| name |
FortiGate/FortiOS Version 6.2.7 |
Durio Unified Threat Management (UTM) v3.2.5 |
| category |
Boundary Protection Devices and Systems |
Network and Network-Related Devices and Systems |
| scheme |
CA |
MY |
| status |
active |
archived |
| not_valid_after |
14.01.2026 |
14.07.2025 |
| not_valid_before |
14.01.2022 |
14.07.2020 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/559-LSS%20CT%20v1.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C105-CERTIFICATE-v1%20signed.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/559-LSS%20CR%20v1.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C105-CR-v1.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/559-LSS%20ST%20v1.7.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Open%20Kod%20Durio%20Security%20Target%20v1.0.pdf |
| manufacturer |
Fortinet, Inc. |
Open Kod Sdn. Bhd. |
| manufacturer_web |
https://www.fortinet.com/ |
https://www.openkod.com/ |
| security_level |
{} |
EAL2 |
| dgst |
92cfd27953f92747 |
18e677bb36b93aee |
| heuristics/cert_id |
559-LSS |
ISCB-5-RPT-C105-CR-v1 |
| heuristics/cert_lab |
CANADA |
[] |
| heuristics/cpe_matches |
cpe:2.3:o:fortinet:fortios:6.2.7:*:*:*:*:*:*:* |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
CVE-2022-42474, CVE-2021-26092, CVE-2022-42472, CVE-2023-36639, CVE-2023-42789, CVE-2021-32600, CVE-2022-41329, CVE-2022-29054, CVE-2023-42790, CVE-2021-43206, CVE-2023-44247, CVE-2021-26103, CVE-2022-45861, CVE-2021-44170, CVE-2021-26110, CVE-2023-28002, CVE-2022-42475, CVE-2022-22305, CVE-2022-23438, CVE-2023-36641, CVE-2023-29175, CVE-2024-26008, CVE-2023-42785, CVE-2022-29055, CVE-2021-42755, CVE-2022-22302, CVE-2022-35843, CVE-2024-21762, CVE-2022-29053, CVE-2021-26108, CVE-2023-22639, CVE-2023-33305, CVE-2024-47569, CVE-2022-42476, CVE-2024-26011, CVE-2021-44168, CVE-2023-45586, CVE-2023-46715, CVE-2022-39948, CVE-2022-23442, CVE-2023-29182, CVE-2021-44171, CVE-2025-58413, CVE-2021-43081, CVE-2021-36169, CVE-2021-41032, CVE-2021-26109, CVE-2021-43072, CVE-2022-27491, CVE-2023-22641, CVE-2023-22640, CVE-2023-29183, CVE-2023-29178, CVE-2022-26122, CVE-2022-41328, CVE-2022-41335, CVE-2022-22306, CVE-2021-24018, CVE-2023-29181, CVE-2022-23439, CVE-2024-26010, CVE-2021-42757, CVE-2023-29180, CVE-2023-41677, CVE-2024-26009, CVE-2023-42786, CVE-2022-40680, CVE-2021-43074, CVE-2023-36640, CVE-2022-38378, CVE-2024-50571, CVE-2023-45583, CVE-2022-43953, CVE-2024-23110, CVE-2022-41330, CVE-2023-27997, CVE-2022-43947, CVE-2022-22299 |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, ASE_SPD.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1 |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
| heuristics/extracted_versions |
6.2.7 |
3.2.5 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- certification_date: 14.01.2022
- level: CPP_ND_V2.2E w/ MOD_CPP_FW_v1.4e, MOD_VPNGW_v1.1,MOD_IPS_V1.0
- product: FortiGate/FortiOS Version 6.2.7
- vendor: Fortinet, Inc.
|
- cert_no: 2020-004-C105
- certification_date: 14.07.2020
- developer: Open Kod Sdn. Bhd.
- enhanced:
- assurance_level: EAL2
- category: Network and Network-Related Devices and Systems
- cert_id: C105
- certification_date: 14.07.2020
- developer: Open Kod Sdn. Bhd.Suite 3-3A 4805,CBD Perdana 2Jalan Perdana Cyber 12Cyberjaya 63000Selangor Tel: +6038318 6736Email: [email protected]: www.openkod.com
- expiration_date: 14.07.2025
- mutual_recognition: CCRA
- product: Durio Unified Threat Management (UTM) v3.2.5
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C105/ISCB-5-RPT-C105-CR-v1.pdf
- scope: The TOE is a hardware appliance that includes several features such as firewall. antivirus software, content filtering and a spam filter in a single integrated package. The TOE is designed to provide firewall services ensuring network protection for Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) networks. The TOE is capable of robust filtering based on information contained in IPv4, IPv6, ICMPv4, ICMPv6, TCP and UDP headers as specified by their respective RFC’s. Additionally, the TOE is capable of content inspection of FTP and H.323 protocols to work with the dynamic nature of these protocols. The TOE has extensive logging capabilities. These audit logs are capable of being exported to an external syslog server over a protected channel for further analysis and inspection.
- status: Archive
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C105/Open_Kod_Durio_Security_Target_v10.pdf
- type: Data Protection
- expiration_date: 14.07.2025
- level: EAL2
- product: Durio Unified Threat Management (UTM) v3.2.5
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/101
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
bde3d7587cf42e78, 89f2a255423f4a20, 6448a1802bb874d8 |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_IPS_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_CPP_FW_v1.4e.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf |
{} |
| pdf_data/cert_filename |
559-LSS CT v1.1.pdf |
ISCB-5-CERT-C105-CERTIFICATE-v1 signed.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20190122115136-04'00'
- /Creator: Adobe Illustrator CC 22.0 (Windows)
- /ModDate: D:20220119105838-05'00'
- /Producer: Adobe PDF library 15.00
- /Title: cyber-centre-product-evaluation-certificate-e-bg
- pdf_file_size_bytes: 1640616
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20200805133537+08'00'
- /Creator: ISCB Printer
- /ModDate: D:20200924041229Z00'00'
- /Producer: macOS Version 10.15.5 (Build 19F101) Quartz PDFContext, AppendMode 1.1
- /Title: SISCB Print20080513340
- pdf_file_size_bytes: 88095
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
559-LSS CR v1.1.pdf |
ISCB-5-RPT-C105-CR-v1.pdf |
| pdf_data/report_frontpage |
- CA:
- cert_id: 559-LSS
- cert_lab: CANADA
|
|
| pdf_data/report_keywords/cc_cert_id |
|
- MY:
- ISCB-5-RPT-C105-CR-v1: 31
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FDP:
- FIA:
- FIA_ATD.1: 1
- FIA_UAU.2: 1
- FMT:
- FMT_MSA.1: 1
- FMT_MTD.1: 1
- FMT_SMF.1: 1
- FTP:
|
| pdf_data/report_keywords/cc_claims |
|
- A:
- A.ADMIN: 1
- A.PLATFORM: 1
- A.USER: 1
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- 73 It is strongly recommended that: a) Even though the identified vulnerabilities are out of scope of the evaluation, the developer should address all residual vulnerabilities by: I. Preventing XSS: 1
- out of scope: 1
|
| pdf_data/report_metadata |
- /Author: Clark, Cory P.
- /CreationDate: D:20220120072326-05'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20220120072326-05'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 719060
- pdf_hyperlinks: https://fortiguard.com/, http://www.zerodayinitiative.com/advisories, https://www.openssl.org/news/vulnerabilities.html, https://docs.fortinet.com/vm, https://web.nvd.nist.gov/view/vuln/search, mailto:[email protected], http://nessus.org/plugins/index.php?view=search, https://www.securityfocus.com/, https://www.rapid7.com/db/vulnerabilities, https://docs.fortinet.com/document/fortigate-private-cloud/6.2.0/vmware-esxiadministration-guide/706376/about-fortigate-vm-on-vmware-esxi, https://www.exploit-db.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /CreationDate: D:20200729055815Z00'00'
- /Creator: Word
- /ModDate: D:20200729055815Z00'00'
- /Producer: macOS Version 10.15.5 (Build 19F101) Quartz PDFContext
- /Title: Microsoft Word - ISCB-5-RPT-C105-CR-v1.docx
- pdf_file_size_bytes: 1108056
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 31
|
| pdf_data/st_filename |
559-LSS ST v1.7.pdf |
Open Kod Durio Security Target v1.0.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 2
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 1
- ASE_INT.1: 2
- ASE_OBJ.2: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 2
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 24
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_GEN_EXT: 2
- FAU_GEN_EXT.1: 6
- FAU_GEN_EXT.1.1: 1
- FAU_STG_EXT: 2
- FAU_STG_EXT.1: 10
- FAU_STG_EXT.1.1: 2
- FAU_STG_EXT.1.2: 2
- FAU_STG_EXT.1.3: 3
- FAU_STG_EXT.2: 4
- FAU_STG_EXT.2.1: 1
- FAU_STG_EXT.3: 5
- FAU_STG_EXT.4: 4
- FAU_STG_EXT.4.1: 1
- FAU_STG_EXT.5: 4
- FAU_STG_EXT.5.1: 1
- FCO:
- FCO_CPC_EXT: 2
- FCO_CPC_EXT.1: 6
- FCO_CPC_EXT.1.1: 2
- FCO_CPC_EXT.1.2: 2
- FCO_CPC_EXT.1.3: 2
- FCS:
- FCS_CKM: 10
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 16
- FCS_CKM.2.1: 1
- FCS_CKM.4: 4
- FCS_CKM.4.1: 1
- FCS_COP: 68
- FCS_COP.1: 5
- FCS_NTP_EXT: 2
- FCS_NTP_EXT.1: 5
- FCS_NTP_EXT.1.1: 1
- FCS_NTP_EXT.1.2: 1
- FCS_NTP_EXT.1.3: 1
- FCS_NTP_EXT.1.4: 2
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 24
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SSHC_EXT: 2
- FCS_SSHC_EXT.1: 5
- FCS_SSHC_EXT.1.1: 1
- FCS_SSHC_EXT.1.2: 1
- FCS_SSHC_EXT.1.3: 1
- FCS_SSHC_EXT.1.4: 1
- FCS_SSHC_EXT.1.5: 1
- FCS_SSHC_EXT.1.6: 1
- FCS_SSHC_EXT.1.7: 1
- FCS_SSHC_EXT.1.8: 1
- FCS_SSHC_EXT.1.9: 1
- FCS_SSHS_EXT: 2
- FCS_SSHS_EXT.1: 9
- FCS_SSHS_EXT.1.1: 2
- FCS_SSHS_EXT.1.2: 2
- FCS_SSHS_EXT.1.3: 2
- FCS_SSHS_EXT.1.4: 2
- FCS_SSHS_EXT.1.5: 2
- FCS_SSHS_EXT.1.6: 2
- FCS_SSHS_EXT.1.7: 2
- FCS_SSHS_EXT.1.8: 2
- FCS_TLSC_EXT: 2
- FCS_TLSC_EXT.1: 9
- FCS_TLSC_EXT.1.1: 2
- FCS_TLSC_EXT.1.2: 2
- FCS_TLSC_EXT.1.3: 2
- FCS_TLSC_EXT.1.4: 2
- FCS_TLSC_EXT.2: 8
- FCS_TLSC_EXT.2.1: 2
- FCS_TLSC_EXT.2.3: 1
- FCS_TLSS_EXT: 4
- FCS_TLSS_EXT.1: 11
- FCS_TLSS_EXT.1.1: 2
- FCS_TLSS_EXT.1.2: 2
- FCS_TLSS_EXT.1.3: 2
- FCS_TLSS_EXT.1.4: 2
- FCS_TLSS_EXT.2: 3
- FCS_TLSS_EXT.2.1: 1
- FCS_TLSS_EXT.2.2: 1
- FCS_TLSS_EXT.2.3: 1
- FDP:
- FDP_RIP.2: 4
- FDP_RIP.2.1: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 9
- FIA_PMG_EXT.1.1: 2
- FIA_PSK_EXT.1: 3
- FIA_PSK_EXT.1.1: 1
- FIA_PSK_EXT.1.2: 2
- FIA_PSK_EXT.1.3: 1
- FIA_PSK_EXT.1.4: 1
- FIA_UAU.1: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 2
- FIA_UAU_EXT.2: 9
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT: 3
- FIA_UIA_EXT.1: 8
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FMT:
- FMT_MOF: 11
- FMT_MOF.1: 4
- FMT_MTD: 8
- FMT_MTD.1: 2
- FMT_SMF: 11
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.2: 4
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 2
- FPT_APW_EXT.1: 9
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_FLS: 3
- FPT_FLS.1: 1
- FPT_ITT.1: 3
- FPT_PTD: 1
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 9
- FPT_SKP_EXT.1.1: 2
- FPT_STM: 2
- FPT_STM_EXT: 2
- FPT_STM_EXT.1: 7
- FPT_STM_EXT.1.1: 2
- FPT_STM_EXT.1.2: 2
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 9
- FPT_TST_EXT.1.1: 2
- FPT_TST_EXT.3: 3
- FPT_TST_EXT.3.1: 1
- FPT_TST_EXT.3.2: 1
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 10
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FPT_TUD_EXT.2: 5
- FPT_TUD_EXT.2.2: 1
- FPT_TUD_EXT.2.3: 1
- FPT_TUD_EXT.2.4: 1
- FTA:
- FTA_SSL: 1
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 3
- FTA_SSL_EXT.1: 10
- FTA_SSL_EXT.1.1: 2
- FTA_TAB.1: 7
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 14
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 4
- FTP_TRP.1: 3
|
- FAU:
- FAU_GEN.1: 7
- FAU_GEN.1.1: 1
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FDP:
- FDP_ACC.1: 14
- FDP_ACC.1.1: 1
- FDP_ACF.1: 7
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_IFF: 2
- FIA:
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UID.1: 4
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 17
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTP:
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_: 1
- A.CONNECTIONS: 2
- A.LIMITED_: 1
- A.NO_THRU_: 1
- A.PHYSICAL_: 1
- A.REGULAR_: 1
- A.RESIDUAL_: 1
- A.TRUSTED_: 1
- A.VS_CORRECT_: 1
- A.VS_ISOLATION: 1
- A.VS_REGULAR_: 1
- A.VS_TRUSTED_: 1
- O:
- O.ADDRESS_FILTERING: 1
- O.AUTHENTICATION: 1
- O.CRYPTOGRAPHIC_: 1
- O.FAIL_SECURE: 1
- O.IPS_ANALYZE: 1
- O.IPS_REACT: 1
- O.PORT_FILTERING: 1
- O.RESIDUAL_: 1
- O.STATEFUL_TRAFFIC_: 1
- O.SYSTEM_MONITORING: 2
- O.TOE_ADMINISTRATION: 2
- OE:
- OE.ADMIN_: 1
- OE.CONNECTIONS: 2
- OE.NO_GENERAL_: 1
- OE.NO_THRU_: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- OE.VM_: 1
- T:
- T.DATA_INTEGRITY: 1
- T.MALICIOUS_TRAFFIC: 1
- T.NETWORK_ACCESS: 2
- T.NETWORK_DISCLOSURE: 3
- T.NETWORK_DOS: 1
- T.NETWORK_MISUSE: 3
- T.PASSWORD_: 1
- T.REPLAY_ATTACK: 1
- T.SECURITY_: 2
- T.UNAUTHORIZED_: 1
- T.UNDETECTED_: 1
- T.UNTRUSTED_: 1
- T.UPDATE_: 1
- T.WEAK_: 2
|
- A:
- A.ADMIN: 2
- A.PHYSICAL: 3
- A.PLATFORM: 3
- A.TIMESTAMP: 3
- A.USER: 3
- O:
- O.ACCESS: 5
- O.CONFIG: 4
- O.MANAGE: 4
- O.NOAUTH: 5
- O.TOECOM: 4
- O.USER: 5
- OE:
- OE.ADMIN: 3
- OE.PHYSICAL: 2
- OE.PLATFORM: 3
- OE.TIMESTAMP: 2
- OE.USER: 3
- T:
- T.CONFIG: 2
- T.MANAGEMENT: 3
- T.TOECOM: 3
- T.UNAUTHORISED_AC: 1
- T.UNAUTHORISED_ACCESS: 2
- T.WEB_ATTACK: 2
|
| pdf_data/st_keywords/vendor |
|
- Microsoft:
- STMicroelectronics:
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 29
- AES-: 1
- AES-128: 2
- constructions:
- MAC:
- HMAC: 10
- HMAC-SHA-256: 10
- HMAC-SHA-384: 7
- HMAC-SHA-512: 8
|
|
| pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 5
- DHE: 2
- Diffie-Hellman: 12
- RSA:
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 11
- SHA-384: 10
- SHA-512: 9
- SHA256: 1
- SHA384: 1
- SHA512: 1
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 28
- IKEv1: 27
- IKEv2: 26
- IPsec:
- SSH:
- TLS:
- DTLS:
- DTLS: 38
- DTLS 1.0: 2
- DTLS 1.2: 2
- SSL:
- SSL: 9
- SSL 2.0: 3
- SSL 3.0: 3
- TLS:
- TLS: 107
- TLS 1.0: 3
- TLS 1.1: 6
- TLS 1.2: 5
- TLS1.1: 2
- TLS1.2: 2
- VPN:
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 10
- P-384: 6
- P-521: 6
- secp256r1: 7
- secp384r1: 3
- secp521r1: 4
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 4
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 4
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 4
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 4
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 4
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 4
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 4
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 4
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 4
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 4
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 4
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 4
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 3
- FIPS 186-4: 4
- FIPS PUB 186-4: 6
- ISO:
- ISO/IEC 10118-: 1
- ISO/IEC 14888-3: 2
- ISO/IEC 18031:2011: 4
- ISO/IEC 18031:2011 6: 1
- ISO/IEC 9796-2: 2
- ISO/IEC 9797-: 1
- PKCS:
- RFC:
- RFC 1305: 1
- RFC 2409: 2
- RFC 2460: 4
- RFC 2463: 2
- RFC 2818: 9
- RFC 2986: 2
- RFC 3268: 4
- RFC 3513: 2
- RFC 3526: 6
- RFC 3602: 9
- RFC 4106: 6
- RFC 4109: 2
- RFC 4251: 1
- RFC 4253: 3
- RFC 4301: 4
- RFC 4303: 2
- RFC 4304: 3
- RFC 4306: 2
- RFC 4346: 5
- RFC 4347: 2
- RFC 4443: 1
- RFC 4492: 8
- RFC 4868: 5
- RFC 4945: 3
- RFC 5077: 5
- RFC 5114: 2
- RFC 5246: 9
- RFC 5280: 9
- RFC 5282: 1
- RFC 5289: 8
- RFC 5735: 2
- RFC 5759: 1
- RFC 5905: 1
- RFC 5996: 5
- RFC 6125: 4
- RFC 6347: 2
- RFC 6960: 1
- RFC 768: 4
- RFC 791: 4
- RFC 7919: 2
- RFC 792: 3
- RFC 793: 4
- RFC4346: 1
- X509:
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
|
- /CreationDate: D:20200501080117Z00'00'
- /Creator: Word
- /ModDate: D:20200501080117Z00'00'
- /Producer: macOS Version 10.15.4 (Build 19E287) Quartz PDFContext
- /Title: Microsoft Word - Open Kod Durio Security Target v1.0.docx
- pdf_file_size_bytes: 2686904
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 33
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
True |
| state/cert/download_ok |
True |
True |
| state/cert/extract_ok |
True |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |