Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Waterfall Unidirectional Security Gateway WF-500, Version 2.0
NSCIB-CC-0618820-CR
Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1iOS 16.4.1 (build 20E252) (ANSSI-CC-2023/58)
ANSSI-CC-2023/58
name Waterfall Unidirectional Security Gateway WF-500, Version 2.0 Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1iOS 16.4.1 (build 20E252) (ANSSI-CC-2023/58)
category Boundary Protection Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme NL FR
not_valid_after 24.03.2028 28.12.2028
not_valid_before 24.03.2023 28.12.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-23-0618820-cert.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_58en.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0618820-CR-1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_58en.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0618820-STv3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_58en.pdf
manufacturer Waterfall Security Solutions Ltd. Apple Inc.
manufacturer_web https://www.waterfallsecurity.com https://www.apple.com/
security_level AVA_VAN.5, EAL4+, ALC_FLR.2, ALC_DVS.2 EAL2+, ADV_FSP.3
dgst c891270d230bb586 a5696b3d01538604
heuristics/cert_id NSCIB-CC-0618820-CR ANSSI-CC-2023/58
heuristics/cert_lab []
heuristics/cpe_matches {} cpe:2.3:o:apple:iphone_os:16.4.1:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2024-54510, CVE-2025-24237, CVE-2024-23262, CVE-2024-23220, CVE-2025-24159, CVE-2023-28191, CVE-2024-27807, CVE-2024-44131, CVE-2024-40780, CVE-2024-44308, CVE-2023-38593, CVE-2024-44276, CVE-2025-30434, CVE-2024-44233, CVE-2024-44126, CVE-2024-54514, CVE-2024-27851, CVE-2023-32359, CVE-2023-32411, CVE-2023-41980, CVE-2025-24107, CVE-2024-23212, CVE-2024-54497, CVE-2024-44241, CVE-2024-44158, CVE-2023-40423, CVE-2024-40824, CVE-2023-42939, CVE-2024-27871, CVE-2024-23290, CVE-2025-30467, CVE-2023-42839, CVE-2024-44192, CVE-2024-23222, CVE-2025-24244, CVE-2023-40419, CVE-2025-24264, CVE-2025-31192, CVE-2025-24201, CVE-2024-44204, CVE-2023-32376, CVE-2023-28826, CVE-2024-44198, CVE-2024-40782, CVE-2024-44274, CVE-2023-32416, CVE-2024-44296, CVE-2024-27855, CVE-2024-27874, CVE-2024-27834, CVE-2024-54513, CVE-2024-44124, CVE-2025-31183, CVE-2024-40853, CVE-2023-41071, CVE-2024-54469, CVE-2023-35074, CVE-2024-54478, CVE-2023-40385, CVE-2024-40826, CVE-2023-38604, CVE-2023-41993, CVE-2024-54468, CVE-2025-31201, CVE-2023-40438, CVE-2025-24167, CVE-2025-24149, CVE-2024-23210, CVE-2024-27802, CVE-2023-32396, CVE-2023-40432, CVE-2024-54541, CVE-2025-30471, CVE-2023-42934, CVE-2025-24179, CVE-2023-38603, CVE-2024-27815, CVE-2024-27845, CVE-2023-32381, CVE-2023-38261, CVE-2024-23287, CVE-2024-44194, CVE-2024-54494, CVE-2024-40785, CVE-2025-24158, CVE-2023-42957, CVE-2023-41063, CVE-2025-24182, CVE-2025-30438, CVE-2023-40396, CVE-2023-41232, CVE-2023-38590, CVE-2024-44201, CVE-2024-27796, CVE-2024-27879, CVE-2024-44263, CVE-2023-42883, CVE-2025-31200, CVE-2023-38605, CVE-2023-42949, CVE-2024-27811, CVE-2024-27869, CVE-2024-23264, CVE-2023-34352, CVE-2023-42870, CVE-2023-41995, CVE-2023-32372, CVE-2023-42890, CVE-2023-42922, CVE-2023-38565, CVE-2023-42956, CVE-2025-24091, CVE-2024-27801, CVE-2024-44171, CVE-2024-23263, CVE-2024-40806, CVE-2023-32420, CVE-2024-44147, CVE-2023-38614, CVE-2024-27819, CVE-2024-54564, CVE-2023-40395, CVE-2024-40856, CVE-2025-24208, CVE-2025-24127, CVE-2024-27805, CVE-2025-24283, CVE-2024-23214, CVE-2023-42961, CVE-2024-40857, CVE-2024-44261, CVE-2025-24243, CVE-2025-24251, CVE-2024-27823, CVE-2024-23239, CVE-2025-24214, CVE-2024-27831, CVE-2024-44187, CVE-2025-24104, CVE-2025-31203, CVE-2023-40400, CVE-2024-40786, CVE-2023-42878, CVE-2023-32407, CVE-2023-39434, CVE-2024-44155, CVE-2024-23213, CVE-2024-54551, CVE-2024-40798, CVE-2025-31202, CVE-2023-40454, CVE-2024-40833, CVE-2023-40384, CVE-2023-40448, CVE-2024-40809, CVE-2025-30426, CVE-2025-24173, CVE-2023-42916, CVE-2024-40867, CVE-2024-0258, CVE-2023-32428, CVE-2024-54507, CVE-2023-42974, CVE-2024-44227, CVE-2024-44123, CVE-2023-32361, CVE-2024-40851, CVE-2023-32399, CVE-2023-32384, CVE-2024-27832, CVE-2024-40793, CVE-2023-40442, CVE-2024-23217, CVE-2024-23270, CVE-2024-23242, CVE-2025-30469, CVE-2024-27838, CVE-2024-27839, CVE-2024-54492, CVE-2025-24163, CVE-2025-30427, CVE-2023-41983, CVE-2024-54486, CVE-2024-40863, CVE-2024-27816, CVE-2024-23251, CVE-2024-54500, CVE-2023-28202, CVE-2024-44252, CVE-2025-24210, CVE-2023-35984, CVE-2024-27852, CVE-2023-40424, CVE-2024-44229, CVE-2023-41976, CVE-2024-44242, CVE-2023-38133, CVE-2023-40429, CVE-2024-44206, CVE-2023-41968, CVE-2024-23205, CVE-2024-27848, CVE-2024-44273, CVE-2023-42855, CVE-2023-32432, CVE-2025-30456, CVE-2023-40452, CVE-2025-24131, CVE-2024-40822, CVE-2024-40771, CVE-2023-32404, CVE-2023-42953, CVE-2023-32371, CVE-2023-42866, CVE-2025-24211, CVE-2025-24154, CVE-2023-40427, CVE-2023-40399, CVE-2025-24097, CVE-2024-23289, CVE-2023-41065, CVE-2024-40854, CVE-2023-41174, CVE-2022-3970, CVE-2023-38611, CVE-2025-24145, CVE-2024-27806, CVE-2024-40840, CVE-2024-23278, CVE-2023-32367, CVE-2023-42899, CVE-2024-23288, CVE-2024-44239, CVE-2023-40437, CVE-2024-44180, CVE-2025-24160, CVE-2024-23246, CVE-2023-42946, CVE-2023-42917, CVE-2024-40779, CVE-2023-32390, CVE-2023-41977, CVE-2023-32388, CVE-2023-40443, CVE-2025-24193, CVE-2023-42848, CVE-2024-54538, CVE-2023-40394, CVE-2023-42823, CVE-2023-42873, CVE-2023-40403, CVE-2024-40835, CVE-2023-32365, CVE-2024-54470, CVE-2024-23257, CVE-2025-30428, CVE-2024-27880, CVE-2023-42950, CVE-2025-24213, CVE-2024-27789, CVE-2025-30463, CVE-2024-27800, CVE-2024-27850, CVE-2025-24162, CVE-2023-42951, CVE-2023-41069, CVE-2024-40795, CVE-2023-32409, CVE-2024-54485, CVE-2024-23231, CVE-2024-23296, CVE-2024-54503, CVE-2023-27930, CVE-2025-24137, CVE-2023-41992, CVE-2025-30470, CVE-2023-42962, CVE-2023-32412, CVE-2025-31184, CVE-2025-30433, CVE-2024-23284, CVE-2024-27817, CVE-2023-35990, CVE-2024-23228, CVE-2024-54526, CVE-2024-40852, CVE-2023-32434, CVE-2023-42834, CVE-2023-41974, CVE-2024-44302, CVE-2025-24252, CVE-2025-24209, CVE-2024-54508, CVE-2023-40409, CVE-2023-42841, CVE-2024-27821, CVE-2024-40813, CVE-2025-24161, CVE-2023-41997, CVE-2023-38592, CVE-2024-27863, CVE-2024-44212, CVE-2023-42969, CVE-2024-27836, CVE-2024-23254, CVE-2024-44282, CVE-2023-32437, CVE-2024-54502, CVE-2024-27804, CVE-2024-44164, CVE-2024-44290, CVE-2025-30432, CVE-2024-54517, CVE-2024-44269, CVE-2023-41254, CVE-2024-54535, CVE-2025-24126, CVE-2024-23208, CVE-2025-30430, CVE-2023-40428, CVE-2024-44234, CVE-2025-24150, CVE-2025-24113, CVE-2024-27828, CVE-2023-42846, CVE-2023-42952, CVE-2023-38600, CVE-2023-42942, CVE-2025-24178, CVE-2023-32439, CVE-2024-40830, CVE-2023-42849, CVE-2024-54658, CVE-2024-40776, CVE-2024-44165, CVE-2023-42914, CVE-2023-40420, CVE-2024-40796, CVE-2024-44145, CVE-2023-36495, CVE-2024-27803, CVE-2024-40777, CVE-2024-27856, CVE-2024-23282, CVE-2023-42893, CVE-2023-38424, CVE-2023-40413, CVE-2023-40410, CVE-2024-44205, CVE-2023-40434, CVE-2023-38594, CVE-2023-42936, CVE-2024-23243, CVE-2025-24202, CVE-2024-27810, CVE-2024-27799, CVE-2023-40431, CVE-2025-30447, CVE-2025-31197, CVE-2023-41982, CVE-2024-44185, CVE-2025-24177, CVE-2023-41986, CVE-2023-42896, CVE-2024-23283, CVE-2025-24180, CVE-2024-54488, CVE-2023-37450, CVE-2023-42824, CVE-2025-24124, CVE-2025-31191, CVE-2025-24086, CVE-2023-41984, CVE-2025-24198, CVE-2025-24190, CVE-2024-54525, CVE-2023-32402, CVE-2024-4558, CVE-2024-54558, CVE-2024-54550, CVE-2025-24221, CVE-2025-24123, CVE-2025-30439, CVE-2025-24117, CVE-2024-40787, CVE-2024-44258, CVE-2025-24200, CVE-2023-42852, CVE-2024-54501, CVE-2024-44191, CVE-2023-41070, CVE-2023-41061, CVE-2024-23259, CVE-2023-40447, CVE-2025-24271, CVE-2024-23293, CVE-2025-24270, CVE-2024-40788, CVE-2024-40844, CVE-2023-40529, CVE-2024-44255, CVE-2024-23280, CVE-2024-23240, CVE-2025-24194, CVE-2023-42857, CVE-2024-40778, CVE-2024-40789, CVE-2024-44139, CVE-2023-38597, CVE-2023-42977, CVE-2023-40416, CVE-2023-42925, CVE-2024-23297, CVE-2024-44176, CVE-2023-40408, CVE-2024-27835, CVE-2023-32357, CVE-2024-23250, CVE-2023-42970, CVE-2024-44169, CVE-2023-32415, CVE-2025-24085, CVE-2023-42833, CVE-2024-44183, CVE-2023-32400, CVE-2023-41068, CVE-2023-38136, CVE-2023-41981, CVE-2023-40417, CVE-2024-27840, CVE-2024-23291, CVE-2023-41991, CVE-2024-44259, CVE-2025-30454, CVE-2025-24128, CVE-2024-40850, CVE-2024-54467, CVE-2024-44278, CVE-2023-40412, CVE-2024-44235, CVE-2023-38610, CVE-2023-32422, CVE-2024-44218, CVE-2023-38595, CVE-2024-44170, CVE-2023-41074, CVE-2025-24216, CVE-2023-38410, CVE-2024-23265, CVE-2024-27820, CVE-2024-44127, CVE-2023-38598, CVE-2023-32413, CVE-2024-23206, CVE-2024-44254, CVE-2024-54534, CVE-2023-32389, CVE-2024-23219, CVE-2024-44277, CVE-2023-42923, CVE-2025-24205, CVE-2024-27841, CVE-2023-32392, CVE-2023-42937, CVE-2023-38580, CVE-2024-44202, CVE-2024-44167, CVE-2023-40391, CVE-2023-41060, CVE-2024-40815, CVE-2024-23286, CVE-2024-27833, CVE-2023-40528, CVE-2024-54512, CVE-2023-42869, CVE-2024-23271, CVE-2024-23218, CVE-2024-23226, CVE-2024-54505, CVE-2024-27876, CVE-2024-23225, CVE-2024-44217, CVE-2025-24141, CVE-2024-23256, CVE-2024-27808, CVE-2024-40839, CVE-2024-27884, CVE-2024-40812, CVE-2023-42875, CVE-2023-40441, CVE-2024-27873, CVE-2024-44299, CVE-2023-32394, CVE-2024-44207, CVE-2024-44184, CVE-2024-54518, CVE-2025-24206, CVE-2023-38596, CVE-2023-40520, CVE-2024-23215, CVE-2025-24129, CVE-2025-30445, CVE-2023-32403, CVE-2023-38606, CVE-2025-24257, CVE-2023-41064, CVE-2023-38572, CVE-2023-42884, CVE-2023-42843, CVE-2025-24230, CVE-2024-44232, CVE-2024-40791, CVE-2024-44244, CVE-2023-42919, CVE-2024-40805, CVE-2023-40414, CVE-2024-1580, CVE-2024-40774, CVE-2023-42947, CVE-2023-32354, CVE-2024-40818, CVE-2023-32441, CVE-2024-23211, CVE-2025-30425, CVE-2023-42928, CVE-2025-24217, CVE-2024-23255, CVE-2023-42871, CVE-2023-32373, CVE-2024-27791, CVE-2024-44136, CVE-2025-24212, CVE-2023-32734, CVE-2023-34425, CVE-2024-44215, CVE-2024-40794, CVE-2024-54523, CVE-2023-32368, CVE-2024-27857, CVE-2024-44200, CVE-2023-38425, CVE-2024-54522, CVE-2024-27826, CVE-2024-23235, CVE-2023-38612, CVE-2024-44297, CVE-2024-54499, CVE-2024-40784, CVE-2024-27818, CVE-2024-27859, CVE-2023-32408, CVE-2025-24238, CVE-2023-42941, CVE-2023-38599, CVE-2025-31182, CVE-2023-32423, CVE-2024-23292, CVE-2025-24095, CVE-2023-42888, CVE-2023-32385, CVE-2024-44179, CVE-2023-28204, CVE-2024-23201, CVE-2024-40829, CVE-2023-32352, CVE-2023-45866, CVE-2024-40836, CVE-2024-23241, CVE-2024-54479, CVE-2024-54542, CVE-2023-40392, CVE-2024-54530, CVE-2023-40439, CVE-2024-23223, CVE-2024-27847, CVE-2023-32445, CVE-2023-40456, CVE-2023-42872, CVE-2024-54543, CVE-2024-44144, CVE-2023-35993, CVE-2025-24192, CVE-2023-32391, CVE-2025-30429, CVE-2023-32419, CVE-2023-41073, CVE-2023-40449, CVE-2024-44309, CVE-2024-27830, CVE-2023-40446, CVE-2023-32398, CVE-2024-23273, CVE-2023-32425, CVE-2023-32433, CVE-2024-40799, CVE-2023-42836, CVE-2024-54560, CVE-2024-44251, CVE-2024-44240, CVE-2024-54527
heuristics/extracted_sars ADV_IMP.1, AVA_VAN.5, ADV_ARC.1, ADV_FSP.4, ATE_IND.2, AGD_PRE.1, ALC_CMC.4, ATE_FUN.1, AGD_OPE.1, ASE_REQ.2, ASE_ECD.1, ALC_DVS.2, ATE_COV.2, ASE_OBJ.2, ASE_SPD.1, ADV_TDS.3, ASE_INT.1, ASE_TSS.1, ALC_DEL.1, ATE_DPT.1, ALC_TAT.1, ASE_CCL.1, ALC_LCD.1, ALC_FLR.2, ALC_CMS.4 ADV_ARC.1, ATE_IND.2, ADV_FSP.3, AGD_PRE.1, AGD_OPE.1, ASE_REQ.2, ADV_TDS.1, ASE_ECD.1, AVA_VAN.2, ASE_OBJ.2, ASE_SPD.1, ATE_COV.1, ASE_INT.1, ASE_TSS.1, ALC_DEL.1, ALC_CMC.2, ALC_CMS.2, ASE_CCL.1, ATE_FUN.1
heuristics/extracted_versions 2.0 16.4.1
heuristics/scheme_data
pdf_data/cert_filename NSCIB-CC-23-0618820-cert.pdf certificat-CC-2023_58en.pdf
pdf_data/cert_keywords/cc_cert_id
  • NL:
    • CC-23-0618820: 1
  • FR:
    • ANSSI-CC-2023/58: 2
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL4: 2
    • EAL4 augmented: 1
  • EAL:
    • EAL2: 2
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 2
  • AVA:
    • AVA_VAN.5: 1
  • ADV:
    • ADV_FSP.3: 1
pdf_data/cert_keywords/cc_claims
  • R:
    • R.L: 1
pdf_data/cert_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
  • Thales:
    • THALES/CNES: 2
pdf_data/cert_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 1
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /Author: kruitr
  • /CreationDate: D:20230331124350+02'00'
  • /Creator: Bullzip PDF Printer (11.10.0.2761)
  • /ModDate: D:20230331124510+02'00'
  • /Producer: PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH
  • /Title: Microsoft Word - NSCIB-CC-23-0618820-cert.doc
  • pdf_file_size_bytes: 268471
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20240222154440+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240222155211+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 138204
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename NSCIB-CC-0618820-CR-1.pdf ANSSI-CC-2023_58en.pdf
pdf_data/report_frontpage
  • FR:
  • NL:
    • cert_id: NSCIB-CC-0618820-CR
    • cert_item: Waterfall Unidirectional Security Gateway WF-500, Version 2.0
    • cert_lab: SGS Brightsight B.V.
    • developer: Waterfall Security Solutions, Ltd
  • FR:
  • NL:
pdf_data/report_keywords/cc_cert_id
  • NL:
    • NSCIB-CC-0618820-CR: 11
    • NSCIB-CC-17-119023: 1
  • FR:
    • ANSSI-CC-2023/58: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL4: 2
    • EAL4 augmented: 1
    • EAL4+: 2
  • EAL:
    • EAL2: 3
    • EAL2 augmented: 1
    • EAL4: 1
  • ITSEC:
    • ITSEC E3 Basic: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 2
    • ALC_FLR.2: 2
  • AVA:
    • AVA_VAN.5: 2
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR: 1
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 2
  • SGS:
    • SGS: 2
    • SGS Brightsight: 2
  • Thales:
    • THALES/CNES: 1
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • side-channel: 1
  • other:
    • JIL: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 12
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • and WF-500-Standard-Split, and the host agents exist in the same cabinet. However, those agents are out of scope of the TOE as well. The TOE has been evaluated by SGS Brightsight B.V. located in Delft, The: 1
    • out of scope: 1
pdf_data/report_metadata
pdf_data/st_filename NSCIB-CC-0618820-STv3.pdf ANSSI-cible-CC-2023_58en.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 3
    • EAL 4 augmented: 1
    • EAL4: 12
    • EAL4 augmented: 1
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 6
    • ADV_FSP.1: 2
    • ADV_FSP.2: 2
    • ADV_FSP.4: 8
    • ADV_IMP.1: 5
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 8
  • AGD:
    • AGD_OPE.1: 6
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.4: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_DVS.2: 9
    • ALC_FLR.2: 7
    • ALC_LCD.1: 4
    • ALC_TAT.1: 3
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 6
    • ASE_INT.1: 3
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 3
    • ASE_SPD.1: 2
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 1
    • ATE_COV.2: 4
    • ATE_DPT.1: 4
    • ATE_FUN.1: 8
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.5: 8
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP: 1
    • ADV_FSP.1: 2
    • ADV_FSP.2: 4
    • ADV_FSP.3: 2
    • ADV_TDS.1: 4
  • AGD:
    • AGD_OPE.1: 4
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 2
    • ASE_OBJ.2: 2
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 1
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 4
    • ATE_FUN.1: 3
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_IFC.1: 1
    • FDP_IFC.2: 8
    • FDP_IFC.2.1: 1
    • FDP_IFC.2.2: 1
    • FDP_IFF.1: 8
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
  • FMT:
    • FMT_MSA.3: 2
  • FDP:
    • FDP_ACC: 23
    • FDP_ACC.1: 9
    • FDP_ACC.2: 4
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 19
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_DAU.1: 4
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ETC: 8
    • FDP_ETC.2: 2
    • FDP_ETC.2.1: 2
    • FDP_ETC.2.2: 2
    • FDP_ETC.2.3: 2
    • FDP_ETC.2.4: 2
    • FDP_IFC.1: 7
    • FDP_ITC: 5
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITT.1: 4
    • FDP_ITT.1.1: 1
    • FDP_RIP.1: 15
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 10
    • FDP_SDI.1.1: 1
    • FDP_UCT: 4
    • FDP_UCT.1: 1
    • FDP_UIT: 4
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL: 7
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_ATD.1: 4
    • FIA_ATD.1.1: 2
    • FIA_UAU.1: 1
    • FIA_UAU.2: 11
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 2
    • FIA_UID.1: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 5
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 4
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 11
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_ITC.1: 4
    • FPT_ITC.1.1: 1
    • FPT_RPL: 4
    • FPT_RPL.1: 2
  • FTP:
    • FTP_ITC: 6
    • FTP_ITC.1: 5
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.NETWORK: 4
    • A.PHYSICAL: 4
  • O:
    • O.UNIDIRECTIONAL: 8
  • OE:
    • OE.FILTER_LOW: 4
  • T:
    • T.HACK_HIGH: 1
    • T.HACK_LOW: 3
    • T.LEAKAGE: 2
  • A:
    • A.CDCVM: 3
    • A.DE-: 1
    • A.DEVICE_AUTH: 2
    • A.PERSO: 3
  • D:
    • D.OS: 17
    • D.SEP_SE: 3
  • OE:
    • OE.CDCVM: 3
  • T:
    • T.COR-: 1
    • T.CORRUPT: 1
    • T.PHYSI-: 1
    • T.PHYSICAL: 1
    • T.RECOVER: 2
    • T.REPLAY: 2
    • T.SILENT: 2
    • T.SKIM-: 1
    • T.SKIMMING: 1
    • T.USURP: 2
pdf_data/st_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 66
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
  • FIPS:
    • FIPS 140-3: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • fiber optic cable and relays the data to a server equipped with Waterfall software. Agent Host (out of scope of the TOE) TX & RX Agent Host Modules: is a normal PC, it can transmit data to the TX for: 1
    • out of scope: 1
  • OutOfScope:
    • Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
    • out of scope: 2
    • to return to its User. Note: Defending against device re-use after physical com- promise is out of scope. D.User_Passcode D.User_Bio D.Card_Data T.RECOVER Card Re- covery An attacker attempts to recover: 1
pdf_data/st_metadata
  • /Author: Waterfall Security Solutions
  • /CreationDate: D:20230324114901+01'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20230324114901+01'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: WF-500 V2
  • /Title: Waterfall Unidirectional Security Gateway
  • pdf_file_size_bytes: 1808722
  • pdf_hyperlinks: https://waterfall-security.com/company/legal, http://www.waterfall-security.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 32
  • /CreationDate: D:20231108181326Z
  • /Creator: Word
  • /ModDate: D:20231108181351Z
  • /Producer: Adobe Mac PDF Plug-in
  • /Title: Microsoft Word - [ST] iPhone_A15Bionic_iPhoneSE3_iOS16_SecurityTarget_v1.4.docx
  • pdf_file_size_bytes: 2448380
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different