name |
Motorola Lex L11 on Android 11 |
McAfee® Web Gateway Version 7.2.0.1 |
category |
Mobility |
Boundary Protection Devices and Systems |
scheme |
US |
CA |
status |
archived |
archived |
not_valid_after |
25.01.2024 |
19.04.2018 |
not_valid_before |
25.01.2022 |
20.11.2012 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11229-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11229-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-215%20CR%20v1.0e.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11229-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-215%20ST%20v1.0.pdf |
manufacturer |
Motorola Solutions, Inc. |
McAfee, Inc. |
manufacturer_web |
https://www.motorolasolutions.com |
https://www.mcafee.com/ |
security_level |
{} |
EAL2+, ALC_FLR.2 |
dgst |
3c66a97327fa3745 |
27353893233b1211 |
heuristics/cert_id |
CCEVS-VR-11229-2022 |
383-4-215 |
heuristics/cert_lab |
US |
CANADA |
heuristics/cpe_matches |
{} |
cpe:2.3:a:mcafee:web_gateway:7.2.0.1:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2014-2535, CVE-2017-1000366, CVE-2016-4448, CVE-2021-23885, CVE-2019-6454, CVE-2016-1762, CVE-2019-1559, CVE-2022-1254 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 |
ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ATE_IND.2, ALC_DEL.1, ATE_COV.1, ADV_ARC.1, AGD_OPE.1, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1, AGD_COV.1 |
heuristics/extracted_versions |
11 |
7.2.0.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Mobility
- certification_date: 25.01.2022
- evaluation_facility: Gossamer Security Solutions
- expiration_date: 25.01.2024
- id: CCEVS-VR-VID11229
- product: Motorola Lex L11 on Android 11
- scheme: US
- url: https://www.niap-ccevs.org/product/11229
- vendor: Motorola Mobility LLC
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
df09b703c88c665a, c88af12926be2779 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v3.1.pdf |
{} |
pdf_data/cert_filename |
st_vid11229-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11229-2022: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20220128233236-05'00'
- /ModDate: D:20220128233236-05'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 182501
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid11229-vr.pdf |
383-4-215 CR v1.0e.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-11229-2022
- cert_item: Motorola Solutions, Inc. Motorola Lex L11 on Android 11
- cert_lab: US NIAP
- CA:
|
- US:
- CA:
- cert_id: 383-4-215-CR
- cert_lab: CANADA
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 2: 6
- EAL 2 augmented: 2
- EAL 2+: 3
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author: Cory Clark
- /CCEF: EWA-Canada
- /CR date: 20 November 2012
- /CR version: 1.0
- /Certificate date: 20 November
- /CreationDate: D:20121129081318-05'00'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /Developer name: McAfee Inc.
- /Document number: 383-4-215-CR
- /ETR title, version, date: Evaluation Technical Report for EAL 2+ Common Criteria Evaluation of McAfee, Inc. McAfee® Web Gateway Version 7.2.0.1, v1.0, 5 October 2012
- /Evaluation completion date: 5 October 2012
- /ModDate: D:20121129081324-05'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /ST Title: McAfee® Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Security Target v1.0
- /ST date: 5 October 2012
- /ST version: 1.0
- /SourceModified: D:20121122180711
- /Sponsor: McAfee, Inc.
- /TOE Version: 7.2.0.1
- /TOE name and version: McAfee® Web Gateway Version 7.2.0.1
- /TOE short name: MWG
- /Title: EAL 2 Evaluation of <TOE name and version>
- pdf_file_size_bytes: 64446
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
pdf_data/st_filename |
st_vid11229-st.pdf |
383-4-215 ST v1.0.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 1: 4
- EAL 1 augmented: 2
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 10
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 4
- ALC_CMS: 1
- ALC_CMS.1: 5
- ALC_TSU_EXT: 2
- ALC_TSU_EXT.1: 9
- ATE:
- AVA:
|
- ACM:
- ACM_CMC.2: 1
- ACM_CMS.2: 1
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.1: 2
- ADV_FSP.2: 3
- ADV_TDS.1: 3
- AGD:
- AGD_COV.1: 1
- AGD_OPE.1: 3
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 2
- ALC_FLR.2: 9
- ATE:
- ATE_COV.1: 2
- ATE_FUN.1: 4
- ATE_IND.2: 2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM.1: 4
- FCS_CKM.2: 3
- FCS_CKM.4: 1
- FCS_CKM_EXT.2.1: 1
- FCS_CKM_EXT.3: 1
- FCS_CKM_EXT.4: 1
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 22
- FCS_COP.1.1: 1
- FCS_RBG_EXT.1: 9
- FCS_SMF_EXT.1: 1
- FCS_STG_EXT.1: 1
- FCS_STG_EXT.2: 1
- FCS_STG_EXT.2.1: 1
- FCS_STG_EXT.2.2: 1
- FCS_STG_EXT.3: 1
- FCS_TLSC_EXT: 2
- FCS_TLSC_EXT.1: 3
- FCS_TLSC_EXT.1.1: 1
- FDP:
- FDP_ACC.1: 3
- FDP_DAR_EXT.2: 1
- FDP_IFC_EXT.1: 1
- FDP_STG_EXT.1: 1
- FIA:
- FIA_AFL_EXT.1: 1
- FIA_BLT_EXT.3.1: 1
- FIA_BMG_EXT: 1
- FIA_BMG_EXT.1: 2
- FIA_BMG_EXT.1.1: 1
- FIA_BMG_EXT.1.2: 1
- FIA_PMG_EXT.1: 2
- FIA_UAU.5.1: 2
- FIA_UAU_EXT.2: 1
- FIA_UAU_EXT.2.1: 3
- FMT:
- FMT_MOF_EXT.1: 1
- FMT_MOF_EXT.1.2: 1
- FMT_SMF_EXT.1: 2
- FMT_SMF_EXT.1.1: 1
- FMT_SMF_EXT.2.1: 1
- FMT_SMF_EXT.3: 1
- FPT:
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 1
- FPT_TST_EXT.2: 2
- FTA:
- FTP:
- FTP_ITC_EXT: 1
- FTP_ITC_EXT.1: 1
|
- FAU:
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 9
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FCS:
- FCS_CKM.1: 13
- FCS_CKM.1.1: 2
- FCS_CKM.2: 1
- FCS_CKM.4: 10
- FCS_COP.1: 13
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC.1: 1
- FDP_IFC.1: 26
- FDP_IFC.1.1: 4
- FDP_IFF.1: 28
- FDP_IFF.1.1: 5
- FDP_IFF.1.2: 5
- FDP_IFF.1.3: 4
- FDP_IFF.1.4: 4
- FDP_IFF.1.5: 4
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FIA:
- FIA_ATD.1: 7
- FIA_ATD.1.1: 4
- FIA_UAU.2: 10
- FIA_UAU.2.1: 1
- FIA_UAU.5: 6
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 1
- FIA_UID.2: 10
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 10
- FMT_MOF.1.1: 1
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 22
- FMT_MTD.1.1: 3
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 10
- FPT_STM.1.1: 3
- FPT_TRP.1: 4
- FTP:
- FTP_TRP.1: 4
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- OE:
- OE.CONFIG: 1
- OE.NOTIFY: 1
- OE.NO_TOE_BYPASS: 1
- OE.PRECAUTION: 1
- OE.TRUSTED_ADMIN: 1
|
- A:
- A.BENIGN: 1
- A.NOEVIL: 1
- A.NOREMO: 1
- A.PHYSEC: 2
- A.PROLIN: 1
- A.PUBLIC: 1
- A.SINGEN: 1
- O:
- O.ACCOUN: 5
- O.AUDREC: 8
- O.IDAUTH: 11
- O.MEDIAT: 10
- O.SECFUN: 12
- O.SECSTA: 9
- O.SELPRO: 4
- OE:
- OE.ADMTRA: 3
- OE.BENIGN: 2
- OE.GUIDAN: 3
- OE.NOEVIL: 1
- OE.NOREMO: 2
- OE.PHYSEC: 3
- OE.PROLIN: 2
- OE.PUBLIC: 2
- OE.SINGEN: 2
- T:
- T.AUDACC: 6
- T.AUDFUL: 4
- T.MEDIAT: 2
- T.NOAUTH: 6
- T.SELPRO: 3
- T.TUSAGE: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 34
- AES-128: 1
- AES-256: 16
- constructions:
- MAC:
- HMAC: 4
- HMAC-SHA-256: 4
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 9
- SHA-384: 2
- SHA-512: 1
- scrypt:
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- TLS:
- TLS:
- TLS: 45
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 2
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 6
- P-384: 10
- secp256r1: 2
- secp384r1: 2
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-4: 4
- FIPS 186-4: 7
- FIPS 197: 5
- FIPS 198-1: 3
- FIPS PUB 186-4: 4
- FIPS PUB 197: 2
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38C: 1
- NIST SP 800-38D: 1
- NIST SP 800-38F: 1
- NIST SP 800-57: 1
- SP 800-108: 1
- SP 800-38A: 2
- SP 800-38C: 1
- SP 800-38E: 1
- SP 800-56A: 1
- SP 800-90A: 2
- RFC:
- RFC 2246: 1
- RFC 2818: 2
- RFC 3394: 2
- RFC 4346: 1
- RFC 5216: 1
- RFC 5246: 4
- RFC 5280: 4
- RFC 5288: 3
- RFC 5289: 8
- RFC 6125: 1
- RFC 6960: 1
- X509:
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- FIPS 140: 2
- FIPS 140-2: 1
- FIPS 197: 1
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /CreationDate: D:20220128231252-05'00'
- /ModDate: D:20220128231252-05'00'
- pdf_file_size_bytes: 1857692
- pdf_hyperlinks: https://source.android.com/devices/architecture/kernel/modular-kernels#core-kernel-requirements, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=34730, http://www.globalplatform.org/mediaguidetee.asp, http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ddi0487a.f/index.html, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=34729, http://www.wi-fi.org/certification, https://developer.android.com/reference/javax/net/ssl/HttpsURLConnection, https://source.android.com/setup/contribute/report-bugs, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=34735, https://developer.android.com/reference/javax/net/ssl/SSLSocket, https://developer.android.com/reference/android/app/admin/SecurityLog, https://developer.android.com/guide/topics/connectivity/bluetooth.html, https://developer.android.com/reference/android/app/admin/SecurityLog.SecurityEvent, https://developer.android.com/reference/packages, https://source.android.com/devices/tech/security/index.html, http://developer.android.com/reference/android/bluetooth/package-summary.html
- pdf_is_encrypted: False
- pdf_number_of_pages: 63
|
- /Author: Primasec Ltd
- /Certification:: CC
- /Company: TOSHIBA
- /CreationDate: D:20121005163638+02'00'
- /Creator: Acrobat PDFMaker 9.1 for Word
- /Keywords:
- /ModDate: D:20121005163701+02'00'
- /Producer: Adobe PDF Library 9.0
- /Product Name and Version: MWG 7.0.1.1
- /SourceModified: D:20121005143523
- /Subject:
- /Title: Security Target
- pdf_file_size_bytes: 403541
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 53
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |