This page was not yet optimized for use on mobile devices.
Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4(watchOS 10.4 (build 21T216))
This certificate has known related CVEs, which means that
the certified
product might be vulnerable.
CSV information ?
Status | active |
---|---|
Valid from | 08.01.2025 |
Valid until | 08.01.2030 |
Scheme | 🇫🇷 FR |
Manufacturer | Apple Inc. |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | ADV_FSP.3, EAL2+, ALC_FLR.3 |
Heuristics summary ?
Certificate ?
Certification report ?
Security target ?
Heuristics ?
Extracted SARs
ADV_FSP.3, ALC_FLR.3CPE matches
Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-2024-23251 | MEDIUM | 4.6 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-23282 | MEDIUM | 5.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27800 | MEDIUM | 6.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27801 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27804 | MEDIUM | 5.5 | 3.6 | 14.05.2024 15:13 | ||
CVE-2024-27805 | MEDIUM | 5.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27806 | MEDIUM | 5.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27808 | HIGH | 8.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27810 | MEDIUM | 5.5 | 3.6 | 14.05.2024 15:13 | ||
CVE-2024-27811 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27814 | LOW | 2.4 | 1.4 | 10.06.2024 21:15 | ||
CVE-2024-27815 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27816 | MEDIUM | 5.5 | 3.6 | 14.05.2024 15:13 | ||
CVE-2024-27820 | HIGH | 8.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27821 | MEDIUM | 4.7 | 3.6 | 14.05.2024 15:13 | ||
CVE-2024-27823 | MEDIUM | 5.9 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27826 | HIGH | 7.8 | 5.9 | 29.07.2024 23:15 | ||
CVE-2024-27828 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27830 | MEDIUM | 6.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27832 | HIGH | 7.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27834 | MEDIUM | 5.5 | 3.6 | 14.05.2024 15:13 | ||
CVE-2024-27838 | MEDIUM | 6.5 | 3.6 | 10.06.2024 21:15 | ||
CVE-2024-27840 | MEDIUM | 6.3 | 4.0 | 10.06.2024 21:15 | ||
CVE-2024-27851 | HIGH | 8.8 | 5.9 | 10.06.2024 21:15 | ||
CVE-2024-27863 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-27880 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-27884 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40774 | HIGH | 7.1 | 5.2 | 29.07.2024 23:15 | ||
CVE-2024-40776 | MEDIUM | 4.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40777 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40779 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40780 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40782 | MEDIUM | 6.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40784 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40785 | MEDIUM | 6.1 | 2.7 | 29.07.2024 23:15 | ||
CVE-2024-40787 | HIGH | 7.1 | 5.2 | 29.07.2024 23:15 | ||
CVE-2024-40788 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40789 | MEDIUM | 6.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40793 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40795 | LOW | 3.3 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40799 | HIGH | 7.1 | 5.2 | 29.07.2024 23:15 | ||
CVE-2024-40805 | HIGH | 7.1 | 5.2 | 29.07.2024 23:15 | ||
CVE-2024-40806 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40809 | HIGH | 7.8 | 5.9 | 29.07.2024 23:15 | ||
CVE-2024-40812 | HIGH | 7.8 | 5.9 | 29.07.2024 23:15 | ||
CVE-2024-40813 | MEDIUM | 4.6 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40815 | HIGH | 7.5 | 5.9 | 29.07.2024 23:15 | ||
CVE-2024-40818 | MEDIUM | 4.6 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40822 | LOW | 2.4 | 1.4 | 29.07.2024 23:15 | ||
CVE-2024-40824 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40829 | MEDIUM | 4.6 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40835 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40836 | MEDIUM | 5.5 | 3.6 | 29.07.2024 23:15 | ||
CVE-2024-40850 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-40857 | MEDIUM | 6.1 | 2.7 | 17.09.2024 00:15 | ||
CVE-2024-44144 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44155 | MEDIUM | 6.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44169 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44170 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44171 | MEDIUM | 4.6 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44176 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44183 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44185 | MEDIUM | 5.5 | 3.6 | 24.10.2024 17:15 | ||
CVE-2024-44187 | MEDIUM | 6.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44191 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44194 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44198 | MEDIUM | 5.5 | 3.6 | 17.09.2024 00:15 | ||
CVE-2024-44212 | MEDIUM | 5.3 | 1.4 | 12.12.2024 02:15 | ||
CVE-2024-44215 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44225 | HIGH | 7.8 | 5.9 | 12.12.2024 02:15 | ||
CVE-2024-44232 | MEDIUM | 5.5 | 3.6 | 01.11.2024 21:15 | ||
CVE-2024-44233 | MEDIUM | 5.5 | 3.6 | 01.11.2024 21:15 | ||
CVE-2024-44234 | MEDIUM | 5.5 | 3.6 | 01.11.2024 21:15 | ||
CVE-2024-44239 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44240 | MEDIUM | 5.5 | 3.6 | 28.10.2024 22:15 | ||
CVE-2024-44244 | MEDIUM | 4.3 | 1.4 | 28.10.2024 21:15 | ||
CVE-2024-44254 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44255 | HIGH | 7.8 | 5.9 | 28.10.2024 21:15 | ||
CVE-2024-44269 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44273 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44274 | MEDIUM | 4.6 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44278 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44282 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44285 | HIGH | 7.8 | 5.9 | 28.10.2024 21:15 | ||
CVE-2024-44290 | LOW | 3.3 | 1.4 | 12.12.2024 02:15 | ||
CVE-2024-44296 | MEDIUM | 5.4 | 2.5 | 28.10.2024 21:15 | ||
CVE-2024-44297 | MEDIUM | 6.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-44302 | MEDIUM | 5.5 | 3.6 | 28.10.2024 21:15 | ||
CVE-2024-54479 | HIGH | 7.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54486 | MEDIUM | 6.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54494 | MEDIUM | 5.9 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54500 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54501 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54502 | MEDIUM | 6.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54505 | HIGH | 8.8 | 5.9 | 12.12.2024 02:15 | ||
CVE-2024-54508 | HIGH | 7.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54510 | MEDIUM | 5.1 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54513 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54514 | HIGH | 8.6 | 6.0 | 12.12.2024 02:15 | ||
CVE-2024-54526 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54527 | MEDIUM | 5.5 | 3.6 | 12.12.2024 02:15 | ||
CVE-2024-54534 | CRITICAL | 9.8 | 5.9 | 12.12.2024 02:15 | ||
CVE-2024-54535 | MEDIUM | 4.3 | 1.4 | 15.01.2025 20:15 | ||
CVE-2024-54538 | HIGH | 7.5 | 3.6 | 20.12.2024 01:15 |
Showing 5 out of 104.
Similar certificates
Showing 5 out of 8.
Scheme data ?
Product | Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4 (watchOS 10.4 (build 21T216)) | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-apple-watch-s9-running-watchos-104 | |
Description | Le produit évalué est « Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4, watchOS 10.4 (build 21T216) » développé par APPLE INC.. | |
Sponsor | APPLE INC. | |
Developer | APPLE INC. | |
Cert Id | ANSSI-CC-2024/41 | |
Level | EAL2+ | |
Expiration Date | 08.01.2030 | |
Enhanced | ||
Cert Id | ANSSI-CC-2024/41 | |
Certification Date | 08.01.2025 | |
Expiration Date | 08.01.2030 | |
Category | Divers | |
Cc Version | Critères Communs CC:2022 révision 1 | |
Developer | APPLE INC. | |
Sponsor | APPLE INC. | |
Evaluation Facility | THALES / CNES | |
Level | EAL2+ | |
Protection Profile | ||
Mutual Recognition | CCRA SOG-IS | |
Augmented | ADV_FSP.3, ALC_FLR.3 | |
Report Link | https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_41en.pdf | |
Target Link | https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-Cible-CC-2024_41en_0.pdf | |
Cert Link | https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2024_41en.pdf |
References ?
No references are available for this certificate as its ID was not successfully extracted.
Updates ?
-
27.01.2025 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4(watchOS 10.4 (build 21T216)) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2024_41fr.pdf",
"dgst": "e5bae93bf2719158",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": null,
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:apple:watchos:10.4:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"10.4"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2024-54513",
"CVE-2024-40806",
"CVE-2024-27838",
"CVE-2024-44254",
"CVE-2024-44302",
"CVE-2024-44232",
"CVE-2024-40777",
"CVE-2024-27801",
"CVE-2024-40795",
"CVE-2024-40812",
"CVE-2024-44244",
"CVE-2024-44297",
"CVE-2024-40836",
"CVE-2024-44282",
"CVE-2024-44144",
"CVE-2024-44225",
"CVE-2024-27811",
"CVE-2024-44191",
"CVE-2024-44278",
"CVE-2024-44269",
"CVE-2024-44215",
"CVE-2024-40809",
"CVE-2024-40815",
"CVE-2024-54494",
"CVE-2024-44170",
"CVE-2024-54514",
"CVE-2024-40813",
"CVE-2024-23251",
"CVE-2024-54510",
"CVE-2024-40779",
"CVE-2024-40824",
"CVE-2024-27821",
"CVE-2024-27834",
"CVE-2024-44274",
"CVE-2024-27832",
"CVE-2024-40857",
"CVE-2024-27863",
"CVE-2024-44171",
"CVE-2024-54508",
"CVE-2024-54526",
"CVE-2024-27830",
"CVE-2024-27820",
"CVE-2024-40818",
"CVE-2024-27806",
"CVE-2024-27804",
"CVE-2024-27805",
"CVE-2024-44296",
"CVE-2024-40799",
"CVE-2024-40850",
"CVE-2024-44285",
"CVE-2024-40788",
"CVE-2024-44239",
"CVE-2024-40785",
"CVE-2024-54500",
"CVE-2024-40805",
"CVE-2024-44234",
"CVE-2024-54486",
"CVE-2024-40780",
"CVE-2024-44194",
"CVE-2024-40784",
"CVE-2024-54534",
"CVE-2024-44183",
"CVE-2024-27814",
"CVE-2024-44176",
"CVE-2024-23282",
"CVE-2024-44187",
"CVE-2024-27800",
"CVE-2024-54535",
"CVE-2024-27851",
"CVE-2024-44233",
"CVE-2024-44273",
"CVE-2024-27884",
"CVE-2024-44198",
"CVE-2024-54538",
"CVE-2024-44169",
"CVE-2024-54501",
"CVE-2024-27880",
"CVE-2024-27828",
"CVE-2024-44255",
"CVE-2024-27810",
"CVE-2024-27808",
"CVE-2024-54502",
"CVE-2024-27816",
"CVE-2024-44290",
"CVE-2024-27815",
"CVE-2024-40787",
"CVE-2024-54505",
"CVE-2024-40793",
"CVE-2024-40789",
"CVE-2024-40782",
"CVE-2024-40829",
"CVE-2024-40776",
"CVE-2024-40822",
"CVE-2024-54527",
"CVE-2024-40774",
"CVE-2024-54479",
"CVE-2024-40835",
"CVE-2024-27826",
"CVE-2024-44155",
"CVE-2024-27840",
"CVE-2024-44240",
"CVE-2024-44212",
"CVE-2024-44185",
"CVE-2024-27823"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "ANSSI-CC-2024/41",
"description": "Le produit \u00e9valu\u00e9 est \u00ab Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4, watchOS 10.4 (build 21T216) \u00bb d\u00e9velopp\u00e9 par APPLE INC..",
"developer": "APPLE INC.",
"enhanced": {
"augmented": "ADV_FSP.3, ALC_FLR.3",
"category": "Divers",
"cc_version": "Crit\u00e8res Communs CC:2022 r\u00e9vision 1",
"cert_id": "ANSSI-CC-2024/41",
"cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2024_41en.pdf",
"certification_date": "2025-01-08",
"developer": "APPLE INC.",
"evaluation_facility": "THALES / CNES",
"expiration_date": "2030-01-08",
"level": "EAL2+",
"mutual_recognition": "CCRA SOG-IS",
"protection_profile": "",
"report_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_41en.pdf",
"sponsor": "APPLE INC.",
"target_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-Cible-CC-2024_41en_0.pdf"
},
"expiration_date": "2030-01-08",
"level": "EAL2+",
"product": "Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4 (watchOS 10.4 (build 21T216))",
"sponsor": "APPLE INC.",
"url": "https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-apple-watch-s9-running-watchos-104"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Apple Inc.",
"manufacturer_web": "https://www.apple.com/",
"name": "Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4(watchOS 10.4 (build 21T216))",
"not_valid_after": "2030-01-08",
"not_valid_before": "2025-01-08",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": null,
"report_frontpage": null,
"report_keywords": null,
"report_metadata": null,
"st_filename": null,
"st_frontpage": null,
"st_keywords": null,
"st_metadata": null
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_41fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL2+",
"ALC_FLR.3",
"ADV_FSP.3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2024_41en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
}
},
"status": "active"
}