This page was not yet optimized for use on mobile
devices.
Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 14 - Spring
Known vulnerabilities detected
Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.CSV information
| Status | active |
|---|---|
| Valid from | 06.05.2024 |
| Valid until | 06.05.2026 |
| Scheme | 🇺🇸 US |
| Manufacturer | Samsung Electronics Co., Ltd. |
| Category | Mobility |
| Security level | |
| Protection profiles |
|
Heuristics summary
Certificate ID: CCEVS-VR-VID-11444-2024
Certificate
Extracted keywords
Protocols
TLS, VPNVendor
SamsungCertificates
CCEVS-VR-VID11444-2024Evaluation facilities
Gossamer SecurityFile metadata
| Creation date | D:20240510111710-04'00' |
|---|---|
| Modification date | D:20240510111710-04'00' |
| Pages | 1 |
| Producer | iText 2.1.0 (by lowagie.com) |
Certification report
Extracted keywords
Protocols
TLS, IPsec, VPNVendor
Samsung, QualcommCertificates
CCEVS-VR-VID11444-2024Evaluation facilities
Gossamer SecurityFile metadata
| Author | comptont |
|---|---|
| Creation date | D:20240510110726-04'00' |
| Modification date | D:20240510110726-04'00' |
| Pages | 18 |
| Creator | Microsoft® Word 2019 |
| Producer | Microsoft® Word 2019 |
Frontpage
| Certificate ID | CCEVS-VR-VID11444-2024 |
|---|---|
| Certified item | Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 14 - Spring |
| Certification lab | US NIAP |
Security target
Extracted keywords
Symmetric Algorithms
AES, AES-, AES-128, AES-256, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512Asymmetric Algorithms
RSA 2048, ECDH, ECDHE, ECDSA, ECC, DH, Diffie-Hellman, DHEHash functions
SHA-1, SHA-256, SHA-384, SHA-512, scrypt, PBKDF2Schemes
MACProtocols
TLS, TLS 1.2, TLS 1.1, IKE, IKEv2, IPsec, VPNRandomness
DRBG, RNG, RBGLibraries
BoringSSLElliptic Curves
P-384, P-256, P-521, secp256r1, secp384r1Block cipher modes
CBC, CTR, GCM, CCM, XTSTLS cipher suites
TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHATrusted Execution Environments
TrustZone, SE, TEEVendor
Samsung, Qualcomm, BroadcomClaims
OE.CONFIG, OE.NOTIFY, OE.PRECAUTION, OE.DATA_PROPER_USER, OE.NO_TOE_BYPASS, OE.TRUSTED_ADMIN, OE.PROTECTION, OE.PHYSICAL, OE.TRUSTED_CONFIGSecurity Assurance Requirements (SAR)
ADV_FSP, ADV_FSP.1, AGD_OPE, AGD_OPE.1, AGD_PRE, AGD_PRE.1, ALC_TSU_EXT, ALC_CMC, ALC_CMC.1, ALC_CMS, ALC_CMS.1, ALC_TSU_EXT.1, ATE_IND, ATE_IND.1, AVA_VAN, AVA_VAN.1Security Functional Requirements (SFR)
FAU_GEN, FAU_SAR, FAU_STG, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.4.1, FAU_GEN.1, FAU_SAR.1, FAU_STG.1, FAU_STG.4, FCS_COP.1, FCS_COP, FCS_CKM_EXT, FCS_RBG_EXT, FCS_SRV_EXT, FCS_STG_EXT, FCS_TLS_EXT, FCS_TLSC_EXT, FCS_WPA_EXT, FCS_CKM, FCS_CKM.1.1, FCS_CKM.1, FCS_RBG_EXT.1, FCS_CKM.2, FCS_CKM_EXT.1.1, FCS_CKM_EXT.1.2, FCS_CKM_EXT.1.3, FCS_CKM_EXT.2.1, FCS_CKM_EXT.3.1, FCS_CKM_EXT.3.2, FCS_CKM_EXT.4.1, FCS_CKM_EXT.4.2, FCS_CKM_EXT.5.1, FCS_CKM_EXT.5.2, FCS_CKM_EXT.6.1, FCS_CKM_EXT.8.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_RBG_EXT.1.3, FCS_RBG_EXT.2.1, FCS_SRV_EXT.1.1, FCS_SRV_EXT.2.1, FCS_STG_EXT.1.1, FCS_STG_EXT.1.2, FCS_STG_EXT.1.3, FCS_STG_EXT.1.4, FCS_STG_EXT.1.5, FCS_STG_EXT.2.1, FCS_STG_EXT.2.2, FCS_STG_EXT.3.1, FCS_STG_EXT.2, FCS_STG_EXT.3.2, FCS_TLS_EXT.1.1, FCS_TLSC_EXT.1.1, FCS_TLSC_EXT.1.2, FCS_TLSC_EXT.1.3, FCS_TLSC_EXT.1, FCS_TLSC_EXT.2.1, FCS_TLSC_EXT.2, FCS_TLSC_EXT.4.1, FCS_TLSC_EXT.5.1, FCS_TLSS_EXT.1.1, FCS_WPA_EXT.1, FCS_CKM_EXT.8, FCS_STG_EXT.1, FCS_STG_EXT.3, FCS_CKM_EXT.1, FCS_CKM_EXT.2, FCS_CKM_EXT.3, FCS_CKM_EXT.4, FCS_CKM_EXT.5, FCS_CKM_EXT.6, FCS_RBG_EXT.2, FCS_SRV_EXT.1, FCS_TLSC_EXT.4, FCS_TLSC_EXT.5, FDP_ACC.1, FDP_ACF_EXT, FDP_DAR_EXT, FDP_IFC_EXT, FDP_PBA_EXT, FDP_STG_EXT, FDP_UPC_EXT, FDP_VPN_EXT, FDP_RIP, FDP_ACF_EXT.1.1, FDP_ACF_EXT.1.2, FDP_ACF_EXT.2.1, FDP_ACF_EXT.3.1, FDP_DAR_EXT.1.1, FDP_DAR_EXT.1.2, FDP_DAR_EXT.2.1, FDP_DAR_EXT.2.2, FDP_DAR_EXT.2.3, FDP_DAR_EXT.2.4, FDP_IFC_EXT.1.1, FDP_RIP.2.1, FDP_STG_EXT.1.1, FDP_UPC_EXT.1, FDP_VPN_EXT.1.1, FDP_DAR_EXT.2, FDP_STG_EXT.1, FDP_ACF_EXT.1, FDP_ACF_EXT.3, FDP_DAR_EXT.1, FDP_IFC_EXT.1, FDP_RIP.2, FIA_AFL_EXT, FIA_BLT_EXT, FIA_BMG_EXT, FIA_PAE_EXT, FIA_PMG_EXT, FIA_TRT_EXT, FIA_UAU_EXT, FIA_MBE_EXT.1, FIA_MBE_EXT.2, FIA_MBV_EXT, FIA_MBV_EXT.1, FIA_MBV_EXT.2, FIA_BMG_EXT.1, FIA_UAU, FIA_AFL_EXT.1.1, FIA_AFL_EXT.1.2, FIA_AFL_EXT.1.3, FIA_AFL_EXT.1.4, FIA_AFL_EXT.1.5, FIA_AFL_EXT.1.6, FIA_BLT_EXT.1.1, FIA_BLT_EXT.2.1, FIA_BLT_EXT.3.1, FIA_BLT_EXT.4.1, FIA_BLT_EXT.4.2, FIA_BLT_EXT.6.1, FIA_BLT_EXT.7.1, FIA_MBE_EXT, FIA_MBE_EXT.1.1, FIA_MBE_EXT.2.1, FIA_MBV_EXT.2.1, FIA_PAE_EXT.1.1, FIA_PMG_EXT.1.1, FIA_TRT_EXT.1.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_UAU.7.1, FIA_UAU_EXT.1.1, FIA_UAU_EXT.2.1, FIA_UAU_EXT.2.2, FIA_UAU_EXT.4.1, FIA_UAU_EXT.4.2, FIA_BLT_EXT.1, FIA_BLT_EXT.2, FIA_AFL_EXT.1, FIA_BLT_EXT.3, FIA_BLT_EXT.4, FIA_BLT_EXT.6, FIA_BLT_EXT.7, FIA_PAE_EXT.1, FIA_PMG_EXT.1, FIA_TRT_EXT.1, FIA_UAU.5, FIA_UAU.7, FIA_UAU_EXT.1, FIA_UAU_EXT.2, FIA_UAU_EXT.4, FMT_MOF_EXT, FMT_SMF, FMT_SMF_EXT, FMT_SMF_EXT.3, FMT_MOF_EXT.1.1, FMT_MOF_EXT.1.2, FMT_SMF.1.1, FMT_SMF_EXT.1, FMT_SMF.1, FMT_SMF_EXT.2.1, FMT_SMF_EXT.3.1, FMT_MOF_EXT.1, FMT_SMF_EXT.2, FPT_AEX_EXT, FPT_BBD_EXT, FPT_JTA_EXT, FPT_KST_EXT, FPT_NOT_EXT, FPT_TST_EXT, FPT_TUD_EXT, FPT_BDP_EXT.1, FPT_PBT_EXT.1, FPT_KST_EXT.1, FPT_KST_EXT.2, FPT_STM, FPT_AEX_EXT.1.1, FPT_AEX_EXT.1.2, FPT_AEX_EXT.2.1, FPT_AEX_EXT.3.1, FPT_AEX_EXT.4.1, FPT_AEX_EXT.4.2, FPT_AEX_EXT.5.1, FPT_AEX_EXT.5.2, FPT_AEX_EXT.6.1, FPT_BBD_EXT.1.1, FPT_BDP_EXT.1.1, FPT_BDP_EXT.1.2, FPT_JTA_EXT.1.1, FPT_KST_EXT.1.1, FPT_KST_EXT.2.1, FPT_KST_EXT.3.1, FPT_NOT_EXT.1.1, FPT_PBT_EXT.1.1, FPT_STM.1.1, FPT_TST_EXT.1.1, FPT_TST_EXT.3, FPT_TST_EXT.1, FPT_TST_EXT.2, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_TUD_EXT.2.1, FPT_TUD_EXT.2.2, FPT_TUD_EXT.2.3, FPT_TUD_EXT.3.1, FPT_TUD_EXT.6.1, FPT_TUD_EXT.2, FPT_AEX_EXT.1, FPT_AEX_EXT.2, FPT_AEX_EXT.3, FPT_AEX_EXT.4, FPT_AEX_EXT.5, FPT_BBD_EXT.1, FPT_JTA_EXT.1, FPT_KST_EXT.3, FPT_NOT_EXT.1, FPT_STM.1, FPT_TUD_EXT.1, FPT_TUD_EXT.3, FPT_TUD_EXT.6, FTA_SSL_EXT, FTA_WSE_EXT, FTA_TAB, FTA_SSL_EXT.1.1, FTA_SSL_EXT.1.2, FTA_SSL_EXT.1.3, FTA_TAB.1.1, FTA_WSE_EXT.1.1, FTA_WSE_EXT.1, FTA_SSL_EXT.1, FTA_TAB.1, FTP_ITC_EXT, FTP_BLT_EXT, FTP_BLT_EXT.1.1, FTP_BLT_EXT.1.2, FTP_BLT_EXT.2.1, FTP_BLT_EXT.3, FTP_ITC_EXT.1.1, FTP_ITC_EXT.1.2, FTP_ITC_EXT.1.3, FTP_ITC_EXT.1, FTP_ITC, FTP_BLT_EXT.1, FTP_BLT_EXT.2Standards
FIPS PUB 186-4, FIPS PUB 197, FIPS 186-4, FIPS 197, FIPS 198-1, FIPS 180-4, SP 800-108, NIST SP 800-38A, NIST SP 800-38C, NIST SP 800-38D, NIST SP 800-38F, NIST SP 800-38E, NIST SP 800-132, NIST SP 800-57, SP 800-38F, SP 800-56A, SP 800-90A, SP 800-38A, SP 800-38E, SP 800-38C, PKCS#12, PKCS 2, RFC 3394, RFC 2818, RFC 4301, RFC 4303, RFC 4106, RFC 3602, RFC 8784, RFC 8247, RFC 6379, RFC 5282, RFC 4945, RFC 5246, RFC 5288, RFC 5289, RFC 6125, RFC 4346, RFC 5216, RFC 5746, RFC 5280, RFC 6960, RFC 8603, RFC 3526, RFC 2560, X.509File metadata
| Title | Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 14 Spring - Security Target |
|---|---|
| Author | Ranjit Mallela |
| Creation date | D:20240510111440-04'00' |
| Modification date | D:20240510111440-04'00' |
| Pages | 96 |
| Creator | Microsoft® Word 2019 |
| Producer | Microsoft® Word 2019 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
CCEVS-VR-VID-11444-2024Extracted SARs
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ALC_TSU_EXT.1, ATE_IND.1, AVA_VAN.1CPE matches
- cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-apr-2025-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-aug-2025-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-dec-2024-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-feb-2025-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-jan-2025-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-jul-2025-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-jun-2025-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-mar-2025-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-may-2025-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-nov-2024-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-oct-2024-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-sep-2024-r1:*:*:*:*:*:*
- cpe:2.3:o:samsung:android:14.0:smr-sep-2025-r1:*:*:*:*:*:*
Related CVEs
| ID | Links | Severity | CVSS Score | Published on | ||
|---|---|---|---|---|---|---|
| Base | Exploitability | Impact | ||||
| CVE-2023-42556 | MEDIUM | 5.5 | 3.6 | 05.12.2023 | ||
| CVE-2023-42557 | MEDIUM | 6.7 | 5.9 | 05.12.2023 | ||
| CVE-2023-42559 | MEDIUM | 5.2 | 4.2 | 05.12.2023 | ||
| CVE-2023-42560 | HIGH | 7.8 | 5.9 | 05.12.2023 | ||
| CVE-2023-42561 | MEDIUM | 6.8 | 5.9 | 05.12.2023 | ||
| CVE-2023-42562 | HIGH | 7.8 | 5.9 | 05.12.2023 | ||
| CVE-2023-42563 | HIGH | 7.8 | 5.9 | 05.12.2023 | ||
| CVE-2023-42564 | MEDIUM | 5.5 | 3.6 | 05.12.2023 | ||
| CVE-2023-42565 | MEDIUM | 6.7 | 5.9 | 05.12.2023 | ||
| CVE-2023-42566 | HIGH | 7.8 | 5.9 | 05.12.2023 | ||
| CVE-2023-42567 | HIGH | 7.8 | 5.9 | 05.12.2023 | ||
| CVE-2023-42570 | LOW | 3.3 | 1.4 | 05.12.2023 | ||
| CVE-2023-52432 | HIGH | 7.1 | 5.2 | 05.03.2024 | ||
| CVE-2024-20803 | MEDIUM | 6.5 | 3.6 | 04.01.2024 | ||
| CVE-2024-20806 | MEDIUM | 5.5 | 3.6 | 04.01.2024 | ||
| CVE-2024-20811 | LOW | 3.3 | 1.4 | 06.02.2024 | ||
| CVE-2024-20812 | HIGH | 7.8 | 5.9 | 06.02.2024 | ||
| CVE-2024-20813 | HIGH | 7.8 | 5.9 | 06.02.2024 | ||
| CVE-2024-20814 | MEDIUM | 5.5 | 3.6 | 06.02.2024 | ||
| CVE-2024-20815 | MEDIUM | 6.5 | 3.6 | 06.02.2024 | ||
| CVE-2024-20816 | MEDIUM | 6.5 | 3.6 | 06.02.2024 | ||
| CVE-2024-20817 | HIGH | 7.8 | 5.9 | 06.02.2024 | ||
| CVE-2024-20818 | HIGH | 7.8 | 5.9 | 06.02.2024 | ||
| CVE-2024-20819 | HIGH | 7.8 | 5.9 | 06.02.2024 | ||
| CVE-2024-20830 | MEDIUM | 5.3 | 3.4 | 05.03.2024 | ||
| CVE-2024-20831 | MEDIUM | 6.7 | 5.9 | 05.03.2024 | ||
| CVE-2024-20832 | MEDIUM | 6.7 | 5.9 | 05.03.2024 | ||
| CVE-2024-20833 | MEDIUM | 6.4 | 5.9 | 05.03.2024 | ||
| CVE-2024-20834 | LOW | 3.3 | 1.4 | 05.03.2024 | ||
| CVE-2024-20835 | HIGH | 7.8 | 5.9 | 05.03.2024 | ||
| CVE-2024-20836 | MEDIUM | 5.5 | 3.6 | 05.03.2024 | ||
| CVE-2024-20842 | MEDIUM | 6.7 | 5.9 | 02.04.2024 | ||
| CVE-2024-20843 | MEDIUM | 6.7 | 5.9 | 02.04.2024 | ||
| CVE-2024-20847 | LOW | 3.3 | 1.4 | 02.04.2024 | ||
| CVE-2024-20848 | HIGH | 7.8 | 5.9 | 02.04.2024 | ||
| CVE-2024-20849 | HIGH | 7.8 | 5.9 | 02.04.2024 | ||
| CVE-2024-20855 | LOW | 2.4 | 1.4 | 07.05.2024 | ||
| CVE-2024-20856 | MEDIUM | 4.3 | 3.6 | 07.05.2024 | ||
| CVE-2024-20857 | MEDIUM | 5.5 | 3.6 | 07.05.2024 | ||
| CVE-2024-20858 | MEDIUM | 5.5 | 3.6 | 07.05.2024 | ||
| CVE-2024-20859 | MEDIUM | 5.5 | 3.6 | 07.05.2024 | ||
| CVE-2024-20860 | LOW | 3.3 | 1.4 | 07.05.2024 | ||
| CVE-2024-20861 | MEDIUM | 6.7 | 5.9 | 07.05.2024 | ||
| CVE-2024-20862 | MEDIUM | 6.7 | 5.9 | 07.05.2024 | ||
| CVE-2024-20863 | MEDIUM | 6.7 | 5.9 | 07.05.2024 | ||
| CVE-2024-20864 | MEDIUM | 5.5 | 3.6 | 07.05.2024 | ||
| CVE-2024-20865 | MEDIUM | 6.8 | 5.9 | 07.05.2024 | ||
| CVE-2024-20874 | HIGH | 7.8 | 5.9 | 04.06.2024 | ||
| CVE-2024-20875 | MEDIUM | 5.5 | 3.6 | 04.06.2024 | ||
| CVE-2024-20876 | HIGH | 7.8 | 5.9 | 04.06.2024 | ||
| CVE-2024-20877 | HIGH | 7.8 | 5.9 | 04.06.2024 | ||
| CVE-2024-20878 | HIGH | 7.8 | 5.9 | 04.06.2024 | ||
| CVE-2024-20879 | HIGH | 7.1 | 5.2 | 04.06.2024 | ||
| CVE-2024-20880 | MEDIUM | 6.8 | 5.9 | 04.06.2024 | ||
| CVE-2024-20882 | MEDIUM | 4.6 | 3.6 | 04.06.2024 | ||
| CVE-2024-20883 | HIGH | 7.8 | 5.9 | 04.06.2024 | ||
| CVE-2024-20884 | HIGH | 7.8 | 5.9 | 04.06.2024 | ||
| CVE-2024-20885 | LOW | 3.3 | 1.4 | 04.06.2024 | ||
| CVE-2024-20888 | HIGH | 7.8 | 5.9 | 02.07.2024 | ||
| CVE-2024-20889 | MEDIUM | 4.3 | 1.4 | 02.07.2024 | ||
| CVE-2024-20890 | HIGH | 8.8 | 5.9 | 02.07.2024 | ||
| CVE-2024-20891 | HIGH | 7.8 | 5.9 | 02.07.2024 | ||
| CVE-2024-20892 | HIGH | 7.8 | 5.9 | 02.07.2024 | ||
| CVE-2024-20893 | HIGH | 7.8 | 5.9 | 02.07.2024 | ||
| CVE-2024-20894 | MEDIUM | 4.3 | 3.6 | 02.07.2024 | ||
| CVE-2024-20895 | MEDIUM | 5.5 | 3.6 | 02.07.2024 | ||
| CVE-2024-20896 | MEDIUM | 5.5 | 3.6 | 02.07.2024 | ||
| CVE-2024-20897 | MEDIUM | 5.5 | 3.6 | 02.07.2024 | ||
| CVE-2024-20898 | MEDIUM | 5.5 | 3.6 | 02.07.2024 | ||
| CVE-2024-20899 | MEDIUM | 5.5 | 3.6 | 02.07.2024 | ||
| CVE-2024-20900 | LOW | 3.3 | 1.4 | 02.07.2024 | ||
| CVE-2024-20901 | HIGH | 7.8 | 5.9 | 02.07.2024 | ||
| CVE-2024-34583 | LOW | 3.3 | 1.4 | 02.07.2024 | ||
| CVE-2024-34585 | HIGH | 7.8 | 5.9 | 02.07.2024 | ||
| CVE-2024-34586 | LOW | 3.3 | 1.4 | 02.07.2024 | ||
| CVE-2024-34587 | MEDIUM | 6.8 | 5.9 | 02.07.2024 | ||
| CVE-2024-34588 | MEDIUM | 6.5 | 3.6 | 02.07.2024 | ||
| CVE-2024-34589 | MEDIUM | 6.5 | 3.6 | 02.07.2024 | ||
| CVE-2024-34590 | MEDIUM | 4.3 | 1.4 | 02.07.2024 | ||
| CVE-2024-34591 | MEDIUM | 4.3 | 1.4 | 02.07.2024 | ||
| CVE-2024-34592 | MEDIUM | 4.3 | 1.4 | 02.07.2024 | ||
| CVE-2024-34593 | HIGH | 8.8 | 5.9 | 02.07.2024 | ||
| CVE-2024-34594 | MEDIUM | 5.5 | 3.6 | 02.07.2024 | ||
| CVE-2024-34595 | HIGH | 7.8 | 5.9 | 02.07.2024 | ||
| CVE-2024-34602 | MEDIUM | 5.5 | 3.6 | 08.07.2024 | ||
| CVE-2024-34603 | MEDIUM | 5.5 | 3.6 | 08.07.2024 | ||
| CVE-2024-34604 | MEDIUM | 5.5 | 3.6 | 07.08.2024 | ||
| CVE-2024-34605 | MEDIUM | 5.5 | 3.6 | 07.08.2024 | ||
| CVE-2024-34606 | MEDIUM | 5.5 | 3.6 | 07.08.2024 | ||
| CVE-2024-34607 | MEDIUM | 5.5 | 3.6 | 07.08.2024 | ||
| CVE-2024-34608 | MEDIUM | 5.5 | 3.6 | 07.08.2024 | ||
| CVE-2024-34609 | MEDIUM | 5.5 | 3.6 | 07.08.2024 | ||
| CVE-2024-34610 | MEDIUM | 5.5 | 3.6 | 07.08.2024 | ||
| CVE-2024-34611 | MEDIUM | 5.5 | 3.6 | 07.08.2024 | ||
| CVE-2024-34612 | HIGH | 7.8 | 5.9 | 07.08.2024 | ||
| CVE-2024-34614 | HIGH | 7.8 | 5.9 | 07.08.2024 | ||
| CVE-2024-34615 | HIGH | 7.8 | 5.9 | 07.08.2024 | ||
| CVE-2024-34616 | MEDIUM | 5.5 | 3.6 | 07.08.2024 | ||
| CVE-2024-34617 | LOW | 3.3 | 1.4 | 07.08.2024 | ||
| CVE-2024-34618 | LOW | 3.3 | 1.4 | 07.08.2024 | ||
| CVE-2024-34619 | HIGH | 8.8 | 5.9 | 07.08.2024 | ||
| CVE-2024-34620 | HIGH | 7.8 | 5.9 | 07.08.2024 | ||
| CVE-2024-34637 | MEDIUM | 5.5 | 3.6 | 04.09.2024 | ||
| CVE-2024-34638 | HIGH | 7.1 | 5.2 | 04.09.2024 | ||
| CVE-2024-34639 | MEDIUM | 4.6 | 3.6 | 04.09.2024 | ||
| CVE-2024-34640 | LOW | 3.3 | 1.4 | 04.09.2024 | ||
| CVE-2024-34641 | LOW | 3.3 | 1.4 | 04.09.2024 | ||
| CVE-2024-34642 | MEDIUM | 4.6 | 3.6 | 04.09.2024 | ||
| CVE-2024-34643 | MEDIUM | 5.5 | 3.6 | 04.09.2024 | ||
| CVE-2024-34644 | MEDIUM | 5.5 | 3.6 | 04.09.2024 | ||
| CVE-2024-34646 | MEDIUM | 5.5 | 3.6 | 04.09.2024 | ||
| CVE-2024-34647 | MEDIUM | 5.5 | 3.6 | 04.09.2024 | ||
| CVE-2024-34648 | MEDIUM | 5.5 | 3.6 | 04.09.2024 | ||
| CVE-2024-34649 | LOW | 2.4 | 1.4 | 04.09.2024 | ||
| CVE-2024-34650 | LOW | 3.3 | 1.4 | 04.09.2024 | ||
| CVE-2024-34651 | MEDIUM | 5.5 | 3.6 | 04.09.2024 | ||
| CVE-2024-34652 | LOW | 3.3 | 1.4 | 04.09.2024 | ||
| CVE-2024-34653 | MEDIUM | 4.6 | 3.6 | 04.09.2024 | ||
| CVE-2024-34654 | MEDIUM | 5.5 | 3.6 | 04.09.2024 | ||
| CVE-2024-34655 | MEDIUM | 5.5 | 3.6 | 04.09.2024 | ||
| CVE-2024-34662 | HIGH | 7.8 | 5.9 | 08.10.2024 | ||
| CVE-2024-34665 | HIGH | 8.8 | 5.9 | 08.10.2024 | ||
| CVE-2024-34666 | HIGH | 8.8 | 5.9 | 08.10.2024 | ||
| CVE-2024-34667 | HIGH | 8.8 | 5.9 | 08.10.2024 | ||
| CVE-2024-34668 | HIGH | 8.8 | 5.9 | 08.10.2024 | ||
| CVE-2024-34669 | HIGH | 8.8 | 5.9 | 08.10.2024 | ||
| CVE-2024-34673 | MEDIUM | 5.5 | 3.6 | 06.11.2024 | ||
| CVE-2024-34674 | MEDIUM | 4.6 | 3.6 | 06.11.2024 | ||
| CVE-2024-34675 | MEDIUM | 4.6 | 3.6 | 06.11.2024 | ||
| CVE-2024-34676 | HIGH | 7.3 | 5.9 | 06.11.2024 | ||
| CVE-2024-34677 | LOW | 3.3 | 1.4 | 06.11.2024 | ||
| CVE-2024-34678 | HIGH | 7.8 | 5.9 | 06.11.2024 | ||
| CVE-2024-34679 | HIGH | 7.1 | 5.2 | 06.11.2024 | ||
| CVE-2024-34680 | MEDIUM | 5.5 | 3.6 | 06.11.2024 | ||
| CVE-2024-34682 | LOW | 2.4 | 1.4 | 06.11.2024 | ||
| CVE-2024-49401 | HIGH | 7.1 | 5.2 | 06.11.2024 | ||
| CVE-2024-49402 | MEDIUM | 4.6 | 3.6 | 06.11.2024 | ||
| CVE-2024-49410 | HIGH | 7.8 | 5.9 | 03.12.2024 | ||
| CVE-2024-49411 | MEDIUM | 4.6 | 3.6 | 03.12.2024 | ||
| CVE-2024-49413 | HIGH | 7.8 | 5.9 | 03.12.2024 | ||
| CVE-2024-49414 | LOW | 2.4 | 1.4 | 03.12.2024 | ||
| CVE-2024-49415 | CRITICAL | 9.8 | 5.9 | 03.12.2024 | ||
| CVE-2025-20881 | HIGH | 7.8 | 5.9 | 04.02.2025 | ||
| CVE-2025-20882 | HIGH | 7.8 | 5.9 | 04.02.2025 | ||
| CVE-2025-20883 | MEDIUM | 4.6 | 3.6 | 04.02.2025 | ||
| CVE-2025-20884 | MEDIUM | 4.6 | 3.6 | 04.02.2025 | ||
| CVE-2025-20885 | MEDIUM | 6.7 | 5.9 | 04.02.2025 | ||
| CVE-2025-20886 | MEDIUM | 4.4 | 3.6 | 04.02.2025 | ||
| CVE-2025-20887 | MEDIUM | 5.5 | 3.6 | 04.02.2025 | ||
| CVE-2025-20888 | HIGH | 7.8 | 5.9 | 04.02.2025 | ||
| CVE-2025-20889 | MEDIUM | 5.5 | 3.6 | 04.02.2025 | ||
| CVE-2025-20890 | HIGH | 7.8 | 5.9 | 04.02.2025 | ||
| CVE-2025-20891 | MEDIUM | 5.5 | 3.6 | 04.02.2025 | ||
| CVE-2025-20892 | MEDIUM | 5.9 | 5.2 | 04.02.2025 | ||
| CVE-2025-20893 | MEDIUM | 5.1 | 2.5 | 04.02.2025 | ||
| CVE-2025-20904 | MEDIUM | 6.7 | 5.9 | 04.02.2025 | ||
| CVE-2025-20905 | MEDIUM | 6.7 | 5.9 | 04.02.2025 | ||
| CVE-2025-20907 | MEDIUM | 4.4 | 3.6 | 04.02.2025 | ||
| CVE-2025-20934 | MEDIUM | 5.5 | 3.6 | 08.04.2025 | ||
| CVE-2025-20937 | MEDIUM | 6.7 | 5.9 | 07.05.2025 | ||
| CVE-2025-20953 | MEDIUM | 4.4 | 2.5 | 07.05.2025 | ||
| CVE-2025-20954 | MEDIUM | 5.5 | 3.6 | 07.05.2025 | ||
| CVE-2025-20955 | MEDIUM | 5.5 | 3.6 | 07.05.2025 | ||
| CVE-2025-20957 | HIGH | 7.8 | 5.9 | 07.05.2025 | ||
| CVE-2025-20958 | MEDIUM | 4.4 | 2.5 | 07.05.2025 | ||
| CVE-2025-20959 | MEDIUM | 5.5 | 3.6 | 07.05.2025 | ||
| CVE-2025-20960 | LOW | 3.3 | 1.4 | 07.05.2025 | ||
| CVE-2025-20961 | MEDIUM | 5.5 | 3.6 | 07.05.2025 | ||
| CVE-2025-20962 | MEDIUM | 4.0 | 1.4 | 07.05.2025 | ||
| CVE-2025-20963 | HIGH | 7.8 | 5.9 | 07.05.2025 | ||
| CVE-2025-20964 | HIGH | 7.8 | 5.9 | 07.05.2025 | ||
| CVE-2025-20982 | MEDIUM | 6.7 | 5.9 | 08.07.2025 | ||
| CVE-2025-20983 | MEDIUM | 6.7 | 5.9 | 08.07.2025 | ||
| CVE-2025-20990 | LOW | 3.3 | 1.4 | 06.08.2025 | ||
| CVE-2025-20999 | LOW | 2.1 | 1.4 | 08.07.2025 | ||
| CVE-2025-21000 | LOW | 3.3 | 1.4 | 08.07.2025 | ||
| CVE-2025-21001 | MEDIUM | 5.5 | 3.6 | 08.07.2025 | ||
| CVE-2025-21008 | MEDIUM | 5.5 | 3.6 | 08.07.2025 | ||
| CVE-2025-21009 | MEDIUM | 5.5 | 3.6 | 08.07.2025 | ||
| CVE-2025-21010 | MEDIUM | 6.0 | 4.0 | 06.08.2025 | ||
| CVE-2025-21025 | MEDIUM | 4.4 | 2.5 | 03.09.2025 | ||
| CVE-2025-21026 | LOW | 3.3 | 1.4 | 03.09.2025 | ||
| CVE-2025-21027 | MEDIUM | 4.4 | 2.5 | 03.09.2025 | ||
| CVE-2025-21029 | LOW | 3.3 | 1.4 | 03.09.2025 | ||
| CVE-2025-21031 | MEDIUM | 6.8 | 4.2 | 03.09.2025 | ||
| CVE-2025-21032 | MEDIUM | 6.8 | 5.9 | 03.09.2025 | ||
| CVE-2025-21033 | MEDIUM | 5.5 | 3.6 | 03.09.2025 | ||
| CVE-2025-21034 | HIGH | 7.8 | 5.9 | 03.09.2025 | ||
| CVE-2025-21041 | MEDIUM | 5.5 | 3.6 | 03.09.2025 | ||
| CVE-2025-21042 | CRITICAL | 9.8 | 5.9 | 12.09.2025 | ||
| CVE-2025-21043 | CRITICAL | 9.8 | 5.9 | 12.09.2025 | ||
| CVE-2025-21044 | MEDIUM | 4.4 | 3.6 | 10.10.2025 | ||
| CVE-2025-21046 | LOW | 2.4 | 1.4 | 10.10.2025 | ||
| CVE-2025-21047 | MEDIUM | 6.8 | 5.9 | 10.10.2025 | ||
| CVE-2025-21048 | HIGH | 7.8 | 5.9 | 10.10.2025 | ||
| CVE-2025-21050 | MEDIUM | 5.5 | 3.6 | 10.10.2025 | ||
| CVE-2025-21051 | HIGH | 7.8 | 5.9 | 10.10.2025 | ||
| CVE-2025-21052 | HIGH | 7.8 | 5.9 | 10.10.2025 | ||
| CVE-2025-21053 | HIGH | 7.8 | 5.9 | 10.10.2025 | ||
| CVE-2025-21054 | MEDIUM | 5.5 | 3.6 | 10.10.2025 | ||
| CVE-2025-21055 | HIGH | 7.5 | 3.6 | 10.10.2025 | ||
Showing 5 out of 201.
Similar certificates
| Name | Certificate ID | |
|---|---|---|
| Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 15 – Spring | CCEVS-VR-VID-11593-2025 | Compare |
| Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 13- Spring | CCEVS-VR-VID-11342-2023 | Compare |
| Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 12 – Fall | CCEVS-VR-VID-11307-2022 | Compare |
| Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 13 – Fall | CCEVS-VR-VID-11410-2023 | Compare |
| Samsung Electronics Co., Ltd. Samsung Galaxy Devices with Qualcomm Snapdragon Processors including the Galaxy S4, Gal... | CCEVS-VR-10556-2014 | Compare |
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Mobility",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11444-ci.pdf",
"dgst": "ec43ad01a74b4bb0",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CCEVS-VR-VID-11444-2024",
"cert_lab": [
"US"
],
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:samsung:android:14.0:smr-sep-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-nov-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jul-2025-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-oct-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-dec-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-mar-2025-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-may-2025-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-sep-2025-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-feb-2025-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-apr-2025-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jun-2025-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jan-2025-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-aug-2025-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"eal": "EAL1",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TSU_EXT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"14"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"51729b94f0ac139f",
"83014eb399a802f3",
"f84bb9133ca2c8db",
"29ba341b00e9bd10",
"593b939921a117e0",
"c40ae795865a0dba"
]
},
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2024-34644",
"CVE-2024-34639",
"CVE-2025-21047",
"CVE-2024-34612",
"CVE-2025-20891",
"CVE-2024-20894",
"CVE-2024-20857",
"CVE-2025-20892",
"CVE-2024-34668",
"CVE-2024-49402",
"CVE-2024-20875",
"CVE-2024-34615",
"CVE-2024-20848",
"CVE-2024-34606",
"CVE-2025-21051",
"CVE-2024-20888",
"CVE-2024-49413",
"CVE-2024-34594",
"CVE-2023-42559",
"CVE-2024-20891",
"CVE-2024-20858",
"CVE-2024-20814",
"CVE-2024-34590",
"CVE-2025-20958",
"CVE-2024-20863",
"CVE-2024-49415",
"CVE-2025-21029",
"CVE-2024-34649",
"CVE-2025-20881",
"CVE-2024-20876",
"CVE-2024-34682",
"CVE-2024-20892",
"CVE-2024-20901",
"CVE-2024-20895",
"CVE-2025-21008",
"CVE-2023-42564",
"CVE-2025-20934",
"CVE-2023-42557",
"CVE-2024-34643",
"CVE-2024-20877",
"CVE-2023-42560",
"CVE-2025-20905",
"CVE-2024-34585",
"CVE-2024-20884",
"CVE-2025-21043",
"CVE-2024-20842",
"CVE-2025-20960",
"CVE-2024-34655",
"CVE-2024-20833",
"CVE-2024-34642",
"CVE-2025-20883",
"CVE-2024-49414",
"CVE-2024-20880",
"CVE-2025-21009",
"CVE-2025-21054",
"CVE-2024-20874",
"CVE-2024-20900",
"CVE-2024-20889",
"CVE-2024-34593",
"CVE-2025-20999",
"CVE-2024-34608",
"CVE-2024-34652",
"CVE-2025-20890",
"CVE-2024-20860",
"CVE-2024-20883",
"CVE-2025-20937",
"CVE-2025-21010",
"CVE-2025-20964",
"CVE-2024-34620",
"CVE-2024-34605",
"CVE-2024-34666",
"CVE-2024-34604",
"CVE-2025-21050",
"CVE-2024-34679",
"CVE-2024-34618",
"CVE-2025-21000",
"CVE-2024-34673",
"CVE-2024-20811",
"CVE-2025-20983",
"CVE-2024-20862",
"CVE-2023-42556",
"CVE-2025-21026",
"CVE-2024-34595",
"CVE-2024-34611",
"CVE-2024-34603",
"CVE-2024-20836",
"CVE-2025-20954",
"CVE-2024-34648",
"CVE-2024-34653",
"CVE-2024-20816",
"CVE-2025-20887",
"CVE-2025-20957",
"CVE-2024-34640",
"CVE-2025-21025",
"CVE-2024-34654",
"CVE-2024-20830",
"CVE-2025-20963",
"CVE-2024-34669",
"CVE-2025-20904",
"CVE-2024-34586",
"CVE-2024-20856",
"CVE-2024-20897",
"CVE-2025-20888",
"CVE-2025-21031",
"CVE-2024-34647",
"CVE-2024-34667",
"CVE-2025-21001",
"CVE-2024-20896",
"CVE-2024-20834",
"CVE-2024-20861",
"CVE-2024-34614",
"CVE-2023-42567",
"CVE-2025-21046",
"CVE-2025-20962",
"CVE-2023-42566",
"CVE-2024-34678",
"CVE-2025-20885",
"CVE-2025-20953",
"CVE-2024-20890",
"CVE-2024-49411",
"CVE-2024-34609",
"CVE-2025-20955",
"CVE-2025-20893",
"CVE-2024-34591",
"CVE-2023-42565",
"CVE-2024-49410",
"CVE-2025-20882",
"CVE-2025-20884",
"CVE-2025-21027",
"CVE-2024-34602",
"CVE-2024-34637",
"CVE-2024-34592",
"CVE-2024-20859",
"CVE-2024-20865",
"CVE-2024-20806",
"CVE-2024-34680",
"CVE-2025-21032",
"CVE-2023-42570",
"CVE-2024-20849",
"CVE-2024-20819",
"CVE-2024-34589",
"CVE-2024-34617",
"CVE-2025-20961",
"CVE-2025-21048",
"CVE-2024-20832",
"CVE-2024-49401",
"CVE-2024-34677",
"CVE-2024-34641",
"CVE-2025-21041",
"CVE-2025-21042",
"CVE-2023-42562",
"CVE-2024-20835",
"CVE-2025-21044",
"CVE-2024-34665",
"CVE-2024-20878",
"CVE-2024-34607",
"CVE-2024-34676",
"CVE-2025-20907",
"CVE-2025-20990",
"CVE-2025-21052",
"CVE-2025-20889",
"CVE-2024-20843",
"CVE-2024-20847",
"CVE-2024-34587",
"CVE-2024-34650",
"CVE-2024-20879",
"CVE-2025-21034",
"CVE-2024-20813",
"CVE-2024-20898",
"CVE-2024-20817",
"CVE-2024-34675",
"CVE-2024-34616",
"CVE-2024-20831",
"CVE-2025-20982",
"CVE-2024-34588",
"CVE-2023-52432",
"CVE-2024-20885",
"CVE-2024-34583",
"CVE-2024-34651",
"CVE-2024-20882",
"CVE-2024-20818",
"CVE-2024-20864",
"CVE-2025-20886",
"CVE-2025-21055",
"CVE-2024-34610",
"CVE-2025-21053",
"CVE-2025-21033",
"CVE-2024-20893",
"CVE-2024-34638",
"CVE-2024-34674",
"CVE-2024-34619",
"CVE-2024-20815",
"CVE-2025-20959",
"CVE-2024-34646",
"CVE-2023-42563",
"CVE-2024-34662",
"CVE-2024-20803",
"CVE-2024-20899",
"CVE-2024-20855",
"CVE-2024-20812",
"CVE-2023-42561"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Samsung Electronics Co., Ltd.",
"manufacturer_web": "https://www.samsung.com",
"name": "Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 14 - Spring",
"not_valid_after": "2026-05-06",
"not_valid_before": "2024-05-06",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "st_vid11444-ci.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"US": {
"CCEVS-VR-VID11444-2024": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 1
}
},
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Gossamer": {
"Gossamer Security": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 3
}
},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20240510111710-04\u002700\u0027",
"/ModDate": "D:20240510111710-04\u002700\u0027",
"/Producer": "iText 2.1.0 (by lowagie.com)",
"pdf_file_size_bytes": 189890,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "st_vid11444-vr.pdf",
"report_frontpage": {
"US": {
"cert_id": "CCEVS-VR-VID11444-2024",
"cert_item": "Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 14 - Spring",
"cert_lab": "US NIAP"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"US": {
"CCEVS-VR-VID11444-2024": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 6
},
"TLS": {
"TLS": {
"TLS": 8
}
},
"VPN": {
"VPN": 12
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Gossamer": {
"Gossamer Security": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Qualcomm": {
"Qualcomm": 6
},
"Samsung": {
"Samsung": 36
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "comptont",
"/CreationDate": "D:20240510110726-04\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2019",
"/ModDate": "D:20240510110726-04\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2019",
"pdf_file_size_bytes": 317894,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://pages.nist.gov/800-63-3/sp800-63b.html#memsecret",
"https://web.nvd.nist.gov/view/vuln/search",
"http://www.kb.cert.org/vuls/",
"https://developer.android.com/reference/android/net/VpnService",
"https://developer.android.com/reference/android/app/admin/DevicePolicyManager.html#retrieveSecurityLogs(android.content.ComponentName)",
"https://developer.android.com/reference/android/app/admin/DeviceAdminReceiver.html#onSecurityLogsAvailable(android.content.Context,%20android.content.Intent)",
"https://docs.samsungknox.com/dev/knox-sdk/features/mdm-providers/vpn/knox-vpn-json-message-definition/",
"https://developer.android.com/reference/android/app/admin/DevicePolicyManager#setSecurityLoggingEnabled(android.content.ComponentName,%20boolean)"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 18
},
"st_filename": "st_vid11444-st.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 5
},
"ECDH": {
"ECDH": 6,
"ECDHE": 2
},
"ECDSA": {
"ECDSA": 17
}
},
"FF": {
"DH": {
"DH": 6,
"DHE": 1,
"Diffie-Hellman": 4
}
},
"RSA": {
"RSA 2048": 2
}
},
"cc_cert_id": {},
"cc_claims": {
"OE": {
"OE.CONFIG": 1,
"OE.DATA_PROPER_USER": 1,
"OE.NOTIFY": 1,
"OE.NO_TOE_BYPASS": 2,
"OE.PHYSICAL": 1,
"OE.PRECAUTION": 1,
"OE.PROTECTION": 1,
"OE.TRUSTED_ADMIN": 1,
"OE.TRUSTED_CONFIG": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP": 1,
"ADV_FSP.1": 8
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 9,
"AGD_PRE": 1,
"AGD_PRE.1": 5
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 3,
"ALC_CMS": 1,
"ALC_CMS.1": 4,
"ALC_TSU_EXT": 3,
"ALC_TSU_EXT.1": 6
},
"ATE": {
"ATE_IND": 1,
"ATE_IND.1": 4
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.1": 5
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 8,
"FAU_GEN.1": 5,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAR": 2,
"FAU_SAR.1": 1,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_STG": 4,
"FAU_STG.1": 1,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.4": 1,
"FAU_STG.4.1": 1
},
"FCS": {
"FCS_CKM": 20,
"FCS_CKM.1": 11,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 3,
"FCS_CKM_EXT": 21,
"FCS_CKM_EXT.1": 1,
"FCS_CKM_EXT.1.1": 1,
"FCS_CKM_EXT.1.2": 1,
"FCS_CKM_EXT.1.3": 1,
"FCS_CKM_EXT.2": 1,
"FCS_CKM_EXT.2.1": 1,
"FCS_CKM_EXT.3": 4,
"FCS_CKM_EXT.3.1": 1,
"FCS_CKM_EXT.3.2": 1,
"FCS_CKM_EXT.4": 2,
"FCS_CKM_EXT.4.1": 2,
"FCS_CKM_EXT.4.2": 1,
"FCS_CKM_EXT.5": 1,
"FCS_CKM_EXT.5.1": 1,
"FCS_CKM_EXT.5.2": 1,
"FCS_CKM_EXT.6": 1,
"FCS_CKM_EXT.6.1": 1,
"FCS_CKM_EXT.8": 1,
"FCS_CKM_EXT.8.1": 1,
"FCS_COP": 51,
"FCS_COP.1": 9,
"FCS_RBG_EXT": 6,
"FCS_RBG_EXT.1": 15,
"FCS_RBG_EXT.1.1": 1,
"FCS_RBG_EXT.1.2": 1,
"FCS_RBG_EXT.1.3": 1,
"FCS_RBG_EXT.2": 1,
"FCS_RBG_EXT.2.1": 1,
"FCS_SRV_EXT": 6,
"FCS_SRV_EXT.1": 1,
"FCS_SRV_EXT.1.1": 1,
"FCS_SRV_EXT.2.1": 1,
"FCS_STG_EXT": 9,
"FCS_STG_EXT.1": 2,
"FCS_STG_EXT.1.1": 1,
"FCS_STG_EXT.1.2": 1,
"FCS_STG_EXT.1.3": 1,
"FCS_STG_EXT.1.4": 1,
"FCS_STG_EXT.1.5": 1,
"FCS_STG_EXT.2": 4,
"FCS_STG_EXT.2.1": 2,
"FCS_STG_EXT.2.2": 1,
"FCS_STG_EXT.3": 2,
"FCS_STG_EXT.3.1": 1,
"FCS_STG_EXT.3.2": 1,
"FCS_TLSC_EXT": 17,
"FCS_TLSC_EXT.1": 6,
"FCS_TLSC_EXT.1.1": 1,
"FCS_TLSC_EXT.1.2": 1,
"FCS_TLSC_EXT.1.3": 1,
"FCS_TLSC_EXT.2": 2,
"FCS_TLSC_EXT.2.1": 1,
"FCS_TLSC_EXT.4": 1,
"FCS_TLSC_EXT.4.1": 1,
"FCS_TLSC_EXT.5": 1,
"FCS_TLSC_EXT.5.1": 1,
"FCS_TLSS_EXT.1.1": 1,
"FCS_TLS_EXT": 3,
"FCS_TLS_EXT.1.1": 1,
"FCS_WPA_EXT": 4,
"FCS_WPA_EXT.1": 1
},
"FDP": {
"FDP_ACC.1": 3,
"FDP_ACF_EXT": 9,
"FDP_ACF_EXT.1": 1,
"FDP_ACF_EXT.1.1": 1,
"FDP_ACF_EXT.1.2": 2,
"FDP_ACF_EXT.2.1": 1,
"FDP_ACF_EXT.3": 1,
"FDP_ACF_EXT.3.1": 1,
"FDP_DAR_EXT": 6,
"FDP_DAR_EXT.1": 2,
"FDP_DAR_EXT.1.1": 1,
"FDP_DAR_EXT.1.2": 1,
"FDP_DAR_EXT.2": 2,
"FDP_DAR_EXT.2.1": 1,
"FDP_DAR_EXT.2.2": 1,
"FDP_DAR_EXT.2.3": 1,
"FDP_DAR_EXT.2.4": 1,
"FDP_IFC_EXT": 6,
"FDP_IFC_EXT.1": 2,
"FDP_IFC_EXT.1.1": 2,
"FDP_PBA_EXT": 2,
"FDP_RIP": 2,
"FDP_RIP.2": 1,
"FDP_RIP.2.1": 1,
"FDP_STG_EXT": 3,
"FDP_STG_EXT.1": 2,
"FDP_STG_EXT.1.1": 1,
"FDP_UPC_EXT": 7,
"FDP_UPC_EXT.1": 4,
"FDP_VPN_EXT": 3,
"FDP_VPN_EXT.1.1": 1
},
"FIA": {
"FIA_AFL_EXT": 3,
"FIA_AFL_EXT.1": 3,
"FIA_AFL_EXT.1.1": 1,
"FIA_AFL_EXT.1.2": 1,
"FIA_AFL_EXT.1.3": 1,
"FIA_AFL_EXT.1.4": 1,
"FIA_AFL_EXT.1.5": 1,
"FIA_AFL_EXT.1.6": 1,
"FIA_BLT_EXT": 18,
"FIA_BLT_EXT.1": 2,
"FIA_BLT_EXT.1.1": 1,
"FIA_BLT_EXT.2": 2,
"FIA_BLT_EXT.2.1": 1,
"FIA_BLT_EXT.3": 1,
"FIA_BLT_EXT.3.1": 1,
"FIA_BLT_EXT.4": 1,
"FIA_BLT_EXT.4.1": 1,
"FIA_BLT_EXT.4.2": 1,
"FIA_BLT_EXT.6": 1,
"FIA_BLT_EXT.6.1": 1,
"FIA_BLT_EXT.7": 1,
"FIA_BLT_EXT.7.1": 1,
"FIA_BMG_EXT": 1,
"FIA_BMG_EXT.1": 3,
"FIA_MBE_EXT": 1,
"FIA_MBE_EXT.1": 2,
"FIA_MBE_EXT.1.1": 1,
"FIA_MBE_EXT.2": 2,
"FIA_MBE_EXT.2.1": 1,
"FIA_MBV_EXT": 5,
"FIA_MBV_EXT.1": 5,
"FIA_MBV_EXT.2": 2,
"FIA_MBV_EXT.2.1": 1,
"FIA_PAE_EXT": 3,
"FIA_PAE_EXT.1": 1,
"FIA_PAE_EXT.1.1": 1,
"FIA_PMG_EXT": 3,
"FIA_PMG_EXT.1": 1,
"FIA_PMG_EXT.1.1": 1,
"FIA_TRT_EXT": 3,
"FIA_TRT_EXT.1": 1,
"FIA_TRT_EXT.1.1": 1,
"FIA_UAU": 11,
"FIA_UAU.5": 2,
"FIA_UAU.5.1": 3,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 2,
"FIA_UAU.7": 2,
"FIA_UAU.7.1": 1,
"FIA_UAU_EXT": 9,
"FIA_UAU_EXT.1": 1,
"FIA_UAU_EXT.1.1": 1,
"FIA_UAU_EXT.2": 1,
"FIA_UAU_EXT.2.1": 1,
"FIA_UAU_EXT.2.2": 1,
"FIA_UAU_EXT.4": 1,
"FIA_UAU_EXT.4.1": 1,
"FIA_UAU_EXT.4.2": 1
},
"FMT": {
"FMT_MOF_EXT": 3,
"FMT_MOF_EXT.1": 2,
"FMT_MOF_EXT.1.1": 1,
"FMT_MOF_EXT.1.2": 1,
"FMT_SMF": 6,
"FMT_SMF.1": 2,
"FMT_SMF.1.1": 1,
"FMT_SMF_EXT": 11,
"FMT_SMF_EXT.1": 4,
"FMT_SMF_EXT.2": 1,
"FMT_SMF_EXT.2.1": 1,
"FMT_SMF_EXT.3": 2,
"FMT_SMF_EXT.3.1": 1
},
"FPT": {
"FPT_AEX_EXT": 18,
"FPT_AEX_EXT.1": 1,
"FPT_AEX_EXT.1.1": 1,
"FPT_AEX_EXT.1.2": 1,
"FPT_AEX_EXT.2": 1,
"FPT_AEX_EXT.2.1": 1,
"FPT_AEX_EXT.3": 1,
"FPT_AEX_EXT.3.1": 1,
"FPT_AEX_EXT.4": 1,
"FPT_AEX_EXT.4.1": 1,
"FPT_AEX_EXT.4.2": 1,
"FPT_AEX_EXT.5": 1,
"FPT_AEX_EXT.5.1": 1,
"FPT_AEX_EXT.5.2": 1,
"FPT_AEX_EXT.6.1": 1,
"FPT_BBD_EXT": 3,
"FPT_BBD_EXT.1": 1,
"FPT_BBD_EXT.1.1": 1,
"FPT_BDP_EXT.1": 1,
"FPT_BDP_EXT.1.1": 1,
"FPT_BDP_EXT.1.2": 1,
"FPT_JTA_EXT": 3,
"FPT_JTA_EXT.1": 1,
"FPT_JTA_EXT.1.1": 1,
"FPT_KST_EXT": 6,
"FPT_KST_EXT.1": 3,
"FPT_KST_EXT.1.1": 1,
"FPT_KST_EXT.2": 3,
"FPT_KST_EXT.2.1": 1,
"FPT_KST_EXT.3": 1,
"FPT_KST_EXT.3.1": 1,
"FPT_NOT_EXT": 3,
"FPT_NOT_EXT.1": 1,
"FPT_NOT_EXT.1.1": 1,
"FPT_PBT_EXT.1": 1,
"FPT_PBT_EXT.1.1": 1,
"FPT_STM": 2,
"FPT_STM.1": 1,
"FPT_STM.1.1": 1,
"FPT_TST_EXT": 19,
"FPT_TST_EXT.1": 4,
"FPT_TST_EXT.1.1": 1,
"FPT_TST_EXT.2": 2,
"FPT_TST_EXT.3": 2,
"FPT_TUD_EXT": 10,
"FPT_TUD_EXT.1": 1,
"FPT_TUD_EXT.1.1": 1,
"FPT_TUD_EXT.1.2": 1,
"FPT_TUD_EXT.1.3": 1,
"FPT_TUD_EXT.2": 2,
"FPT_TUD_EXT.2.1": 1,
"FPT_TUD_EXT.2.2": 1,
"FPT_TUD_EXT.2.3": 1,
"FPT_TUD_EXT.3": 1,
"FPT_TUD_EXT.3.1": 1,
"FPT_TUD_EXT.6": 1,
"FPT_TUD_EXT.6.1": 1
},
"FTA": {
"FTA_SSL_EXT": 3,
"FTA_SSL_EXT.1": 2,
"FTA_SSL_EXT.1.1": 1,
"FTA_SSL_EXT.1.2": 1,
"FTA_SSL_EXT.1.3": 1,
"FTA_TAB": 2,
"FTA_TAB.1": 1,
"FTA_TAB.1.1": 1,
"FTA_WSE_EXT": 3,
"FTA_WSE_EXT.1": 2,
"FTA_WSE_EXT.1.1": 1
},
"FTP": {
"FTP_BLT_EXT": 10,
"FTP_BLT_EXT.1": 1,
"FTP_BLT_EXT.1.1": 1,
"FTP_BLT_EXT.1.2": 1,
"FTP_BLT_EXT.2": 1,
"FTP_BLT_EXT.2.1": 1,
"FTP_BLT_EXT.3": 2,
"FTP_ITC": 1,
"FTP_ITC_EXT": 5,
"FTP_ITC_EXT.1": 4,
"FTP_ITC_EXT.1.1": 1,
"FTP_ITC_EXT.1.2": 1,
"FTP_ITC_EXT.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 5
},
"CCM": {
"CCM": 3
},
"CTR": {
"CTR": 1
},
"GCM": {
"GCM": 4
},
"XTS": {
"XTS": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"BoringSSL": {
"BoringSSL": 23
}
},
"crypto_protocol": {
"IKE": {
"IKE": 12,
"IKEv2": 18
},
"IPsec": {
"IPsec": 39
},
"TLS": {
"TLS": {
"TLS": 67,
"TLS 1.1": 1,
"TLS 1.2": 2
}
},
"VPN": {
"VPN": 96
}
},
"crypto_scheme": {
"MAC": {
"MAC": 4
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 16,
"P-384": 10,
"P-521": 8,
"secp256r1": 2,
"secp384r1": 2
}
},
"eval_facility": {},
"hash_function": {
"PBKDF": {
"PBKDF2": 4
},
"SHA": {
"SHA1": {
"SHA-1": 5
},
"SHA2": {
"SHA-256": 19,
"SHA-384": 3,
"SHA-512": 3
}
},
"scrypt": {
"scrypt": 3
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {
"com": {
"com.samsung.android.knox.net.vpn": 1
}
},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 8
},
"RNG": {
"RBG": 14,
"RNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 180-4": 5,
"FIPS 186-4": 10,
"FIPS 197": 10,
"FIPS 198-1": 5,
"FIPS PUB 186-4": 5,
"FIPS PUB 197": 2
},
"NIST": {
"NIST SP 800-132": 4,
"NIST SP 800-38A": 1,
"NIST SP 800-38C": 1,
"NIST SP 800-38D": 1,
"NIST SP 800-38E": 1,
"NIST SP 800-38F": 1,
"NIST SP 800-57": 1,
"SP 800-108": 4,
"SP 800-38A": 1,
"SP 800-38C": 3,
"SP 800-38E": 2,
"SP 800-38F": 1,
"SP 800-56A": 1,
"SP 800-90A": 5
},
"PKCS": {
"PKCS 2": 1,
"PKCS#12": 2
},
"RFC": {
"RFC 2560": 1,
"RFC 2818": 2,
"RFC 3394": 2,
"RFC 3526": 1,
"RFC 3602": 2,
"RFC 4106": 2,
"RFC 4301": 2,
"RFC 4303": 1,
"RFC 4346": 1,
"RFC 4945": 2,
"RFC 5216": 1,
"RFC 5246": 4,
"RFC 5280": 4,
"RFC 5282": 2,
"RFC 5288": 4,
"RFC 5289": 8,
"RFC 5746": 1,
"RFC 6125": 1,
"RFC 6379": 2,
"RFC 6960": 1,
"RFC 8247": 1,
"RFC 8603": 1,
"RFC 8784": 1
},
"X509": {
"X.509": 12
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 35,
"AES-": 5,
"AES-128": 1,
"AES-256": 14
}
},
"constructions": {
"MAC": {
"HMAC": 13,
"HMAC-SHA-256": 3,
"HMAC-SHA-384": 2,
"HMAC-SHA-512": 2
}
}
},
"technical_report_id": {},
"tee_name": {
"ARM": {
"TrustZone": 6
},
"IBM": {
"SE": 4
},
"other": {
"TEE": 33
}
},
"tls_cipher_suite": {
"TLS": {
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 2,
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 2,
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 2,
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 2,
"TLS_RSA_WITH_AES_128_CBC_SHA": 1,
"TLS_RSA_WITH_AES_128_GCM_SHA256": 2,
"TLS_RSA_WITH_AES_256_CBC_SHA": 1,
"TLS_RSA_WITH_AES_256_GCM_SHA384": 2
}
},
"vendor": {
"Broadcom": {
"Broadcom": 3
},
"Qualcomm": {
"Qualcomm": 75
},
"Samsung": {
"Samsung": 168
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Ranjit Mallela",
"/CreationDate": "D:20240510111440-04\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2019",
"/ModDate": "D:20240510111440-04\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2019",
"/Title": "Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 14 Spring - Security Target",
"pdf_file_size_bytes": 1416819,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://developer.android.com/reference/android/net/VpnService.html",
"https://security.samsungmobile.com/securityReporting.smsb",
"https://seap.samsung.com/api-references/android/reference/com/samsung/android/knox/net/vpn/package-summary.html",
"http://developer.android.com/reference/android/bluetooth/package-summary.html",
"https://security.samsungmobile.com/",
"mailto:[email protected]",
"http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ddi0487a.f/index.html",
"https://source.android.com/security/",
"http://www.gossamersec.com/",
"http://www.wi-fi.org/certification",
"https://developer.android.com/reference/javax/net/ssl/SSLSocket",
"https://source.android.com/source/report-bugs.html",
"https://source.android.com/security/apksigning/v3",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37684",
"https://developer.android.com/reference/packages"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 96
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_WLANC_v1.0.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_VPN_CLI_v2.4_PP.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD-BIO-v1.1.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MDF_V3.3.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_BT_V1.0.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11444-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": []
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11444-st.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "7caedf50c67479a47e3d0f0a5d9b7e39ed954b82df046752a61f83aac0cfcd90",
"txt_hash": "a63be29d61c4d4e73d1f5c496cc82d3fd357c775946d886ad648f33b1de64e74"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "5e3f0f5a5773c95a27e6b0d833475d4507cd9d38e85db8e1735cf2d188ac5949",
"txt_hash": "5f38292f8499c8255113e46d1a0affbdac53b77a2a3ea35f183e6e1a993c5471"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "22707614f293921401e49ebeb1f19f5b659fd4de1a02570b0c446d799064b7ab",
"txt_hash": "3f87284d47404cefda57bb8af10fc7fb3135314acc8a00bac8429d3cc8f5d0b0"
}
},
"status": "active"
}