 | MEDIUM | 5.5 | 30.07.2025 | |
| CVE-2025-43186 | CRITICAL | 9.8 | 30.07.2025 | |
| CVE-2025-43187 | HIGH | 7.8 | 29.08.2025 | |
| CVE-2025-43188 | HIGH | 7.8 | 30.07.2025 | |
| CVE-2025-43189 | CRITICAL | 9.8 | 30.07.2025 | |
| CVE-2025-43190 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-43191 | MEDIUM | 6.2 | 30.07.2025 | |
| CVE-2025-43192 | CRITICAL | 9.8 | 30.07.2025 | |
| CVE-2025-43193 | CRITICAL | 9.8 | 30.07.2025 | |
| CVE-2025-43194 | CRITICAL | 9.8 | 30.07.2025 | |
| CVE-2025-43195 | MEDIUM | 5.5 | 30.07.2025 | |
| CVE-2025-43196 | HIGH | 7.8 | 30.07.2025 | |
| CVE-2025-43197 | MEDIUM | 4.0 | 30.07.2025 | |
| CVE-2025-43198 | CRITICAL | 9.8 | 30.07.2025 | |
| CVE-2025-43199 | CRITICAL | 9.8 | 30.07.2025 | |
| CVE-2025-43202 | HIGH | 8.8 | 02.04.2026 | |
| CVE-2025-43204 | HIGH | 7.8 | 15.09.2025 | |
| CVE-2025-43206 | MEDIUM | 4.0 | 30.07.2025 | |
| CVE-2025-43207 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-43208 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-43209 | CRITICAL | 9.8 | 30.07.2025 | |
| CVE-2025-43210 | MEDIUM | 6.3 | 02.04.2026 | |
| CVE-2025-43211 | MEDIUM | 6.2 | 30.07.2025 | |
| CVE-2025-43212 | MEDIUM | 6.5 | 30.07.2025 | |
| CVE-2025-43213 | MEDIUM | 6.5 | 30.07.2025 | |
| CVE-2025-43214 | MEDIUM | 6.5 | 30.07.2025 | |
| CVE-2025-43215 | MEDIUM | 5.5 | 30.07.2025 | |
| CVE-2025-43216 | MEDIUM | 6.5 | 30.07.2025 | |
| CVE-2025-43218 | MEDIUM | 5.5 | 30.07.2025 | |
| CVE-2025-43219 | HIGH | 8.8 | 02.04.2026 | |
| CVE-2025-43220 | CRITICAL | 9.8 | 30.07.2025 | |
| CVE-2025-43221 | HIGH | 7.1 | 30.07.2025 | |
| CVE-2025-43222 | CRITICAL | 9.8 | 30.07.2025 | |
| CVE-2025-43223 | HIGH | 7.5 | 30.07.2025 | |
| CVE-2025-43224 | HIGH | 7.1 | 30.07.2025 | |
| CVE-2025-43225 | MEDIUM | 5.5 | 30.07.2025 | |
| CVE-2025-43226 | MEDIUM | 4.0 | 30.07.2025 | |
| CVE-2025-43227 | HIGH | 7.5 | 30.07.2025 | |
| CVE-2025-43229 | MEDIUM | 6.1 | 30.07.2025 | |
| CVE-2025-43230 | MEDIUM | 4.0 | 30.07.2025 | |
| CVE-2025-43232 | CRITICAL | 9.8 | 30.07.2025 | |
| CVE-2025-43233 | CRITICAL | 9.8 | 30.07.2025 | |
| CVE-2025-43234 | CRITICAL | 9.8 | 30.07.2025 | |
| CVE-2025-43235 | MEDIUM | 5.5 | 30.07.2025 | |
| CVE-2025-43236 | LOW | 3.3 | 02.04.2026 | |
| CVE-2025-43237 | CRITICAL | 9.8 | 30.07.2025 | |
| CVE-2025-43238 | MEDIUM | 6.2 | 02.04.2026 | |
| CVE-2025-43239 | HIGH | 7.1 | 30.07.2025 | |
| CVE-2025-43240 | MEDIUM | 6.2 | 30.07.2025 | |
| CVE-2025-43241 | MEDIUM | 5.5 | 30.07.2025 | |
| CVE-2025-43243 | CRITICAL | 9.8 | 30.07.2025 | |
| CVE-2025-43244 | CRITICAL | 9.8 | 30.07.2025 | |
| CVE-2025-43245 | CRITICAL | 9.8 | 30.07.2025 | |
| CVE-2025-43246 | MEDIUM | 5.5 | 30.07.2025 | |
| CVE-2025-43247 | MEDIUM | 5.5 | 30.07.2025 | |
| CVE-2025-43248 | HIGH | 7.8 | 30.07.2025 | |
| CVE-2025-43249 | HIGH | 7.8 | 30.07.2025 | |
| CVE-2025-43250 | MEDIUM | 4.0 | 30.07.2025 | |
| CVE-2025-43251 | MEDIUM | 5.5 | 30.07.2025 | |
| CVE-2025-43252 | MEDIUM | 6.5 | 30.07.2025 | |
| CVE-2025-43253 | CRITICAL | 9.8 | 30.07.2025 | |
| CVE-2025-43254 | HIGH | 7.1 | 30.07.2025 | |
| CVE-2025-43255 | LOW | 3.3 | 29.08.2025 | |
| CVE-2025-43256 | HIGH | 7.8 | 30.07.2025 | |
| CVE-2025-43257 | HIGH | 8.7 | 02.04.2026 | |
| CVE-2025-43259 | MEDIUM | 4.6 | 30.07.2025 | |
| CVE-2025-43260 | MEDIUM | 5.1 | 30.07.2025 | |
| CVE-2025-43261 | CRITICAL | 9.8 | 30.07.2025 | |
| CVE-2025-43262 | MEDIUM | 5.1 | 15.09.2025 | |
| CVE-2025-43264 | HIGH | 8.8 | 02.04.2026 | |
| CVE-2025-43265 | MEDIUM | 4.0 | 30.07.2025 | |
| CVE-2025-43266 | MEDIUM | 5.1 | 30.07.2025 | |
| CVE-2025-43267 | MEDIUM | 5.5 | 30.07.2025 | |
| CVE-2025-43268 | HIGH | 7.8 | 29.08.2025 | |
| CVE-2025-43270 | HIGH | 8.8 | 30.07.2025 | |
| CVE-2025-43272 | MEDIUM | 6.5 | 15.09.2025 | |
| CVE-2025-43274 | MEDIUM | 4.4 | 30.07.2025 | |
| CVE-2025-43275 | CRITICAL | 9.8 | 30.07.2025 | |
| CVE-2025-43276 | MEDIUM | 5.3 | 30.07.2025 | |
| CVE-2025-43279 | MEDIUM | 6.2 | 15.09.2025 | |
| CVE-2025-43281 | HIGH | 7.8 | 15.10.2025 | |
| CVE-2025-43282 | MEDIUM | 5.5 | 15.10.2025 | |
| CVE-2025-43283 | LOW | 3.3 | 15.09.2025 | |
| CVE-2025-43284 | MEDIUM | 5.5 | 29.08.2025 | |
| CVE-2025-43285 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-43286 | HIGH | 7.8 | 15.09.2025 | |
| CVE-2025-43287 | HIGH | 7.1 | 15.09.2025 | |
| CVE-2025-43288 | MEDIUM | 5.5 | 04.11.2025 | |
| CVE-2025-43291 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-43292 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-43293 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-43294 | LOW | 3.3 | 15.09.2025 | |
| CVE-2025-43295 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-43296 | MEDIUM | 5.5 | 09.10.2025 | |
| CVE-2025-43297 | MEDIUM | 6.2 | 15.09.2025 | |
| CVE-2025-43298 | HIGH | 7.8 | 15.09.2025 | |
| CVE-2025-43299 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-43301 | LOW | 3.3 | 15.09.2025 | |
| CVE-2025-43302 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-43303 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-43304 | HIGH | 7.0 | 15.09.2025 | |
| CVE-2025-43305 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-43307 | MEDIUM | 4.0 | 15.09.2025 | |
| CVE-2025-43308 | MEDIUM | 5.3 | 15.09.2025 | |
| CVE-2025-43310 | MEDIUM | 4.4 | 15.09.2025 | |
| CVE-2025-43311 | MEDIUM | 5.1 | 15.09.2025 | |
| CVE-2025-43312 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-43313 | MEDIUM | 5.5 | 15.10.2025 | |
| CVE-2025-43314 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-43315 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-43316 | HIGH | 7.8 | 15.09.2025 | |
| CVE-2025-43317 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-43318 | MEDIUM | 6.2 | 15.09.2025 | |
| CVE-2025-43319 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-43320 | HIGH | 7.8 | 12.12.2025 | |
| CVE-2025-43321 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-43322 | MEDIUM | 5.5 | 04.11.2025 | |
| CVE-2025-43325 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-43326 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-43327 | MEDIUM | 6.5 | 15.09.2025 | |
| CVE-2025-43328 | LOW | 3.3 | 15.09.2025 | |
| CVE-2025-43329 | HIGH | 8.8 | 15.09.2025 | |
| CVE-2025-43330 | HIGH | 8.2 | 15.09.2025 | |
| CVE-2025-43331 | MEDIUM | 4.0 | 15.09.2025 | |
| CVE-2025-43332 | MEDIUM | 5.2 | 15.09.2025 | |
| CVE-2025-43333 | HIGH | 7.8 | 15.09.2025 | |
| CVE-2025-43334 | MEDIUM | 5.5 | 04.11.2025 | |
| CVE-2025-43335 | MEDIUM | 5.5 | 04.11.2025 | |
| CVE-2025-43336 | MEDIUM | 4.4 | 04.11.2025 | |
| CVE-2025-43337 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-43340 | HIGH | 7.8 | 15.09.2025 | |
| CVE-2025-43341 | HIGH | 7.8 | 15.09.2025 | |
| CVE-2025-43342 | CRITICAL | 9.8 | 15.09.2025 | |
| CVE-2025-43343 | CRITICAL | 9.8 | 15.09.2025 | |
| CVE-2025-43344 | LOW | 3.3 | 15.09.2025 | |
| CVE-2025-43345 | MEDIUM | 5.5 | 04.11.2025 | |
| CVE-2025-43346 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-43347 | CRITICAL | 9.8 | 15.09.2025 | |
| CVE-2025-43348 | MEDIUM | 5.5 | 04.11.2025 | |
| CVE-2025-43349 | LOW | 2.8 | 15.09.2025 | |
| CVE-2025-43351 | MEDIUM | 5.5 | 12.12.2025 | |
| CVE-2025-43353 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-43354 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-43355 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-43356 | MEDIUM | 6.5 | 15.09.2025 | |
| CVE-2025-43357 | LOW | 3.3 | 15.09.2025 | |
| CVE-2025-43358 | HIGH | 8.8 | 15.09.2025 | |
| CVE-2025-43359 | CRITICAL | 9.8 | 15.09.2025 | |
| CVE-2025-43361 | HIGH | 7.8 | 04.11.2025 | |
| CVE-2025-43364 | HIGH | 7.8 | 04.11.2025 | |
| CVE-2025-43366 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-43367 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-43368 | MEDIUM | 4.3 | 15.09.2025 | |
| CVE-2025-43369 | MEDIUM | 5.5 | 15.09.2025 | |
| CVE-2025-43372 | HIGH | 7.8 | 15.09.2025 | |
| CVE-2025-43373 | HIGH | 7.5 | 04.11.2025 | |
| CVE-2025-43374 | MEDIUM | 4.3 | 21.11.2025 | |
| CVE-2025-43377 | MEDIUM | 5.5 | 04.11.2025 | |
| CVE-2025-43378 | MEDIUM | 5.5 | 04.11.2025 | |
| CVE-2025-43379 | MEDIUM | 5.5 | 04.11.2025 | |
| CVE-2025-43380 | MEDIUM | 5.5 | 04.11.2025 | |
| CVE-2025-43381 | MEDIUM | 5.5 | 12.12.2025 | |
| CVE-2025-43382 | MEDIUM | 5.5 | 04.11.2025 | |
| CVE-2025-43383 | MEDIUM | 4.3 | 04.11.2025 | |
| CVE-2025-43384 | MEDIUM | 4.3 | 04.11.2025 | |
| CVE-2025-43385 | MEDIUM | 4.3 | 04.11.2025 | |
| CVE-2025-43387 | HIGH | 7.8 | 04.11.2025 | |
| CVE-2025-43388 | MEDIUM | 5.5 | 12.12.2025 | |
| CVE-2025-43389 | MEDIUM | 5.5 | 04.11.2025 | |
| CVE-2025-43390 | MEDIUM | 5.5 | 04.11.2025 | |
| CVE-2025-43391 | MEDIUM | 5.5 | 04.11.2025 | |
| CVE-2025-43393 | MEDIUM | 5.2 | 12.12.2025 | |
| CVE-2025-43394 | MEDIUM | 5.5 | 04.11.2025 | |
| CVE-2025-43395 | LOW | 3.3 | 04.11.2025 | |
| CVE-2025-43396 | MEDIUM | 5.5 | 04.11.2025 | |
| CVE-2025-43397 | MEDIUM | 5.5 | 04.11.2025 | |
| CVE-2025-43398 | MEDIUM | 5.5 | 04.11.2025 | |
| CVE-2025-43399 | HIGH | 7.5 | 04.11.2025 | |
| CVE-2025-43400 | MEDIUM | 6.3 | 29.09.2025 | |
| CVE-2025-43401 | HIGH | 7.5 | 04.11.2025 | |
| CVE-2025-43402 | HIGH | 7.8 | 12.12.2025 | |
| CVE-2025-43403 | MEDIUM | 5.5 | 11.02.2026 | |
| CVE-2025-43404 | LOW | 3.3 | 12.12.2025 | |
| CVE-2025-43405 | HIGH | 7.5 | 04.11.2025 | |
| CVE-2025-43406 | MEDIUM | 5.5 | 12.12.2025 | |
| CVE-2025-43407 | HIGH | 7.8 | 04.11.2025 | |
| CVE-2025-43408 | LOW | 2.4 | 04.11.2025 | |
| CVE-2025-43409 | MEDIUM | 5.5 | 04.11.2025 | |
| CVE-2025-43410 | LOW | 2.4 | 12.12.2025 | |
| CVE-2025-43411 | MEDIUM | 5.5 | 04.11.2025 | |
| CVE-2025-43412 | MEDIUM | 6.3 | 04.11.2025 | |
| CVE-2025-43413 | HIGH | 7.5 | 04.11.2025 | |
| CVE-2025-43414 | MEDIUM | 6.2 | 04.11.2025 | |
| CVE-2025-43416 | MEDIUM | 5.5 | 12.12.2025 | |
| CVE-2025-43420 | MEDIUM | 4.7 | 04.11.2025 | |
| CVE-2025-43423 | LOW | 2.0 | 04.11.2025 | |
| CVE-2025-43428 | CRITICAL | 9.8 | 17.12.2025 | |
| CVE-2025-43445 | MEDIUM | 4.3 | 04.11.2025 | |
| CVE-2025-43446 | MEDIUM | 5.5 | 04.11.2025 | |
| CVE-2025-43448 | MEDIUM | 6.3 | 04.11.2025 | |
| CVE-2025-43461 | MEDIUM | 5.5 | 12.12.2025 | |
| CVE-2025-43463 | MEDIUM | 5.5 | 12.12.2025 | |
| CVE-2025-43464 | MEDIUM | 6.5 | 12.12.2025 | |
| CVE-2025-43465 | MEDIUM | 5.5 | 12.12.2025 | |
| CVE-2025-43466 | MEDIUM | 5.5 | 12.12.2025 | |
| CVE-2025-43467 | HIGH | 7.8 | 12.12.2025 | |
| CVE-2025-43468 | MEDIUM | 5.5 | 04.11.2025 | |
| CVE-2025-43469 | MEDIUM | 5.5 | 04.11.2025 | |
| CVE-2025-43470 | MEDIUM | 5.5 | 12.12.2025 | |
| CVE-2025-43471 | MEDIUM | 5.5 | 12.12.2025 | |
| CVE-2025-43472 | HIGH | 7.8 | 04.11.2025 | |
| CVE-2025-43473 | MEDIUM | 5.5 | 12.12.2025 | |
| CVE-2025-43474 | HIGH | 7.8 | 04.11.2025 | |
| CVE-2025-43476 | HIGH | 7.8 | 04.11.2025 | |
| CVE-2025-43477 | MEDIUM | 5.5 | 04.11.2025 | |
| CVE-2025-43478 | MEDIUM | 5.5 | 04.11.2025 | |
| CVE-2025-43479 | MEDIUM | 5.5 | 04.11.2025 | |
| CVE-2025-43481 | MEDIUM | 5.2 | 04.11.2025 | |
| CVE-2025-43482 | MEDIUM | 5.5 | 12.12.2025 | |
| CVE-2025-43494 | HIGH | 7.5 | 12.12.2025 | |
| CVE-2025-43496 | HIGH | 7.5 | 04.11.2025 | |
| CVE-2025-43497 | MEDIUM | 5.2 | 12.12.2025 | |
| CVE-2025-43498 | MEDIUM | 5.5 | 04.11.2025 | |
| CVE-2025-43499 | MEDIUM | 5.5 | 04.11.2025 | |
| CVE-2025-43501 | MEDIUM | 4.3 | 17.12.2025 | |
| CVE-2025-43506 | HIGH | 7.5 | 12.12.2025 | |
| CVE-2025-43509 | MEDIUM | 5.5 | 12.12.2025 | |
| CVE-2025-43510 | HIGH | 7.8 | 12.12.2025 | |
| CVE-2025-43512 | HIGH | 7.8 | 12.12.2025 | |
| CVE-2025-43513 | MEDIUM | 5.5 | 12.12.2025 | |
| CVE-2025-43514 | MEDIUM | 5.5 | 17.12.2025 | |
| CVE-2025-43516 | LOW | 3.3 | 12.12.2025 | |
| CVE-2025-43517 | LOW | 3.3 | 12.12.2025 | |
| CVE-2025-43518 | LOW | 3.3 | 12.12.2025 | |
| CVE-2025-43519 | MEDIUM | 5.5 | 12.12.2025 | |
| CVE-2025-43520 | MEDIUM | 5.5 | 12.12.2025 | |
| CVE-2025-43521 | MEDIUM | 5.5 | 12.12.2025 | |
| CVE-2025-43522 | LOW | 3.3 | 12.12.2025 | |
| CVE-2025-43523 | MEDIUM | 5.5 | 12.12.2025 | |
| CVE-2025-43526 | CRITICAL | 9.8 | 17.12.2025 | |
| CVE-2025-43527 | HIGH | 7.8 | 12.12.2025 | |
| CVE-2025-43530 | MEDIUM | 5.5 | 12.12.2025 | |
| CVE-2025-43531 | LOW | 3.1 | 17.12.2025 | |
| CVE-2025-43532 | LOW | 2.8 | 12.12.2025 | |
| CVE-2025-43533 | MEDIUM | 5.7 | 17.12.2025 | |
| CVE-2025-43535 | MEDIUM | 4.3 | 17.12.2025 | |
| CVE-2025-43536 | MEDIUM | 4.3 | 17.12.2025 | |
| CVE-2025-43539 | HIGH | 8.8 | 12.12.2025 | |
| CVE-2025-43541 | MEDIUM | 4.3 | 17.12.2025 | |
| CVE-2025-43542 | HIGH | 7.5 | 12.12.2025 | |
| CVE-2025-46276 | MEDIUM | 5.5 | 12.12.2025 | |
| CVE-2025-46277 | LOW | 3.3 | 17.12.2025 | |
| CVE-2025-46278 | MEDIUM | 5.5 | 17.12.2025 | |
| CVE-2025-46279 | LOW | 3.3 | 17.12.2025 | |
| CVE-2025-46281 | HIGH | 8.8 | 17.12.2025 | |
| CVE-2025-46282 | MEDIUM | 5.5 | 17.12.2025 | |
| CVE-2025-46283 | MEDIUM | 5.5 | 17.12.2025 | |
| CVE-2025-46285 | HIGH | 7.8 | 12.12.2025 | |
| CVE-2025-46287 | MEDIUM | 6.5 | 12.12.2025 | |
| CVE-2025-46288 | MEDIUM | 5.5 | 17.12.2025 | |
| CVE-2025-46289 | MEDIUM | 5.5 | 12.12.2025 | |
| CVE-2025-46290 | HIGH | 7.5 | 11.02.2026 | |
| CVE-2025-46291 | HIGH | 7.8 | 17.12.2025 | |
| CVE-2025-46297 | MEDIUM | 5.5 | 09.01.2026 | |
| CVE-2025-46298 | MEDIUM | 6.5 | 09.01.2026 | |
| CVE-2025-46299 | MEDIUM | 4.3 | 09.01.2026 | |
| CVE-2025-46300 | MEDIUM | 5.7 | 11.02.2026 | |
| CVE-2025-46301 | MEDIUM | 5.7 | 11.02.2026 | |
| CVE-2025-46302 | MEDIUM | 5.7 | 11.02.2026 | |
| CVE-2025-46303 | MEDIUM | 5.7 | 11.02.2026 | |
| CVE-2025-46304 | MEDIUM | 5.7 | 11.02.2026 | |
| CVE-2025-46305 | MEDIUM | 5.7 | 11.02.2026 | |
| CVE-2025-46306 | MEDIUM | 5.5 | 28.01.2026 | |
| CVE-2025-46310 | MEDIUM | 6.0 | 11.02.2026 | |
| CVE-2025-46316 | MEDIUM | 4.3 | 28.01.2026 | |
| CVE-2025-6558 | HIGH | 8.8 | 15.07.2025 | |
| CVE-2026-20601 | LOW | 3.3 | 11.02.2026 | |
| CVE-2026-20602 | MEDIUM | 5.5 | 11.02.2026 | |
| CVE-2026-20603 | MEDIUM | 4.4 | 11.02.2026 | |
| CVE-2026-20605 | MEDIUM | 4.6 | 11.02.2026 | |
| CVE-2026-20606 | HIGH | 7.1 | 11.02.2026 | |
| CVE-2026-20607 | MEDIUM | 4.0 | 25.03.2026 | |
| CVE-2026-20608 | MEDIUM | 5.5 | 11.02.2026 | |
| CVE-2026-20609 | MEDIUM | 4.4 | 11.02.2026 | |
| CVE-2026-20610 | HIGH | 7.8 | 11.02.2026 | |
| CVE-2026-20611 | HIGH | 7.8 | 11.02.2026 | |
| CVE-2026-20612 | MEDIUM | 5.5 | 11.02.2026 | |
| CVE-2026-20614 | HIGH | 7.8 | 11.02.2026 | |
| CVE-2026-20618 | MEDIUM | 5.5 | 11.02.2026 | |
| CVE-2026-20619 | MEDIUM | 5.5 | 11.02.2026 | |
| CVE-2026-20620 | HIGH | 7.7 | 11.02.2026 | |
| CVE-2026-20621 | MEDIUM | 5.5 | 11.02.2026 | |
| CVE-2026-20622 | HIGH | 7.5 | 25.03.2026 | |
| CVE-2026-20623 | MEDIUM | 5.5 | 11.02.2026 | |
| CVE-2026-20624 | MEDIUM | 5.5 | 11.02.2026 | |
| CVE-2026-20625 | MEDIUM | 5.5 | 11.02.2026 | |
| CVE-2026-20626 | HIGH | 7.8 | 11.02.2026 | |
| CVE-2026-20628 | HIGH | 7.1 | 11.02.2026 | |
| CVE-2026-20629 | MEDIUM | 5.5 | 11.02.2026 | |
| CVE-2026-20630 | MEDIUM | 5.5 | 11.02.2026 | |
| CVE-2026-20633 | MEDIUM | 5.5 | 25.03.2026 | |
| CVE-2026-20634 | MEDIUM | 5.5 | 11.02.2026 | |
| CVE-2026-20635 | MEDIUM | 4.3 | 11.02.2026 | |
| CVE-2026-20636 | MEDIUM | 6.5 | 11.02.2026 | |
| CVE-2026-20637 | MEDIUM | 6.2 | 25.03.2026 | |
| CVE-2026-20639 | HIGH | 7.5 | 25.03.2026 | |
| CVE-2026-20641 | HIGH | 7.1 | 11.02.2026 | |
| CVE-2026-20643 | MEDIUM | 5.4 | 17.03.2026 | |
| CVE-2026-20644 | MEDIUM | 6.5 | 11.02.2026 | |
| CVE-2026-20646 | LOW | 3.3 | 11.02.2026 | |
| CVE-2026-20647 | MEDIUM | 5.5 | 11.02.2026 | |
| CVE-2026-20648 | MEDIUM | 5.5 | 11.02.2026 | |
| CVE-2026-20649 | HIGH | 7.5 | 11.02.2026 | |
| CVE-2026-20650 | HIGH | 7.5 | 11.02.2026 | |
| CVE-2026-20651 | MEDIUM | 6.2 | 25.03.2026 | |
| CVE-2026-20652 | HIGH | 7.5 | 11.02.2026 | |
| CVE-2026-20653 | MEDIUM | 5.5 | 11.02.2026 | |
| CVE-2026-20654 | MEDIUM | 5.5 | 11.02.2026 | |
| CVE-2026-20656 | LOW | 3.3 | 11.02.2026 | |
| CVE-2026-20657 | MEDIUM | 6.5 | 25.03.2026 | |
| CVE-2026-20662 | MEDIUM | 4.6 | 11.02.2026 | |
| CVE-2026-20665 | MEDIUM | 6.5 | 25.03.2026 | |
| CVE-2026-20666 | MEDIUM | 5.5 | 11.02.2026 | |
| CVE-2026-20667 | HIGH | 8.8 | 11.02.2026 | |
| CVE-2026-20668 | MEDIUM | 5.5 | 25.03.2026 | |
| CVE-2026-20669 | MEDIUM | 5.5 | 11.02.2026 | |
| CVE-2026-20671 | LOW | 3.1 | 11.02.2026 | |
| CVE-2026-20673 | MEDIUM | 5.3 | 11.02.2026 | |
| CVE-2026-20675 | MEDIUM | 5.5 | 11.02.2026 | |
| CVE-2026-20676 | MEDIUM | 5.3 | 11.02.2026 | |
| CVE-2026-20680 | MEDIUM | 6.5 | 11.02.2026 | |
| CVE-2026-20681 | LOW | 3.3 | 11.02.2026 | |
| CVE-2026-20687 | HIGH | 7.1 | 25.03.2026 | |
| CVE-2026-20688 | CRITICAL | 9.3 | 25.03.2026 | |
| CVE-2026-20690 | MEDIUM | 6.5 | 25.03.2026 | |
| CVE-2026-20692 | MEDIUM | 5.3 | 25.03.2026 | |
| CVE-2026-20693 | MEDIUM | 4.9 | 25.03.2026 | |
| CVE-2026-20694 | MEDIUM | 5.5 | 25.03.2026 | |
| CVE-2026-20695 | MEDIUM | 6.2 | 25.03.2026 | |
| CVE-2026-20697 | MEDIUM | 5.3 | 25.03.2026 | |
| CVE-2026-20699 | MEDIUM | 6.2 | 25.03.2026 | |
| CVE-2026-20700 | HIGH | 7.8 | 11.02.2026 | |
| CVE-2026-20701 | HIGH | 7.5 | 25.03.2026 | |
| CVE-2026-28816 | MEDIUM | 4.0 | 25.03.2026 | |
| CVE-2026-28817 | HIGH | 8.1 | 25.03.2026 | |
| CVE-2026-28818 | MEDIUM | 5.3 | 25.03.2026 | |
| CVE-2026-28821 | HIGH | 8.4 | 25.03.2026 | |
| CVE-2026-28822 | MEDIUM | 6.2 | 25.03.2026 | |
| CVE-2026-28824 | MEDIUM | 5.3 | 25.03.2026 | |
| CVE-2026-28825 | HIGH | 7.1 | 25.03.2026 | |
| CVE-2026-28827 | CRITICAL | 9.3 | 25.03.2026 | |
| CVE-2026-28828 | MEDIUM | 5.3 | 25.03.2026 | |
| CVE-2026-28829 | MEDIUM | 5.5 | 25.03.2026 | |
| CVE-2026-28831 | MEDIUM | 5.5 | 25.03.2026 | |
| CVE-2026-28832 | HIGH | 8.4 | 25.03.2026 | |
| CVE-2026-28834 | MEDIUM | 5.1 | 25.03.2026 | |
| CVE-2026-28835 | MEDIUM | 6.5 | 25.03.2026 | |
| CVE-2026-28838 | MEDIUM | 5.3 | 25.03.2026 | |
| CVE-2026-28839 | MEDIUM | 5.3 | 25.03.2026 | |
| CVE-2026-28844 | MEDIUM | 6.5 | 25.03.2026 | |
| CVE-2026-28852 | MEDIUM | 5.5 | 25.03.2026 | |
| CVE-2026-28859 | MEDIUM | 4.3 | 25.03.2026 | |
| CVE-2026-28861 | MEDIUM | 4.3 | 25.03.2026 | |
| CVE-2026-28862 | MEDIUM | 5.3 | 25.03.2026 | |
| CVE-2026-28864 | LOW | 3.3 | 25.03.2026 | |
| CVE-2026-28865 | HIGH | 7.5 | 25.03.2026 | |
| CVE-2026-28866 | MEDIUM | 6.2 | 25.03.2026 | |
| CVE-2026-28867 | MEDIUM | 6.2 | 25.03.2026 | |
| CVE-2026-28868 | MEDIUM | 5.5 | 25.03.2026 | |
| CVE-2026-28870 | MEDIUM | 5.5 | 25.03.2026 | |
| CVE-2026-28871 | MEDIUM | 4.3 | 25.03.2026 | |
| CVE-2026-28876 | HIGH | 7.5 | 25.03.2026 | |
| CVE-2026-28877 | MEDIUM | 5.5 | 25.03.2026 | |
| CVE-2026-28879 | MEDIUM | 6.5 | 25.03.2026 | |
| CVE-2026-28880 | MEDIUM | 6.5 | 25.03.2026 | |
| CVE-2026-28882 | MEDIUM | 4.0 | 25.03.2026 | |
| CVE-2026-28886 | MEDIUM | 5.9 | 25.03.2026 | |
| CVE-2026-28888 | MEDIUM | 5.1 | 25.03.2026 | |
| CVE-2026-28891 | HIGH | 8.1 | 25.03.2026 | |
| CVE-2026-28892 | MEDIUM | 5.5 | 25.03.2026 | |
| CVE-2026-28894 | HIGH | 7.5 | 25.03.2026 |
Showing 5 out of 450.
Similar certificates
Showing 5 out of 12.
Scheme data
| Product | Strong Customer Authentication for Apple Pay on MacBook Air 2024 with M3 running macOS Sequoia 15.4 | |
|---|---|---|
| Product Link | https://oc.ccn.cni.es/en/certified-products/certified-products/1084-strong-customer-authentication-for-apple-pay-on-macbook-air-2024-with-m3-running-macos-sequoia-15-4 | |
| Category | Otras herramientas | |
| Manufacturer | Apple Inc. | |
| Certification Date | 16.01.2026 | |
| Enhanced | ||
| Description | The TOE platform includes the components implementing Strong Customer Authentication (SCA) and Dynamic Linking for Apple Pay. User authentication is managed by the Secure Enclave. The Secure Enclave is a dedicated secure subsystem integrated into Apple systems on chip (SoCs). The Secure Enclave is isolated from the main processor to provide an extra layer of security and is designed to keep sensitive user data secure even when the Application Processor kernel becomes compromised. MacOS also allows the Apple Pay services and other security functions of the TOE to operate. The Secure Element (outside of the TOE) is the secure component holding the Apple Pay secrets and processes the Apple Pay transactions. | |
| Category | Otras herramientas | |
| Manufacturer | Apple Inc. | |
| Type | Product | |
| Evaluation Facility | Applus Laboratories | |
| Status | Certified | |
| Certification Date | 16.01.2026 | |
| Cc Version | CC/CEM:2022 Release 1 | |
| Level | EAL2 + ADV_FSP.3, ALC_FLR.3 | |
| Target Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2446 | |
| Cert Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2447 | |
| Report Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2448 | |
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2025-11_Certificado.pdf",
"dgst": "c2e0d23f0b5f4231",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "2025-11-INF-4674",
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:apple:macos:15.4:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"eal": "EAL2+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"15.4"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2026-20699",
"CVE-2026-20628",
"CVE-2025-43327",
"CVE-2025-43320",
"CVE-2025-24224",
"CVE-2025-31273",
"CVE-2026-20635",
"CVE-2025-46310",
"CVE-2026-20620",
"CVE-2025-43210",
"CVE-2026-20602",
"CVE-2025-43214",
"CVE-2025-31215",
"CVE-2025-43223",
"CVE-2025-31233",
"CVE-2025-43464",
"CVE-2026-20605",
"CVE-2025-43536",
"CVE-2025-43412",
"CVE-2025-43526",
"CVE-2026-20624",
"CVE-2025-43514",
"CVE-2026-20606",
"CVE-2025-43328",
"CVE-2025-43262",
"CVE-2026-20687",
"CVE-2025-46303",
"CVE-2025-31237",
"CVE-2026-20614",
"CVE-2025-43482",
"CVE-2026-28828",
"CVE-2026-20673",
"CVE-2026-20650",
"CVE-2025-43398",
"CVE-2026-20647",
"CVE-2025-43229",
"CVE-2026-28891",
"CVE-2025-43372",
"CVE-2025-31240",
"CVE-2025-43213",
"CVE-2026-20671",
"CVE-2025-46289",
"CVE-2025-46283",
"CVE-2025-43317",
"CVE-2025-43501",
"CVE-2025-31281",
"CVE-2025-43399",
"CVE-2026-20669",
"CVE-2025-43388",
"CVE-2026-20692",
"CVE-2025-46316",
"CVE-1999-0590",
"CVE-2026-20618",
"CVE-2025-43293",
"CVE-2025-43379",
"CVE-2026-20622",
"CVE-2025-43380",
"CVE-2025-43187",
"CVE-2025-43236",
"CVE-2025-43218",
"CVE-2025-43321",
"CVE-2025-43279",
"CVE-2025-31226",
"CVE-2025-43367",
"CVE-2025-43394",
"CVE-2025-43408",
"CVE-2025-43307",
"CVE-2026-28867",
"CVE-2025-43233",
"CVE-2025-43314",
"CVE-2026-28871",
"CVE-2026-28839",
"CVE-2025-24188",
"CVE-2026-20701",
"CVE-2026-20629",
"CVE-2026-28824",
"CVE-2025-31238",
"CVE-2025-43296",
"CVE-2025-43420",
"CVE-2026-20608",
"CVE-2025-43361",
"CVE-2025-31271",
"CVE-2025-43390",
"CVE-2025-43222",
"CVE-2025-43465",
"CVE-2026-28834",
"CVE-2026-28886",
"CVE-2026-28838",
"CVE-2025-43470",
"CVE-2025-43204",
"CVE-2025-43359",
"CVE-2025-43396",
"CVE-2025-43354",
"CVE-2025-43346",
"CVE-2025-43235",
"CVE-2025-43382",
"CVE-2026-20649",
"CVE-2025-43252",
"CVE-2025-43240",
"CVE-2025-43286",
"CVE-2025-43318",
"CVE-2026-20644",
"CVE-2025-43391",
"CVE-2025-31277",
"CVE-2025-43411",
"CVE-2025-43466",
"CVE-2025-43467",
"CVE-2025-46298",
"CVE-2025-43337",
"CVE-2025-43185",
"CVE-2025-43219",
"CVE-2025-31239",
"CVE-2025-24222",
"CVE-2025-43520",
"CVE-2025-46301",
"CVE-2025-43342",
"CVE-2025-43316",
"CVE-2025-43291",
"CVE-2025-46300",
"CVE-2025-43268",
"CVE-2025-31268",
"CVE-2025-43384",
"CVE-2025-31204",
"CVE-2025-43348",
"CVE-2025-43446",
"CVE-2025-43331",
"CVE-2025-43518",
"CVE-2025-24274",
"CVE-2025-43349",
"CVE-2025-43260",
"CVE-2025-46304",
"CVE-2025-31241",
"CVE-2025-43414",
"CVE-2025-31236",
"CVE-2025-43413",
"CVE-2025-43496",
"CVE-2025-43510",
"CVE-2025-43530",
"CVE-2025-31279",
"CVE-2025-46297",
"CVE-2025-43403",
"CVE-2025-31223",
"CVE-2025-43409",
"CVE-2025-43247",
"CVE-2025-43220",
"CVE-2025-43206",
"CVE-2025-43366",
"CVE-2025-43326",
"CVE-2025-43248",
"CVE-2025-31212",
"CVE-2025-43257",
"CVE-2001-0102",
"CVE-2025-43226",
"CVE-2025-43478",
"CVE-2025-24223",
"CVE-2025-43469",
"CVE-2025-31260",
"CVE-2025-43389",
"CVE-2026-28821",
"CVE-2025-46281",
"CVE-2025-46299",
"CVE-2025-43333",
"CVE-2026-20653",
"CVE-2025-43265",
"CVE-2025-43494",
"CVE-2025-43299",
"CVE-2025-43303",
"CVE-2025-43383",
"CVE-2025-31275",
"CVE-2025-30440",
"CVE-2025-43340",
"CVE-2025-43513",
"CVE-2025-46287",
"CVE-2025-43343",
"CVE-2026-20636",
"CVE-2025-43245",
"CVE-2025-43471",
"CVE-2025-43325",
"CVE-2025-43381",
"CVE-2025-43428",
"CVE-2025-43535",
"CVE-2025-43395",
"CVE-2025-43313",
"CVE-2025-43468",
"CVE-2025-43374",
"CVE-2025-31242",
"CVE-2026-20637",
"CVE-2025-43402",
"CVE-2025-43521",
"CVE-2025-43302",
"CVE-2026-20607",
"CVE-2025-43249",
"CVE-2025-43533",
"CVE-2025-24088",
"CVE-2025-43387",
"CVE-2025-43472",
"CVE-2025-43377",
"CVE-2025-46277",
"CVE-2025-43301",
"CVE-2026-28877",
"CVE-2025-43186",
"CVE-2025-31224",
"CVE-2025-43275",
"CVE-2025-31217",
"CVE-2026-20700",
"CVE-2026-28816",
"CVE-2025-43287",
"CVE-2025-14174",
"CVE-2025-43196",
"CVE-2025-43404",
"CVE-2025-43215",
"CVE-2025-43237",
"CVE-2026-28835",
"CVE-2026-20630",
"CVE-2026-28868",
"CVE-2025-43531",
"CVE-2025-43512",
"CVE-2025-43356",
"CVE-2026-28861",
"CVE-2025-43243",
"CVE-2025-43517",
"CVE-2025-43364",
"CVE-2026-20666",
"CVE-2025-43351",
"CVE-2025-31201",
"CVE-2025-43250",
"CVE-2025-31221",
"CVE-2025-43292",
"CVE-2026-20652",
"CVE-2026-20646",
"CVE-2025-43312",
"CVE-2026-20693",
"CVE-2025-43345",
"CVE-2025-43369",
"CVE-2025-43264",
"CVE-2026-20668",
"CVE-2025-43190",
"CVE-2025-46288",
"CVE-2025-31280",
"CVE-2025-43216",
"CVE-2026-28817",
"CVE-2025-43256",
"CVE-2025-31251",
"CVE-2026-20695",
"CVE-2026-28844",
"CVE-2025-43308",
"CVE-2025-43208",
"CVE-2025-43334",
"CVE-2025-46279",
"CVE-2026-28879",
"CVE-2025-43297",
"CVE-2025-43516",
"CVE-2026-20675",
"CVE-2026-20643",
"CVE-2025-43232",
"CVE-2025-43341",
"CVE-2025-46290",
"CVE-2025-43189",
"CVE-2025-6558",
"CVE-2025-43448",
"CVE-2025-43276",
"CVE-2025-43476",
"CVE-2025-43283",
"CVE-2025-43473",
"CVE-2025-43519",
"CVE-2025-43416",
"CVE-2026-28888",
"CVE-2025-43385",
"CVE-2026-20667",
"CVE-2025-43191",
"CVE-2025-31246",
"CVE-2025-31258",
"CVE-2025-43405",
"CVE-2025-31219",
"CVE-2026-28864",
"CVE-2026-20609",
"CVE-2025-31257",
"CVE-2025-43357",
"CVE-2026-20603",
"CVE-2026-28870",
"CVE-2025-43506",
"CVE-2025-31209",
"CVE-2025-31200",
"CVE-2025-43294",
"CVE-2025-43527",
"CVE-2025-43272",
"CVE-2025-43209",
"CVE-2026-20651",
"CVE-2025-46282",
"CVE-2025-43304",
"CVE-2025-43474",
"CVE-2025-31247",
"CVE-2025-43261",
"CVE-2025-31269",
"CVE-2025-31255",
"CVE-2026-20694",
"CVE-2025-46302",
"CVE-2025-31248",
"CVE-2026-28832",
"CVE-2026-20641",
"CVE-2025-43477",
"CVE-2026-20681",
"CVE-2025-43195",
"CVE-2025-43255",
"CVE-2025-31232",
"CVE-2025-43239",
"CVE-2025-43393",
"CVE-2025-43221",
"CVE-2025-43353",
"CVE-2025-31256",
"CVE-2025-43305",
"CVE-2025-43368",
"CVE-2025-24142",
"CVE-2026-28852",
"CVE-2025-43274",
"CVE-2025-43532",
"CVE-2026-28831",
"CVE-2025-43407",
"CVE-2025-43400",
"CVE-2025-43315",
"CVE-2025-31244",
"CVE-2025-31250",
"CVE-2026-20654",
"CVE-2025-43238",
"CVE-2026-20626",
"CVE-2026-28865",
"CVE-2025-43378",
"CVE-2025-43202",
"CVE-2025-43244",
"CVE-2025-43358",
"CVE-2025-31259",
"CVE-2025-43241",
"CVE-2025-43251",
"CVE-2025-31266",
"CVE-2025-31234",
"CVE-2025-46278",
"CVE-2025-46285",
"CVE-2025-43246",
"CVE-2026-20697",
"CVE-2025-43310",
"CVE-2025-43541",
"CVE-2025-43266",
"CVE-2025-43373",
"CVE-2026-20619",
"CVE-2026-20611",
"CVE-2025-43523",
"CVE-2025-31218",
"CVE-2025-43285",
"CVE-2025-43509",
"CVE-2025-31205",
"CVE-2025-43497",
"CVE-2025-43410",
"CVE-2025-31278",
"CVE-2026-20623",
"CVE-2025-43253",
"CVE-2025-43188",
"CVE-2025-43230",
"CVE-2025-43267",
"CVE-2025-43193",
"CVE-2026-20633",
"CVE-2025-43336",
"CVE-2026-28825",
"CVE-2025-43479",
"CVE-2025-43499",
"CVE-2025-24197",
"CVE-2025-43259",
"CVE-2025-31208",
"CVE-2025-31222",
"CVE-2026-28882",
"CVE-2025-31245",
"CVE-2025-43192",
"CVE-2026-28866",
"CVE-2026-28876",
"CVE-2025-43522",
"CVE-2026-20612",
"CVE-2025-31249",
"CVE-2025-43332",
"CVE-2026-28892",
"CVE-2026-20680",
"CVE-2026-20625",
"CVE-2026-20601",
"CVE-2026-28818",
"CVE-2025-43282",
"CVE-2025-31270",
"CVE-2025-43224",
"CVE-2025-43481",
"CVE-2026-20665",
"CVE-2025-43423",
"CVE-2025-46306",
"CVE-2025-43298",
"CVE-2025-43225",
"CVE-2025-43335",
"CVE-2025-43212",
"CVE-2025-43270",
"CVE-2025-43401",
"CVE-2026-28829",
"CVE-2025-43211",
"CVE-2025-43207",
"CVE-2025-43329",
"CVE-2026-20690",
"CVE-2026-28859",
"CVE-2025-43198",
"CVE-2025-43542",
"CVE-2026-28827",
"CVE-2025-43311",
"CVE-2025-43254",
"CVE-2025-43463",
"CVE-2025-43445",
"CVE-2025-46291",
"CVE-2025-43461",
"CVE-2025-43199",
"CVE-2026-20639",
"CVE-2025-43227",
"CVE-2025-43234",
"CVE-2026-28862",
"CVE-2025-43281",
"CVE-2026-20621",
"CVE-2025-43284",
"CVE-2026-20676",
"CVE-2025-43194",
"CVE-2025-43406",
"CVE-2025-31235",
"CVE-2025-43197",
"CVE-2025-43288",
"CVE-2026-20634",
"CVE-2025-31213",
"CVE-2025-43397",
"CVE-2026-20656",
"CVE-2025-31206",
"CVE-2025-43322",
"CVE-2025-43539",
"CVE-2026-28822",
"CVE-2025-43344",
"CVE-2026-20688",
"CVE-2025-43330",
"CVE-2026-20662",
"CVE-2025-43355",
"CVE-2025-46305",
"CVE-2025-31243",
"CVE-2026-20610",
"CVE-2026-28894",
"CVE-2025-46276",
"CVE-2026-28880",
"CVE-2025-31220",
"CVE-2025-43319",
"CVE-2025-43347",
"CVE-2026-20648",
"CVE-2025-43295",
"CVE-2026-20657",
"CVE-2025-43498"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "Otras herramientas",
"certification_date": "2026-01-16",
"enhanced": {
"category": "Otras herramientas",
"cc_version": "CC/CEM:2022 Release 1",
"cert_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2447",
"certification_date": "2026-01-16",
"description": "The TOE platform includes the components implementing Strong Customer Authentication (SCA) and Dynamic Linking for Apple Pay. User authentication is managed by the Secure Enclave. The Secure Enclave is a dedicated secure subsystem integrated into Apple systems on chip (SoCs). The Secure Enclave is isolated from the main processor to provide an extra layer of security and is designed to keep sensitive user data secure even when the Application Processor kernel becomes compromised. MacOS also allows the Apple Pay services and other security functions of the TOE to operate. The Secure Element (outside of the TOE) is the secure component holding the Apple Pay secrets and processes the Apple Pay transactions.",
"evaluation_facility": "Applus Laboratories",
"level": "EAL2 + ADV_FSP.3, ALC_FLR.3",
"manufacturer": "Apple Inc.",
"report_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2448",
"status": "Certified",
"target_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2446",
"type": "Product"
},
"manufacturer": "Apple Inc.",
"product": "Strong Customer Authentication for Apple Pay on MacBook Air 2024 with M3 running macOS Sequoia 15.4",
"product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/1084-strong-customer-authentication-for-apple-pay-on-macbook-air-2024-with-m3-running-macos-sequoia-15-4"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Apple Inc.",
"manufacturer_web": "https://www.apple.com/",
"name": "Strong Customer Authentication for Apple Pay on MacBook Air 2024 with M3running macOS Sequoia 15.4",
"not_valid_after": "2031-01-16",
"not_valid_before": "2026-01-16",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "2025-11_Certificado.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"T": {
"T.I": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.3": 1
},
"ALC": {
"ALC_FLR.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1,
"EAL2+": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Applus": {
"Applus Laboratories": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "2025-11_INF-4674.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"ES": {
"2025-11-INF-4674- v1": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.3": 8,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_DEL.1": 1,
"ALC_FLR": 2,
"ALC_FLR.3": 8
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_INT.1": 1,
"ASE_REQ.2": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 1,
"EAL 4": 2,
"EAL2": 8
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC": 3,
"FDP_ACF": 3,
"FDP_DAU.1": 1,
"FDP_ETC": 1,
"FDP_ITC.1": 1,
"FDP_ITT.1": 1,
"FDP_RIP.1": 1,
"FDP_UCT": 2,
"FDP_UIT": 2
},
"FIA": {
"FIA_AFL": 2,
"FIA_ATD.1": 1,
"FIA_UAU.5": 1,
"FIA_UAU.6": 1,
"FIA_UID.2": 1
},
"FMT": {
"FMT_MSA.3": 1,
"FMT_MTD.1": 1,
"FMT_SMR.1": 1
},
"FPR": {
"FPR_UNO.1": 1
},
"FPT": {
"FPT_ITC.1": 1,
"FPT_RPL": 2
},
"FTP": {
"FTP_ITC": 2
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Applus": {
"Applus Laboratories": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "",
"/CreationDate": "",
"/Creator": "",
"/Keywords": "",
"/ModDate": "",
"/Producer": "",
"/Subject": "",
"/Title": "",
"/Trapped": "",
"pdf_file_size_bytes": 446270,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 18
},
"st_filename": "2025-11_ST.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.DEVICE_AUTH": 3,
"A.NO_EVIL_ROOT_USER": 3,
"A.NO_EXTERNAL_KEY-": 1,
"A.NO_EXTERNAL_KEYBOARD": 1,
"A.PERSO": 4,
"A.WATCH_USER": 4
},
"D": {
"D.OS": 17,
"D.SEP_SE": 3
},
"T": {
"T.CORRUPT": 4,
"T.PHYSICAL": 2,
"T.RECOVER": 4,
"T.REPLAY": 2,
"T.SILENT": 3,
"T.SKIM-": 1,
"T.SKIMMING": 2,
"T.USURP": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 3,
"ADV_FSP.1": 2,
"ADV_FSP.2": 4,
"ADV_FSP.3": 3,
"ADV_TDS.1": 4
},
"AGD": {
"AGD_OPE.1": 4,
"AGD_PRE.1": 4
},
"ALC": {
"ALC_CMC.2": 2,
"ALC_CMS.2": 2,
"ALC_DEL.1": 2,
"ALC_FLR": 1,
"ALC_FLR.3": 3
},
"ASE": {
"ASE_CCL.1": 2,
"ASE_ECD.1": 3,
"ASE_INT.1": 2,
"ASE_OBJ.2": 2,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 1,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_COV.1": 4,
"ATE_FUN.1": 3,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 2 augmented": 1,
"EAL2": 1
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC": 25,
"FDP_ACC.1": 10,
"FDP_ACC.2": 4,
"FDP_ACC.2.1": 1,
"FDP_ACC.2.2": 1,
"FDP_ACF": 23,
"FDP_ACF.1": 12,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_DAU.1": 4,
"FDP_DAU.1.1": 1,
"FDP_DAU.1.2": 1,
"FDP_ETC": 8,
"FDP_ETC.2": 2,
"FDP_ETC.2.1": 2,
"FDP_ETC.2.2": 2,
"FDP_ETC.2.3": 2,
"FDP_ETC.2.4": 2,
"FDP_IFC.1": 9,
"FDP_ITC.1": 4,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITT.1": 4,
"FDP_ITT.1.1": 1,
"FDP_RIP.1": 13,
"FDP_RIP.1.1": 1,
"FDP_SDI.1": 9,
"FDP_SDI.1.1": 1,
"FDP_UCT": 10,
"FDP_UCT.1": 1,
"FDP_UCT.1.1": 1,
"FDP_UIT": 10,
"FDP_UIT.1": 2,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL": 12,
"FIA_AFL.1": 1,
"FIA_AFL.1.1": 3,
"FIA_AFL.1.2": 3,
"FIA_ATD.1": 5,
"FIA_ATD.1.1": 2,
"FIA_SOS.2": 4,
"FIA_SOS.2.1": 1,
"FIA_SOS.2.2": 1,
"FIA_UAU.1": 1,
"FIA_UAU.2": 11,
"FIA_UAU.2.1": 1,
"FIA_UAU.5": 5,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 11,
"FIA_UAU.6.1": 2,
"FIA_UID.1": 1,
"FIA_UID.2": 6,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MSA.1": 6,
"FMT_MSA.1.1": 2,
"FMT_MSA.3": 14,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 4,
"FMT_MTD.1.1": 1,
"FMT_MTD.3": 4,
"FMT_MTD.3.1": 1,
"FMT_SMF.1": 6,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 10,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 16,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_ITC.1": 4,
"FPT_ITC.1.1": 1,
"FPT_RPL": 8,
"FPT_RPL.1": 6
},
"FTP": {
"FTP_ITC": 14,
"FTP_ITC.1": 7,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 4
}
},
"certification_process": {
"OutOfScope": {
"Element of the device is separately certified according to the Common Criteria and is therefore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by": 1,
"out of scope": 2,
"pected to return to its User. Note: Defending against device re-use after physical compromise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* Strong Customer": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 2,
"TLS 1.2": 1
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-3": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 4
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "",
"/CreationDate": "",
"/Creator": "",
"/Keywords": "",
"/ModDate": "",
"/Producer": "",
"/Subject": "",
"/Title": "",
"/Trapped": "",
"pdf_file_size_bytes": 1053984,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://support.apple.com/guide/macbook-air",
"https://support.apple.com/102664",
"https://support.apple.com/HT201541",
"https://support.apple.com/guide/mac-help/welcome/mac",
"https://support.apple.com/en-gb/guide/personal-safety/ipsd0a253dd5/1.0/web/1.0",
"https://support.apple.com/102633",
"https://support.apple.com/HT201371",
"https://privacy.apple.com/",
"https://support.apple.com/apple-pay",
"https://support.apple.com/HT201260",
"https://support.apple.com/HT201221",
"https://www.apple.com/",
"https://www.apple.com/legal/sla/docs/macOSSequoia.pdf",
"https://lists.apple.com/mailman/listinfo/security-announce/",
"https://developer.apple.com/documentation/bundleresources/entitlements/com.apple.developer.in-app-payments",
"https://support.apple.com/en-us/HT204587",
"https://checkcoverage.apple.com/",
"https://support.apple.com/HT204899",
"https://support.apple.com/HT201222",
"https://apply.applecard.apple/",
"https://developer.apple.com/documentation/security/",
"https://support.apple.com/HT206995",
"https://support.apple.com/HT201862",
"https://support.apple.com/guide/certifications/apple-pay-security-certifications-apc3a0db329f/web",
"https://support.apple.com/guide/security/welcome/web",
"https://support.apple.com/HT201220",
"https://support.apple.com/HT212225",
"https://support.apple.com/en-us/HT201581"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 56
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2025-11_INF-4674.pdf",
"scheme": "ES",
"security_level": {
"_type": "Set",
"elements": [
"ADV_FSP.3",
"EAL2+",
"ALC_FLR.3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2025-11_ST.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "f1ca8de9df574dc14636f14444ce121ee484e4c3b298f2b6467b323743c93a9b",
"txt_hash": "d7e9c0873f789e7a7cb41b0787731e419bb0ae6251c76c792ff1c62b860508ba"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "f422a94cc3e52f5c9a1e29e6f35907db01b7c4b2843cc54fc1c6270b769ebd01",
"txt_hash": "cf567feca333803de31cea1bb17ffbac7b5b97b534a19b94e7dac4a98c4d112d"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "6cd7860430a7639fe22e534ae2fb828c4a9f1ffdf320014a1acfce96ccc9c373",
"txt_hash": "636b7b7b4abec6e773f483ac9ae104a196dd1ccd59c7f96828a4228ceb83503a"
}
},
"status": "active"
}