name |
Cisco Expressway X12.5 |
CBB business application unit Version 1.0 |
category |
Network and Network-Related Devices and Systems |
Other Devices and Systems |
scheme |
US |
JP |
status |
archived |
archived |
not_valid_after |
26.02.2020 |
10.12.2010 |
not_valid_before |
19.08.2019 |
11.03.2005 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10938-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10938-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0024_ecvr2.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10938-st.pdf |
|
manufacturer |
Cisco Systems, Inc. |
The Bank of Tokyo-Mitsubishi/ MITSUBISHI ELECTRIC INFORMATION SYSTEMS CORPORATION |
manufacturer_web |
https://www.cisco.com |
https://www.mitsubishielectric.com/ |
security_level |
{} |
EAL2 |
dgst |
0393e74562b1ca21 |
fcef5c6a6d0cec57 |
heuristics/cert_id |
CCEVS-VR-VID-10938-2019 |
JISEC-CC-CRP-C0024 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
{} |
heuristics/extracted_versions |
12.5 |
1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Network Device
- certification_date: 19.08.2019
- evaluation_facility: Acumen Security
- expiration_date: 19.08.2021
- id: CCEVS-VR-VID10938
- product: Cisco Expressway X12.5
- scheme: US
- url: https://www.niap-ccevs.org/product/10938
- vendor: Cisco Systems, Inc.
|
- cert_id: JISEC-CC-CRP-C0159
- certification_date: 01.05.2008
- claim: EAL2+ ALC_FLR.1
- enhanced:
- assurance_level: EAL2 Augmented with ALC_FLR.1
- cc_version: 3.1
- description: PRODUCT DESCRIPTION Description of TOE TOE is application software installed in dedicated terminals for banking services that are placed in stores such as supermarkets. By using the terminals, customers can take banking services such as address corrections and changing signature. The terminal can also accept application forms in bulk. To enable these services, TOE has the acceptance function, the collection function, and the data communication function. TOE security functions TOE has the following security functions: - Encryption function of individual information. - Identification and authentication of user.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: ABB business application software
- product_type: Business application in a terminal for banking services
- toe_version: 1.0
- vendor: AEON BANK, LTD. / Mitsubishi Electric Information Systems Corporation
- expiration_date: 01.01.2011
- supplier: AEON BANK, LTD./ Mitsubishi Electric Information Systems Corporation
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0159_it7174.html
- toe_japan_name: ABB business application software 1.0
- toe_overseas_link: None
- toe_overseas_name: -----
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
48ac4778e4272298 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.0E.pdf |
{} |
pdf_data/cert_filename |
st_vid10938-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10938-2019: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
- Cisco:
- Cisco: 1
- Cisco Systems, Inc: 1
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20190820124751-04'00'
- /ModDate: D:20190820124850-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 184204
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid10938-vr.pdf |
c0024_ecvr2.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10938-2019
- cert_item: for Cisco Expressway X12.5
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10938-2019: 1
|
- JP:
- Certification No. C0024: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.2: 2
- FCS_COP: 4
- FCS_RBG_EXT.1: 1
- FIA:
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINISTRATOR: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPR: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_: 1
- T.UNDETECTED_ACTIVITY: 2
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOIN: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
|
pdf_data/report_keywords/vendor |
- Cisco:
- Cisco: 47
- Cisco Systems: 2
- Cisco Systems, Inc: 2
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
- SHA512: 1
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- SSH:
- TLS:
- TLS:
- TLS: 6
- TLSv1.1: 2
- TLSv1.2: 2
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS 186-4: 1
- FIPS PUB 186-4: 1
- ISO:
- PKCS:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20190820120909-04'00'
- /ModDate: D:20190820120909-04'00'
- pdf_file_size_bytes: 1135922
- pdf_hyperlinks: http://nvd.nist.gov/
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
- /Author: IPA/JISEC
- /Company: IPA/ISEC
- /CreationDate: D:20051104120631+09'00'
- /Creator: Word 用 Acrobat PDFMaker 6.0
- /ModDate: D:20051104120640+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /SourceModified: D:20051104030140
- /Title: TOE List
- pdf_file_size_bytes: 23139
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/st_filename |
st_vid10938-st.pdf |
|
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 2
- ASE_INT.1: 2
- ASE_OBJ.1: 2
- ASE_REQ.1: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 2
- ATE:
- AVA:
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 7
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCO:
- FCO_CPC_EXT.1: 3
- FCO_CPC_EXT.1.1: 1
- FCO_CPC_EXT.1.2: 1
- FCO_CPC_EXT.1.3: 1
- FCS:
- FCS_CKM.1: 8
- FCS_CKM.1.1: 2
- FCS_CKM.2: 9
- FCS_CKM.2.1: 1
- FCS_CKM.4: 5
- FCS_CKM.4.1: 1
- FCS_COP: 21
- FCS_COP.1: 4
- FCS_CPC_EXT.1: 1
- FCS_DTLS: 1
- FCS_RBG_EXT.1: 5
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSHC_EXT.1: 6
- FCS_SSHC_EXT.1.1: 2
- FCS_SSHC_EXT.1.2: 1
- FCS_SSHC_EXT.1.3: 1
- FCS_SSHC_EXT.1.4: 1
- FCS_SSHC_EXT.1.5: 3
- FCS_SSHC_EXT.1.6: 1
- FCS_SSHC_EXT.1.7: 1
- FCS_SSHC_EXT.1.8: 3
- FCS_SSHC_EXT.1.9: 2
- FCS_SSHS_EXT.1: 4
- FCS_SSHS_EXT.1.1: 2
- FCS_SSHS_EXT.1.2: 2
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 1
- FCS_SSHS_EXT.1.5: 3
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 1
- FCS_SSHS_EXT.1.8: 3
- FCS_TLSC_EXT.1: 1
- FCS_TLSC_EXT.1.1: 3
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.2: 5
- FCS_TLSC_EXT.2.1: 4
- FCS_TLSC_EXT.2.2: 2
- FCS_TLSC_EXT.2.3: 1
- FCS_TLSC_EXT.2.4: 1
- FCS_TLSC_EXT.2.5: 1
- FCS_TLSS_EXT: 1
- FCS_TLSS_EXT.1: 1
- FCS_TLSS_EXT.1.1: 1
- FCS_TLSS_EXT.2: 4
- FCS_TLSS_EXT.2.1: 2
- FCS_TLSS_EXT.2.2: 1
- FCS_TLSS_EXT.2.3: 1
- FCS_TLSS_EXT.2.4: 3
- FCS_TLSS_EXT.2.5: 3
- FCS_TLSS_EXT.2.6: 1
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.7: 3
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 5
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 4
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF: 3
- FMT_MOF.1: 2
- FMT_MTD: 13
- FMT_MTD.1: 2
- FMT_SMF.1: 5
- FMT_SMF.1.1: 1
- FMT_SMR.2: 4
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 1
- FPT_APW_EXT.1: 3
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_ITT.1: 4
- FPT_ITT.1.1: 1
- FPT_SKP_EXT.1: 4
- FPT_SKP_EXT.1.1: 1
- FPT_STM_EXT.1: 7
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 3
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL.3: 6
- FTA_SSL.4: 3
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 4
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 7
- FTP:
- FTP_ITC.1: 11
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_TRP: 1
- FTP_TRP.1: 7
|
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.COMPONENTS_RUNNING: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 2
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINISTRATOR: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.COMPONENTS_RUNNING: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
|
pdf_data/st_keywords/vendor |
- Cisco:
- Cisco: 91
- Cisco Systems, Inc: 3
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 4
- HMAC-SHA-256: 3
- HMAC-SHA-384: 2
- HMAC-SHA-512: 2
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 4
- SHA-384: 5
- SHA-512: 6
- SHA256: 2
- SHA512: 1
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- DTLS:
- SSL:
- SSL: 2
- SSL 2.0: 1
- SSL 3.0: 1
- TLS:
- TLS: 63
- TLS 1.0: 1
- TLS 1.1: 2
- TLS 1.2: 2
- TLS v1.0: 1
- TLS v1.1: 1
- TLS v1.2: 1
- TLS1.1: 1
- TLS1.2: 1
- TLSv1.1: 3
- TLSv1.2: 4
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 3
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140: 1
- FIPS 140-2: 1
- FIPS 186-4: 1
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 4
- FIPS PUB 186-3: 1
- FIPS PUB 186-4: 8
- FIPS PUB 198-1: 1
- ISO:
- ISO/IEC 18031:2011: 3
- ISO/IEC 9796-2: 1
- NIST:
- NIST SP 800-56A: 1
- SP 800-90: 1
- PKCS:
- PKCS #1: 1
- PKCS#1: 1
- PKCS#7: 1
- RFC:
- RFC 2818: 1
- RFC 2986: 2
- RFC 3268: 3
- RFC 4251: 1
- RFC 4253: 2
- RFC 4346: 2
- RFC 5246: 8
- RFC 5280: 4
- RFC 5288: 6
- RFC 5759: 1
- RFC 6125: 1
- RFC 6187: 1
- RFC 8017: 3
- RFC5905: 1
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Cisco CC TME
- /CreationDate: D:20190816160101-04'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20190820120703-04'00'
- /Producer: Microsoft® Word for Office 365
- /Title: ST
- pdf_file_size_bytes: 987341
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 69
|
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
False |
state/st/download_ok |
True |
False |
state/st/extract_ok |
True |
False |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |