McAfee Application Control v5.0, Change Control v5.0, and Integrity Monitor v5.0 with McAfee Agent v4.5 and ePolicy Orchestrator v4.5

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status archived
Valid from 14.01.2011
Valid until 15.05.2017
Scheme 🇨🇦 CA
Manufacturer McAfee, Inc.
Category Data Protection
Security level ALC_FLR.2, EAL3+
Maintenance updates Maintenance Report for McAfee Application Control v5.1, Change Control v5.1, and Integrity Monitor v5.1 with McAfee Agent v4.5 and ePolicy Orchestrator v4.5 (16.06.2011) Certification report
McAfee Application Control v6.0 and Change Control v6.0 with McAfee Agent v4.6 and ePolicy Orchestrator v4.6 (23.03.2012) Certification report
McAfee Application Control v6.1 and Change Control v6.1 with McAfee Agent v4.6 and ePolicy Orchestrator v4.6 (27.12.2012) Certification report

Heuristics summary ?

Certificate ID: 383-4-153

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, Triple-DES, 3DES, HMAC
Asymmetric Algorithms
DSA
Hash functions
SHA-1

Vendor
Microsoft Corporation, Microsoft

Security level
EAL 3+, EAL 3, EAL 3 augmented
Security Assurance Requirements (SAR)
ALC_FLR, ALC_FLR.2
Certificates
383-4-153-CR
Evaluation facilities
EWA-Canada

Standards
FIPS 140-2, FIPS 46-3, FIPS 197, FIPS 186-2, FIPS 180-2, FIPS 198, ISO/IEC 17025:2005

File metadata

Title EAL 3+ Evaluation of McAfee Application Control v5
Author rareade
Creation date D:20110207085153-05'00'
Modification date D:20110207085320-05'00'
Pages 15
Creator Acrobat PDFMaker 9.0 for Word
Producer Acrobat Distiller 9.0.0 (Windows)

Security target ?

Extracted keywords

Symmetric Algorithms
AES, 3DES, HMAC
Asymmetric Algorithms
DSA
Hash functions
SHA-1
Randomness
PRNG
Block cipher modes
CBC

Vendor
Microsoft, Cisco

Security level
EAL3+, EAL3, EAL3 augmented
Claims
O.AUDIT, O.ACCESS, O.AUDIT_REVIEW, O.IDENTIFY, O.EADMIN, O.PROTECT, O.COLLECT, O.ANALYZE, O.REACT, T.AUTHENTICATE, T.COMPROMISE, T.PROTECT, T.APP_CHG_CONTROL, A.ACCESS, A.ASCOPE, A.TIME, A.LOCATE, A.PROTECT, A.MANAGE, A.NOEVIL, A.DYNAMIC, OE.TIME, OE.INTEROP, OE.AUTHENTICATE, OE.MANAGE
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.4, FDP_ITC.1, FDP_ITC.2, FIA_ATD.1, FIA_UID.2, FIA_USB.1, FIA_ATD.1.1, FIA_UID.1, FIA_UID.2.1, FIA_USB, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_ITT.1, FPT_STM.1, FPT_ITT.1.1

Standards
FIPS 140-2, FIPS 186-2, FIPS 197, FIPS 46-3, FIPS 198, FIPS 180-3

File metadata

Title McAfee Application Control and Change Control v5.0 ST v0.6
Author anicewick
Creation date D:20101216082458-05'00'
Modification date D:20110117101915-05'00'
Pages 55
Creator PDFCreator Version 0.9.3
Producer GPL Ghostscript 8.54

Heuristics ?

Certificate ID: 383-4-153

Extracted SARs

ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_LCD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2012-4594
C M N
MEDIUM 4.0 2.9 22.08.2012 10:42
CVE-2013-0140
C M N
HIGH 7.9 10.0 01.05.2013 12:00
CVE-2013-0141
C M N
MEDIUM 4.3 4.9 01.05.2013 12:00
CVE-2013-3627
C M N
MEDIUM 5.0 2.9 05.10.2013 10:55
CVE-2013-4882
C M N
MEDIUM 6.5 6.4 22.07.2013 11:21
CVE-2013-4883
C M N
MEDIUM 4.3 2.9 22.07.2013 11:21
CVE-2014-2205
C M N
MEDIUM 6.3 6.9 26.02.2014 15:55
CVE-2015-0921
C M N
MEDIUM 4.0 2.9 09.01.2015 18:59
CVE-2015-0922
C M N
MEDIUM 5.0 2.9 09.01.2015 18:59
CVE-2015-2859
C M N
MEDIUM 5.8 4.9 23.06.2015 21:59
CVE-2015-4559
C M N
MEDIUM 4.3 2.9 15.06.2015 15:59
CVE-2015-8765
C M N
HIGH 8.3 3.7 08.01.2016 20:59
CVE-2015-8987
C M N
MEDIUM 5.3 3.6 14.03.2017 22:59
CVE-2016-3984
C M N
MEDIUM 5.1 4.2 08.04.2016 15:59
CVE-2017-3896
C M N
MEDIUM 5.9 3.6 13.02.2017 16:59
CVE-2017-3980
C M N
HIGH 7.2 5.9 18.05.2017 19:29
CVE-2019-3604
C M N
HIGH 8.8 5.9 01.02.2019 15:29
CVE-2020-13938
C M N
MEDIUM 5.5 3.6 10.06.2021 07:15
CVE-2020-7317
C M N
MEDIUM 4.3 2.7 14.10.2020 19:15
CVE-2021-2161
C M N
MEDIUM 4.3 2.9 22.04.2021 22:15
CVE-2021-23840
C M N
HIGH 7.5 3.6 16.02.2021 17:15
CVE-2021-23888
C M N
MEDIUM 6.3 4.2 26.03.2021 10:15
CVE-2021-23889
C M N
MEDIUM 4.8 2.7 26.03.2021 10:15
CVE-2021-23890
C M N
MEDIUM 6.5 2.5 26.03.2021 10:15
CVE-2021-2432
C M N
MEDIUM 4.3 2.9 21.07.2021 15:16
CVE-2021-30639
C M N
HIGH 7.5 3.6 12.07.2021 15:15
CVE-2021-31834
C M N
MEDIUM 5.4 2.7 22.10.2021 11:15
CVE-2021-31835
C M N
MEDIUM 4.8 2.7 22.10.2021 11:15
CVE-2021-33037
C M N
MEDIUM 5.3 1.4 12.07.2021 15:15
CVE-2021-3712
C M N
HIGH 7.4 5.2 24.08.2021 15:15
CVE-2022-0842
C M N
MEDIUM 4.9 3.6 23.03.2022 14:15
CVE-2022-0857
C M N
MEDIUM 6.1 2.7 23.03.2022 15:15
CVE-2022-0858
C M N
MEDIUM 4.7 1.4 23.03.2022 15:15
CVE-2022-0859
C M N
MEDIUM 6.7 5.9 23.03.2022 15:15
CVE-2022-0861
C M N
LOW 3.8 2.5 23.03.2022 15:15
CVE-2022-0862
C M N
MEDIUM 5.3 1.4 23.03.2022 15:15
CVE-2022-1257
C M N
MEDIUM 5.5 3.6 14.04.2022 15:15
CVE-2022-1258
C M N
HIGH 7.2 5.9 14.04.2022 15:15
CVE-2022-3338
C M N
MEDIUM 5.4 2.7 18.10.2022 10:15
CVE-2022-3339
C M N
MEDIUM 6.1 2.7 18.10.2022 10:15
CVE-2023-3946
C M N
MEDIUM 6.1 2.7 26.07.2023 06:15
CVE-2023-5444
C M N
HIGH 8.0 5.9 17.11.2023 10:15
CVE-2023-5445
C M N
MEDIUM 5.4 2.7 17.11.2023 10:15
Showing 5 out of 43.

References ?

No references are available for this certificate.

Updates ?

  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 30.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2023-3946', 'CVE-2023-5444', 'CVE-2023-5445']} values added.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ca811c64885104b76b91dba1dcdc3e242feb2acb2d52d49b10fbb35822a1eaf4', 'txt_hash': 'f67d05d606081d709a15ab5ca5d42fb1e37fc4d95be82b4606c5708544d56ff6'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '0e7bfe3e8189179779e482fb2b3bbb4c6ada921a90e4da063be22a1bb076b650', 'txt_hash': '2d15aefeea005403a4d1011d3cd023be8f228807ff178a898a45a7af4fc9da83'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 91704, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 15, '/AM_ACPP_Date': '[dd month yyyy]', '/AM_ACPP_Doc#': '[AM_AMCPP_Doc#]', '/AM_ACPP_Title': 'Assurance Continuity Program Plan (ACPP)', '/AM_ACPP_Version': '[AM_AMCPP_Version]', '/AM_IAR_Date': '[dd month yyyy]', '/AM_IAR_Doc#': '[AM_IAR_Doc#]', '/AM_IAR_Title': 'Assurance Maintenace Impact Analysis Report', '/AM_IAR_Version': '[AM_IAR_Version]', '/AM_ST Date': '[dd month yyyy]', '/AM_ST Title': '[AM_ST Title]', '/AM_ST Version': '[AM_ST Version]', '/AM_TOE': '[AM_TOE]', '/AM_TOE Short': '[AM_TOE Short]', '/AM_TOE Version': '[AM_TOE Version]', '/Author': 'rareade', '/CC Version': '3.1R3', '/CC date': 'July 2009', '/CEM Version': '3.1R3', '/CEM date': 'July 2009', '/CR_Date': '[dd month yyyy]', '/CR_Version': 'X.X', '/Client City': 'Santa Clara', '/Client Country': 'USA', '/Client Full Name': 'McAfee, Inc.', '/Client Postal Code': '95054', '/Client Short Name': 'McAfee', '/Client State': 'California', '/Client Street': '3965 Freedom Circle', '/CreationDate': "D:20110207085153-05'00'", '/Creator': 'Acrobat PDFMaker 9.0 for Word', '/Developer Long Name': 'McAfee, Incorporated', '/Developer Short Name': 'McAfee', '/EAL Level': '3+', '/EAL Level Base': '3', '/EAL Level Text': '3 augmented', '/EAL Long': 'EAL 3 Augmented', '/EAL Short': 'EAL 3+', '/ETPlan_Doc#': '1657-000-D003', '/ETPlan_Title': 'Evaluation Test Plan', '/ETPlan_Version': '1.0', '/ETPlan_date': '1 December 2010', '/ETProcRes_Date': 'dd month yyyyy', '/ETProcRes_Doc#': '1657-000-D005', '/ETProcRes_Title': 'Evaluation Test Results', '/ETProcRes_Version': 'X.X', '/ETProc_Date': '1 December 2010', '/ETProc_Doc#': '1657-000-D004', '/ETProc_Title': 'Evaluation Test Procedures and Test Results', '/ETProc_Version': '1.0', '/ETReport_Date': '16 December 2010', '/ETReport_Doc#': '1657-000-D002', '/ETReport_Title': 'Evaluation Technical Report', '/ETReport_TitleShort': 'ETR', '/ETReport_Version': '1.3', '/EWP_Date': '5 March 2010', '/EWP_Doc#': '1657-000-D001', '/EWP_Title': 'Evaluation Work Plan', '/EWP_Version': '1.1', '/Eval number': '383-4-153', '/Eval_End_Date': '[dd month yyyy (date on certificate)]', '/Eval_Start_Date': 'dd month yyyy', '/ModDate': "D:20110207085320-05'00'", '/Producer': 'Acrobat Distiller 9.0.0 (Windows)', '/ProjectNumber': '1657', '/ST_Date': '14 December 2010', '/ST_Title': 'McAfee Application Control v5.0, Change Control v5.0, and Integrity Monitor v5.0 with McAfee Agent v4.5 and ePolicy Orchestrator v4.5 Security Target', '/ST_Version': '0.6', '/SVC_Date': 'dd month yyyyy', '/SVC_Doc#': '1657-000-D007', '/SVC_Title': 'Site Visit Checklist', '/SVC_Version': 'X.X', '/SVR_Date': '25 October 2010', '/SVR_Doc#': '1657-000-D006', '/SVR_Title': 'Site Visit Report', '/SVR_Version': '1.0', '/SV_City': 'Gurgaon', '/Security Classification': 'EWA-Canada & McAfee Proprietary', '/SourceModified': 'D:20110207135109', '/Sponsor': 'tbd', '/Sponsor City': 'tbd', '/Sponsor Country': 'tbd', '/Sponsor Postal Code': 'tbd', '/Sponsor State': 'tbd', '/Sponsor Street': 'tbd', '/TOE': 'McAfee Application Control v5.0, Change Control v5.0, and Integrity Monitor v5.0 with McAfee Agent v4.5 and ePolicy Orchestrator v4.5', '/TOE Line1': '[TOE Line1 - enter later for PCR or web page]', '/TOE Line2': '[TOE Line2 - enter later for PCR or web page]', '/TOE Line3': '[TOE Line3 - enter later for PCR or web page]', '/TOE Line4': '[TOE Line4 - enter later for PCR or web page]', '/TOE Line5': '[TOE Line5 - enter later for PCR or web page]', '/TOE Short': 'McAfee AC, CC & IM + Agent and ePO', '/TOE Short with version': 'McAfee AC v5.0, CCv5.0 & IM v5.0 + Agent v4.5 and ePO v4.5', '/TOE Short-NoTM': 'McAfee AC, CC, & IM with Agent & ePO', '/TOE Version': '5.0', '/TOE with version': 'McAfee Application Control v5.0, Change Control v5.0, and Integrity Monitor v5.0 with McAfee Agent v4.5 and ePolicy Orchestrator v4.5', '/TOE-NoTM': 'McAfee AC, CC & IM + Agent and ePO', '/Title': 'EAL 3+ Evaluation of McAfee Application Control v5', '/_AdHocReviewCycleID': '-2122720358', '/_AuthorEmail': '[email protected]', '/_AuthorEmailDisplayName': 'Reade, Rick A.', '/_EmailSubject': 'CCS CPL post request ... rick', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 3727387, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 55, '/Author': 'anicewick', '/CreationDate': "D:20101216082458-05'00'", '/Creator': 'PDFCreator Version 0.9.3', '/Keywords': '', '/ModDate': "D:20110117101915-05'00'", '/Producer': 'GPL Ghostscript 8.54', '/Subject': '', '/Title': 'McAfee Application Control and Change Control v5.0 ST v0.6', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'CA': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'CA': {'383-4-153-CR': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3+': 3, 'EAL 3': 4, 'EAL 3 augmented': 2}}, 'cc_sar': {'ALC': {'ALC_FLR': 1, 'ALC_FLR.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Microsoft': {'Microsoft Corporation': 1, 'Microsoft': 1}}, 'eval_facility': {'EWA': {'EWA-Canada': 4}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'3DES': {'Triple-DES': 1, '3DES': 1}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'FF': {'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 1, 'FIPS 46-3': 1, 'FIPS 197': 1, 'FIPS 186-2': 1, 'FIPS 180-2': 1, 'FIPS 198': 1}, 'ISO': {'ISO/IEC 17025:2005': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3+': 1, 'EAL3': 4, 'EAL3 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 4, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 10, 'FAU_SAR.1': 9, 'FAU_SAR.2': 7, 'FAU_SAR.3': 7, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1}, 'FCS': {'FCS_COP.1': 5, 'FCS_COP.1.1': 1, 'FCS_CKM.1': 1, 'FCS_CKM.4': 2}, 'FDP': {'FDP_ITC.1': 1, 'FDP_ITC.2': 1}, 'FIA': {'FIA_ATD.1': 7, 'FIA_UID.2': 8, 'FIA_USB.1': 8, 'FIA_ATD.1.1': 1, 'FIA_UID.1': 5, 'FIA_UID.2.1': 1, 'FIA_USB': 1}, 'FMT': {'FMT_MTD.1': 7, 'FMT_SMF.1': 8, 'FMT_SMR.1': 9, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_ITT.1': 6, 'FPT_STM.1': 3, 'FPT_ITT.1.1': 1}}, 'cc_claims': {'O': {'O.AUDIT': 4, 'O.ACCESS': 5, 'O.AUDIT_REVIEW': 4, 'O.IDENTIFY': 4, 'O.EADMIN': 4, 'O.PROTECT': 6, 'O.COLLECT': 4, 'O.ANALYZE': 4, 'O.REACT': 4}, 'T': {'T.AUTHENTICATE': 2, 'T.COMPROMISE': 2, 'T.PROTECT': 2, 'T.APP_CHG_CONTROL': 2}, 'A': {'A.ACCESS': 2, 'A.ASCOPE': 2, 'A.TIME': 2, 'A.LOCATE': 2, 'A.PROTECT': 2, 'A.MANAGE': 2, 'A.NOEVIL': 2, 'A.DYNAMIC': 2}, 'OE': {'OE.TIME': 3, 'OE.INTEROP': 7, 'OE.AUTHENTICATE': 3, 'OE.MANAGE': 2}}, 'vendor': {'Microsoft': {'Microsoft': 3}, 'Cisco': {'Cisco': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'3DES': {'3DES': 1}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'FF': {'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'PRNG': {'PRNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 4, 'FIPS 186-2': 3, 'FIPS 197': 1, 'FIPS 46-3': 1, 'FIPS 198': 1, 'FIPS 180-3': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to mcafee-appl-v50-cert-eng.pdf.
    • The st_filename property was set to mcafee-appl-v50-sec-eng.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to 383-4-153.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/mcafee-appl-v50-cert-eng.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/mcafee-appl-v50-sec-eng.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name McAfee Application Control v5.0, Change Control v5.0, and Integrity Monitor v5.0 with McAfee Agent v4.5 and ePolicy Orchestrator v4.5 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Data Protection",
  "cert_link": null,
  "dgst": "3b51c1b9523740c7",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "383-4-153",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.4:*:*:*:*:*:*:*",
        "cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.3:*:*:*:*:*:*:*",
        "cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.6:*:*:*:*:*:*:*",
        "cpe:2.3:a:mcafee:epolicy_orchestrator:5.0.0:*:*:*:*:*:*:*",
        "cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.0:*:*:*:*:*:*:*",
        "cpe:2.3:a:mcafee:epolicy_orchestrator:5.0.1:*:*:*:*:*:*:*",
        "cpe:2.3:a:mcafee:mcafee_agent:5.0.4:*:*:*:*:*:*:*",
        "cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.7:*:*:*:*:*:*:*",
        "cpe:2.3:a:mcafee:agent:4.5.0:*:*:*:*:*:*:*",
        "cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.5:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.5",
        "5.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2023-5445",
        "CVE-2014-2205",
        "CVE-2015-4559",
        "CVE-2022-3339",
        "CVE-2022-3338",
        "CVE-2021-2161",
        "CVE-2015-2859",
        "CVE-2023-5444",
        "CVE-2022-0859",
        "CVE-2022-1257",
        "CVE-2021-3712",
        "CVE-2021-31834",
        "CVE-2021-23889",
        "CVE-2013-3627",
        "CVE-2016-3984",
        "CVE-2020-13938",
        "CVE-2020-7317",
        "CVE-2013-0141",
        "CVE-2021-30639",
        "CVE-2013-0140",
        "CVE-2015-0921",
        "CVE-2015-8765",
        "CVE-2022-1258",
        "CVE-2021-23840",
        "CVE-2023-3946",
        "CVE-2022-0857",
        "CVE-2015-0922",
        "CVE-2022-0842",
        "CVE-2013-4882",
        "CVE-2021-31835",
        "CVE-2021-23888",
        "CVE-2012-4594",
        "CVE-2022-0861",
        "CVE-2017-3980",
        "CVE-2017-3896",
        "CVE-2021-23890",
        "CVE-2021-2432",
        "CVE-2015-8987",
        "CVE-2019-3604",
        "CVE-2022-0862",
        "CVE-2013-4883",
        "CVE-2021-33037",
        "CVE-2022-0858"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2012-03-23",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-7-73%20MR%20v1.0e.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "McAfee Application Control v6.0 and Change Control v6.0 with McAfee Agent v4.6 and ePolicy Orchestrator v4.6"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2012-12-27",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/mcafee-appl-v61-feb-maint-eng.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "McAfee Application Control v6.1 and Change Control v6.1 with McAfee Agent v4.6 and ePolicy Orchestrator v4.6"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2011-06-16",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-7-63%20MR%20v1.0e.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Maintenance Report for McAfee Application Control v5.1, Change Control v5.1, and Integrity Monitor v5.1 with McAfee Agent v4.5 and ePolicy Orchestrator v4.5"
      }
    ]
  },
  "manufacturer": "McAfee, Inc.",
  "manufacturer_web": "https://www.mcafee.com/",
  "name": "McAfee Application Control v5.0, Change Control v5.0, and Integrity Monitor v5.0 with McAfee Agent v4.5 and ePolicy Orchestrator v4.5",
  "not_valid_after": "2017-05-15",
  "not_valid_before": "2011-01-14",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "mcafee-appl-v50-cert-eng.pdf",
    "report_frontpage": {
      "CA": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DSA": {
            "DSA": 1
          }
        }
      },
      "cc_cert_id": {
        "CA": {
          "383-4-153-CR": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1,
          "ALC_FLR.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 3": 4,
          "EAL 3 augmented": 2,
          "EAL 3+": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "EWA": {
          "EWA-Canada": 4
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS 180-2": 1,
          "FIPS 186-2": 1,
          "FIPS 197": 1,
          "FIPS 198": 1,
          "FIPS 46-3": 1
        },
        "ISO": {
          "ISO/IEC 17025:2005": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1,
            "Triple-DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1,
          "Microsoft Corporation": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/AM_ACPP_Date": "[dd month yyyy]",
      "/AM_ACPP_Doc#": "[AM_AMCPP_Doc#]",
      "/AM_ACPP_Title": "Assurance Continuity Program Plan (ACPP)",
      "/AM_ACPP_Version": "[AM_AMCPP_Version]",
      "/AM_IAR_Date": "[dd month yyyy]",
      "/AM_IAR_Doc#": "[AM_IAR_Doc#]",
      "/AM_IAR_Title": "Assurance Maintenace Impact Analysis Report",
      "/AM_IAR_Version": "[AM_IAR_Version]",
      "/AM_ST Date": "[dd month yyyy]",
      "/AM_ST Title": "[AM_ST Title]",
      "/AM_ST Version": "[AM_ST Version]",
      "/AM_TOE": "[AM_TOE]",
      "/AM_TOE Short": "[AM_TOE Short]",
      "/AM_TOE Version": "[AM_TOE Version]",
      "/Author": "rareade",
      "/CC Version": "3.1R3",
      "/CC date": "July 2009",
      "/CEM Version": "3.1R3",
      "/CEM date": "July 2009",
      "/CR_Date": "[dd month yyyy]",
      "/CR_Version": "X.X",
      "/Client City": "Santa Clara",
      "/Client Country": "USA",
      "/Client Full Name": "McAfee, Inc.",
      "/Client Postal Code": "95054",
      "/Client Short Name": "McAfee",
      "/Client State": "California",
      "/Client Street": "3965 Freedom Circle",
      "/CreationDate": "D:20110207085153-05\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 9.0 for Word",
      "/Developer Long Name": "McAfee, Incorporated",
      "/Developer Short Name": "McAfee",
      "/EAL Level": "3+",
      "/EAL Level Base": "3",
      "/EAL Level Text": "3 augmented",
      "/EAL Long": "EAL 3 Augmented",
      "/EAL Short": "EAL 3+",
      "/ETPlan_Doc#": "1657-000-D003",
      "/ETPlan_Title": "Evaluation Test Plan",
      "/ETPlan_Version": "1.0",
      "/ETPlan_date": "1 December 2010",
      "/ETProcRes_Date": "dd month yyyyy",
      "/ETProcRes_Doc#": "1657-000-D005",
      "/ETProcRes_Title": "Evaluation Test Results",
      "/ETProcRes_Version": "X.X",
      "/ETProc_Date": "1 December 2010",
      "/ETProc_Doc#": "1657-000-D004",
      "/ETProc_Title": "Evaluation Test Procedures and Test Results",
      "/ETProc_Version": "1.0",
      "/ETReport_Date": "16 December 2010",
      "/ETReport_Doc#": "1657-000-D002",
      "/ETReport_Title": "Evaluation Technical Report",
      "/ETReport_TitleShort": "ETR",
      "/ETReport_Version": "1.3",
      "/EWP_Date": "5 March 2010",
      "/EWP_Doc#": "1657-000-D001",
      "/EWP_Title": "Evaluation Work Plan",
      "/EWP_Version": "1.1",
      "/Eval number": "383-4-153",
      "/Eval_End_Date": "[dd month yyyy (date on certificate)]",
      "/Eval_Start_Date": "dd month yyyy",
      "/ModDate": "D:20110207085320-05\u002700\u0027",
      "/Producer": "Acrobat Distiller 9.0.0 (Windows)",
      "/ProjectNumber": "1657",
      "/ST_Date": "14 December 2010",
      "/ST_Title": "McAfee Application Control v5.0, Change Control v5.0, and Integrity Monitor v5.0 with McAfee Agent v4.5 and ePolicy Orchestrator v4.5 Security Target",
      "/ST_Version": "0.6",
      "/SVC_Date": "dd month yyyyy",
      "/SVC_Doc#": "1657-000-D007",
      "/SVC_Title": "Site Visit Checklist",
      "/SVC_Version": "X.X",
      "/SVR_Date": "25 October 2010",
      "/SVR_Doc#": "1657-000-D006",
      "/SVR_Title": "Site Visit Report",
      "/SVR_Version": "1.0",
      "/SV_City": "Gurgaon",
      "/Security Classification": "EWA-Canada \u0026 McAfee Proprietary",
      "/SourceModified": "D:20110207135109",
      "/Sponsor": "tbd",
      "/Sponsor City": "tbd",
      "/Sponsor Country": "tbd",
      "/Sponsor Postal Code": "tbd",
      "/Sponsor State": "tbd",
      "/Sponsor Street": "tbd",
      "/TOE": "McAfee Application Control v5.0, Change Control v5.0, and Integrity Monitor v5.0 with McAfee Agent v4.5 and ePolicy Orchestrator v4.5",
      "/TOE Line1": "[TOE Line1 - enter later for PCR or web page]",
      "/TOE Line2": "[TOE Line2 - enter later for PCR or web page]",
      "/TOE Line3": "[TOE Line3 - enter later for PCR or web page]",
      "/TOE Line4": "[TOE Line4 - enter later for PCR or web page]",
      "/TOE Line5": "[TOE Line5 - enter later for PCR or web page]",
      "/TOE Short": "McAfee AC, CC \u0026 IM + Agent and ePO",
      "/TOE Short with version": "McAfee AC v5.0, CCv5.0 \u0026 IM v5.0 + Agent v4.5 and ePO v4.5",
      "/TOE Short-NoTM": "McAfee AC, CC, \u0026 IM with Agent \u0026 ePO",
      "/TOE Version": "5.0",
      "/TOE with version": "McAfee Application Control v5.0, Change Control v5.0, and Integrity Monitor v5.0 with McAfee Agent v4.5 and ePolicy Orchestrator v4.5",
      "/TOE-NoTM": "McAfee AC, CC \u0026 IM + Agent and ePO",
      "/Title": "EAL 3+ Evaluation of McAfee Application Control v5",
      "/_AdHocReviewCycleID": "-2122720358",
      "/_AuthorEmail": "[email protected]",
      "/_AuthorEmailDisplayName": "Reade, Rick A.",
      "/_EmailSubject": "CCS CPL post request ... rick",
      "pdf_file_size_bytes": 91704,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 15
    },
    "st_filename": "mcafee-appl-v50-sec-eng.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DSA": {
            "DSA": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ACCESS": 2,
          "A.ASCOPE": 2,
          "A.DYNAMIC": 2,
          "A.LOCATE": 2,
          "A.MANAGE": 2,
          "A.NOEVIL": 2,
          "A.PROTECT": 2,
          "A.TIME": 2
        },
        "O": {
          "O.ACCESS": 5,
          "O.ANALYZE": 4,
          "O.AUDIT": 4,
          "O.AUDIT_REVIEW": 4,
          "O.COLLECT": 4,
          "O.EADMIN": 4,
          "O.IDENTIFY": 4,
          "O.PROTECT": 6,
          "O.REACT": 4
        },
        "OE": {
          "OE.AUTHENTICATE": 3,
          "OE.INTEROP": 7,
          "OE.MANAGE": 2,
          "OE.TIME": 3
        },
        "T": {
          "T.APP_CHG_CONTROL": 2,
          "T.AUTHENTICATE": 2,
          "T.COMPROMISE": 2,
          "T.PROTECT": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.3": 1,
          "ADV_TDS.2": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.3": 1,
          "ALC_CMS.3": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR.2": 4,
          "ALC_LCD.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 4,
          "EAL3 augmented": 1,
          "EAL3+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 10,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_SAR.1": 9,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 7,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3": 7,
          "FAU_SAR.3.1": 1
        },
        "FCS": {
          "FCS_CKM.1": 1,
          "FCS_CKM.4": 2,
          "FCS_COP.1": 5,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_ITC.1": 1,
          "FDP_ITC.2": 1
        },
        "FIA": {
          "FIA_ATD.1": 7,
          "FIA_ATD.1.1": 1,
          "FIA_UID.1": 5,
          "FIA_UID.2": 8,
          "FIA_UID.2.1": 1,
          "FIA_USB": 1,
          "FIA_USB.1": 8
        },
        "FMT": {
          "FMT_MTD.1": 7,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 8,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 9,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_ITT.1": 6,
          "FPT_ITT.1.1": 1,
          "FPT_STM.1": 3
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 4,
          "FIPS 180-3": 1,
          "FIPS 186-2": 3,
          "FIPS 197": 1,
          "FIPS 198": 1,
          "FIPS 46-3": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 1
        },
        "Microsoft": {
          "Microsoft": 3
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "anicewick",
      "/CreationDate": "D:20101216082458-05\u002700\u0027",
      "/Creator": "PDFCreator Version 0.9.3",
      "/Keywords": "",
      "/ModDate": "D:20110117101915-05\u002700\u0027",
      "/Producer": "GPL Ghostscript 8.54",
      "/Subject": "",
      "/Title": "McAfee Application Control and Change Control v5.0 ST v0.6",
      "pdf_file_size_bytes": 3727387,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 55
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/mcafee-appl-v50-cert-eng.pdf",
  "scheme": "CA",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3+",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/mcafee-appl-v50-sec-eng.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ca811c64885104b76b91dba1dcdc3e242feb2acb2d52d49b10fbb35822a1eaf4",
      "txt_hash": "f67d05d606081d709a15ab5ca5d42fb1e37fc4d95be82b4606c5708544d56ff6"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "0e7bfe3e8189179779e482fb2b3bbb4c6ada921a90e4da063be22a1bb076b650",
      "txt_hash": "2d15aefeea005403a4d1011d3cd023be8f228807ff178a898a45a7af4fc9da83"
    }
  },
  "status": "archived"
}