name |
Microsoft Windows Server 2003 SP2 including R2, Standard, Enterprise, Datacenter, x64, and Itanium Editions; Windows XP Professional SP2 and x64 SP2; Windows XP Embedded SP2 |
Microsoft Windows 11 (version 22H2), Microsoft Windows 10 (version 22H2), Microsoft Windows Server 2022, Microsoft Windows Server Datacenter: Azure Edition, Microsoft Azure Stack HCIv2 version 22H2, Microsoft Azure Stack Hub, Microsoft Azure Stack Edge |
category |
Operating Systems |
Operating Systems |
scheme |
US |
ES |
status |
archived |
active |
not_valid_after |
07.02.2010 |
17.01.2029 |
not_valid_before |
07.02.2008 |
17.01.2024 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2023-08_Certificado.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10184-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2023-08-INF-4178.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10184-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2023-08-ST_lite.pdf |
manufacturer |
Microsoft Corporation |
Microsoft Corporation |
manufacturer_web |
https://www.microsoft.com |
https://www.microsoft.com |
security_level |
EAL4+, ALC_FLR.3 |
{} |
dgst |
cf3575b11c3e657d |
f4ec532602eb2c7d |
heuristics/cert_id |
CCEVS-VR-VID-10184-2008 |
2023-8-INF-4178 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
cpe:2.3:o:microsoft:windows_2003_server:-:sp2:itanium:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:tablet_pc:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:media_center:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:home:*:x86:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x86:*, cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:-:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:embedded:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:home:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:-:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:tablet_pc:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:home:*:itanium:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:embedded:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:media_center:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:embedded:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:x86:*:*:*:*:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*, cpe:2.3:o:microsoft:windows_2003_server:-:r2_sp2:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:x86:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:embedded:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:starter:*:itanium:*, cpe:2.3:o:microsoft:windows_2003_server:-:sp2:x64:*:*:*:*:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:home:*:x64:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:starter:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:home:*:x86:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:media_center:*:x64:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:embedded:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:x86:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:media_center:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:tablet_pc:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:media_center:*:x64:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*, cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:tablet_pc:*:x86:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:tablet_pc:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:starter:*:x86:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
CVE-2009-2510, CVE-2013-1269, CVE-2009-1920, CVE-2009-0235, CVE-2008-2250, CVE-2013-3894, CVE-2011-1878, CVE-2015-2364, CVE-2009-0089, CVE-2010-1897, CVE-2008-1441, CVE-2013-3129, CVE-2013-3879, CVE-2015-1680, CVE-2012-1528, CVE-2011-1227, CVE-2010-2731, CVE-2011-0661, CVE-2008-0015, CVE-2013-1278, CVE-2013-1295, CVE-2009-1124, CVE-2008-1454, CVE-2011-0034, CVE-2006-4692, CVE-2013-3866, CVE-2013-3863, CVE-2012-5364, CVE-2015-1643, CVE-2013-0810, CVE-2008-3464, CVE-2010-0018, CVE-2013-1343, CVE-2008-0322, CVE-2013-1285, CVE-2010-1098, CVE-2006-2374, CVE-2013-3174, CVE-2011-1970, CVE-2011-2018, CVE-2011-0087, CVE-2015-0008, CVE-2011-0674, CVE-2007-0040, CVE-2009-1511, CVE-2010-0252, CVE-2008-3012, CVE-2009-0085, CVE-2007-1531, CVE-2011-1880, CVE-2009-0232, CVE-2011-0090, CVE-2015-2374, CVE-2009-2509, CVE-2015-0010, CVE-2011-0667, CVE-2010-0719, CVE-2008-2252, CVE-2015-0088, CVE-2007-1206, CVE-2008-1083, CVE-2011-0672, CVE-2007-1204, CVE-2013-1276, CVE-2011-0040, CVE-2010-1734, CVE-2011-1236, CVE-2011-1875, CVE-2010-3963, CVE-2010-2739, CVE-2008-4114, CVE-2011-3400, CVE-2010-4562, CVE-2014-0315, CVE-2011-0677, CVE-2015-0005, CVE-2009-2507, CVE-2010-0235, CVE-2011-0673, CVE-2013-1291, CVE-2010-0818, CVE-2011-0666, CVE-2010-0022, CVE-2008-3014, CVE-2010-3943, CVE-2015-0009, CVE-2008-4036, CVE-2014-4113, CVE-2010-0484, CVE-2009-1928, CVE-2008-6819, CVE-2015-0093, CVE-2013-1294, CVE-2011-1237, CVE-2010-3940, CVE-2011-0675, CVE-2019-1489, CVE-2011-0670, CVE-2009-1133, CVE-2015-1702, CVE-2011-0030, CVE-2009-0231, CVE-2013-1283, CVE-2009-1922, CVE-2007-1912, CVE-2015-1727, CVE-2014-1767, CVE-2009-2500, CVE-2011-0665, CVE-2012-1870, CVE-2011-0676, CVE-2009-2515, CVE-2013-1342, CVE-2011-1894, CVE-2011-3402, CVE-2011-1238, CVE-2013-3175, CVE-2006-0005, CVE-2014-1819, CVE-2008-2249, CVE-2011-1232, CVE-2014-1818, CVE-2011-1869, CVE-2008-4250, CVE-2013-3167, CVE-2015-0060, CVE-2013-1272, CVE-2011-1243, CVE-2004-0840, CVE-2011-0033, CVE-2007-0069, CVE-2011-5046, CVE-2007-0038, CVE-2012-0159, CVE-2015-0081, CVE-2009-3020, CVE-2009-2503, CVE-2008-1087, CVE-2009-1926, CVE-2015-1723, CVE-2008-1086, CVE-2013-1264, CVE-2009-2514, CVE-2009-2494, CVE-2012-1852, CVE-2007-0066, CVE-2009-2504, CVE-2011-1879, CVE-2015-0004, CVE-2013-3869, CVE-2013-3899, CVE-2010-3941, CVE-2010-2742, CVE-2010-2744, CVE-2010-0238, CVE-2011-3415, CVE-2012-1868, CVE-2013-3200, CVE-2009-0079, CVE-2011-0041, CVE-2009-4210, CVE-2015-0061, CVE-2010-1883, CVE-2010-3957, CVE-2012-0009, CVE-2010-2265, CVE-2015-1716, CVE-2009-0550, CVE-2013-1340, CVE-2015-2363, CVE-2015-0092, CVE-2013-1286, CVE-2013-5056, CVE-2009-3677, CVE-2012-0004, CVE-2013-3661, CVE-2015-1722, CVE-2015-2416, CVE-2007-3463, CVE-2010-1886, CVE-2002-2324, CVE-2007-1765, CVE-2012-0173, CVE-2010-3974, CVE-2013-3918, CVE-2013-5065, CVE-2010-1735, CVE-2014-1807, CVE-2011-0654, CVE-2010-1885, CVE-2007-6753, CVE-2011-2003, CVE-2003-0907, CVE-2013-3173, CVE-2010-0231, CVE-2007-0843, CVE-2014-0317, CVE-2010-0028, CVE-2010-1255, CVE-2006-2373, CVE-2015-1677, CVE-2009-2516, CVE-2010-0485, CVE-2017-8487, CVE-2011-1239, CVE-2011-0671, CVE-2015-1768, CVE-2013-1263, CVE-2009-0083, CVE-2013-3876, CVE-2011-1886, CVE-2003-0904, CVE-2010-0487, CVE-2013-1279, CVE-2015-2365, CVE-2012-0005, CVE-2008-3648, CVE-2009-0243, CVE-2010-0035, CVE-2015-2370, CVE-2011-0039, CVE-2013-1262, CVE-2011-0045, CVE-2013-3172, CVE-2014-6324, CVE-2008-1456, CVE-2015-0096, CVE-2012-0149, CVE-2007-2224, CVE-2014-6317, CVE-2014-1817, CVE-2015-2371, CVE-2009-1123, CVE-2015-0095, CVE-2012-1890, CVE-2015-0094, CVE-2011-1233, CVE-2014-0300, CVE-2015-0011, CVE-2009-4311, CVE-2012-1527, CVE-2009-1808, CVE-2010-2550, CVE-2011-1235, CVE-2013-3864, CVE-2011-3414, CVE-2007-1537, CVE-2008-1457, CVE-2009-3126, CVE-2012-0006, CVE-2013-3128, CVE-2002-0862, CVE-2009-0081, CVE-2007-5145, CVE-2015-1676, CVE-2012-0154, CVE-2013-1259, CVE-2013-1252, CVE-2010-0025, CVE-2011-1264, CVE-2011-1284, CVE-2015-1645, CVE-2009-0082, CVE-2008-4038, CVE-2013-0077, CVE-2013-3181, CVE-2010-0021, CVE-2012-0157, CVE-2012-1866, CVE-2009-2513, CVE-2002-2132, CVE-2014-6355, CVE-2009-1930, CVE-2011-1240, CVE-2015-2417, CVE-2015-0015, CVE-2011-1283, CVE-2011-1870, CVE-2010-2743, CVE-2012-1865, CVE-2013-1257, CVE-2011-1876, CVE-2009-2493, CVE-2015-2360, CVE-2012-1867, CVE-2009-1925, CVE-2010-0237, CVE-2009-0234, CVE-2013-3136, CVE-2012-1893, CVE-2011-1974, CVE-2009-1923, CVE-2010-0812, CVE-2011-1242, CVE-2009-1546, CVE-2011-0662, CVE-2010-0486, CVE-2010-0232, CVE-2012-1848, CVE-2010-2563, CVE-2011-0042, CVE-2004-0119, CVE-2008-4609, CVE-2011-1881, CVE-2012-2553, CVE-2007-5133, CVE-2012-0003, CVE-2011-1226, CVE-2011-2005, CVE-2007-2218, CVE-2010-4701, CVE-2012-0181, CVE-2007-1211, CVE-2013-1273, CVE-2013-1287, CVE-2015-1721, CVE-2015-0091, CVE-2008-2245, CVE-2013-1249, CVE-2013-1277, CVE-2015-2369, CVE-2009-2653, CVE-2015-0003, CVE-2009-0086, CVE-2012-0151, CVE-2009-2508, CVE-2010-2567, CVE-2011-1991, CVE-2013-1341, CVE-2010-0819, CVE-2012-0001, CVE-2008-1436, CVE-2009-4313, CVE-2010-1896, CVE-2010-2568, CVE-2011-1868, CVE-2013-1261, CVE-2007-3034, CVE-2011-0086, CVE-2012-0002, CVE-2012-2529, CVE-2011-2014, CVE-2011-0088, CVE-2009-1545, CVE-2011-3408, CVE-2010-3144, CVE-2013-1248, CVE-2012-1864, CVE-2009-1127, CVE-2009-0094, CVE-2009-2511, CVE-2014-4118, CVE-2015-0075, CVE-2009-1126, CVE-2010-3942, CVE-2011-0028, CVE-2009-0078, CVE-2008-4834, CVE-2014-4076, CVE-2009-0093, CVE-2008-1453, CVE-2011-2011, CVE-2011-3397, CVE-2008-2251, CVE-2007-1212, CVE-2010-1888, CVE-2011-1874, CVE-2013-1271, CVE-2007-2219, CVE-2014-0266, CVE-2013-1274, CVE-2011-1225, CVE-2010-0234, CVE-2011-1249, CVE-2013-3878, CVE-2015-1720, CVE-2015-1719, CVE-2010-4398, CVE-2008-5044, CVE-2003-1048, CVE-2013-3660, CVE-2010-1689, CVE-2017-0176, CVE-2015-0089, CVE-2015-0073, CVE-2011-3416, CVE-2009-2502, CVE-2009-0119, CVE-2006-6723, CVE-2007-5352, CVE-2010-0476, CVE-2010-0023, CVE-2000-1218, CVE-2012-2530, CVE-2008-3465, CVE-2012-1853, CVE-2011-0658, CVE-2010-0480, CVE-2007-3036, CVE-2013-3865, CVE-2010-1895, CVE-2013-3940, CVE-2010-3959, CVE-2013-1251, CVE-2007-3898, CVE-2015-0087, CVE-2015-1724, CVE-2010-0269, CVE-2013-1275, CVE-2015-0074, CVE-2013-1345, CVE-2011-0089, CVE-2009-1139, CVE-2010-0233, CVE-2010-0016, CVE-2014-1814, CVE-2009-0320, CVE-2011-0660, CVE-2014-6321, CVE-2015-0077, CVE-2008-1445, CVE-2009-2519, CVE-2011-1241, CVE-2010-3939, CVE-2013-1253, CVE-2010-2553, CVE-2009-0230, CVE-2015-0014, CVE-2007-1215, CVE-2010-0236, CVE-2015-0080, CVE-2013-3198, CVE-2010-2746, CVE-2012-2556, CVE-2010-2729, CVE-2010-1891, CVE-2011-1985, CVE-2011-1884, CVE-2009-1125, CVE-2013-1250, CVE-2010-2740, CVE-2010-2741, CVE-2007-2237, CVE-2008-4835, CVE-2008-0088, CVE-2011-3401, CVE-2011-1282, CVE-2013-1334, CVE-2015-0090, CVE-2009-1544, CVE-2014-4064, CVE-2010-1882, CVE-2010-1690, CVE-2010-0811, CVE-2014-4077, CVE-2015-2367, CVE-2012-2527, CVE-2002-0391, CVE-2013-1256, CVE-2010-2738, CVE-2015-0006, CVE-2011-1281, CVE-2011-1268, CVE-2012-0148, CVE-2008-1451, CVE-2015-0057, CVE-2008-1440, CVE-2008-1084, CVE-2009-1929, CVE-2013-1270, CVE-2015-1726, CVE-2013-3196, CVE-2013-1254, CVE-2009-1924, CVE-2010-3222, CVE-2011-1882, CVE-2011-0043, CVE-2010-3956, CVE-2012-5362, CVE-2015-1678, CVE-2011-1984, CVE-2011-1967, CVE-2011-1231, CVE-2010-3227, CVE-2007-2228, CVE-2008-4327, CVE-2007-0214, CVE-2010-4669, CVE-2008-0020, CVE-2010-0020, CVE-2010-2566, CVE-2013-1344, CVE-2009-2528, CVE-2010-3140, CVE-2008-0083, CVE-2011-1873, CVE-2011-1968, CVE-2007-1205, CVE-2013-5058, CVE-2006-5758, CVE-2013-1255, CVE-2003-0813, CVE-2011-0096, CVE-2013-1260, CVE-2010-3970, CVE-2013-1268, CVE-2011-1248, CVE-2009-2517, CVE-2012-1850, CVE-2011-1234, CVE-2014-6332, CVE-2011-1230, CVE-2007-6026, CVE-2015-1644, CVE-2005-1987, CVE-2010-1887, CVE-2009-4312, CVE-2009-3675, CVE-2008-3013, CVE-2011-1885, CVE-2012-0180, CVE-2011-1883, CVE-2009-0233, CVE-2014-0318, CVE-2012-4774, CVE-2012-0013, CVE-2015-1679, CVE-2013-1265, CVE-2015-1701, CVE-2013-1267, CVE-2013-1258, CVE-2009-0087, CVE-2014-4115, CVE-2011-3406, CVE-2015-1725, CVE-2012-1851, CVE-2006-7210, CVE-2012-0217, CVE-2013-1300, CVE-2009-2501, CVE-2013-3197, CVE-2009-2524, CVE-2014-4148, CVE-2011-0657, CVE-2012-2526, CVE-2009-0568, CVE-2010-0820, CVE-2006-5586, CVE-2010-0024, CVE-2017-8461, CVE-2013-1266, CVE-2010-0027, CVE-2012-4786, CVE-2010-1894, CVE-2012-0175, CVE-2015-2387, CVE-2009-0229, CVE-2015-1637, CVE-2013-3195, CVE-2011-1229, CVE-2011-3417, CVE-2011-1247, CVE-2010-0250, CVE-2013-1313, CVE-2013-3887, CVE-2014-0323, CVE-2013-1280, CVE-2008-0087, CVE-2014-0301, CVE-2011-2600, CVE-2014-4971, CVE-2011-1228, CVE-2007-5348 |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_LLD.1, ALC_TAT.1, ATE_FUN.1, ALC_DVS.1, ADV_IMP.1, ADV_SPM.1, AVA_SOF.1, AGD_ADM.1, ADV_HLD.2, ADV_FSP.2, AGD_USR.1, AVA_MSU.2, AVA_VLA.2, ATE_COV.2, ALC_FLR.3, ADV_RCR.1, ATE_DPT.1, ALC_LCD.1, ATE_IND.2 |
AGD_PRE.1, ASE_CCL.1, ALC_CMS.1, ASE_OBJ.2, ASE_INT.1, ASE_TSS.1, ADV_FSP.1, ALC_TSU_EXT.1, ASE_REQ.2, AVA_VAN.1, AGD_OPE.1, ATE_IND.1, ASE_ECD.1, ASE_SPD.1, ALC_CMC.1 |
heuristics/extracted_versions |
2003 |
10, 2022, 11 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Operating System
- certification_date: 07.02.2008
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date:
- id: CCEVS-VR-VID10184
- product: Microsoft Windows Server 2003 SP2 including R2, Standard, Enterprise, Datacenter, x64, and Itanium Editions; Windows XP Professional SP2 and x64 SP2; Windows XP Embedded SP2 (for specific TOE software updates, patches, and hotfixes see Section 1 of Security Target)
- scheme: US
- url: https://www.niap-ccevs.org/product/10184
- vendor: Microsoft Corporation
|
- category: Operating systems
- certification_date: 17.01.2024
- enhanced:
- manufacturer: Microsoft Corp.
- product: Microsoft Windows 11 (version 22H2), Microsoft Windows 10 (version 22H2), Microsoft Windows Server 2022, Microsoft Windows Server Datacenter: Azure Edition, Microsoft Azure Stack HCIv2 version 22H2, Microsoft Azure Stack Hub, Microsoft Azure Stack Edge
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/1005-microsoft-windows-11-version-22h2-microsoft-windows-10-version-22h2-microsoft-windows-server-2022-microsoft-windows-server-datacenter-azure-edition-microsoft-azure-stack-hciv2-version-22h2-microsoft-azure-stack-hub-microsoft-azure-stack-edge
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
|
2023-08_Certificado.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- Microsoft:
- Microsoft: 21
- Microsoft Corporation: 1
|
pdf_data/cert_keywords/eval_facility |
|
- DEKRA:
- DEKRA Testing and Certification: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 901903
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
st_vid10184-vr.pdf |
2023-08-INF-4178.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10184-2008
- cert_item: Microsoft Windows Server 2003, Microsoft Windows XP Professional, and Microsoft Windows XP embedded
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10184-2008: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 4: 3
- EAL 4 augmented: 2
|
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_FLR: 2
- ALC_TSU_EXT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 4
- FAU_SEL.1: 1
- FCS:
- FCS_CKM.1: 3
- FCS_CKM.2: 2
- FCS_CKM_EXT.2: 1
- FCS_CKM_EXT.4: 1
- FCS_CKM_EXT.8: 1
- FCS_COP.1: 4
- FCS_DTLS_EXT.1: 1
- FCS_EAP_EXT.1: 1
- FCS_RBG_EXT.1: 1
- FCS_STO_EXT.1: 1
- FCS_TLSC_EXT.1: 2
- FCS_TLSC_EXT.2: 2
- FCS_TLSC_EXT.3: 1
- FCS_TLSC_EXT.4: 1
- FCS_WPA_EXT.1: 1
- FDP:
- FDP_ACF_EXT.1: 1
- FDP_IFC_EXT.1: 1
- FDP_RIP.2: 1
- FDP_VPN_EXT.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_BLT_EXT.1: 1
- FIA_BLT_EXT.2: 1
- FIA_BLT_EXT.3: 1
- FIA_BLT_EXT.4: 1
- FIA_BLT_EXT.6: 1
- FIA_BLT_EXT.7: 1
- FIA_PSK_EXT.1: 1
- FIA_PSK_EXT.2: 1
- FIA_UAU.5: 1
- FMT:
- FMT_MOF_EXT.1: 2
- FMT_SMF.1: 2
- FMT_SMF_EXT.1: 2
- FPT:
- FPT_ACF_EXT.1: 1
- FPT_ASLR_EXT.1: 1
- FPT_SBOP_EXT.1: 1
- FPT_SRP_EXT.1: 1
- FPT_TST_EXT.1: 2
- FPT_TST_EXT.3: 1
- FPT_TUD_EXT.1: 1
- FPT_TUD_EXT.2: 1
- FTA:
- FTA_TAB.1: 1
- FTA_WSE_EXT.1: 1
- FTP:
- FTP_BLT_EXT.1: 1
- FTP_BLT_EXT.2: 1
- FTP_BLT_EXT.3: 2
- FTP_ITC.1: 1
- FTP_ITC_EXT.1: 3
- FTP_TRP.1: 1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Microsoft:
- Microsoft: 68
- Microsoft Corporation: 2
|
- Microsoft:
- Microsoft: 132
- Microsoft Corporation: 3
- Qualcomm:
|
pdf_data/report_keywords/eval_facility |
|
- DEKRA:
- DEKRA Testing and Certification: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Santosh Chokhani
- /Company: Orion
- /CreationDate: D:20080222120444-05'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /ModDate: D:20080222120502-05'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20080222170424
- /Title: Validation Report
- pdf_file_size_bytes: 222190
- pdf_hyperlinks: http://www.cve.mitre.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
|
pdf_data/st_filename |
st_vid10184-st.pdf |
2023-08-ST_lite.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 3: 4
- EAL 4: 14
- EAL 4 augmented: 5
- EAL3: 2
- EAL4: 21
- EAL4 augmented: 4
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 14
- ACM_CAP.4: 24
- ACM_SCP.2: 11
- ADO:
- ADO_DEL.2: 11
- ADO_IGS.1: 10
- ADV:
- ADV_FSP.2: 14
- ADV_HLD.2: 16
- ADV_IMP.1: 11
- ADV_LLD.1: 18
- ADV_RCR.1: 8
- ADV_SPM.1: 13
- AGD:
- AGD_ADM.1: 15
- AGD_USR.1: 13
- ALC:
- ALC_DVS.1: 11
- ALC_FLR.3: 25
- ALC_LCD.1: 12
- ALC_TAT.1: 13
- ATE:
- ATE_COV.2: 11
- ATE_DPT.1: 9
- ATE_FUN.1: 14
- ATE_IND.2: 12
- AVA:
- AVA_MSU.2: 18
- AVA_SOF.1: 11
- AVA_VLA.2: 16
|
- ADV:
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 3
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT.1: 8
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 3
- FAU_GEN.1: 17
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAR.1: 14
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 9
- FAU_SAR.2.1: 1
- FAU_SAR.3: 13
- FAU_SAR.3.1: 2
- FAU_SEL.1: 7
- FAU_SEL.1.1: 1
- FAU_STG.1: 12
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 10
- FAU_STG.3.1: 1
- FAU_STG.4: 14
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 10
- FCS_CKM.1: 19
- FCS_CKM.1.1: 5
- FCS_CKM.2: 10
- FCS_CKM.2.1: 2
- FCS_CKM.4: 9
- FCS_CKM.4.1: 1
- FCS_CKM_EXP.1: 1
- FCS_CKM_EXP.2.2: 1
- FCS_COP: 1
- FCS_COP.1: 31
- FCS_COP.1.1: 16
- FDP:
- FDP_ACC.1: 19
- FDP_ACC.2: 37
- FDP_ACC.2.1: 4
- FDP_ACC.2.2: 4
- FDP_ACF.1: 45
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 6
- FDP_ACF.1.3: 6
- FDP_ACF.1.4: 4
- FDP_ACF.2: 2
- FDP_IFC.1: 41
- FDP_IFC.1.1: 3
- FDP_IFF.1: 29
- FDP_IFF.1.1: 3
- FDP_IFF.1.2: 3
- FDP_IFF.1.3: 3
- FDP_IFF.1.4: 3
- FDP_IFF.1.5: 3
- FDP_IFF.1.6: 3
- FDP_ITC: 1
- FDP_ITC.1: 4
- FDP_ITT.1: 9
- FDP_ITT.1.1: 1
- FDP_RIP.2: 11
- FDP_RIP.2.1: 1
- FDP_UCT.1: 9
- FDP_UCT.1.1: 1
- FDP_UIT.1: 9
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 11
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_SOS.1: 15
- FIA_SOS.1.1: 1
- FIA_UAU.1: 14
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.6: 9
- FIA_UAU.6.1: 1
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 13
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 18
- FIA_USB.1: 4
- FMT:
- FMT_MOF.1: 46
- FMT_MOF.1.1: 4
- FMT_MSA: 1
- FMT_MSA.1: 73
- FMT_MSA.1.1: 8
- FMT_MSA.2: 9
- FMT_MSA.3: 64
- FMT_MSA.3.1: 7
- FMT_MSA.3.2: 7
- FMT_MTD.1: 141
- FMT_MTD.1.1: 17
- FMT_MTD.1.2: 1
- FMT_MTD.2: 11
- FMT_MTD.2.1: 1
- FMT_MTD.2.2: 1
- FMT_REV: 1
- FMT_REV.1: 19
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SAE.1: 11
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 33
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SMR.3: 8
- FMT_SMR.3.1: 1
- FPT:
- FPT_AMT.1: 7
- FPT_ITT.1: 6
- FPT_ITT.3: 3
- FPT_RPL: 1
- FPT_RPL.1: 3
- FPT_RVM.1: 10
- FPT_RVM.1.1: 1
- FPT_SEP: 2
- FPT_SEP.1: 10
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 12
- FPT_STM.1.1: 1
- FPT_SUS: 3
- FPT_TRC.1: 4
- FRU:
- FRU_RSA.1: 9
- FRU_RSA.1.1: 1
- FTA:
- FTA_LSA.1: 1
- FTA_MCS.1: 2
- FTA_MSC.1: 1
- FTA_SSL.1: 8
- FTA_SSL.1.1: 1
- FTA_SSL.1.2: 1
- FTA_SSL.2: 12
- FTA_SSL.2.1: 1
- FTA_SSL.2.2: 1
- FTA_SSL.3: 7
- FTA_SSL.3.1: 1
- FTA_TAB.1: 8
- FTA_TAB.1.1: 1
- FTA_TRP.1: 1
- FTA_TSE.1: 10
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC.1: 2
- FTP_TRP.1: 11
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 9
- FAU_GEN.1: 37
- FAU_GEN.1.1: 5
- FAU_GEN.1.2: 6
- FAU_SEL: 2
- FAU_SEL.1: 6
- FAU_SEL.1.1: 1
- FCS:
- FCS_CKM: 15
- FCS_CKM.1: 64
- FCS_CKM.1.1: 4
- FCS_CKM.2: 35
- FCS_CKM.2.1: 3
- FCS_CKM_EXT: 2
- FCS_CKM_EXT.2: 7
- FCS_CKM_EXT.2.1: 1
- FCS_CKM_EXT.4: 7
- FCS_CKM_EXT.4.1: 3
- FCS_CKM_EXT.4.2: 1
- FCS_CKM_EXT.8: 8
- FCS_CKM_EXT.8.1: 1
- FCS_COP: 1
- FCS_COP.1: 88
- FCS_COP.1.1: 5
- FCS_DTLS_EXT: 1
- FCS_DTLS_EXT.1: 13
- FCS_DTLS_EXT.1.1: 2
- FCS_DTLS_EXT.1.2: 2
- FCS_EAP_EXT: 1
- FCS_EAP_EXT.1: 7
- FCS_EAP_EXT.1.1: 1
- FCS_PSK_EXT.1: 2
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 18
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_STO_EXT: 1
- FCS_STO_EXT.1: 7
- FCS_STO_EXT.1.1: 1
- FCS_TLCS_EXT: 2
- FCS_TLCS_EXT.1: 1
- FCS_TLCS_EXT.2: 1
- FCS_TLSC: 1
- FCS_TLSC_EXT: 9
- FCS_TLSC_EXT.1: 24
- FCS_TLSC_EXT.1.1: 3
- FCS_TLSC_EXT.1.2: 3
- FCS_TLSC_EXT.1.3: 2
- FCS_TLSC_EXT.1.4: 1
- FCS_TLSC_EXT.1.5: 1
- FCS_TLSC_EXT.2: 21
- FCS_TLSC_EXT.2.1: 2
- FCS_TLSC_EXT.3: 13
- FCS_TLSC_EXT.3.1: 1
- FCS_TLSC_EXT.4: 12
- FCS_TLSC_EXT.4.1: 1
- FCS_TLS_EXT.1: 2
- FCS_TLS_EXT.2: 2
- FCS_TLS_EXT.3: 1
- FCS_TLS_EXT.4: 1
- FCS_WPA_EXT.1: 7
- FCS_WPA_EXT.1.1: 1
- FDP:
- FDP_ACF_EXT: 1
- FDP_ACF_EXT.1: 7
- FDP_ACF_EXT.1.1: 1
- FDP_IFC_EXT.1: 9
- FDP_IFC_EXT.1.1: 1
- FDP_RDP.2: 1
- FDP_RIP: 1
- FDP_RIP.2: 7
- FDP_RIP.2.1: 1
- FDP_VPN_EXT: 1
- FDP_VPN_EXT.1: 5
- FDP_VPN_EXT.1.1: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 7
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_BLT_EXT: 1
- FIA_BLT_EXT.1: 9
- FIA_BLT_EXT.1.1: 2
- FIA_BLT_EXT.2: 9
- FIA_BLT_EXT.2.1: 2
- FIA_BLT_EXT.3: 9
- FIA_BLT_EXT.3.1: 2
- FIA_BLT_EXT.4: 9
- FIA_BLT_EXT.4.1: 2
- FIA_BLT_EXT.4.2: 2
- FIA_BLT_EXT.5: 1
- FIA_BLT_EXT.6: 11
- FIA_BLT_EXT.6.1: 4
- FIA_BLT_EXT.7: 8
- FIA_BLT_EXT.7.1: 5
- FIA_PAE_EXT: 1
- FIA_PAE_EXT.1: 7
- FIA_PAE_EXT.1.1: 1
- FIA_PSK_EXT: 1
- FIA_PSK_EXT.1: 5
- FIA_PSK_EXT.1.1: 2
- FIA_PSK_EXT.1.2: 3
- FIA_PSK_EXT.2: 4
- FIA_PSK_EXT.2.1: 2
- FIA_UAU: 1
- FIA_UAU.5: 7
- FIA_UAU.5.1: 2
- FIA_UAU.5.2: 2
- FMT:
- FMT_MOF.1: 2
- FMT_MOF_EXT: 3
- FMT_MOF_EXT.1: 17
- FMT_MOF_EXT.1.1: 2
- FMT_SMF: 9
- FMT_SMF.1: 17
- FMT_SMF.1.1: 2
- FMT_SMF_EXT: 4
- FMT_SMF_EXT.1: 20
- FMT_SMF_EXT.1.1: 4
- FPT:
- FPT_ACF_EXT: 1
- FPT_ACF_EXT.1: 7
- FPT_ACF_EXT.1.1: 2
- FPT_ACF_EXT.1.2: 2
- FPT_ASLR_EXT: 1
- FPT_ASLR_EXT.1: 7
- FPT_ASLR_EXT.1.1: 1
- FPT_SBOP_EXT: 1
- FPT_SBOP_EXT.1: 7
- FPT_SBOP_EXT.1.1: 1
- FPT_SRP_EXT: 1
- FPT_SRP_EXT.1: 7
- FPT_SRP_EXT.1.1: 1
- FPT_TST_EXT: 8
- FPT_TST_EXT.1: 19
- FPT_TST_EXT.1.1: 2
- FPT_TST_EXT.1.2: 1
- FPT_TST_EXT.3: 8
- FPT_TST_EXT.3.1: 1
- FPT_TST_EXT.3.2: 1
- FPT_TUD_EXT: 1
- FPT_TUD_EXT.1: 12
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.2: 8
- FPT_TUD_EXT.2.1: 2
- FPT_TUD_EXT.2.2: 2
- FTA:
- FTA_TAB: 1
- FTA_TAB.1: 7
- FTA_TAB.1.1: 1
- FTA_WSE_EXT: 1
- FTA_WSE_EXT.1: 8
- FTA_WSE_EXT.1.1: 1
- FTP:
- FTP_BLT_EXT: 8
- FTP_BLT_EXT.1: 10
- FTP_BLT_EXT.1.1: 1
- FTP_BLT_EXT.1.2: 1
- FTP_BLT_EXT.2: 8
- FTP_BLT_EXT.2.1: 1
- FTP_BLT_EXT.3: 16
- FTP_BLT_EXT.3.1: 2
- FTP_ITC: 5
- FTP_ITC.1: 17
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 2
- FTP_ITC.1.3: 2
- FTP_ITC_EXT: 1
- FTP_ITC_EXT.1: 24
- FTP_ITC_EXT.1.1: 2
- FTP_TRP: 1
- FTP_TRP.1: 7
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
- FTP_TST_EXT: 1
- FTP_TST_EXT.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CONNECT: 3
- A.COOP: 5
- A.LOCATE: 3
- A.MANAGE: 2
- A.NO_EVIL_ADM: 3
- A.PEER: 3
- A.PROTECT: 2
- O:
- O.ASSURANCE: 4
- O.AUDITING: 8
- O.AUDIT_: 1
- O.AUDIT_PROTECTION: 4
- O.AUTHORIZATION: 8
- O.CREDEN: 4
- O.DISCRETIONARY_ACCESS: 3
- O.ENCRYPTED_DATA: 11
- O.ENFORCEMENT: 9
- O.FRAMEWORK: 5
- O.INSTALL: 4
- O.IPSEC: 13
- O.LEGAL_WARNING: 4
- O.LIMIT_AUTHORIZATION: 9
- O.MANAGE: 7
- O.MEDIATE: 9
- O.OUTDATED_SW: 2
- O.PARTIAL_RECOVERY: 8
- O.PHYSICAL: 5
- O.PROTECT: 9
- O.RESIDUAL_INFORMATION: 8
- O.SOFTWARE_PROTECT: 4
- O.TRUSTED_PATH: 8
- O.UPDATED_SW: 1
- T:
- T.ADDRESS_MASQUERADE: 4
- T.ADMIN_ERROR: 4
- T.AUDIT_COMPROMISE: 5
- T.AUDIT_CORRUPT: 4
- T.CONFIG_CORRUPT: 3
- T.EAVESDROP: 4
- T.LOST_DATA: 3
- T.MALICIOUS_CODE_EXEC: 4
- T.MASQUERADE: 3
- T.OBJECTS_NOT_CLEAN: 4
- T.OLD_SW: 3
- T.POOR_DESIGN: 3
- T.POOR_IMPLEMENTATION: 4
- T.REPLAY: 4
- T.SPOOF: 4
- T.SYSACC: 4
- T.TCPIP_ATTACK: 3
- T.UNATTENDED_SESSION: 5
- T.UNAUTH_ACCESS: 7
- T.UNAUTH_MODIFICATION: 4
- T.UNDETECTED_ACTIONS: 4
- T.UNIDENTIFIED_ACTIONS: 8
- T.USER_CORRUPT: 7
- T.USER_CURRUPT: 1
|
- A:
- A.NO_TOE_BYPASS: 5
- A.PHYSICAL: 2
- A.PLATFORM: 3
- A.PROPER_ADMIN: 3
- A.PROPER_USER: 3
- A.TRUSTED_ADMIN: 3
- A.TRUSTED_CONFIG: 2
- O:
- O.ACCOUNTABILITY: 8
- O.AUTHENTICATION: 3
- O.AUTH_COMM: 5
- O.CRYPTOGRAPHIC_FUNCTIONS: 8
- O.INTEGRITY: 7
- O.KNOWN_STATE: 4
- O.MANAGEMENT: 8
- O.NONDISCLOSURE: 3
- O.PROTECTED_COMMS: 13
- O.PROTECTED_STORAGE: 4
- O.SELF_TEST: 4
- O.SYSTEM_: 1
- O.SYSTEM_MONITORING: 5
- O.TOE_ADMINISTRATION: 6
- O.TSF_SELF_TEST: 2
- O.WIRELESS_ACCESS_POINT_: 1
- O.WIRELESS_ACCESS_POINT_CO: 1
- O.WIRELESS_ACCESS_POINT_CONNECTION: 1
- OE:
- OE.NO_TOE_BYPASS: 6
- OE.PHYSICAL: 2
- OE.PLATFORM: 3
- OE.PROPER_ADMIN: 4
- OE.PROPER_USER: 4
- OE.TRUSTED_ADMIN: 5
- OE.TRUSTED_CONFIG: 2
- SA:
- T:
- T.LIMITED_PHYSICAL_ACCESS: 2
- T.LOCAL_ATTACK: 2
- T.NETWORK_ATTACK: 8
- T.NETWORK_EAVESDROP: 6
- T.TSF_CONFIGURATION: 2
- T.TSF_FAILURE: 5
- T.UNAUTHORIZED: 1
- T.UNAUTHORIZED_ACCESS: 7
- T.UNDETECTED_ACTIONS: 3
- T.USER_DATA_REUSE: 2
|
pdf_data/st_keywords/vendor |
- Broadcom:
- Infineon:
- Microsoft:
- Microsoft: 51
- Microsoft Corporation: 186
|
- Cisco:
- Microsoft:
- Microsoft: 312
- Microsoft Corporation: 5
- Qualcomm:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- AES:
- AES: 31
- AES-128: 1
- AES-256: 4
- RC:
- DES:
- constructions:
- MAC:
- HMAC: 24
- HMAC-SHA-256: 3
- HMAC-SHA-384: 2
- HMAC-SHA-512: 1
|
pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- DH:
- DH: 10
- DHE: 4
- Diffie-Hellman: 13
- DSA:
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 3
- SHA-384: 3
- SHA-512: 3
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-256: 17
- SHA-384: 7
- SHA-512: 3
- SHA256: 4
- SHA384: 3
- SHA512: 3
|
pdf_data/st_keywords/crypto_scheme |
- KEX:
- Key Exchange: 2
- Key exchange: 1
- MAC:
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 52
- IKEv1: 32
- IKEv2: 32
- IPsec:
- PGP:
- TLS:
- DTLS:
- DTLS: 23
- DTLS 1.0: 2
- DTLS 1.2: 3
- SSL:
- TLS:
- TLS: 122
- TLS 1.0: 4
- TLS 1.1: 4
- TLS 1.2: 5
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 20
- P-384: 26
- P-521: 22
- secp256r1: 3
- secp384r1: 3
- secp521r1: 4
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_NULL_WITH_NULL_NULL: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 5
- TLS_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_GCM_SHA384: 2
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140: 5
- FIPS 140-1: 6
- FIPS 140-2: 5
- FIPS 140-214: 1
- FIPS 180-2: 1
- FIPS 186-2: 2
- FIPS 197: 2
- FIPS 46-3: 3
- PKCS:
- RFC:
- X509:
|
- FIPS:
- FIPS 140: 1
- FIPS 140-2: 1
- FIPS 180-4: 5
- FIPS 186-4: 45
- FIPS 197: 6
- FIPS 198-1: 1
- FIPS 198-2: 5
- FIPS PUB 186-4: 8
- FIPS PUB 197: 1
- ISO:
- NIST:
- NIST SP 800-38A: 6
- NIST SP 800-38C: 7
- NIST SP 800-38D: 6
- NIST SP 800-38E: 6
- NIST SP 800-38F: 7
- NIST SP 800-56A: 5
- NIST SP 800-56B: 5
- NIST SP 800-57: 1
- NIST SP 800-90: 5
- NIST SP 800-90A: 1
- NIST SP 800-90B: 1
- SP 800-56A: 2
- SP 800-90: 1
- PKCS:
- RFC:
- RFC 2246: 2
- RFC 2396: 1
- RFC 2404: 1
- RFC 2408: 1
- RFC 2818: 1
- RFC 3268: 1
- RFC 3394: 1
- RFC 3526: 3
- RFC 3546: 2
- RFC 3602: 1
- RFC 4106: 1
- RFC 4109: 1
- RFC 4301: 5
- RFC 4303: 1
- RFC 4304: 1
- RFC 4306: 1
- RFC 4346: 1
- RFC 4347: 1
- RFC 4366: 1
- RFC 4492: 1
- RFC 4681: 1
- RFC 4868: 3
- RFC 4945: 1
- RFC 5114: 2
- RFC 5216: 2
- RFC 5246: 14
- RFC 5280: 8
- RFC 5288: 8
- RFC 5289: 18
- RFC 5430: 1
- RFC 5759: 1
- RFC 6066: 2
- RFC 6125: 1
- RFC 6347: 2
- RFC 6379: 1
- RFC 6960: 1
- RFC 6961: 1
- RFC 7296: 1
- RFC 8017: 1
- RFC 8247: 1
- RFC 8784: 1
- RFC 8996: 2
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
- kernel. Software loaded for execution directly by the platform (e.g. first-stage bootloaders) is out of scope. For each additional category of executable code verified before execution, the evaluator will: 1
- out of scope: 2
|
pdf_data/st_metadata |
- /Author: SAIC
- /Company: SAIC
- /CreationDate: D:20080222121234-05'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /ModDate: D:20080222121818-05'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20080222171054
- /Title: Windows 2003/XP Security Target
- pdf_file_size_bytes: 1878359
- pdf_hyperlinks: http://creativecommons.org/licenses/by-nd-nc/1.0/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 183
|
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled: true
- /MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method: Standard
- /MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId: 72f988bf-86f1-41af-91ab-2d7cd011db47
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 1800007
- pdf_hyperlinks: https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0707, http://technet.microsoft.com/en-us/library/cc962035.aspx, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16315, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0578, http://www.ietf.org/rfc/rfc4301.txt, http://www.ietf.org/rfc/rfc3546.txt, https://www.niap-ccevs.org/documents_and_guidance/view_td.cfm?TD=0680, https://datatracker.ietf.org/doc/html/rfc4303, https://datatracker.ietf.org/doc/html/rfc4307, https://datatracker.ietf.org/doc/html/rfc5282, http://www.ietf.org/rfc/rfc2246.txt, http://msdn.microsoft.com/en-us/library/cc233476.aspx, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16320, https://www.niap-ccevs.org/documents_and_guidance/view_td.cfm?TD=0725, https://www.microsoft.com/Licensing/servicecenter/default.aspx, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16325, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0463, http://msdn.microsoft.com/en-us/library/windows/desktop/aa374757(v=vs.85).aspx), https://datatracker.ietf.org/doc/html/rfc2408, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16249, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16305, http://msdn.microsoft.com/en-us/library/jj709814.aspx, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16298, https://tools.ietf.org/html/draft-ietf-tls-ssl-version3-00, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0640, https://www.microsoft.com/en-us/software-download/windows11,, https://www.niap-ccevs.org/documents_and_guidance/view_td.cfm?TD=0649, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0703, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16311, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0493, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16326, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16314, https://datatracker.ietf.org/doc/html/rfc4306, https://msdn.microsoft.com/en-us/library/windows/desktop/aa380252(v=vs.85).aspx, http://msdn.microsoft.com/en-us/library/windows/desktop/aa376545(v=vs.85).aspx, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0690, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16308, https://datatracker.ietf.org/doc/html/rfc4109, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16321, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=375, http://www.ietf.org/rfc/rfc2408.txt, https://datatracker.ietf.org/doc/html/rfc4304, http://www.ietf.org/rfc/rfc5246.txt, http://microsoft.com/store/apps, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0685, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16309, http://www.ietf.org/rfc/rfc3268.txt, http://www.commoncriteriaportal.org/files/epfiles/st_windows10.pdf, https://datatracker.ietf.org/doc/html/rfc5280, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0501, http://www.ietf.org/rfc/rfc4346.txt, https://msdn.microsoft.com/en-us/library/windows/apps/windows.networking.vpn.aspx, https://support.microsoft.com/en-us/windows/supported-bluetooth-profiles-8900e50f-318e-4283-2beb-c8325bfc9515, https://docs.microsoft.com/en-US/powershell/scripting/setup/winrmsecurity?view=powershell-6, https://msdn.microsoft.com/en-us/library/windows/desktop/aa380261(v=vs.85).aspx, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0710, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16319, https://tools.ietf.org/rfc/rfc2404.txt, https://support.microsoft.com/en-us/topic/windows-server-images-for-december-2022-9782ce71-701d-4a49-9c83-a6f48c846dae, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16323, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0441, https://tools.ietf.org/rfc/rfc4868.txt, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16303, http://blogs.msdn.com/b/windowsappdev/archive/2012/12/04/designing-a-simple-and-secure-app-package-appx.aspx, https://msdn.microsoft.com/en-us/library/windows/desktop/aa380882(v=vs.85).aspx, https://www.rfc-editor.org/rfc/rfc5216, https://www.niap-ccevs.org/st/st_vid10677-st.pdf, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16300, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16312, http://msdn.microsoft.com/en-us/library/jj663164.aspx, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0643, mailto:[email protected], https://www.niap-ccevs.org/documents_and_guidance/view_td.cfm?TD=0647, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0715, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16316, https://datatracker.ietf.org/doc/html/rfc4301, https://www.rfc-editor.org/rfc/rfc8996, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16306, https://datatracker.ietf.org/doc/html/rfc5881, http://www.ietf.org/rfc/rfc2409.txt, https://datatracker.ietf.org/doc/html/rfc4106, http://msdn.microsoft.com/en-us/library/windows/desktop/aa374757(v=vs.85).aspx, http://tools.ietf.org/html/rfc5280, http://technet.microsoft.com/en-us/library/cc782582(v=WS.10).aspx, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0667, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36411, https://technet.microsoft.com/en-us/library/hh831447.aspx, https://msdn.microsoft.com/en-us/library/windows/desktop/hh706794(v=vs.85).aspx, http://creativecommons.org/licenses/by-nd-nc/1.0/, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16324, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0645, http://technet.microsoft.com/en-us/library/905aa96a-4af7-44b0-8e8f-d2b6854a91e6, https://www.microsoft.com/en-us/software-download/windows10, https://datatracker.ietf.org/doc/html/rfc6379, https://datatracker.ietf.org/doc/html/rfc2986, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16307, https://support.microsoft.com/en-us/topic/december-13-2022-kb5021249-os-build-20348-1366-d5fe7608-bc9d-4055-a88c-fb2fd3d5fd45, http://technet.microsoft.com/en-us/library/cc783349(v=WS.10).aspx, https://datatracker.ietf.org/doc/html/rfc2407, https://msdn.microsoft.com/en-us/library/dd207968.aspx, http://windows.microsoft.com/en-us/windows/connect-using-remote-desktop-connection%23connect-using-remote-desktop-connection=windows-7, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16245, https://datatracker.ietf.org/doc/html/rfc4868, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0662, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=451, https://datatracker.ietf.org/doc/html/rfc2409, http://msdn.microsoft.com/en-us/library/jj652462.aspx, https://learn.microsoft.com/en-us/windows-hardware/drivers/bluetooth/general-bluetooth-support-in-windows, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0650, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16299, http://www.ietf.org/rfc/rfc4306.txt, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16255, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16313, http://www.ietf.org/rfc/rfc4492.txt, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=396, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16310, http://www.ietf.org/rfc/rfc4681.txt, http://catalog.update.microsoft.com/, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16318, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16317, https://msdn.microsoft.com/en-us/library/windows/hardware/ff562768(v=vs.85).aspx, http://technet.microsoft.com/en-us/library/dd421709(v=WS.10).aspx, https://datatracker.ietf.org/doc/html/rfc5996, https://www.niap-ccevs.org/documents_and_guidance/view_td.cfm?TD=0662, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16304, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16322, http://msdn.microsoft.com/en-us/library/aa375458(v=VS.85).aspx, https://www.microsoft.com/en-us/Licensing/product-licensing/windows10.aspx, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16327, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16301, https://datatracker.ietf.org/doc/html/rfc4945, http://www.ietf.org/rfc/rfc5289.txt, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16247, http://www.ietf.org/rfc/rfc4366.txt, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16253
- pdf_is_encrypted: False
- pdf_number_of_pages: 203
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |