This page was not yet optimized for use on mobile devices.
McAfee VirusScan Enterprise v8.5i and McAfee ePolicy Orchestrator v3.6
This certificate has known related CVEs, which means that
the certified
product might be vulnerable.
CSV information ?
Status | archived |
---|---|
Valid from | 22.06.2007 |
Valid until | 06.09.2012 |
Scheme | 🇺🇸 US |
Manufacturer | McAfee, Inc. |
Category | Other Devices and Systems |
Security level | ALC_FLR.2, EAL2+ |
Heuristics summary ?
Certificate ID: CCEVS-VR-0047-2007
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
RC2, 3DESAsymmetric Algorithms
DSAVendor
MicrosoftSecurity level
EAL2, EAL 4, EAL 2, EAL2 augmented, EAL 2 augmentedClaims
T.ACCIDENTAL_ADMIN_ERROR, T.AUDIT_, T.MASQUERADE, T.POOR_DESIGN, T.POOR_IMPLEMENTATION, T.POOR_TEST, T.RESIDUAL_DATA, T.TSF_COMPROMISE, T.UNATTENDED_SESSION, T.UNIDENTIFIED_ACTIONS, T.VIRUS, A.PHYSICALSecurity Assurance Requirements (SAR)
ALC_FLR.2Certificates
CCEVS-VR-07-0047File metadata
Title | National Information Assurance Partnership |
---|---|
Author | Jerome F. Myers |
Creation date | D:20070717151740-04'00' |
Modification date | D:20070717151821-04'00' |
Pages | 18 |
Creator | Acrobat PDFMaker 7.0 for Word |
Producer | Acrobat Distiller 7.0 (Windows) |
Frontpage
Certificate ID | CCEVS-VR-07-0047 |
---|---|
Certified item | McAfee VirusScan 8.5i and ePolicy Orchestrator 3.6.1 |
Certification lab | US NIAP |
Security target ?
Extracted keywords
Symmetric Algorithms
RC2, 3DESAsymmetric Algorithms
DSAHash functions
SHA-1Vendor
MicrosoftSecurity level
EAL2, EAL2 augmentedClaims
O.ADMIN_GUIDANCE, O.ADMIN_ROLE, O.AUDIT_GENERATION, O.AUDIT_PROTECTION, O.AUDIT_REVIEW, O.CONFIGURATION_IDENTIFICATION, O.CORRECT_TSF_OPERATION, O.CRYPTOGRAPHY, O.DOCUMENTED_DESIGN, O.MANAGE, O.PARTIAL_FUNCTIONAL_TEST, O.PARTIAL_SELF_PROTECTION, O.VIRUS, O.VULNERABILITY_ANALYSIS, O.AUDIT_PROTECT, O.CONFIGURATION_IDENTIF, O.CORRECT_TSF_OPERATIO, O.PARTIAL_FUNCTIONAL_TE, O.PARTIAL_SELF_PROTECTI, O.VULNERABILITY_ANALYSI, O.PARTIAL_SELF_PROTEC, O.CONFIGURATION_IDEN, O.VULNERABILITY_ANALY, O.VULNERABILITY_ANALYSIS_TEST, O.PARTIAL_FUNCTIONAL, O.PARTIAL_FUNCTIONAL_TESTING, O.CORRECT_TSF_OPERAT, O.AUDIT_GEN, O.AUDIT_PROTECTIO, O.CONFIGURATION_I, O.CORRECT_TSF_OP, O.DOCUMENTED_DES, O.PARTIAL_FUNCTIO, O.PARTIAL_SELF_PR, O.VULNERABILITY_A, T.ACCIDENTAL_ADMIN_ERROR, T.AUDIT_, T.MASQUERADE, T.POOR_DESIGN, T.POOR_IMPLEMENTATION, T.POOR_TEST, T.RESIDUAL_DATA, T.TSF_COMPROMISE, T.UNATTENDED_SESSION, T.UNIDENTIFIED_ACTIONS, T.VIRUS, T.ACCIDENTAL_ADMIN_, T.UNATTENDED_, A.AUDIT_BACKUP, A.NO_EVIL, A.PHYSICAL, A.SECURE_COMMS, A.SECURE_UPDATES, OE.AUDIT_BACKUP, OE.AUDIT_SEARCH, OE.AUDIT_STORAGE, OE.DISPLAY_BANNER, OE.DOMAIN_SEPARATION, OE.NO_BYPASS, OE.NO_EVIL, OE.PHYSICAL, OE.RESIDUAL_INFORMATION, OE.SECURE_COMMS, OE.SECURE_UPDATES, OE.TIME_STAMPS, OE.TOE_ACCESS, OE.RESIDUAL_INFORMATIO, OE.TRUST_IT, OE.RESIDUAL_, OE.DOMAIN_SEPARATIO, OE.RESIDUAL_INFORMAT, OE.RESIDUAL_INFORMATISecurity Assurance Requirements (SAR)
ACM_CAP.2, ADO_DEL.1, ADO_IGS.1, ADV_FSP.1, ADV_HLD.1, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.2, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAR.3, FAU_GEN, FAU_SAR.1, FAU_SAR.2, FAU_STG, FAU_GEN.1, FAU_GEN.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_STG.1, FAU_SAR.3.1, FAU_STG.4, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.4, FDP_RIP.1, FDP_RIP.1.1, FDP_ITC.1, FDP_ITC.2, FDP_RIP.2, FDP_ACF, FDP_IFF, FDP_ACT, FIA_AFL.1, FIA_SOS.1, FIA_UAU.2, FIA_UAU.6, FIA_UID.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UAU.6.1, FIA_UID.2.1, FIA_UID.1, FMT_MOF.1, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_MSA.2, FPT_SEP_EXP.1, FPT_SEP, FPT_SEP_EXP, FPT_SEP_EXP.1.2, FPT_ITT.1, FPT_RVM.1, FPT_SEP.1, FPT_STM.1, FPT_SEP.1.1, FPT_SEP.1.2, FTA_SSL.1, FTA_TAB.1, FTA_SSL.1.1, FTA_SSL.1.2, FTA_TAB.1.1, FTP_ITT.1.1, FTP_RVM.1.1, FTP_STM.1.1, FTP_RVM.1Standards
FIPS 140-2, FIPS 180-2File metadata
Title | SECURITY TARGET |
---|---|
Author | User |
Creation date | D:20070619111903-07'00' |
Modification date | D:20070619144257-04'00' |
Pages | 65 |
Creator | Acrobat PDFMaker 7.0.7 for Word |
Producer | Acrobat Distiller 7.0.5 (Windows) |
Heuristics ?
Certificate ID: CCEVS-VR-0047-2007
Extracted SARs
ALC_FLR.2, AVA_MSU.1, AGD_ADM.1, ADV_RCR.1, ATE_IND.2, AGD_USR.1, ATE_COV.1, AVA_VLA.1, ATE_FUN.1, ADV_FSP.1, AVA_SOF.1, ADV_HLD.1CPE matches
Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-2009-1348 | HIGH | 7.6 | 10.0 | 30.04.2009 20:30 | ||
CVE-2009-5118 | HIGH | 9.3 | 10.0 | 22.08.2012 10:42 | ||
CVE-2010-3496 | MEDIUM | 6.4 | 4.9 | 22.08.2012 10:42 | ||
CVE-2010-5143 | LOW | 2.6 | 4.9 | 22.08.2012 10:42 | ||
CVE-2012-4594 | MEDIUM | 4.0 | 2.9 | 22.08.2012 10:42 | ||
CVE-2013-0140 | HIGH | 7.9 | 10.0 | 01.05.2013 12:00 | ||
CVE-2013-0141 | MEDIUM | 4.3 | 4.9 | 01.05.2013 12:00 | ||
CVE-2013-4882 | MEDIUM | 6.5 | 6.4 | 22.07.2013 11:21 | ||
CVE-2013-4883 | MEDIUM | 4.3 | 2.9 | 22.07.2013 11:21 | ||
CVE-2014-2205 | MEDIUM | 6.3 | 6.9 | 26.02.2014 15:55 | ||
CVE-2015-0921 | MEDIUM | 4.0 | 2.9 | 09.01.2015 18:59 | ||
CVE-2015-0922 | MEDIUM | 5.0 | 2.9 | 09.01.2015 18:59 | ||
CVE-2015-4559 | MEDIUM | 4.3 | 2.9 | 15.06.2015 15:59 | ||
CVE-2015-8577 | LOW | 2.6 | 4.9 | 16.12.2015 18:59 | ||
CVE-2015-8765 | HIGH | 8.3 | 3.7 | 08.01.2016 20:59 | ||
CVE-2017-3980 | HIGH | 7.2 | 5.9 | 18.05.2017 19:29 | ||
CVE-2019-3604 | HIGH | 8.8 | 5.9 | 01.02.2019 15:29 | ||
CVE-2020-13938 | MEDIUM | 5.5 | 3.6 | 10.06.2021 07:15 | ||
CVE-2020-7317 | MEDIUM | 4.3 | 2.7 | 14.10.2020 19:15 | ||
CVE-2020-7337 | MEDIUM | 6.7 | 5.9 | 09.12.2020 09:15 | ||
CVE-2021-2161 | MEDIUM | 5.9 | 3.6 | 22.04.2021 22:15 | ||
CVE-2021-23840 | HIGH | 7.5 | 3.6 | 16.02.2021 17:15 | ||
CVE-2021-23888 | MEDIUM | 6.3 | 4.2 | 26.03.2021 10:15 | ||
CVE-2021-23889 | MEDIUM | 4.8 | 2.7 | 26.03.2021 10:15 | ||
CVE-2021-23890 | MEDIUM | 6.5 | 2.5 | 26.03.2021 10:15 | ||
CVE-2021-2432 | LOW | 3.7 | 1.4 | 21.07.2021 15:16 | ||
CVE-2021-30639 | HIGH | 7.5 | 3.6 | 12.07.2021 15:15 | ||
CVE-2021-31834 | MEDIUM | 5.4 | 2.7 | 22.10.2021 11:15 | ||
CVE-2021-31835 | MEDIUM | 4.8 | 2.7 | 22.10.2021 11:15 | ||
CVE-2021-33037 | MEDIUM | 5.3 | 1.4 | 12.07.2021 15:15 | ||
CVE-2021-3712 | HIGH | 7.4 | 5.2 | 24.08.2021 15:15 | ||
CVE-2022-0842 | MEDIUM | 4.9 | 3.6 | 23.03.2022 14:15 | ||
CVE-2022-0857 | MEDIUM | 6.1 | 2.7 | 23.03.2022 15:15 | ||
CVE-2022-0858 | MEDIUM | 4.7 | 1.4 | 23.03.2022 15:15 | ||
CVE-2022-0859 | MEDIUM | 6.7 | 5.9 | 23.03.2022 15:15 | ||
CVE-2022-0861 | LOW | 3.8 | 2.5 | 23.03.2022 15:15 | ||
CVE-2022-0862 | MEDIUM | 5.3 | 1.4 | 23.03.2022 15:15 | ||
CVE-2022-3338 | MEDIUM | 5.4 | 2.7 | 18.10.2022 10:15 | ||
CVE-2022-3339 | MEDIUM | 6.1 | 2.7 | 18.10.2022 10:15 |
References ?
No references are available for this certificate.
Updates ?
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '86aad77b277c643759d94dfeaa4f064880a0ae7765bd41aa997559d61a0a23fc', 'txt_hash': '4db81c15e39caca7da06a08ff41a607f313aad4949566846b9db470f9fafb5d4'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'aa9c263e08a30d76630a10f7909ebec7a9c5eeb73a5e86f6b59c81cf8963cd39', 'txt_hash': 'ef242a2a738df1810e8a7734c7034a66f7e3ccf1ae707318ae514f14eeb3786c'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 174038, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/CreationDate': "D:20070717151740-04'00'", '/_EmailSubject': 'Validation Report for vid10166', '/Author': 'Jerome F. Myers', '/Creator': 'Acrobat PDFMaker 7.0 for Word', '/_AuthorEmailDisplayName': 'Dignan, David M.', '/Producer': 'Acrobat Distiller 7.0 (Windows)', '/_AuthorEmail': '[email protected]', '/ModDate': "D:20070717151821-04'00'", '/_AdHocReviewCycleID': '-2067643838', '/_PreviousAdHocReviewCycleID': '819936599', '/Company': 'The Aerospace Corporation', '/SourceModified': 'D:20070717191708', '/Title': 'National Information Assurance Partnership', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.cert.org/', 'http://www.osvdb.org/', 'http://nvd.nist.gov/', 'http://archives.neohapsis.com/', 'http://www.securityfocus.com/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 781280, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 65, '/ModDate': "D:20070619144257-04'00'", '/CreationDate': "D:20070619111903-07'00'", '/Title': 'SECURITY TARGET', '/Creator': 'Acrobat PDFMaker 7.0.7 for Word', '/Author': 'User', '/Producer': 'Acrobat Distiller 7.0.5 (Windows)', '/SourceModified': 'D:20070619181729', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'US': {'cert_id': 'CCEVS-VR-07-0047', 'cert_item': 'McAfee VirusScan 8.5i and ePolicy Orchestrator 3.6.1', 'cert_lab': 'US NIAP'}}
. - The report_keywords property was set to
{'cc_cert_id': {'US': {'CCEVS-VR-07-0047': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 3, 'EAL 4': 1, 'EAL 2': 2, 'EAL2 augmented': 3, 'EAL 2 augmented': 2}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 5}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.ACCIDENTAL_ADMIN_ERROR': 1, 'T.AUDIT_': 1, 'T.MASQUERADE': 1, 'T.POOR_DESIGN': 1, 'T.POOR_IMPLEMENTATION': 1, 'T.POOR_TEST': 1, 'T.RESIDUAL_DATA': 1, 'T.TSF_COMPROMISE': 1, 'T.UNATTENDED_SESSION': 1, 'T.UNIDENTIFIED_ACTIONS': 1, 'T.VIRUS': 1}, 'A': {'A.PHYSICAL': 1}}, 'vendor': {'Microsoft': {'Microsoft': 10}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'RC': {'RC2': 1}}, 'DES': {'3DES': {'3DES': 1}}}, 'asymmetric_crypto': {'FF': {'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 6, 'EAL2 augmented': 5}}, 'cc_sar': {'ACM': {'ACM_CAP.2': 5}, 'ADO': {'ADO_DEL.1': 5, 'ADO_IGS.1': 4}, 'ADV': {'ADV_FSP.1': 4, 'ADV_HLD.1': 4, 'ADV_RCR.1': 5}, 'AGD': {'AGD_ADM.1': 5, 'AGD_USR.1': 3}, 'ALC': {'ALC_FLR.2': 10}, 'ATE': {'ATE_COV.1': 5, 'ATE_FUN.1': 3, 'ATE_IND.2': 5}, 'AVA': {'AVA_MSU.1': 5, 'AVA_SOF.1': 2, 'AVA_VLA.1': 6}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 1, 'FAU_SAR.3': 10, 'FAU_GEN': 21, 'FAU_SAR.1': 13, 'FAU_SAR.2': 8, 'FAU_STG': 29, 'FAU_GEN.1': 5, 'FAU_GEN.2': 1, 'FAU_SAR.1.1': 2, 'FAU_SAR.1.2': 2, 'FAU_SAR.2.1': 1, 'FAU_STG.1': 6, 'FAU_SAR.3.1': 1, 'FAU_STG.4': 1}, 'FCS': {'FCS_COP.1': 8, 'FCS_COP.1.1': 1, 'FCS_CKM.1': 2, 'FCS_CKM.4': 2}, 'FDP': {'FDP_RIP.1': 3, 'FDP_RIP.1.1': 1, 'FDP_ITC.1': 2, 'FDP_ITC.2': 1, 'FDP_RIP.2': 1, 'FDP_ACF': 1, 'FDP_IFF': 2, 'FDP_ACT': 1}, 'FIA': {'FIA_AFL.1': 4, 'FIA_SOS.1': 4, 'FIA_UAU.2': 4, 'FIA_UAU.6': 4, 'FIA_UID.2': 4, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.6.1': 1, 'FIA_UID.2.1': 1, 'FIA_UID.1': 2}, 'FMT': {'FMT_MOF.1': 13, 'FMT_MTD.1': 9, 'FMT_SMF.1': 11, 'FMT_SMR.1': 11, 'FMT_MOF.1.1': 2, 'FMT_MTD.1.1': 3, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_MSA.2': 2}, 'FPT': {'FPT_SEP_EXP.1': 10, 'FPT_SEP': 5, 'FPT_SEP_EXP': 1, 'FPT_SEP_EXP.1.2': 1, 'FPT_ITT.1': 4, 'FPT_RVM.1': 3, 'FPT_SEP.1': 4, 'FPT_STM.1': 5, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1}, 'FTA': {'FTA_SSL.1': 4, 'FTA_TAB.1': 4, 'FTA_SSL.1.1': 1, 'FTA_SSL.1.2': 1, 'FTA_TAB.1.1': 1}, 'FTP': {'FTP_ITT.1.1': 1, 'FTP_RVM.1.1': 1, 'FTP_STM.1.1': 1, 'FTP_RVM.1': 1}}, 'cc_claims': {'O': {'O.ADMIN_GUIDANCE': 5, 'O.ADMIN_ROLE': 4, 'O.AUDIT_GENERATION': 5, 'O.AUDIT_PROTECTION': 1, 'O.AUDIT_REVIEW': 5, 'O.CONFIGURATION_IDENTIFICATION': 3, 'O.CORRECT_TSF_OPERATION': 4, 'O.CRYPTOGRAPHY': 4, 'O.DOCUMENTED_DESIGN': 7, 'O.MANAGE': 5, 'O.PARTIAL_FUNCTIONAL_TEST': 2, 'O.PARTIAL_SELF_PROTECTION': 3, 'O.VIRUS': 6, 'O.VULNERABILITY_ANALYSIS': 1, 'O.AUDIT_PROTECT': 2, 'O.CONFIGURATION_IDENTIF': 1, 'O.CORRECT_TSF_OPERATIO': 1, 'O.PARTIAL_FUNCTIONAL_TE': 1, 'O.PARTIAL_SELF_PROTECTI': 1, 'O.VULNERABILITY_ANALYSI': 1, 'O.PARTIAL_SELF_PROTEC': 2, 'O.CONFIGURATION_IDEN': 2, 'O.VULNERABILITY_ANALY': 3, 'O.VULNERABILITY_ANALYSIS_TEST': 3, 'O.PARTIAL_FUNCTIONAL': 2, 'O.PARTIAL_FUNCTIONAL_TESTING': 2, 'O.CORRECT_TSF_OPERAT': 2, 'O.AUDIT_GEN': 1, 'O.AUDIT_PROTECTIO': 1, 'O.CONFIGURATION_I': 1, 'O.CORRECT_TSF_OP': 1, 'O.DOCUMENTED_DES': 1, 'O.PARTIAL_FUNCTIO': 1, 'O.PARTIAL_SELF_PR': 1, 'O.VULNERABILITY_A': 1}, 'T': {'T.ACCIDENTAL_ADMIN_ERROR': 3, 'T.AUDIT_': 3, 'T.MASQUERADE': 2, 'T.POOR_DESIGN': 2, 'T.POOR_IMPLEMENTATION': 3, 'T.POOR_TEST': 2, 'T.RESIDUAL_DATA': 3, 'T.TSF_COMPROMISE': 2, 'T.UNATTENDED_SESSION': 2, 'T.UNIDENTIFIED_ACTIONS': 2, 'T.VIRUS': 3, 'T.ACCIDENTAL_ADMIN_': 1, 'T.UNATTENDED_': 1}, 'A': {'A.AUDIT_BACKUP': 3, 'A.NO_EVIL': 1, 'A.PHYSICAL': 3, 'A.SECURE_COMMS': 2, 'A.SECURE_UPDATES': 3}, 'OE': {'OE.AUDIT_BACKUP': 3, 'OE.AUDIT_SEARCH': 8, 'OE.AUDIT_STORAGE': 4, 'OE.DISPLAY_BANNER': 5, 'OE.DOMAIN_SEPARATION': 6, 'OE.NO_BYPASS': 7, 'OE.NO_EVIL': 3, 'OE.PHYSICAL': 3, 'OE.RESIDUAL_INFORMATION': 4, 'OE.SECURE_COMMS': 5, 'OE.SECURE_UPDATES': 3, 'OE.TIME_STAMPS': 5, 'OE.TOE_ACCESS': 6, 'OE.RESIDUAL_INFORMATIO': 1, 'OE.TRUST_IT': 1, 'OE.RESIDUAL_': 1, 'OE.DOMAIN_SEPARATIO': 3, 'OE.RESIDUAL_INFORMAT': 2, 'OE.RESIDUAL_INFORMATI': 1}}, 'vendor': {'Microsoft': {'Microsoft': 8}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'RC': {'RC2': 1}}, 'DES': {'3DES': {'3DES': 1}}}, 'asymmetric_crypto': {'FF': {'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 5, 'FIPS 180-2': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
st_vid10166-vr.pdf
. - The st_filename property was set to
st_vid10166-st.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['US']
. - The cert_id property was set to
CCEVS-VR-0047-2007
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 1}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10166-vr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10166-st.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 1}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name McAfee VirusScan Enterprise v8.5i and McAfee ePolicy Orchestrator v3.6 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": null,
"dgst": "d51744cd80325e5d",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CCEVS-VR-0047-2007",
"cert_lab": [
"US"
],
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:a:mcafee:epolicy_orchestrator:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:virusscan_enterprise:8.5i:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:3.6.0:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3.6",
"8.5"
]
},
"indirect_transitive_cves": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2017-3980",
"CVE-2009-1348",
"CVE-2013-0141",
"CVE-2021-23840",
"CVE-2021-23890",
"CVE-2012-4594",
"CVE-2020-13938",
"CVE-2021-2161",
"CVE-2015-8577",
"CVE-2010-3496",
"CVE-2010-5143",
"CVE-2015-8765",
"CVE-2022-3339",
"CVE-2015-0921",
"CVE-2004-0095",
"CVE-2007-1538",
"CVE-2021-31834",
"CVE-2021-23889",
"CVE-2009-5118",
"CVE-2020-7337",
"CVE-2021-31835",
"CVE-2021-23888",
"CVE-2006-5274",
"CVE-2022-0861",
"CVE-2022-0859",
"CVE-2022-0858",
"CVE-2015-4559",
"CVE-2021-3712",
"CVE-2020-7317",
"CVE-2022-0842",
"CVE-2021-30639",
"CVE-2019-3604",
"CVE-2015-0922",
"CVE-2013-4882",
"CVE-2007-1498",
"CVE-2021-33037",
"CVE-2022-0857",
"CVE-2022-3338",
"CVE-2022-0862",
"CVE-2013-4883",
"CVE-2013-0140",
"CVE-2014-2205",
"CVE-2021-2432"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "McAfee, Inc.",
"manufacturer_web": "https://www.mcafee.com/",
"name": "McAfee VirusScan Enterprise v8.5i and McAfee ePolicy Orchestrator v3.6",
"not_valid_after": "2012-09-06",
"not_valid_before": "2007-06-22",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "st_vid10166-vr.pdf",
"report_frontpage": {
"US": {
"cert_id": "CCEVS-VR-07-0047",
"cert_item": "McAfee VirusScan 8.5i and ePolicy Orchestrator 3.6.1",
"cert_lab": "US NIAP"
}
},
"report_keywords": {
"asymmetric_crypto": {
"FF": {
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {
"US": {
"CCEVS-VR-07-0047": 1
}
},
"cc_claims": {
"A": {
"A.PHYSICAL": 1
},
"T": {
"T.ACCIDENTAL_ADMIN_ERROR": 1,
"T.AUDIT_": 1,
"T.MASQUERADE": 1,
"T.POOR_DESIGN": 1,
"T.POOR_IMPLEMENTATION": 1,
"T.POOR_TEST": 1,
"T.RESIDUAL_DATA": 1,
"T.TSF_COMPROMISE": 1,
"T.UNATTENDED_SESSION": 1,
"T.UNIDENTIFIED_ACTIONS": 1,
"T.VIRUS": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 2,
"EAL 2 augmented": 2,
"EAL 4": 1,
"EAL2": 3,
"EAL2 augmented": 3
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {
"AES_competition": {
"RC": {
"RC2": 1
}
},
"DES": {
"3DES": {
"3DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 10
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Jerome F. Myers",
"/Company": "The Aerospace Corporation",
"/CreationDate": "D:20070717151740-04\u002700\u0027",
"/Creator": "Acrobat PDFMaker 7.0 for Word",
"/ModDate": "D:20070717151821-04\u002700\u0027",
"/Producer": "Acrobat Distiller 7.0 (Windows)",
"/SourceModified": "D:20070717191708",
"/Title": "National Information Assurance Partnership",
"/_AdHocReviewCycleID": "-2067643838",
"/_AuthorEmail": "[email protected]",
"/_AuthorEmailDisplayName": "Dignan, David M.",
"/_EmailSubject": "Validation Report for vid10166",
"/_PreviousAdHocReviewCycleID": "819936599",
"pdf_file_size_bytes": 174038,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://archives.neohapsis.com/",
"http://www.securityfocus.com/",
"http://www.osvdb.org/",
"http://www.cert.org/",
"http://nvd.nist.gov/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 18
},
"st_filename": "st_vid10166-st.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.AUDIT_BACKUP": 3,
"A.NO_EVIL": 1,
"A.PHYSICAL": 3,
"A.SECURE_COMMS": 2,
"A.SECURE_UPDATES": 3
},
"O": {
"O.ADMIN_GUIDANCE": 5,
"O.ADMIN_ROLE": 4,
"O.AUDIT_GEN": 1,
"O.AUDIT_GENERATION": 5,
"O.AUDIT_PROTECT": 2,
"O.AUDIT_PROTECTIO": 1,
"O.AUDIT_PROTECTION": 1,
"O.AUDIT_REVIEW": 5,
"O.CONFIGURATION_I": 1,
"O.CONFIGURATION_IDEN": 2,
"O.CONFIGURATION_IDENTIF": 1,
"O.CONFIGURATION_IDENTIFICATION": 3,
"O.CORRECT_TSF_OP": 1,
"O.CORRECT_TSF_OPERAT": 2,
"O.CORRECT_TSF_OPERATIO": 1,
"O.CORRECT_TSF_OPERATION": 4,
"O.CRYPTOGRAPHY": 4,
"O.DOCUMENTED_DES": 1,
"O.DOCUMENTED_DESIGN": 7,
"O.MANAGE": 5,
"O.PARTIAL_FUNCTIO": 1,
"O.PARTIAL_FUNCTIONAL": 2,
"O.PARTIAL_FUNCTIONAL_TE": 1,
"O.PARTIAL_FUNCTIONAL_TEST": 2,
"O.PARTIAL_FUNCTIONAL_TESTING": 2,
"O.PARTIAL_SELF_PR": 1,
"O.PARTIAL_SELF_PROTEC": 2,
"O.PARTIAL_SELF_PROTECTI": 1,
"O.PARTIAL_SELF_PROTECTION": 3,
"O.VIRUS": 6,
"O.VULNERABILITY_A": 1,
"O.VULNERABILITY_ANALY": 3,
"O.VULNERABILITY_ANALYSI": 1,
"O.VULNERABILITY_ANALYSIS": 1,
"O.VULNERABILITY_ANALYSIS_TEST": 3
},
"OE": {
"OE.AUDIT_BACKUP": 3,
"OE.AUDIT_SEARCH": 8,
"OE.AUDIT_STORAGE": 4,
"OE.DISPLAY_BANNER": 5,
"OE.DOMAIN_SEPARATIO": 3,
"OE.DOMAIN_SEPARATION": 6,
"OE.NO_BYPASS": 7,
"OE.NO_EVIL": 3,
"OE.PHYSICAL": 3,
"OE.RESIDUAL_": 1,
"OE.RESIDUAL_INFORMAT": 2,
"OE.RESIDUAL_INFORMATI": 1,
"OE.RESIDUAL_INFORMATIO": 1,
"OE.RESIDUAL_INFORMATION": 4,
"OE.SECURE_COMMS": 5,
"OE.SECURE_UPDATES": 3,
"OE.TIME_STAMPS": 5,
"OE.TOE_ACCESS": 6,
"OE.TRUST_IT": 1
},
"T": {
"T.ACCIDENTAL_ADMIN_": 1,
"T.ACCIDENTAL_ADMIN_ERROR": 3,
"T.AUDIT_": 3,
"T.MASQUERADE": 2,
"T.POOR_DESIGN": 2,
"T.POOR_IMPLEMENTATION": 3,
"T.POOR_TEST": 2,
"T.RESIDUAL_DATA": 3,
"T.TSF_COMPROMISE": 2,
"T.UNATTENDED_": 1,
"T.UNATTENDED_SESSION": 2,
"T.UNIDENTIFIED_ACTIONS": 2,
"T.VIRUS": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_CAP.2": 5
},
"ADO": {
"ADO_DEL.1": 5,
"ADO_IGS.1": 4
},
"ADV": {
"ADV_FSP.1": 4,
"ADV_HLD.1": 4,
"ADV_RCR.1": 5
},
"AGD": {
"AGD_ADM.1": 5,
"AGD_USR.1": 3
},
"ALC": {
"ALC_FLR.2": 10
},
"ATE": {
"ATE_COV.1": 5,
"ATE_FUN.1": 3,
"ATE_IND.2": 5
},
"AVA": {
"AVA_MSU.1": 5,
"AVA_SOF.1": 2,
"AVA_VLA.1": 6
}
},
"cc_security_level": {
"EAL": {
"EAL2": 6,
"EAL2 augmented": 5
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 1,
"FAU_GEN": 21,
"FAU_GEN.1": 5,
"FAU_GEN.2": 1,
"FAU_SAR.1": 13,
"FAU_SAR.1.1": 2,
"FAU_SAR.1.2": 2,
"FAU_SAR.2": 8,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 10,
"FAU_SAR.3.1": 1,
"FAU_STG": 29,
"FAU_STG.1": 6,
"FAU_STG.4": 1
},
"FCS": {
"FCS_CKM.1": 2,
"FCS_CKM.4": 2,
"FCS_COP.1": 8,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACF": 1,
"FDP_ACT": 1,
"FDP_IFF": 2,
"FDP_ITC.1": 2,
"FDP_ITC.2": 1,
"FDP_RIP.1": 3,
"FDP_RIP.1.1": 1,
"FDP_RIP.2": 1
},
"FIA": {
"FIA_AFL.1": 4,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_SOS.1": 4,
"FIA_SOS.1.1": 1,
"FIA_UAU.2": 4,
"FIA_UAU.2.1": 1,
"FIA_UAU.6": 4,
"FIA_UAU.6.1": 1,
"FIA_UID.1": 2,
"FIA_UID.2": 4,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF.1": 13,
"FMT_MOF.1.1": 2,
"FMT_MSA.2": 2,
"FMT_MTD.1": 9,
"FMT_MTD.1.1": 3,
"FMT_SMF.1": 11,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 11,
"FMT_SMR.1.1": 1
},
"FPT": {
"FPT_ITT.1": 4,
"FPT_RVM.1": 3,
"FPT_SEP": 5,
"FPT_SEP.1": 4,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_SEP_EXP": 1,
"FPT_SEP_EXP.1": 10,
"FPT_SEP_EXP.1.2": 1,
"FPT_STM.1": 5
},
"FTA": {
"FTA_SSL.1": 4,
"FTA_SSL.1.1": 1,
"FTA_SSL.1.2": 1,
"FTA_TAB.1": 4,
"FTA_TAB.1.1": 1
},
"FTP": {
"FTP_ITT.1.1": 1,
"FTP_RVM.1": 1,
"FTP_RVM.1.1": 1,
"FTP_STM.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 5,
"FIPS 180-2": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"RC": {
"RC2": 1
}
},
"DES": {
"3DES": {
"3DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 8
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "User",
"/CreationDate": "D:20070619111903-07\u002700\u0027",
"/Creator": "Acrobat PDFMaker 7.0.7 for Word",
"/ModDate": "D:20070619144257-04\u002700\u0027",
"/Producer": "Acrobat Distiller 7.0.5 (Windows)",
"/SourceModified": "D:20070619181729",
"/Title": "SECURITY TARGET",
"pdf_file_size_bytes": 781280,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 65
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_AV_BR_V1.1.pdf",
"pp_name": "U.S. Government Protection Profile Anti-Virus Applications for Workstations in Basic Robustness Envir..."
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10166-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL2+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10166-st.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "86aad77b277c643759d94dfeaa4f064880a0ae7765bd41aa997559d61a0a23fc",
"txt_hash": "4db81c15e39caca7da06a08ff41a607f313aad4949566846b9db470f9fafb5d4"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "aa9c263e08a30d76630a10f7909ebec7a9c5eeb73a5e86f6b59c81cf8963cd39",
"txt_hash": "ef242a2a738df1810e8a7734c7034a66f7e3ccf1ae707318ae514f14eeb3786c"
}
},
"status": "archived"
}