name |
Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1 |
Tenable Security Center 3.2 (SC3) with 3D Tool 1.2 (3DT), Log Correlation Engine 2.0.2 (LCE), Passive Vulnerability Scanner 3.0 (PVS), and Nessus Scanner 3.0.4 (Nessus) |
category |
Detection Devices and Systems |
Detection Devices and Systems |
scheme |
US |
US |
status |
archived |
archived |
not_valid_after |
01.11.2014 |
01.11.2014 |
not_valid_before |
01.10.2012 |
31.01.2010 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10273-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10273-st.pdf |
manufacturer |
Tenable Network Security, Inc. |
Tenable Network Security, Inc. |
manufacturer_web |
https://www.tenable.com/ |
https://www.tenable.com/ |
security_level |
EAL2+, ALC_FLR.2 |
EAL2+ |
dgst |
7a9d9dd29e76bfba |
b1453ddae675bfa6 |
heuristics/cert_id |
CCEVS-VR-VID-10443-2012 |
CCEVS-VR-VID-10273-2010 |
heuristics/cert_lab |
US |
US |
heuristics/cpe_matches |
cpe:2.3:a:tenable:nessus:4.4.1.15078:*:*:*:*:*:x64:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
CVE-2023-6062, CVE-2021-20079, CVE-2023-3252, CVE-2021-3450, CVE-2017-18214, CVE-2018-5407, CVE-2022-22827, CVE-2021-46143, CVE-2022-22822, CVE-2022-22826, CVE-2024-0955, CVE-2020-5765, CVE-2016-1000029, CVE-2022-3499, CVE-2018-1141, CVE-2022-33757, CVE-2019-1559, CVE-2023-3251, CVE-2021-45960, CVE-2022-23852, CVE-2022-28291, CVE-2022-0778, CVE-2022-32973, CVE-2022-4313, CVE-2017-5179, CVE-2019-3982, CVE-2020-5774, CVE-2022-23990, CVE-2021-3449, CVE-2022-22825, CVE-2019-3962, CVE-2018-20843, CVE-2016-4055, CVE-2016-9260, CVE-2024-0971, CVE-2019-3961, CVE-2022-22824, CVE-2018-1147, CVE-2016-1000028, CVE-2018-1148, CVE-2023-3253, CVE-2019-3923, CVE-2022-32974, CVE-2021-20106, CVE-2021-20135, CVE-2022-22823, CVE-2023-6178 |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.2, ALC_CMC.2, AGD_PRE.1, ADV_ARC.1, ALC_CMS.2, ATE_FUN.1, ALC_DEL.1, AGD_OPE.1, ATE_COV.1, ADV_TDS.1, ALC_FLR.2, ATE_IND.2, AVA_VAN.2 |
ALC_FLR.3, AGD_USR.1, ADV_FSP.1, ADV_RCR.1, ATE_FUN.1, ADV_HLD.1, AVA_VLA.1, ATE_COV.1, AVA_SOF.1, AGD_ADM.1, ATE_IND.2, AVA_MSU.1 |
heuristics/extracted_versions |
3.6, 4.4, 2.1, 5.0.1, 2.0.1 |
3.2, 3.0, 3.0.4, 1.2, 2.0.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Enterprise Security Management
- certification_date: 01.10.2012
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 01.11.2014
- id: CCEVS-VR-VID10443
- product: Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1. Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1
- scheme: US
- url: https://www.niap-ccevs.org/product/10443
- vendor: Tenable, Inc
|
- category: Enterprise Security Management, Network Management, Wireless Monitoring
- certification_date: 31.01.2010
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 01.11.2014
- id: CCEVS-VR-VID10273
- product: Tenable Security Center 3.2 (SC3) with 3D Tool 1.2 (3DT), Log Correlation Engine 2.0.2 (LCE), Passive Vulnerability Scanner 3.0 (PVS), and Nessus Scanner 3.0.4 (Nessus)
- scheme: US
- url: https://www.niap-ccevs.org/product/10273
- vendor: Tenable, Inc
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
st_vid10443-vr.pdf |
st_vid10273-vr.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10443-2012
- cert_item: Tenable SecurityCenter 4 and Components
- cert_lab: US NIAP
|
- US:
- cert_id: CCEVS-VR-VID10273-2010
- cert_item: Tenable Network Security, Inc. Tenable Security Center 3.2 and Components
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10443-2012: 1
|
- US:
- CCEVS-VR-VID10273-2010: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 4
- EAL 2 augmented: 3
- EAL 4: 1
- EAL2: 1
- EAL2+: 3
|
- EAL:
- EAL 2: 3
- EAL 2 augmented: 2
- EAL 4: 1
- EAL2+: 2
|
pdf_data/report_keywords/cc_sar |
|
- ALC:
- AVA:
- AVA_MSU.1: 2
- AVA_MSU.2: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ASCOPE: 1
- A.DYNMIC: 1
- A.LOCATE: 1
- A.MANAGE: 1
- A.NOEVIL: 1
- A.NOTRST: 1
- A.OS: 1
- A.PROTCT: 1
- A.WKSTN: 1
- T:
- T.COMDIS: 1
- T.COMINT: 1
- T.FACCNT: 1
- T.FALACT: 1
- T.FALASC: 1
- T.FALREC: 1
- T.IMPCON: 1
- T.INADVE: 1
- T.INFLUX: 1
- T.LOSSOF: 1
- T.MISACT: 1
- T.MISUSE: 1
- T.NOHALT: 1
- T.PRIVIL: 1
- T.SCNCFG: 1
- T.SCNMLC: 1
- T.SCNVUL: 1
|
- A:
- A.ACCESS: 1
- A.ASCOPE: 1
- A.DYNMIC: 1
- A.LOCATE: 1
- A.MANAGE: 1
- A.NOEVIL: 1
- A.NOTRST: 1
- A.OS: 2
- A.PROTCT: 1
- A.WKSTN: 2
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Evaluation Team
- /CreationDate: D:20121024103543
- /Creator: Microsoft® Office Word 2007
- /Keywords: VR
- /ModDate: D:20121024103543
- /Producer: Microsoft® Office Word 2007
- /Subject: Validator Report
- /Title: Validation Report for IronPort Messaging Gateway
- pdf_file_size_bytes: 441073
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
- /Author: Mario Tinto
- /Comments:
- /Company: Aerospace Corporation
- /CreationDate: D:20100216104339-05'00'
- /Creator: Acrobat PDFMaker 9.1 for Word
- /Keywords:
- /ModDate: D:20100216104343-05'00'
- /Producer: Adobe PDF Library 9.0
- /SourceModified: D:20100212151946
- /Subject:
- /Title: Validators Report
- pdf_file_size_bytes: 224485
- pdf_hyperlinks:
|