Pulse Connect Secure v9.1

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status archived
Valid from 30.03.2020
Valid until 30.03.2022
Scheme 🇺🇸 US
Manufacturer Pulse Secure, LLC
Category Network and Network-Related Devices and Systems
Security level

Heuristics summary ?

Certificate ?

Certification report ?

Security target ?

Heuristics ?

CPE matches

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2020-12880
C M N
MEDIUM 5.5 3.6 27.07.2020 23:15
CVE-2020-15352
C M N
HIGH 7.2 5.9 27.10.2020 05:15
CVE-2020-15408
C M N
MEDIUM 4.6 2.5 28.07.2020 15:15
CVE-2020-8204
C M N
MEDIUM 6.1 2.7 30.07.2020 13:15
CVE-2020-8206
C M N
HIGH 8.1 5.9 30.07.2020 13:15
CVE-2020-8216
C M N
MEDIUM 4.3 1.4 30.07.2020 13:15
CVE-2020-8217
C M N
MEDIUM 5.4 2.7 30.07.2020 13:15
CVE-2020-8218
C M N
HIGH 7.2 5.9 30.07.2020 13:15
CVE-2020-8219
C M N
HIGH 7.2 5.9 30.07.2020 13:15
CVE-2020-8220
C M N
MEDIUM 6.5 5.2 30.07.2020 13:15
CVE-2020-8221
C M N
MEDIUM 4.9 3.6 30.07.2020 13:15
CVE-2020-8222
C M N
MEDIUM 6.8 4.0 30.07.2020 13:15
CVE-2020-8238
C M N
MEDIUM 6.1 2.7 30.09.2020 18:15
CVE-2020-8243
C M N
HIGH 7.2 5.9 30.09.2020 18:15
CVE-2020-8256
C M N
MEDIUM 4.9 3.6 30.09.2020 18:15
CVE-2020-8261
C M N
MEDIUM 4.3 1.4 28.10.2020 13:15
CVE-2020-8262
C M N
MEDIUM 6.1 2.7 28.10.2020 13:15
CVE-2021-22893
C M N
CRITICAL 10.0 6.0 23.04.2021 17:15
CVE-2021-22894
C M N
HIGH 8.8 5.9 27.05.2021 12:15
CVE-2021-22899
C M N
HIGH 8.8 5.9 27.05.2021 12:15
CVE-2021-22900
C M N
HIGH 7.2 5.9 27.05.2021 12:15
CVE-2021-22908
C M N
HIGH 8.8 5.9 27.05.2021 12:15
CVE-2021-22933
C M N
MEDIUM 6.5 5.2 16.08.2021 19:15
CVE-2021-22934
C M N
HIGH 7.2 5.9 16.08.2021 19:15
CVE-2021-22935
C M N
HIGH 7.2 5.9 16.08.2021 19:15
CVE-2021-22936
C M N
MEDIUM 6.1 2.7 16.08.2021 19:15
CVE-2021-22937
C M N
HIGH 7.2 5.9 16.08.2021 19:15
CVE-2021-22938
C M N
HIGH 7.2 5.9 16.08.2021 19:15
CVE-2021-22965
C M N
HIGH 7.5 3.6 19.11.2021 19:15
CVE-2021-44720
C M N
HIGH 7.2 5.9 12.08.2022 15:15
CVE-2022-21826
C M N
MEDIUM 5.4 2.7 30.09.2022 17:15
CVE-2022-35254
C M N
HIGH 7.5 3.6 05.12.2022 22:15
CVE-2022-35258
C M N
HIGH 7.5 3.6 05.12.2022 22:15

Scheme data ?

Product Pulse Connect Secure v9.1
Id CCEVS-VR-VID11021
Url https://www.niap-ccevs.org/product/11021
Certification Date 2020-03-30T00:00:00Z
Expiration Date 2022-03-30T00:00:00Z
Category Network Device
Vendor Pulse Secure LLC
Evaluation Facility Acumen Security
Scheme US

References ?

No references are available for this certificate as its ID was not successfully extracted.

Updates ?

  • 21.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Pulse Connect Secure v9.1 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11021-ci.pdf",
  "dgst": "e6b05b9a16de4ebc",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": null,
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r7:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r4:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r6.0:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r8:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r9.0:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r9.2:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r8.1:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r11.5:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r8.2:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r5.0:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r4.0:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r3:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r1:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r10.0:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:-:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r8.0:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r14:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r12.1:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r9:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r15:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r8.4:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r11.0:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r13.1:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r12.2:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r11.4:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r7.0:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r4.3:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r4.1:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r10.2:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r13:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r2.0:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r2:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r11.1:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r3.0:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r11.3:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r5:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r4.2:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r9.1:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r12:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r1.0:*:*:*:*:*:*",
        "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.1:r6:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_sars": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "9.1"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2020-8219",
        "CVE-2020-12880",
        "CVE-2020-15352",
        "CVE-2020-8220",
        "CVE-2021-22908",
        "CVE-2021-22900",
        "CVE-2021-22935",
        "CVE-2021-22934",
        "CVE-2021-22937",
        "CVE-2022-35258",
        "CVE-2020-8262",
        "CVE-2020-8206",
        "CVE-2020-8217",
        "CVE-2021-44720",
        "CVE-2020-8218",
        "CVE-2020-8204",
        "CVE-2021-22933",
        "CVE-2020-8222",
        "CVE-2021-22938",
        "CVE-2020-8243",
        "CVE-2020-8256",
        "CVE-2022-35254",
        "CVE-2020-15408",
        "CVE-2020-8238",
        "CVE-2021-22936",
        "CVE-2020-8216",
        "CVE-2021-22894",
        "CVE-2020-8261",
        "CVE-2021-22893",
        "CVE-2021-22965",
        "CVE-2022-21826",
        "CVE-2020-8221",
        "CVE-2021-22899"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Network Device",
      "certification_date": "2020-03-30T00:00:00Z",
      "evaluation_facility": "Acumen Security",
      "expiration_date": "2022-03-30T00:00:00Z",
      "id": "CCEVS-VR-VID11021",
      "product": "Pulse Connect Secure v9.1",
      "scheme": "US",
      "url": "https://www.niap-ccevs.org/product/11021",
      "vendor": "Pulse Secure LLC"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Pulse Secure, LLC",
  "manufacturer_web": "https://www.pulsesecure.net",
  "name": "Pulse Connect Secure v9.1",
  "not_valid_after": "2022-03-30",
  "not_valid_before": "2020-03-30",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": null,
    "report_frontpage": null,
    "report_keywords": null,
    "report_metadata": null,
    "st_filename": null,
    "st_frontpage": null,
    "st_keywords": null,
    "st_metadata": null
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf",
        "pp_name": "collaborative Protection Profile for Network Devices v2.1"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid11021-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": []
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid11021-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    }
  },
  "status": "archived"
}