Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4(watchOS 10.4 (build 21T216))

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status active
Valid from 08.01.2025
Valid until 08.01.2030
Scheme 🇫🇷 FR
Manufacturer Apple Inc.
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ADV_FSP.3, EAL2+, ALC_FLR.3

Heuristics summary ?

Certificate ?

Certification report ?

Security target ?

Heuristics ?

Extracted SARs

ADV_FSP.3, ALC_FLR.3

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2024-23251
C M N
MEDIUM 4.6 3.6 10.06.2024 21:15
CVE-2024-23282
C M N
MEDIUM 5.5 3.6 10.06.2024 21:15
CVE-2024-27800
C M N
MEDIUM 6.5 3.6 10.06.2024 21:15
CVE-2024-27801
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27804
C M N
MEDIUM 5.5 3.6 14.05.2024 15:13
CVE-2024-27805
C M N
MEDIUM 5.5 3.6 10.06.2024 21:15
CVE-2024-27806
C M N
MEDIUM 5.5 3.6 10.06.2024 21:15
CVE-2024-27808
C M N
HIGH 8.8 5.9 10.06.2024 21:15
CVE-2024-27810
C M N
MEDIUM 5.5 3.6 14.05.2024 15:13
CVE-2024-27811
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27814
C M N
LOW 2.4 1.4 10.06.2024 21:15
CVE-2024-27815
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27816
C M N
MEDIUM 5.5 3.6 14.05.2024 15:13
CVE-2024-27820
C M N
HIGH 8.8 5.9 10.06.2024 21:15
CVE-2024-27821
C M N
MEDIUM 4.7 3.6 14.05.2024 15:13
CVE-2024-27823
C M N
MEDIUM 5.9 3.6 29.07.2024 23:15
CVE-2024-27826
C M N
HIGH 7.8 5.9 29.07.2024 23:15
CVE-2024-27828
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27830
C M N
MEDIUM 6.5 3.6 10.06.2024 21:15
CVE-2024-27832
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27834
C M N
MEDIUM 5.5 3.6 14.05.2024 15:13
CVE-2024-27838
C M N
MEDIUM 6.5 3.6 10.06.2024 21:15
CVE-2024-27840
C M N
MEDIUM 6.3 4.0 10.06.2024 21:15
CVE-2024-27851
C M N
HIGH 8.8 5.9 10.06.2024 21:15
CVE-2024-27863
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-27880
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-27884
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40774
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40776
C M N
MEDIUM 4.3 1.4 29.07.2024 23:15
CVE-2024-40777
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40779
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40780
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40782
C M N
MEDIUM 6.5 3.6 29.07.2024 23:15
CVE-2024-40784
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40785
C M N
MEDIUM 6.1 2.7 29.07.2024 23:15
CVE-2024-40787
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40788
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40789
C M N
MEDIUM 6.5 3.6 29.07.2024 23:15
CVE-2024-40793
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40795
C M N
LOW 3.3 1.4 29.07.2024 23:15
CVE-2024-40799
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40805
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40806
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40809
C M N
HIGH 7.8 5.9 29.07.2024 23:15
CVE-2024-40812
C M N
HIGH 7.8 5.9 29.07.2024 23:15
CVE-2024-40813
C M N
MEDIUM 4.6 3.6 29.07.2024 23:15
CVE-2024-40815
C M N
HIGH 7.5 5.9 29.07.2024 23:15
CVE-2024-40818
C M N
MEDIUM 4.6 3.6 29.07.2024 23:15
CVE-2024-40822
C M N
LOW 2.4 1.4 29.07.2024 23:15
CVE-2024-40824
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40829
C M N
MEDIUM 4.6 3.6 29.07.2024 23:15
CVE-2024-40835
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40836
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40850
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40857
C M N
MEDIUM 6.1 2.7 17.09.2024 00:15
CVE-2024-44144
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44155
C M N
MEDIUM 6.5 3.6 28.10.2024 21:15
CVE-2024-44169
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44170
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44171
C M N
MEDIUM 4.6 3.6 17.09.2024 00:15
CVE-2024-44176
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44183
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44185
C M N
MEDIUM 5.5 3.6 24.10.2024 17:15
CVE-2024-44187
C M N
MEDIUM 6.5 3.6 17.09.2024 00:15
CVE-2024-44191
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44194
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44198
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44212
C M N
MEDIUM 5.3 1.4 12.12.2024 02:15
CVE-2024-44215
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44225
C M N
HIGH 7.8 5.9 12.12.2024 02:15
CVE-2024-44232
C M N
MEDIUM 5.5 3.6 01.11.2024 21:15
CVE-2024-44233
C M N
MEDIUM 5.5 3.6 01.11.2024 21:15
CVE-2024-44234
C M N
MEDIUM 5.5 3.6 01.11.2024 21:15
CVE-2024-44239
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44240
C M N
MEDIUM 5.5 3.6 28.10.2024 22:15
CVE-2024-44244
C M N
MEDIUM 4.3 1.4 28.10.2024 21:15
CVE-2024-44254
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44255
C M N
HIGH 7.8 5.9 28.10.2024 21:15
CVE-2024-44269
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44273
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44274
C M N
MEDIUM 4.6 3.6 28.10.2024 21:15
CVE-2024-44278
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44282
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44285
C M N
HIGH 7.8 5.9 28.10.2024 21:15
CVE-2024-44290
C M N
LOW 3.3 1.4 12.12.2024 02:15
CVE-2024-44296
C M N
MEDIUM 5.4 2.5 28.10.2024 21:15
CVE-2024-44297
C M N
MEDIUM 6.5 3.6 28.10.2024 21:15
CVE-2024-44302
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-54479
C M N
HIGH 7.5 3.6 12.12.2024 02:15
CVE-2024-54486
C M N
MEDIUM 6.5 3.6 12.12.2024 02:15
CVE-2024-54494
C M N
MEDIUM 5.9 3.6 12.12.2024 02:15
CVE-2024-54500
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54501
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54502
C M N
MEDIUM 6.5 3.6 12.12.2024 02:15
CVE-2024-54505
C M N
HIGH 8.8 5.9 12.12.2024 02:15
CVE-2024-54508
C M N
HIGH 7.5 3.6 12.12.2024 02:15
CVE-2024-54510
C M N
MEDIUM 5.1 3.6 12.12.2024 02:15
CVE-2024-54513
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54514
C M N
HIGH 8.6 6.0 12.12.2024 02:15
CVE-2024-54526
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54527
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54534
C M N
CRITICAL 9.8 5.9 12.12.2024 02:15
CVE-2024-54535
C M N
MEDIUM 4.3 1.4 15.01.2025 20:15
CVE-2024-54538
C M N
HIGH 7.5 3.6 20.12.2024 01:15
Showing 5 out of 104.

Scheme data ?

Product Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4 (watchOS 10.4 (build 21T216))
Url https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-apple-watch-s9-running-watchos-104
Description Le produit évalué est « Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4, watchOS 10.4 (build 21T216) » développé par APPLE INC..
Sponsor APPLE INC.
Developer APPLE INC.
Cert Id ANSSI-CC-2024/41
Level EAL2+
Expiration Date 08.01.2030
Enhanced
Cert Id ANSSI-CC-2024/41
Certification Date 08.01.2025
Expiration Date 08.01.2030
Category Divers
Cc Version Critères Communs CC:2022 révision 1
Developer APPLE INC.
Sponsor APPLE INC.
Evaluation Facility THALES / CNES
Level EAL2+
Protection Profile
Mutual Recognition CCRA SOG-IS
Augmented ADV_FSP.3, ALC_FLR.3
Report Link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_41en.pdf
Target Link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-Cible-CC-2024_41en_0.pdf
Cert Link https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2024_41en.pdf

References ?

No references are available for this certificate as its ID was not successfully extracted.

Updates ?

  • 27.01.2025 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4(watchOS 10.4 (build 21T216)) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2024_41fr.pdf",
  "dgst": "e5bae93bf2719158",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": null,
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:o:apple:watchos:10.4:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "10.4"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2024-54513",
        "CVE-2024-40806",
        "CVE-2024-27838",
        "CVE-2024-44254",
        "CVE-2024-44302",
        "CVE-2024-44232",
        "CVE-2024-40777",
        "CVE-2024-27801",
        "CVE-2024-40795",
        "CVE-2024-40812",
        "CVE-2024-44244",
        "CVE-2024-44297",
        "CVE-2024-40836",
        "CVE-2024-44282",
        "CVE-2024-44144",
        "CVE-2024-44225",
        "CVE-2024-27811",
        "CVE-2024-44191",
        "CVE-2024-44278",
        "CVE-2024-44269",
        "CVE-2024-44215",
        "CVE-2024-40809",
        "CVE-2024-40815",
        "CVE-2024-54494",
        "CVE-2024-44170",
        "CVE-2024-54514",
        "CVE-2024-40813",
        "CVE-2024-23251",
        "CVE-2024-54510",
        "CVE-2024-40779",
        "CVE-2024-40824",
        "CVE-2024-27821",
        "CVE-2024-27834",
        "CVE-2024-44274",
        "CVE-2024-27832",
        "CVE-2024-40857",
        "CVE-2024-27863",
        "CVE-2024-44171",
        "CVE-2024-54508",
        "CVE-2024-54526",
        "CVE-2024-27830",
        "CVE-2024-27820",
        "CVE-2024-40818",
        "CVE-2024-27806",
        "CVE-2024-27804",
        "CVE-2024-27805",
        "CVE-2024-44296",
        "CVE-2024-40799",
        "CVE-2024-40850",
        "CVE-2024-44285",
        "CVE-2024-40788",
        "CVE-2024-44239",
        "CVE-2024-40785",
        "CVE-2024-54500",
        "CVE-2024-40805",
        "CVE-2024-44234",
        "CVE-2024-54486",
        "CVE-2024-40780",
        "CVE-2024-44194",
        "CVE-2024-40784",
        "CVE-2024-54534",
        "CVE-2024-44183",
        "CVE-2024-27814",
        "CVE-2024-44176",
        "CVE-2024-23282",
        "CVE-2024-44187",
        "CVE-2024-27800",
        "CVE-2024-54535",
        "CVE-2024-27851",
        "CVE-2024-44233",
        "CVE-2024-44273",
        "CVE-2024-27884",
        "CVE-2024-44198",
        "CVE-2024-54538",
        "CVE-2024-44169",
        "CVE-2024-54501",
        "CVE-2024-27880",
        "CVE-2024-27828",
        "CVE-2024-44255",
        "CVE-2024-27810",
        "CVE-2024-27808",
        "CVE-2024-54502",
        "CVE-2024-27816",
        "CVE-2024-44290",
        "CVE-2024-27815",
        "CVE-2024-40787",
        "CVE-2024-54505",
        "CVE-2024-40793",
        "CVE-2024-40789",
        "CVE-2024-40782",
        "CVE-2024-40829",
        "CVE-2024-40776",
        "CVE-2024-40822",
        "CVE-2024-54527",
        "CVE-2024-40774",
        "CVE-2024-54479",
        "CVE-2024-40835",
        "CVE-2024-27826",
        "CVE-2024-44155",
        "CVE-2024-27840",
        "CVE-2024-44240",
        "CVE-2024-44212",
        "CVE-2024-44185",
        "CVE-2024-27823"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "ANSSI-CC-2024/41",
      "description": "Le produit \u00e9valu\u00e9 est \u00ab Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4, watchOS 10.4 (build 21T216) \u00bb d\u00e9velopp\u00e9 par APPLE INC..",
      "developer": "APPLE INC.",
      "enhanced": {
        "augmented": "ADV_FSP.3, ALC_FLR.3",
        "category": "Divers",
        "cc_version": "Crit\u00e8res Communs CC:2022 r\u00e9vision 1",
        "cert_id": "ANSSI-CC-2024/41",
        "cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2024_41en.pdf",
        "certification_date": "2025-01-08",
        "developer": "APPLE INC.",
        "evaluation_facility": "THALES / CNES",
        "expiration_date": "2030-01-08",
        "level": "EAL2+",
        "mutual_recognition": "CCRA SOG-IS",
        "protection_profile": "",
        "report_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_41en.pdf",
        "sponsor": "APPLE INC.",
        "target_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-Cible-CC-2024_41en_0.pdf"
      },
      "expiration_date": "2030-01-08",
      "level": "EAL2+",
      "product": "Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4 (watchOS 10.4 (build 21T216))",
      "sponsor": "APPLE INC.",
      "url": "https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-apple-watch-s9-running-watchos-104"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Apple Inc.",
  "manufacturer_web": "https://www.apple.com/",
  "name": "Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4(watchOS 10.4 (build 21T216))",
  "not_valid_after": "2030-01-08",
  "not_valid_before": "2025-01-08",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": null,
    "report_frontpage": null,
    "report_keywords": null,
    "report_metadata": null,
    "st_filename": null,
    "st_frontpage": null,
    "st_keywords": null,
    "st_metadata": null
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_41fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2+",
      "ALC_FLR.3",
      "ADV_FSP.3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2024_41en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    }
  },
  "status": "active"
}