| name |
Stratus CM 4110 and Stratus CM 4120 |
JBoss Enterprise Application Platform 7 Version 7.2.3 |
| category |
Network and Network-Related Devices and Systems |
Operating Systems |
| scheme |
US |
IT |
| status |
archived |
archived |
| not_valid_after |
30.04.2015 |
02.12.2024 |
| not_valid_before |
30.04.2013 |
02.12.2019 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10492-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_jboss_eap_723_v1.0_en.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10492-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_jboss_eap_723_v1.9.pdf |
| manufacturer |
NCS Technologies, Inc. |
Red Hat, Inc. |
| manufacturer_web |
https://www.ncst.com |
https://www.redhat.com |
| security_level |
EAL2+, ALC_FLR.2 |
ALC_FLR.3, EAL4 |
| dgst |
92ec626435d92741 |
514b807132e6327a |
| heuristics/cert_id |
|
OCSI/CERT/ATS/05/2018/RC |
| heuristics/cert_lab |
US |
[] |
| heuristics/cpe_matches |
{} |
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2:*:*:*:*:*:*:* |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
CVE-2022-0866, CVE-2019-12400, CVE-2019-14885, CVE-2020-7238, CVE-2019-19343 |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ATE_COV.2, ADV_FSP.2, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ADV_TDS.3, AVA_VAN.3, ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_DVS.1, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ASE_TSS.1, ADV_FSP.4, ADV_ARC.1 |
| heuristics/extracted_versions |
4110, 4120 |
7.2.3 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10492/
- categories: ['Peripheral Switch']
- category: Peripheral Switch
- certification_date: 30.04.2013
- evaluation_facility: UL Verification Services
- expiration_date: 30.04.2015
- id: CCEVS-VR-VID10492
- product: Stratus CM 4110 and Stratus CM 4120
- scheme: US
- url: https://www.niap-ccevs.org/products/10492
- vendor: NCS Technologies, Inc.
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
fd5d86dc01df0437 |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psshid_v2.1-vr.pdf |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
st_vid10492-vr.pdf |
cr_jboss_eap_723_v1.0_en.pdf |
| pdf_data/report_frontpage |
- US:
- cert_id: To be completed by CCEVS
- cert_item: NCS Technologies, Inc. Models: NCS Stratus CM 4110, Version: F103540-1 NCS Stratus CM 4120, Version: F103786-1
- cert_lab: US NIAP
|
|
| pdf_data/report_keywords/cc_cert_id |
|
- IT:
- OCSI/CERT/ATS/05/2018/RC: 37
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 6
- EAL 2 augmented: 3
- EAL 4: 1
- EAL2: 1
|
- EAL:
- EAL2: 2
- EAL4: 9
- EAL4 augmented: 2
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 1
- ALC_FLR.3: 7
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.MANAGE: 1
- A.NOEVIL: 1
- A.PHYSICAL: 1
- T:
- T.INVALIDUSB: 1
- T.RESIDUAL: 1
- T.ROM_PROG: 1
- T.SPOOF: 1
- T.TRANSFER: 1
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ISO:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
- org:
- org.jboss.as: 1
- org.wildfly.security: 1
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /Author: Marvin Byrd
- /CreationDate: D:20130502111525
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20130502111525
- /Producer: Microsoft® Office Word 2007
- pdf_file_size_bytes: 483812
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
- /Author: ocsi
- /CreationDate: D:20191212104003+01'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20191212104003+01'00'
- /Producer: Microsoft® Word 2010
- /Title: Certfication Report “JBoss Enterprise Application Platform 7 Version 7.2.3”
- pdf_file_size_bytes: 866495
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 37
|
| pdf_data/st_filename |
st_vid10492-st.pdf |
st_jboss_eap_723_v1.9.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 4
- EAL 2 augmented: 1
- EAL1: 2
- EAL2: 4
- EAL3: 2
- EAL5: 2
- EAL7: 2
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 5
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 10
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- ADV_TDS.1: 7
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 7
- AGD_PRE: 1
- AGD_PRE.1: 4
- ALC:
- ALC_CMC: 1
- ALC_CMC.2: 3
- ALC_CMS: 1
- ALC_CMS.2: 2
- ALC_DEL: 1
- ALC_DEL.1: 3
- ALC_DVS: 1
- ALC_FLR: 1
- ALC_FLR.2: 3
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.2: 1
- ASE_REQ: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 6
- ATE_COV.2: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_FUN.1: 4
- ATE_IND: 1
- ATE_IND.2: 2
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 4
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FDP:
- FDP_ACC.1: 2
- FDP_ETC: 1
- FDP_IFC: 3
- FDP_IFC.1: 13
- FDP_IFC.1.1: 1
- FDP_IFF: 4
- FDP_IFF.1: 9
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_ITC: 1
- FDP_MSA.1: 2
- FIA:
- FMT:
- FMT_MOF.1: 1
- FMT_MSA: 2
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 2
- FMT_SMR.1: 5
- FPT:
- FPT_PAR_EXP: 3
- FPT_PAR_EXP.1: 6
- FPT_PAR_EXP.1.1: 2
- FPT_PAR_EXP.1.2: 2
- FPT_PAR_EXP.1.3: 2
- FPT_PAR_EXT.1: 7
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FDP:
- FDP_ACC.1: 43
- FDP_ACC.1.1: 4
- FDP_ACF.1: 28
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_IFC.1: 3
- FDP_ROL: 23
- FIA:
- FIA_ATD.1: 12
- FIA_ATD.1.1: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 10
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 33
- FMT_MSA.1.1: 3
- FMT_MSA.3: 38
- FMT_MSA.3.1: 4
- FMT_MSA.3.2: 4
- FMT_MTD.1: 20
- FMT_MTD.1.1: 3
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 3
- FMT_SMR.2: 18
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_ITT.1: 3
- FPT_STM.1: 2
- FPT_TRC.1: 9
- FPT_TRC.1.1: 1
- FPT_TRC.1.2: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.MANAGE: 2
- A.NO_EVIL: 1
- A.PHYSICAL: 3
- O:
- O.CONF: 7
- O.INDICATE: 4
- O.PAIR_PROTECT: 5
- O.ROM: 6
- O.SELECT: 5
- O.SWITCH: 5
- O.USBDETECT: 4
- OE:
- OE.ACCESS: 3
- OE.MANAGE: 3
- OE.NOEVIL: 3
- OE.PHYSICAL: 3
- OSP:
- T:
- T.INVALIDUSB: 3
- T.RESIDUAL: 2
- T.ROM_PROG: 4
- T.SPOOF: 2
- T.TRANSFER: 4
|
- A:
- A.ADMIN: 5
- A.CLUSTER: 2
- A.DEVEL: 5
- A.PEER: 3
- A.PROTECT: 7
- A.SYSTEM: 3
- A.TLS: 5
- O:
- O.ACCESS: 21
- O.AUDITING: 7
- O.AUTHORIZATION: 17
- O.CONSISTENCY: 6
- O.ROLE: 17
- OE:
- OE.ADMIN: 3
- OE.DEVEL: 3
- OE.INSTALL: 6
- OE.PHYSICAL: 3
- OE.RECOVER: 2
- OE.SYSTEM: 5
- T:
- T.ACCESS: 6
- T.DIFFER: 3
- T.UAUSER: 3
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: seckgren
- /CreationDate: D:20130429123428-07'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20130501172145-04'00'
- /Producer: Acrobat Distiller 10.1.5 (Windows)
- /Title: Microsoft Word - 2q - NCS KVM Security Target v1.778-Clean.docx
- pdf_file_size_bytes: 314177
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 39
|
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |