This page was not yet optimized for use on mobile
devices.
Strong Customer Authentication for Apple Pay on Mac mini with M4 running macOS Sequoia 15.4, paired with Magic keyboard with Touch ID(macOS Sequoia 15.4 (build 24E248)) (ANSSI-CC-2025/36)
Known vulnerabilities detected
Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.CSV information
| Status | active |
|---|---|
| Valid from | 23.10.2025 |
| Valid until | 23.10.2030 |
| Scheme | 🇫🇷 FR |
| Manufacturer | Apple Inc. |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | ADV_FSP.3, EAL2+, ALC_FLR.3 |
Heuristics summary
Certificate ID: ANSSI-CC-2025/36
Certificate
Extracted keywords
Security level
EAL2Security Assurance Requirements (SAR)
ADV_FSP.3, ALC_FLR.3Certificates
ANSSI-CC-2025/36File metadata
| Creation date | D:20251020161716+02'00' |
|---|---|
| Modification date | D:20251023041359-07'00' |
| Pages | 2 |
| Creator | Acrobat PDFMaker 25 pour Word |
| Producer | PDFKit.NET 12.3.654.0 DMV10 |
Certification report
Extracted keywords
Symmetric Algorithms
DESSecurity level
EAL2, EAL4, ITSEC E3 ElémentaireSecurity Assurance Requirements (SAR)
ADV_FSP.3, ALC_FLR.3, ALC_FLRCertificates
ANSSI-CC-2025/36Evaluation facilities
CESTIStandards
ISO/IEC 15408-, ISO/IEC 18045:2022, CCMB-2022-11-001File metadata
| Creation date | D:20251020161735+02'00' |
|---|---|
| Modification date | D:20251023041359-07'00' |
| Pages | 13 |
| Creator | Acrobat PDFMaker 25 pour Word |
| Producer | PDFKit.NET 12.3.654.0 DMV10 |
Security target
Extracted keywords
Asymmetric Algorithms
ECDHSchemes
MACProtocols
TLS 1.2, TLSTrusted Execution Environments
SESecurity level
EAL 2, EAL2, EAL 2 augmentedClaims
D.OS, D.SEP_SE, T.COR-, T.PHYSI-, T.RE-, T.REPLAY, T.SILENT, T.SKIM-, T.USURP, T.CORRUPT, T.RECOVER, T.SKIMMING, T.PHYSICAL, A.DEVICE_AUTH, A.PERSO, A.WATCH_USER, A.NO_EVIL_ROOT_USERSecurity Assurance Requirements (SAR)
ADV_FSP.3, ADV_ARC.1, ADV_TDS.1, ADV_FSP.2, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.3, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1Security Functional Requirements (SFR)
FDP_DAU.1, FDP_DAU.1.1, FDP_DAU.1.2, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_ETC, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_ITT, FDP_ITT.1.1, FDP_UCT, FDP_UCT.1, FDP_UIT, FDP_UIT.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.1.1, FDP_ACC.1, FDP_IFC.1, FDP_ETC.2, FIA_UID.2, FIA_UID.2.1, FIA_UAU.2, FIA_UAU.2.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_AFL.1, FIA_AFL, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.6.1, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.1, FIA_UID.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1.1, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.3, FMT_MTD.3.1, FPR_UNO.1, FPR_UNO.1.1, FPT_ITC.1, FPT_ITC.1.1, FPT_RPL, FPT_RPL.1, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1Certification process
out of scope, Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by, to re- turn to its User. Note: Defending against device re-use after physical compromise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.Keyboard_Secret D.SEP_Watch* T.RE- COVERStandards
FIPS 140-3File metadata
| Title | Microsoft Word - [ST] Macmini_M4_Keyboard_macOS15_SecurityTarget_v1.4.docx |
|---|---|
| Creation date | D:20250812181208Z |
| Modification date | D:20250812191229+01'00' |
| Pages | 57 |
| Creator | Word |
| Producer | Adobe Mac PDF Plug-in |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ANSSI-CC-2025/36Extracted SARs
ADV_ARC.1, ADV_FSP.3, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2CPE matches
Related CVEs
| ID | Links | Severity | CVSS Score | Published on | ||
|---|---|---|---|---|---|---|
| Base | Exploitability | Impact | ||||
| CVE-1999-0590 | HIGH | 10.0 | 10.0 | 01.06.2000 | ||
| CVE-2001-0102 | HIGH | 7.2 | 10.0 | 12.02.2001 | ||
| CVE-2025-24088 | HIGH | 7.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-24142 | MEDIUM | 5.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-24188 | MEDIUM | 6.5 | 3.6 | 30.07.2025 | ||
| CVE-2025-24197 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-24222 | MEDIUM | 6.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-24223 | HIGH | 8.0 | 5.9 | 12.05.2025 | ||
| CVE-2025-24224 | HIGH | 7.5 | 3.6 | 30.07.2025 | ||
| CVE-2025-24274 | HIGH | 7.8 | 5.9 | 12.05.2025 | ||
| CVE-2025-30440 | MEDIUM | 5.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-31200 | CRITICAL | 9.8 | 5.9 | 16.04.2025 | ||
| CVE-2025-31201 | CRITICAL | 9.8 | 5.9 | 16.04.2025 | ||
| CVE-2025-31204 | HIGH | 8.8 | 5.9 | 12.05.2025 | ||
| CVE-2025-31205 | MEDIUM | 6.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-31206 | MEDIUM | 4.3 | 1.4 | 12.05.2025 | ||
| CVE-2025-31208 | HIGH | 7.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-31209 | MEDIUM | 6.3 | 3.4 | 12.05.2025 | ||
| CVE-2025-31212 | MEDIUM | 5.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-31213 | HIGH | 7.6 | 4.7 | 12.05.2025 | ||
| CVE-2025-31215 | MEDIUM | 6.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-31217 | MEDIUM | 6.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-31218 | MEDIUM | 6.2 | 3.6 | 12.05.2025 | ||
| CVE-2025-31219 | HIGH | 7.1 | 4.2 | 12.05.2025 | ||
| CVE-2025-31220 | MEDIUM | 5.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-31221 | HIGH | 7.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-31222 | HIGH | 7.8 | 5.9 | 12.05.2025 | ||
| CVE-2025-31223 | HIGH | 8.0 | 5.9 | 12.05.2025 | ||
| CVE-2025-31224 | HIGH | 7.8 | 5.9 | 12.05.2025 | ||
| CVE-2025-31226 | MEDIUM | 5.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-31232 | HIGH | 7.1 | 4.2 | 12.05.2025 | ||
| CVE-2025-31233 | MEDIUM | 6.3 | 3.4 | 12.05.2025 | ||
| CVE-2025-31234 | HIGH | 8.2 | 4.2 | 12.05.2025 | ||
| CVE-2025-31235 | MEDIUM | 6.5 | 4.0 | 12.05.2025 | ||
| CVE-2025-31236 | MEDIUM | 5.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-31237 | HIGH | 7.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-31238 | HIGH | 7.3 | 3.4 | 12.05.2025 | ||
| CVE-2025-31239 | MEDIUM | 4.3 | 1.4 | 12.05.2025 | ||
| CVE-2025-31240 | HIGH | 7.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-31241 | MEDIUM | 5.3 | 1.4 | 12.05.2025 | ||
| CVE-2025-31242 | MEDIUM | 5.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-31243 | HIGH | 7.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-31244 | HIGH | 8.8 | 6.0 | 12.05.2025 | ||
| CVE-2025-31245 | MEDIUM | 5.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-31246 | HIGH | 8.8 | 5.9 | 12.05.2025 | ||
| CVE-2025-31247 | HIGH | 7.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-31249 | HIGH | 7.1 | 4.2 | 12.05.2025 | ||
| CVE-2025-31250 | MEDIUM | 5.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-31251 | MEDIUM | 5.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-31255 | CRITICAL | 9.8 | 5.9 | 15.09.2025 | ||
| CVE-2025-31256 | MEDIUM | 5.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-31257 | MEDIUM | 4.7 | 1.4 | 12.05.2025 | ||
| CVE-2025-31258 | MEDIUM | 6.5 | 2.5 | 12.05.2025 | ||
| CVE-2025-31259 | HIGH | 7.8 | 5.9 | 12.05.2025 | ||
| CVE-2025-31260 | MEDIUM | 5.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-31268 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-31269 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-31270 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-31271 | HIGH | 7.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-31273 | HIGH | 8.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-31275 | MEDIUM | 6.2 | 3.6 | 30.07.2025 | ||
| CVE-2025-31277 | HIGH | 8.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-31278 | HIGH | 8.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-31279 | CRITICAL | 9.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-31280 | HIGH | 7.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-31281 | CRITICAL | 9.1 | 5.2 | 30.07.2025 | ||
| CVE-2025-43185 | MEDIUM | 5.5 | 3.6 | 30.07.2025 | ||
| CVE-2025-43186 | CRITICAL | 9.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43187 | HIGH | 7.8 | 5.9 | 29.08.2025 | ||
| CVE-2025-43188 | HIGH | 7.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43189 | CRITICAL | 9.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43190 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43191 | MEDIUM | 6.2 | 3.6 | 30.07.2025 | ||
| CVE-2025-43192 | CRITICAL | 9.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43193 | CRITICAL | 9.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43194 | CRITICAL | 9.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43195 | MEDIUM | 5.5 | 3.6 | 30.07.2025 | ||
| CVE-2025-43196 | HIGH | 7.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43197 | MEDIUM | 4.0 | 1.4 | 30.07.2025 | ||
| CVE-2025-43198 | CRITICAL | 9.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43199 | CRITICAL | 9.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43204 | HIGH | 7.8 | 5.9 | 15.09.2025 | ||
| CVE-2025-43206 | MEDIUM | 4.0 | 1.4 | 30.07.2025 | ||
| CVE-2025-43207 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43208 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43209 | CRITICAL | 9.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43211 | MEDIUM | 6.2 | 3.6 | 30.07.2025 | ||
| CVE-2025-43212 | MEDIUM | 6.5 | 3.6 | 30.07.2025 | ||
| CVE-2025-43213 | MEDIUM | 6.5 | 3.6 | 30.07.2025 | ||
| CVE-2025-43214 | MEDIUM | 6.5 | 3.6 | 30.07.2025 | ||
| CVE-2025-43215 | MEDIUM | 5.5 | 3.6 | 30.07.2025 | ||
| CVE-2025-43216 | MEDIUM | 6.5 | 3.6 | 30.07.2025 | ||
| CVE-2025-43218 | MEDIUM | 5.5 | 3.6 | 30.07.2025 | ||
| CVE-2025-43220 | CRITICAL | 9.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43221 | HIGH | 7.1 | 5.2 | 30.07.2025 | ||
| CVE-2025-43222 | CRITICAL | 9.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43223 | HIGH | 7.5 | 3.6 | 30.07.2025 | ||
| CVE-2025-43224 | HIGH | 7.1 | 5.2 | 30.07.2025 | ||
| CVE-2025-43225 | MEDIUM | 5.5 | 3.6 | 30.07.2025 | ||
| CVE-2025-43226 | MEDIUM | 4.0 | 1.4 | 30.07.2025 | ||
| CVE-2025-43227 | HIGH | 7.5 | 3.6 | 30.07.2025 | ||
| CVE-2025-43229 | MEDIUM | 6.1 | 2.7 | 30.07.2025 | ||
| CVE-2025-43230 | MEDIUM | 4.0 | 1.4 | 30.07.2025 | ||
| CVE-2025-43232 | CRITICAL | 9.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43233 | CRITICAL | 9.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43234 | CRITICAL | 9.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43235 | MEDIUM | 5.5 | 3.6 | 30.07.2025 | ||
| CVE-2025-43237 | CRITICAL | 9.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43239 | HIGH | 7.1 | 5.2 | 30.07.2025 | ||
| CVE-2025-43240 | MEDIUM | 6.2 | 3.6 | 30.07.2025 | ||
| CVE-2025-43241 | MEDIUM | 5.5 | 3.6 | 30.07.2025 | ||
| CVE-2025-43243 | CRITICAL | 9.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43244 | CRITICAL | 9.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43245 | CRITICAL | 9.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43246 | MEDIUM | 5.5 | 3.6 | 30.07.2025 | ||
| CVE-2025-43247 | MEDIUM | 5.5 | 4.2 | 30.07.2025 | ||
| CVE-2025-43248 | HIGH | 7.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43249 | HIGH | 7.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43250 | MEDIUM | 4.0 | 1.4 | 30.07.2025 | ||
| CVE-2025-43251 | MEDIUM | 5.5 | 3.6 | 30.07.2025 | ||
| CVE-2025-43252 | MEDIUM | 6.5 | 3.6 | 30.07.2025 | ||
| CVE-2025-43253 | CRITICAL | 9.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43254 | HIGH | 7.1 | 5.2 | 30.07.2025 | ||
| CVE-2025-43255 | LOW | 3.3 | 1.4 | 29.08.2025 | ||
| CVE-2025-43256 | HIGH | 7.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43259 | MEDIUM | 4.6 | 3.6 | 30.07.2025 | ||
| CVE-2025-43260 | MEDIUM | 5.1 | 2.5 | 30.07.2025 | ||
| CVE-2025-43261 | CRITICAL | 9.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43262 | MEDIUM | 5.1 | 2.5 | 15.09.2025 | ||
| CVE-2025-43265 | MEDIUM | 4.0 | 1.4 | 30.07.2025 | ||
| CVE-2025-43266 | MEDIUM | 5.1 | 2.5 | 30.07.2025 | ||
| CVE-2025-43267 | MEDIUM | 5.5 | 3.6 | 30.07.2025 | ||
| CVE-2025-43268 | HIGH | 7.8 | 5.9 | 29.08.2025 | ||
| CVE-2025-43270 | HIGH | 8.8 | 6.0 | 30.07.2025 | ||
| CVE-2025-43272 | MEDIUM | 6.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43274 | MEDIUM | 4.4 | 2.5 | 30.07.2025 | ||
| CVE-2025-43275 | CRITICAL | 9.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43276 | MEDIUM | 5.3 | 1.4 | 30.07.2025 | ||
| CVE-2025-43279 | MEDIUM | 6.2 | 3.6 | 15.09.2025 | ||
| CVE-2025-43281 | HIGH | 8.4 | 5.9 | 15.10.2025 | ||
| CVE-2025-43282 | MEDIUM | 5.5 | 3.6 | 15.10.2025 | ||
| CVE-2025-43283 | LOW | 3.3 | 1.4 | 15.09.2025 | ||
| CVE-2025-43285 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43286 | HIGH | 7.8 | 5.9 | 15.09.2025 | ||
| CVE-2025-43287 | HIGH | 7.1 | 5.2 | 15.09.2025 | ||
| CVE-2025-43291 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43292 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43293 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43294 | LOW | 3.3 | 1.4 | 15.09.2025 | ||
| CVE-2025-43295 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43296 | MEDIUM | 5.5 | 3.6 | 09.10.2025 | ||
| CVE-2025-43297 | MEDIUM | 6.2 | 3.6 | 15.09.2025 | ||
| CVE-2025-43298 | HIGH | 7.8 | 5.9 | 15.09.2025 | ||
| CVE-2025-43299 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43301 | LOW | 3.3 | 1.4 | 15.09.2025 | ||
| CVE-2025-43302 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43303 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43304 | HIGH | 7.0 | 5.9 | 15.09.2025 | ||
| CVE-2025-43305 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43307 | MEDIUM | 4.0 | 1.4 | 15.09.2025 | ||
| CVE-2025-43308 | MEDIUM | 5.3 | 1.4 | 15.09.2025 | ||
| CVE-2025-43310 | MEDIUM | 4.4 | 2.5 | 15.09.2025 | ||
| CVE-2025-43311 | MEDIUM | 5.1 | 2.5 | 15.09.2025 | ||
| CVE-2025-43312 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43313 | MEDIUM | 5.5 | 3.6 | 15.10.2025 | ||
| CVE-2025-43314 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43315 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43316 | HIGH | 7.8 | 5.9 | 15.09.2025 | ||
| CVE-2025-43317 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43318 | MEDIUM | 6.2 | 3.6 | 15.09.2025 | ||
| CVE-2025-43319 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43321 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43325 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43326 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43327 | MEDIUM | 6.5 | 2.5 | 15.09.2025 | ||
| CVE-2025-43328 | LOW | 3.3 | 1.4 | 15.09.2025 | ||
| CVE-2025-43329 | HIGH | 8.8 | 6.0 | 15.09.2025 | ||
| CVE-2025-43330 | HIGH | 8.2 | 5.8 | 15.09.2025 | ||
| CVE-2025-43331 | MEDIUM | 4.0 | 1.4 | 15.09.2025 | ||
| CVE-2025-43332 | MEDIUM | 5.2 | 2.7 | 15.09.2025 | ||
| CVE-2025-43333 | HIGH | 7.8 | 5.9 | 15.09.2025 | ||
| CVE-2025-43337 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43340 | HIGH | 7.8 | 5.9 | 15.09.2025 | ||
| CVE-2025-43341 | HIGH | 7.8 | 5.9 | 15.09.2025 | ||
| CVE-2025-43342 | CRITICAL | 9.8 | 5.9 | 15.09.2025 | ||
| CVE-2025-43343 | CRITICAL | 9.8 | 5.9 | 15.09.2025 | ||
| CVE-2025-43344 | LOW | 3.3 | 1.4 | 15.09.2025 | ||
| CVE-2025-43346 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43347 | CRITICAL | 9.8 | 5.9 | 15.09.2025 | ||
| CVE-2025-43349 | LOW | 2.8 | 1.4 | 15.09.2025 | ||
| CVE-2025-43353 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43354 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43355 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43356 | MEDIUM | 6.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43357 | LOW | 3.3 | 1.4 | 15.09.2025 | ||
| CVE-2025-43358 | HIGH | 8.8 | 6.0 | 15.09.2025 | ||
| CVE-2025-43359 | CRITICAL | 9.8 | 5.9 | 15.09.2025 | ||
| CVE-2025-43366 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43367 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43368 | MEDIUM | 4.3 | 1.4 | 15.09.2025 | ||
| CVE-2025-43369 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43372 | HIGH | 7.8 | 5.9 | 15.09.2025 | ||
| CVE-2025-43400 | MEDIUM | 6.3 | 3.4 | 29.09.2025 | ||
Showing 5 out of 203.
Similar certificates
Showing 5 out of 24.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2025_36fr.pdf",
"dgst": "f6a3a902436a298c",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2025/36",
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:apple:macos:15.4:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"eal": "EAL2+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"15.4"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2025-31241",
"CVE-2025-43329",
"CVE-2025-31209",
"CVE-2025-43333",
"CVE-2025-31213",
"CVE-2025-31247",
"CVE-2025-43259",
"CVE-2025-24197",
"CVE-2025-43243",
"CVE-2025-43235",
"CVE-2025-43188",
"CVE-2025-43327",
"CVE-2025-43286",
"CVE-2025-31220",
"CVE-2025-31236",
"CVE-2025-43283",
"CVE-2025-31205",
"CVE-2025-43193",
"CVE-2025-31242",
"CVE-2025-43343",
"CVE-2025-43349",
"CVE-2025-31259",
"CVE-2025-43211",
"CVE-2025-31260",
"CVE-2025-43317",
"CVE-2025-43199",
"CVE-2025-43337",
"CVE-2025-43266",
"CVE-2025-31218",
"CVE-2025-43316",
"CVE-2025-43250",
"CVE-2025-43367",
"CVE-2025-43326",
"CVE-2025-43274",
"CVE-2025-24142",
"CVE-2001-0102",
"CVE-2025-43254",
"CVE-2025-43190",
"CVE-2025-31238",
"CVE-2025-43314",
"CVE-2025-31275",
"CVE-2025-43294",
"CVE-2025-43232",
"CVE-2025-43221",
"CVE-2025-31281",
"CVE-2025-31204",
"CVE-2025-43357",
"CVE-2025-43224",
"CVE-2025-43192",
"CVE-2025-43197",
"CVE-2025-43270",
"CVE-2025-43369",
"CVE-2025-31206",
"CVE-2025-43215",
"CVE-2025-43249",
"CVE-2025-43255",
"CVE-2025-43318",
"CVE-2025-31250",
"CVE-2025-43207",
"CVE-2025-43244",
"CVE-2025-43347",
"CVE-2025-43301",
"CVE-2025-43400",
"CVE-2025-43358",
"CVE-2025-43272",
"CVE-2025-43241",
"CVE-1999-0590",
"CVE-2025-43275",
"CVE-2025-43368",
"CVE-2025-43331",
"CVE-2025-24224",
"CVE-2025-31268",
"CVE-2025-31224",
"CVE-2025-43297",
"CVE-2025-43330",
"CVE-2025-43359",
"CVE-2025-31244",
"CVE-2025-43186",
"CVE-2025-43281",
"CVE-2025-43260",
"CVE-2025-43305",
"CVE-2025-43319",
"CVE-2025-43265",
"CVE-2025-43299",
"CVE-2025-24223",
"CVE-2025-43239",
"CVE-2025-43245",
"CVE-2025-31269",
"CVE-2025-31240",
"CVE-2025-31278",
"CVE-2025-43253",
"CVE-2025-43308",
"CVE-2025-31251",
"CVE-2025-43332",
"CVE-2025-43189",
"CVE-2025-31277",
"CVE-2025-43340",
"CVE-2025-43206",
"CVE-2025-31280",
"CVE-2025-43304",
"CVE-2025-43208",
"CVE-2025-31235",
"CVE-2025-31258",
"CVE-2025-43223",
"CVE-2025-31219",
"CVE-2025-43276",
"CVE-2025-43355",
"CVE-2025-43296",
"CVE-2025-43298",
"CVE-2025-43185",
"CVE-2025-43311",
"CVE-2025-43295",
"CVE-2025-31234",
"CVE-2025-43267",
"CVE-2025-43226",
"CVE-2025-43354",
"CVE-2025-31239",
"CVE-2025-31245",
"CVE-2025-43195",
"CVE-2025-43198",
"CVE-2025-43268",
"CVE-2025-31270",
"CVE-2025-43248",
"CVE-2025-31255",
"CVE-2025-43222",
"CVE-2025-24274",
"CVE-2025-43209",
"CVE-2025-43214",
"CVE-2025-43234",
"CVE-2025-43218",
"CVE-2025-43303",
"CVE-2025-43307",
"CVE-2025-43252",
"CVE-2025-43312",
"CVE-2025-43342",
"CVE-2025-43187",
"CVE-2025-31215",
"CVE-2025-43346",
"CVE-2025-43366",
"CVE-2025-43310",
"CVE-2025-43191",
"CVE-2025-43194",
"CVE-2025-31223",
"CVE-2025-43344",
"CVE-2025-43356",
"CVE-2025-43256",
"CVE-2025-43251",
"CVE-2025-24222",
"CVE-2025-43279",
"CVE-2025-43353",
"CVE-2025-43291",
"CVE-2025-43261",
"CVE-2025-43282",
"CVE-2025-31273",
"CVE-2025-43302",
"CVE-2025-43229",
"CVE-2025-31256",
"CVE-2025-31257",
"CVE-2025-24088",
"CVE-2025-43328",
"CVE-2025-43372",
"CVE-2025-43240",
"CVE-2025-31226",
"CVE-2025-43262",
"CVE-2025-43313",
"CVE-2025-43315",
"CVE-2025-31232",
"CVE-2025-31237",
"CVE-2025-43233",
"CVE-2025-43285",
"CVE-2025-30440",
"CVE-2025-43341",
"CVE-2025-43204",
"CVE-2025-31243",
"CVE-2025-31200",
"CVE-2025-43216",
"CVE-2025-31249",
"CVE-2025-43227",
"CVE-2025-31222",
"CVE-2025-43287",
"CVE-2025-43321",
"CVE-2025-43325",
"CVE-2025-43225",
"CVE-2025-31221",
"CVE-2025-43237",
"CVE-2025-31279",
"CVE-2025-43220",
"CVE-2025-31201",
"CVE-2025-31208",
"CVE-2025-31271",
"CVE-2025-43292",
"CVE-2025-31233",
"CVE-2025-43212",
"CVE-2025-43293",
"CVE-2025-43246",
"CVE-2025-43213",
"CVE-2025-43196",
"CVE-2025-43230",
"CVE-2025-43247",
"CVE-2025-31217",
"CVE-2025-24188",
"CVE-2025-31212",
"CVE-2025-31246"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Apple Inc.",
"manufacturer_web": "https://www.apple.com/",
"name": "Strong Customer Authentication for Apple Pay on Mac mini with M4 running macOS Sequoia 15.4, paired with Magic keyboard with Touch ID(macOS Sequoia 15.4 (build 24E248)) (ANSSI-CC-2025/36)",
"not_valid_after": "2030-10-23",
"not_valid_before": "2025-10-23",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "Certificat-ANSSI-CC-2025_36fr.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2025/36": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.3": 1
},
"ALC": {
"ALC_FLR.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 2
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20251020161716+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 25 pour Word",
"/ModDate": "D:20251023041359-07\u002700\u0027",
"/Producer": "PDFKit.NET 12.3.654.0 DMV10",
"pdf_file_size_bytes": 276737,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "ANSSI-CC-2025_36fr.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2025/36": 3
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.3": 1
},
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.3": 2
}
},
"cc_security_level": {
"EAL": {
"EAL2": 3,
"EAL4": 1
},
"ITSEC": {
"ITSEC E3 El\u00e9mentaire": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CESTI": {
"CESTI": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2022-11-001": 1
},
"ISO": {
"ISO/IEC 15408-": 1,
"ISO/IEC 18045:2022": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20251020161735+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 25 pour Word",
"/ModDate": "D:20251023041359-07\u002700\u0027",
"/Producer": "PDFKit.NET 12.3.654.0 DMV10",
"pdf_file_size_bytes": 665617,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"http://www.sogis.eu/",
"http://www.cyber.gouv.fr/",
"http://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 13
},
"st_filename": "ANSSI-Cible-CC-2025_36en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.DEVICE_AUTH": 3,
"A.NO_EVIL_ROOT_USER": 2,
"A.PERSO": 4,
"A.WATCH_USER": 4
},
"D": {
"D.OS": 17,
"D.SEP_SE": 3
},
"T": {
"T.COR-": 1,
"T.CORRUPT": 3,
"T.PHYSI-": 1,
"T.PHYSICAL": 1,
"T.RE-": 1,
"T.RECOVER": 3,
"T.REPLAY": 2,
"T.SILENT": 3,
"T.SKIM-": 1,
"T.SKIMMING": 2,
"T.USURP": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 3,
"ADV_FSP.1": 2,
"ADV_FSP.2": 4,
"ADV_FSP.3": 3,
"ADV_TDS.1": 4
},
"AGD": {
"AGD_OPE.1": 4,
"AGD_PRE.1": 4
},
"ALC": {
"ALC_CMC.2": 2,
"ALC_CMS.2": 2,
"ALC_DEL.1": 2,
"ALC_FLR": 1,
"ALC_FLR.3": 3
},
"ASE": {
"ASE_CCL.1": 2,
"ASE_ECD.1": 3,
"ASE_INT.1": 2,
"ASE_OBJ.2": 2,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 1,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_COV.1": 4,
"ATE_FUN.1": 3,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 2 augmented": 1,
"EAL2": 1
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC": 25,
"FDP_ACC.1": 12,
"FDP_ACC.2": 4,
"FDP_ACC.2.1": 1,
"FDP_ACC.2.2": 1,
"FDP_ACF": 23,
"FDP_ACF.1": 12,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_DAU.1": 4,
"FDP_DAU.1.1": 1,
"FDP_DAU.1.2": 1,
"FDP_ETC": 8,
"FDP_ETC.2": 2,
"FDP_ETC.2.1": 2,
"FDP_ETC.2.2": 2,
"FDP_ETC.2.3": 2,
"FDP_ETC.2.4": 2,
"FDP_IFC.1": 10,
"FDP_ITC.1": 4,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITT": 8,
"FDP_ITT.1.1": 2,
"FDP_RIP.1": 13,
"FDP_RIP.1.1": 1,
"FDP_SDI.1": 9,
"FDP_SDI.1.1": 1,
"FDP_UCT": 10,
"FDP_UCT.1": 1,
"FDP_UCT.1.1": 1,
"FDP_UIT": 10,
"FDP_UIT.1": 2,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL": 12,
"FIA_AFL.1": 1,
"FIA_AFL.1.1": 3,
"FIA_AFL.1.2": 3,
"FIA_ATD.1": 5,
"FIA_ATD.1.1": 2,
"FIA_SOS.2": 4,
"FIA_SOS.2.1": 1,
"FIA_SOS.2.2": 1,
"FIA_UAU.1": 1,
"FIA_UAU.2": 11,
"FIA_UAU.2.1": 1,
"FIA_UAU.5": 5,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 11,
"FIA_UAU.6.1": 2,
"FIA_UID.1": 1,
"FIA_UID.2": 6,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MSA.1": 6,
"FMT_MSA.1.1": 2,
"FMT_MSA.3": 14,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 4,
"FMT_MTD.1.1": 1,
"FMT_MTD.3": 4,
"FMT_MTD.3.1": 1,
"FMT_SMF.1": 6,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 10,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 17,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_ITC.1": 4,
"FPT_ITC.1.1": 1,
"FPT_RPL": 10,
"FPT_RPL.1": 4
},
"FTP": {
"FTP_ITC": 14,
"FTP_ITC.1": 7,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 4
}
},
"certification_process": {
"OutOfScope": {
"Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by": 1,
"out of scope": 2,
"to re- turn to its User. Note: Defending against device re-use after physical compromise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.Keyboard_Secret D.SEP_Watch* T.RE- COVER": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 2,
"TLS 1.2": 1
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-3": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 4
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20250812181208Z",
"/Creator": "Word",
"/ModDate": "D:20250812191229+01\u002700\u0027",
"/Producer": "Adobe Mac PDF Plug-in",
"/Title": "Microsoft Word - [ST] Macmini_M4_Keyboard_macOS15_SecurityTarget_v1.4.docx",
"pdf_file_size_bytes": 2944602,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 57
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025_36fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL2+",
"ADV_FSP.3",
"ALC_FLR.3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2025_36en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "6606fa0e696afd29214d8ff8d321407caa16c4f51eaa95b40c4f3d800548131b",
"txt_hash": "e132e57ecf218053ad1cad1b1a1d47e6b1aa74db5c6c64bc1b29c0c05aedd5c5"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2e9acd2cb4c64f8e80f92780d9480f7f217177b55121936608cb92bd475a2fa5",
"txt_hash": "0a4f7bedf86d39ce8b2f26392c4f7fae622c0b29b91cab09e4aeb68afa9cc018"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "5b9eb3a17b64ab24263e3586e4ac9ce674bd58508668f691800f80fbca3d7551",
"txt_hash": "089033b07ea28e62ae0ce8060a095406ed4766ed61674d235f96fc341d3798d3"
}
},
"status": "active"
}