{"_id": "dc9117d5e0cd2dfb", "_type": "sec_certs.sample.cc.CCCertificate", "dgst": "dc9117d5e0cd2dfb", "status": "archived", "category": "Other Devices and Systems", "name": "Cisco Adaptive Security Appliances (ASA) 9.16 on Firepower 1000 and 2100 Series", "manufacturer": "Cisco Systems, Inc.", "scheme": "US", "security_level": {"_type": "Set", "elements": []}, "not_valid_before": "2022-07-15", "not_valid_after": "2024-07-15", "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11255-vr.pdf", "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11255-st.pdf", "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11255-ci.pdf", "manufacturer_web": "https://www.cisco.com", "protection_profile_links": {"_type": "Set", "elements": ["https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_CPP_FW_v1.4e.pdf", "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf"]}, "maintenance_updates": {"_type": "Set", "elements": []}, "state": {"_type": "sec_certs.sample.cc_eucc_common.InternalState", "report": {"_type": "sec_certs.sample.document_state.DocumentState", "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "2cfa078afeb27077ddfadee1de3763f4343c37fd31fee04bfec73ab25e4b86cb", "txt_hash": "a2b5d8d0ab31d550db2d3607b97cdd3f8bfaa1033ec571198a21af1172f1b88d", "json_hash": null}, "st": {"_type": "sec_certs.sample.document_state.DocumentState", "download_ok": true, "convert_ok": true, "extract_ok": true, "pdf_hash": "8ea802fc222415f933da28afd5152cfe996024667fec1fc7852a5683e8cea0f2", "txt_hash": "a81fa8841f4ddca4d23b6da0ce130c2a7c58a37c1ea657ae49e7ace5e08c4ffb", "json_hash": null}, "cert": {"_type": "sec_certs.sample.document_state.DocumentState", "download_ok": true, "convert_ok": true, "extract_ok": false, "pdf_hash": "4167837d28dee486ff884540e3cedbd96470fb7939bf875efdd3e0b6cb1bf5bb", "txt_hash": "58758247d79c004398e7c47567cbc6cf0dce10bd87880be138993ffac2780aad", "json_hash": null}}, "pdf_data": {"_type": "sec_certs.sample.cc_eucc_common.PdfData", "report_metadata": {"pdf_file_size_bytes": 367233, "pdf_is_encrypted": false, "pdf_number_of_pages": 17, "/Author": "comptont", "/Creator": "Microsoft\u00ae Word for Microsoft 365", "/CreationDate": "D:20220720110616-04'00'", "/ModDate": "D:20220720110616-04'00'", "/Producer": "Microsoft\u00ae Word for Microsoft 365", "pdf_hyperlinks": {"_type": "Set", "elements": ["https://www.exploit-db.com/)", "http://nessus.org/plugins/index.php?view=search", "http://www.kb.cert.org/vuls/", "https://www.rapid7.com/db/vulnerabilities", "https://web.nvd.nist.gov/vuln/search"]}}, "st_metadata": {"pdf_file_size_bytes": 1361043, "pdf_is_encrypted": false, "pdf_number_of_pages": 103, "/Author": "GCT", "/Creator": "Microsoft\u00ae Word for Microsoft 365", "/CreationDate": "D:20220720110455-04'00'", "/ModDate": "D:20220720110455-04'00'", "/Producer": "Microsoft\u00ae Word for Microsoft 365", "pdf_hyperlinks": {"_type": "Set", "elements": ["http://tools.ietf.org/rfcmarkup?doc=793#section-2.7", "http://en.wikipedia.org/wiki/Internet_Control_Message_Protocol"]}}, "cert_metadata": null, "report_frontpage": {"US": {"cert_id": "CCEVS-VR-VID11255-2022", "cert_item": "Cisco Adaptive Security Appliances (ASA) 9.16 on Firepower 1000 and 2100 Series", "cert_lab": "US NIAP"}}, "st_frontpage": null, "cert_frontpage": null, "report_keywords": {"cc_cert_id": {"US": {"CCEVS-VR-VID11255-2022": 1}}, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": {}, "cc_sfr": {}, "cc_claims": {}, "vendor": {"Cisco": {"Cisco": 20, "Cisco Systems, Inc": 3}}, "eval_facility": {"Gossamer": {"Gossamer Security": 4}}, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {"SSH": {"SSHv2": 4, "SSH": 2}, "TLS": {"TLS": {"TLS": 5}}, "IKE": {"IKE": 1}, "IPsec": {"IPsec": 10}, "VPN": {"VPN": 20}}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {}}, "st_keywords": {"cc_cert_id": {}, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": {"ADV": {"ADV_FSP.1": 2}, "AGD": {"AGD_OPE.1": 3, "AGD_PRE.1": 2}, "ALC": {"ALC_CMC.1": 2, "ALC_CMS.1": 2}, "ATE": {"ATE_IND.1": 2}, "AVA": {"AVA_VAN.1": 5, "AVA_VAN": 1}}, "cc_sfr": {"FAU": {"FAU_STG": 1, "FAU_GEN.1": 6, "FAU_GEN.2": 4, "FAU_STG_EXT.1": 4, "FAU_GEN.1.1": 1, "FAU_GEN.1.2": 1, "FAU_GEN.2.1": 1, "FAU_STG_EXT.1.1": 1, "FAU_STG_EXT.1.2": 1, "FAU_STG_EXT.1.3": 1}, "FCS": {"FCS_SSHC_EXT.1": 1, "FCS_TLSS_EXT.1.3": 2, "FCS_TLSC_EXT.1.2": 2, "FCS_SSHS_EXT.1": 7, "FCS_CKM.2": 6, "FCS_CKM.1.1": 2, "FCS_CKM.2.1": 2, "FCS_TLSS_EXT.1": 7, "FCS_TLSS_EXT.1.4": 3, "FCS_TLSC_EXT.2.3": 2, "FCS_NTP_EXT.1.4": 1, "FCS_NTP_EXT.1": 1, "FCS_COP": 23, "FCS_CKM": 5, "FCS_CKM.1": 9, "FCS_CKM.4": 5, "FCS_RBG_EXT.1": 8, "FCS_TLSC_EXT.1": 6, "FCS_TLSC_EXT.2": 3, "FCS_CKM.4.1": 1, "FCS_COP.1": 4, "FCS_RBG_EXT.1.1": 1, "FCS_RBG_EXT.1.2": 1, "FCS_SSHS_EXT.1.1": 1, "FCS_SSHS_EXT.1.2": 1, "FCS_SSHS_EXT.1.3": 1, "FCS_SSHS_EXT.1.4": 1, "FCS_SSHS_EXT.1.5": 1, "FCS_SSHS_EXT.1.6": 1, "FCS_SSHS_EXT.1.7": 1, "FCS_SSHS_EXT.1.8": 1, "FCS_TLSC_EXT.1.1": 1, "FCS_TLSC_EXT.1.3": 1, "FCS_TLSC_EXT.1.4": 1, "FCS_TLSC_EXT.2.1": 1, "FCS_TLSS_EXT.1.1": 1, "FCS_TLSS_EXT.1.2": 1}, "FDP": {"FDP_RIP.2": 5, "FDP_RIP.2.1": 1}, "FIA": {"FIA_AFL.1": 9, "FIA_PSK_EXT.1": 5, "FIA_PMG_EXT.1": 4, "FIA_UIA_EXT.1": 4, "FIA_UAU_EXT.2": 4, "FIA_UAU.7": 4, "FIA_AFL.1.1": 1, "FIA_AFL.1.2": 1, "FIA_PMG_EXT.1.1": 1, "FIA_UIA_EXT.1.1": 1, "FIA_UIA_EXT.1.2": 1, "FIA_UAU_EXT.2.1": 1, "FIA_UAU.7.1": 1, "FIA_PSK_EXT.1.1": 1, "FIA_PSK_EXT.1.2": 1, "FIA_PSK_EXT.1.3": 1, "FIA_PSK_EXT.1.4": 1}, "FMT": {"FMT_SMF.1": 9, "FMT_MTD": 9, "FMT_SMF": 11, "FMT_MOF": 4, "FMT_SMR.2": 4, "FMT_MOF.1": 1, "FMT_MTD.1": 2, "FMT_SMF.1.1": 1, "FMT_SMR.2.1": 1, "FMT_SMR.2.2": 1, "FMT_SMR.2.3": 1}, "FPT": {"FPT_STM_EXT.1.2": 2, "FPT_TST_EXT.1": 5, "FPT_TUD_EXT.1": 5, "FPT_FLS": 5, "FPT_TST_EXT.3": 5, "FPT_SKP_EXT.1": 4, "FPT_APW_EXT.1": 4, "FPT_STM_EXT.1": 5, "FPT_SKP_EXT.1.1": 1, "FPT_APW_EXT.1.1": 1, "FPT_APW_EXT.1.2": 1, "FPT_STM_EXT.1.1": 1, "FPT_TST_EXT": 1, "FPT_TST_EXT.1.1": 1, "FPT_TUD_EXT.1.1": 1, "FPT_TUD_EXT.1.2": 1, "FPT_TUD_EXT.1.3": 1, "FPT_FLS.1": 2, "FPT_TST_EXT.3.1": 1, "FPT_TST_EXT.3.2": 1}, "FTA": {"FTA_SSL": 4, "FTA_TSE.1": 5, "FTA_VCM_EXT.1": 5, "FTA_SSL_EXT.1": 4, "FTA_SSL.3": 6, "FTA_SSL.4": 3, "FTA_TAB.1": 5, "FTA_SSL_EXT.1.1": 1, "FTA_SSL.3.1": 1, "FTA_SSL.4.1": 1, "FTA_TAB.1.1": 1, "FTA_TSE.1.1": 1, "FTA_VCM_EXT.1.1": 1, "FTA_SSL_EXT": 1}, "FTP": {"FTP_ITC.1": 11, "FTP_ITC": 5, "FTP_TRP": 4, "FTP_ITC.1.1": 1, "FTP_ITC.1.2": 1, "FTP_ITC.1.3": 1, "FTP_TRP.1": 3}}, "cc_claims": {"O": {"O.RESIDUAL_INFORMATION": 1, "O.STATEFUL_TRAFFIC_FILTERING": 1, "O.ADDRESS_FILTERING": 1, "O.AUTHENTICATION": 1, "O.CRYPTOGRAPHIC_FUNCTIONS": 1, "O.FAIL_SECURE": 1, "O.PORT_FILTERING": 1, "O.SYSTEM_MONITORING": 1, "O.TOE_ADMINISTRATION": 1}, "T": {"T.UNAUTHORIZED_": 1, "T.WEAK_CRYPTOGRAPHY": 1, "T.UNTRUSTED_COMMUNICATIONS": 1, "T.WEAK_AUTHENTICATION_": 1, "T.UPDATE_COMPROMISE": 1, "T.UNDETECTED_ACTIVITY": 1, "T.SECURITY_FUNCTIONALITY_": 2, "T.PASSWORD_CRACKING": 1, "T.NETWORK_DISCLOSURE": 2, "T.NETWORK_ACCESS": 1, "T.NETWORK_MISUSE": 2, "T.MALICIOUS_TRAFFIC": 1, "T.DATA_INTEGRITY": 1, "T.REPLAY_ATTACK": 1}, "A": {"A.LIMITED_FUNCTIONALITY": 2, "A.CONNECTIONS": 2, "A.PHYSICAL_PROTECTION": 1, "A.NO_THRU_TRAFFIC_PROTECTION": 1, "A.TRUSTED_ADMINSTRATOR": 1, "A.REGULAR_UPDATES": 1, "A.ADMIN_CREDENTIALS_": 1, "A.RESIDUAL_INFORMATION": 1, "A.VS_TRUSTED_ADMINISTRATOR": 1, "A.VS_REGULAR_UPDATES": 1, "A.VS_ISOLATON": 1, "A.VS_CORRECT_CONFIGURATION": 1}, "OE": {"OE.PHYSICAL": 1, "OE.NO_GENERAL_PURPOSE": 1, "OE.NO_THRU_TRAFFIC_PROTECTION": 1, "OE.TRUSTED_ADMIN": 1, "OE.UPDATES": 1, "OE.ADMIN_CREDENTIALS_": 1, "OE.RESIDUAL_INFORMATION": 1, "OE.VM_CONFIGURATION": 1, "OE.CONNECTIONS": 1}}, "vendor": {"Microsoft": {"Microsoft": 1}, "Cisco": {"Cisco": 18, "Cisco Systems, Inc": 2}}, "eval_facility": {}, "symmetric_crypto": {"AES_competition": {"AES": {"AES": 11, "AES-256": 1}}, "miscellaneous": {"Skinny": {"Skinny": 2}}, "constructions": {"MAC": {"HMAC": 3, "HMAC-SHA-256": 7, "HMAC-SHA-384": 6, "HMAC-SHA-512": 7}}}, "asymmetric_crypto": {"RSA": {"RSA-2048": 1}, "ECC": {"ECDH": {"ECDHE": 2}, "ECDSA": {"ECDSA": 20}, "ECC": {"ECC": 4}}, "FF": {"DH": {"Diffie-Hellman": 5, "DH": 8}, "DSA": {"DSA": 1}}}, "pq_crypto": {}, "hash_function": {"SHA": {"SHA1": {"SHA-1": 4}, "SHA2": {"SHA-256": 4, "SHA-384": 4, "SHA-512": 4}}, "PBKDF": {"PBKDF2": 2}}, "crypto_scheme": {"MAC": {"MAC": 2}, "KEX": {"Key Exchange": 2}, "KA": {"Key Agreement": 1}}, "crypto_protocol": {"SSH": {"SSHv2": 13, "SSH": 48}, "TLS": {"SSL": {"SSL": 2, "SSL 2.0": 1, "SSL 3.0": 1}, "TLS": {"TLS": 55, "TLS 1.2": 2, "TLS 1.1": 2, "TLSv1.2": 5, "TLS 1.0": 1, "TLS1.1": 2, "TLS1.2": 2, "TLS v1.2": 5, "TLSv1.1": 1}, "DTLS": {"DTLS": 1}}, "IKE": {"IKE": 35, "IKEv2": 22}, "IPsec": {"IPsec": 102}, "VPN": {"VPN": 177}}, "randomness": {"PRNG": {"PRNG": 1, "DRBG": 4}, "RNG": {"RBG": 1}}, "cipher_mode": {"CBC": {"CBC": 5}, "GCM": {"GCM": 6}}, "ecc_curve": {"NIST": {"P-256": 14, "P-384": 10, "P-521": 14, "P-348": 2, "secp256r1": 3, "secp384r1": 4, "secp521r1": 4}}, "crypto_engine": {}, "tls_cipher_suite": {"TLS": {"TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 3, "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 3, "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256": 3, "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256": 3, "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 3, "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 3}}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {"FIPS": {"FIPS PUB 186-4": 10, "FIPS 140-2": 3, "FIPS PUB 140-2": 1, "FIPS PUB 186-3": 1, "FIPS PUB 198-1": 1, "FIPS PUB 180-4": 2}, "NIST": {"NIST SP 800-56A": 1, "NIST SP 800-90": 1}, "PKCS": {"PKCS #1": 1}, "RFC": {"RFC 5077": 1, "RFC 3526": 5, "RFC 3447": 2, "RFC 2818": 1, "RFC 4301": 1, "RFC 4303": 2, "RFC 3602": 3, "RFC 4106": 2, "RFC 5996": 2, "RFC 4868": 1, "RFC 5282": 1, "RFC 5114": 1, "RFC 4945": 1, "RFC 4253": 1, "RFC 5246": 9, "RFC 4346": 5, "RFC 3268": 4, "RFC 5289": 4, "RFC 6125": 1, "RFC 5280": 4, "RFC 6960": 1, "RFC 5759": 1, "RFC 2986": 1, "RFC 5735": 1, "RFC 3513": 3, "RFC 791": 4, "RFC 2460": 4, "RFC 793": 4, "RFC 768": 4, "RFC 792": 2, "RFC 4443": 2}, "ISO": {"ISO/IEC 9796-2": 1, "ISO/IEC 14888-3": 1, "ISO/IEC 18031:2011": 2}, "X509": {"X.509": 8}, "CC": {"CCMB-2017-04-001": 1, "CCMB-2017-04-002": 1, "CCMB-2017-04-003": 1, "CCMB-2017-04-004": 1}}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {}}, "cert_keywords": {"cc_cert_id": {"US": {"CCEVS-VR-VID11255-2022": 1}}, "cc_protection_profile_id": {}, "cc_security_level": {}, "cc_sar": {}, "cc_sfr": {}, "cc_claims": {}, "vendor": {"Cisco": {"Cisco Systems, Inc": 1, "Cisco": 1}}, "eval_facility": {"Gossamer": {"Gossamer Security": 1}}, "symmetric_crypto": {}, "asymmetric_crypto": {}, "pq_crypto": {}, "hash_function": {}, "crypto_scheme": {}, "crypto_protocol": {"VPN": {"VPN": 1}}, "randomness": {}, "cipher_mode": {}, "ecc_curve": {}, "crypto_engine": {}, "tls_cipher_suite": {}, "crypto_library": {}, "vulnerability": {}, "side_channel_analysis": {}, "technical_report_id": {}, "device_model": {}, "tee_name": {}, "os_name": {}, "cplc_data": {}, "ic_data_group": {}, "standard_id": {}, "javacard_version": {}, "javacard_api_const": {}, "javacard_packages": {}, "certification_process": {}}, "report_filename": "st_vid11255-vr.pdf", "st_filename": "st_vid11255-st.pdf", "cert_filename": "st_vid11255-ci.pdf"}, "heuristics": {"_type": "sec_certs.sample.cc_eucc_common.Heuristics", "extracted_versions": {"_type": "Set", "elements": ["9.16"]}, "cpe_matches": null, "verified_cpe_matches": null, "related_cves": null, "cert_lab": ["US"], "cert_id": "CCEVS-VR-VID-11255-2022", "prev_certificates": null, "next_certificates": null, "st_references": {"_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null}, "report_references": {"_type": "sec_certs.sample.certificate.References", "directly_referenced_by": null, "indirectly_referenced_by": null, "directly_referencing": null, "indirectly_referencing": null}, "annotated_references": null, "extracted_sars": {"_type": "Set", "elements": [{"_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMS", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "AGD_OPE", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ALC_CMC", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ADV_FSP", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "ATE_IND", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "AGD_PRE", "level": 1}, {"_type": "sec_certs.sample.sar.SAR", "family": "AVA_VAN", "level": 1}]}, "direct_transitive_cves": null, "indirect_transitive_cves": null, "scheme_data": {"product": "Cisco Adaptive Security Appliances (ASA) 9.16 on Firepower 1000 and 2100 Series", "id": "CCEVS-VR-VID11255", "url": "https://www.niap-ccevs.org/products/11255", "api_url": "https://www.niap-ccevs.org/api/project/product/pcl_products/11255/", "certification_date": "2022-07-15", "expiration_date": "2024-07-15", "category": "Firewall", "categories": ["Firewall", " Virtual Private Network"], "vendor": "Cisco Systems, Inc.", "evaluation_facility": "Gossamer Security Solutions", "scheme": "US"}, "protection_profiles": {"_type": "Set", "elements": ["bde3d7587cf42e78", "89f2a255423f4a20"]}, "eal": null}}