McAfee Application Control v5.0, Change Control v5.0, and Integrity Monitor v5.0 with McAfee Agent v4.5 and ePolicy Orchestrator v4.5
CSV information ?
Status | archived |
---|---|
Valid from | 14.01.2011 |
Valid until | 15.05.2017 |
Scheme | 🇨🇦 CA |
Manufacturer | McAfee, Inc. |
Category | Data Protection |
Security level | ALC_FLR.2, EAL3+ |
Maintenance updates | Maintenance Report for McAfee Application Control v5.1, Change Control v5.1, and Integrity Monitor v5.1 with McAfee Agent v4.5 and ePolicy Orchestrator v4.5 (16.06.2011) Certification report |
McAfee Application Control v6.0 and Change Control v6.0 with McAfee Agent v4.6 and ePolicy Orchestrator v4.6 (23.03.2012) Certification report | |
McAfee Application Control v6.1 and Change Control v6.1 with McAfee Agent v4.6 and ePolicy Orchestrator v4.6 (27.12.2012) Certification report |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, Triple-DES, 3DES, HMACAsymmetric Algorithms
DSAHash functions
SHA-1Vendor
Microsoft Corporation, MicrosoftSecurity level
EAL 3+, EAL 3, EAL 3 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR, ALC_FLR.2Certificates
383-4-153-CREvaluation facilities
EWA-CanadaStandards
FIPS 140-2, FIPS 46-3, FIPS 197, FIPS 186-2, FIPS 180-2, FIPS 198, ISO/IEC 17025:2005File metadata
Title | EAL 3+ Evaluation of McAfee Application Control v5 |
---|---|
Author | rareade |
Creation date | D:20110207085153-05'00' |
Modification date | D:20110207085320-05'00' |
Pages | 15 |
Creator | Acrobat PDFMaker 9.0 for Word |
Producer | Acrobat Distiller 9.0.0 (Windows) |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, 3DES, HMACAsymmetric Algorithms
DSAHash functions
SHA-1Randomness
PRNGBlock cipher modes
CBCVendor
Microsoft, CiscoSecurity level
EAL3+, EAL3, EAL3 augmentedClaims
O.AUDIT, O.ACCESS, O.AUDIT_REVIEW, O.IDENTIFY, O.EADMIN, O.PROTECT, O.COLLECT, O.ANALYZE, O.REACT, T.AUTHENTICATE, T.COMPROMISE, T.PROTECT, T.APP_CHG_CONTROL, A.ACCESS, A.ASCOPE, A.TIME, A.LOCATE, A.PROTECT, A.MANAGE, A.NOEVIL, A.DYNAMIC, OE.TIME, OE.INTEROP, OE.AUTHENTICATE, OE.MANAGESecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.4, FDP_ITC.1, FDP_ITC.2, FIA_ATD.1, FIA_UID.2, FIA_USB.1, FIA_ATD.1.1, FIA_UID.1, FIA_UID.2.1, FIA_USB, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_ITT.1, FPT_STM.1, FPT_ITT.1.1Standards
FIPS 140-2, FIPS 186-2, FIPS 197, FIPS 46-3, FIPS 198, FIPS 180-3File metadata
Title | McAfee Application Control and Change Control v5.0 ST v0.6 |
---|---|
Author | anicewick |
Creation date | D:20101216082458-05'00' |
Modification date | D:20110117101915-05'00' |
Pages | 55 |
Creator | PDFCreator Version 0.9.3 |
Producer | GPL Ghostscript 8.54 |
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_LCD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2CPE matches
- cpe:2.3:a:mcafee:agent:4.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:mcafee:epolicy_orchestrator:5.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:mcafee:epolicy_orchestrator:5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mcafee:mcafee_agent:5.0.4:*:*:*:*:*:*:*
Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-2012-4594 | MEDIUM | 4.0 | 2.9 | 22.08.2012 10:42 | ||
CVE-2013-0140 | HIGH | 7.9 | 10.0 | 01.05.2013 12:00 | ||
CVE-2013-0141 | MEDIUM | 4.3 | 4.9 | 01.05.2013 12:00 | ||
CVE-2013-3627 | MEDIUM | 5.0 | 2.9 | 05.10.2013 10:55 | ||
CVE-2013-4882 | MEDIUM | 6.5 | 6.4 | 22.07.2013 11:21 | ||
CVE-2013-4883 | MEDIUM | 4.3 | 2.9 | 22.07.2013 11:21 | ||
CVE-2014-2205 | MEDIUM | 6.3 | 6.9 | 26.02.2014 15:55 | ||
CVE-2015-0921 | MEDIUM | 4.0 | 2.9 | 09.01.2015 18:59 | ||
CVE-2015-0922 | MEDIUM | 5.0 | 2.9 | 09.01.2015 18:59 | ||
CVE-2015-2859 | MEDIUM | 5.8 | 4.9 | 23.06.2015 21:59 | ||
CVE-2015-4559 | MEDIUM | 4.3 | 2.9 | 15.06.2015 15:59 | ||
CVE-2015-8765 | HIGH | 8.3 | 3.7 | 08.01.2016 20:59 | ||
CVE-2015-8987 | MEDIUM | 5.3 | 3.6 | 14.03.2017 22:59 | ||
CVE-2016-3984 | MEDIUM | 5.1 | 4.2 | 08.04.2016 15:59 | ||
CVE-2017-3896 | MEDIUM | 5.9 | 3.6 | 13.02.2017 16:59 | ||
CVE-2017-3980 | HIGH | 7.2 | 5.9 | 18.05.2017 19:29 | ||
CVE-2019-3604 | HIGH | 8.8 | 5.9 | 01.02.2019 15:29 | ||
CVE-2020-13938 | MEDIUM | 5.5 | 3.6 | 10.06.2021 07:15 | ||
CVE-2020-7317 | MEDIUM | 4.3 | 2.7 | 14.10.2020 19:15 | ||
CVE-2021-2161 | MEDIUM | 4.3 | 2.9 | 22.04.2021 22:15 | ||
CVE-2021-23840 | HIGH | 7.5 | 3.6 | 16.02.2021 17:15 | ||
CVE-2021-23888 | MEDIUM | 6.3 | 4.2 | 26.03.2021 10:15 | ||
CVE-2021-23889 | MEDIUM | 4.8 | 2.7 | 26.03.2021 10:15 | ||
CVE-2021-23890 | MEDIUM | 6.5 | 2.5 | 26.03.2021 10:15 | ||
CVE-2021-2432 | MEDIUM | 4.3 | 2.9 | 21.07.2021 15:16 | ||
CVE-2021-30639 | HIGH | 7.5 | 3.6 | 12.07.2021 15:15 | ||
CVE-2021-31834 | MEDIUM | 5.4 | 2.7 | 22.10.2021 11:15 | ||
CVE-2021-31835 | MEDIUM | 4.8 | 2.7 | 22.10.2021 11:15 | ||
CVE-2021-33037 | MEDIUM | 5.3 | 1.4 | 12.07.2021 15:15 | ||
CVE-2021-3712 | HIGH | 7.4 | 5.2 | 24.08.2021 15:15 | ||
CVE-2022-0842 | MEDIUM | 4.9 | 3.6 | 23.03.2022 14:15 | ||
CVE-2022-0857 | MEDIUM | 6.1 | 2.7 | 23.03.2022 15:15 | ||
CVE-2022-0858 | MEDIUM | 4.7 | 1.4 | 23.03.2022 15:15 | ||
CVE-2022-0859 | MEDIUM | 6.7 | 5.9 | 23.03.2022 15:15 | ||
CVE-2022-0861 | LOW | 3.8 | 2.5 | 23.03.2022 15:15 | ||
CVE-2022-0862 | MEDIUM | 5.3 | 1.4 | 23.03.2022 15:15 | ||
CVE-2022-1257 | MEDIUM | 5.5 | 3.6 | 14.04.2022 15:15 | ||
CVE-2022-1258 | HIGH | 7.2 | 5.9 | 14.04.2022 15:15 | ||
CVE-2022-3338 | MEDIUM | 5.4 | 2.7 | 18.10.2022 10:15 | ||
CVE-2022-3339 | MEDIUM | 6.1 | 2.7 | 18.10.2022 10:15 | ||
CVE-2023-3946 | MEDIUM | 6.1 | 2.7 | 26.07.2023 06:15 | ||
CVE-2023-5444 | HIGH | 8.0 | 5.9 | 17.11.2023 10:15 | ||
CVE-2023-5445 | MEDIUM | 5.4 | 2.7 | 17.11.2023 10:15 |
Similar certificates
References ?
No references are available for this certificate.
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
30.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2023-3946', 'CVE-2023-5444', 'CVE-2023-5445']}
values added.
- The related_cves property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ca811c64885104b76b91dba1dcdc3e242feb2acb2d52d49b10fbb35822a1eaf4', 'txt_hash': 'f67d05d606081d709a15ab5ca5d42fb1e37fc4d95be82b4606c5708544d56ff6'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '0e7bfe3e8189179779e482fb2b3bbb4c6ada921a90e4da063be22a1bb076b650', 'txt_hash': '2d15aefeea005403a4d1011d3cd023be8f228807ff178a898a45a7af4fc9da83'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 91704, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 15, '/AM_ACPP_Date': '[dd month yyyy]', '/AM_ACPP_Doc#': '[AM_AMCPP_Doc#]', '/AM_ACPP_Title': 'Assurance Continuity Program Plan (ACPP)', '/AM_ACPP_Version': '[AM_AMCPP_Version]', '/AM_IAR_Date': '[dd month yyyy]', '/AM_IAR_Doc#': '[AM_IAR_Doc#]', '/AM_IAR_Title': 'Assurance Maintenace Impact Analysis Report', '/AM_IAR_Version': '[AM_IAR_Version]', '/AM_ST Date': '[dd month yyyy]', '/AM_ST Title': '[AM_ST Title]', '/AM_ST Version': '[AM_ST Version]', '/AM_TOE': '[AM_TOE]', '/AM_TOE Short': '[AM_TOE Short]', '/AM_TOE Version': '[AM_TOE Version]', '/Author': 'rareade', '/CC Version': '3.1R3', '/CC date': 'July 2009', '/CEM Version': '3.1R3', '/CEM date': 'July 2009', '/CR_Date': '[dd month yyyy]', '/CR_Version': 'X.X', '/Client City': 'Santa Clara', '/Client Country': 'USA', '/Client Full Name': 'McAfee, Inc.', '/Client Postal Code': '95054', '/Client Short Name': 'McAfee', '/Client State': 'California', '/Client Street': '3965 Freedom Circle', '/CreationDate': "D:20110207085153-05'00'", '/Creator': 'Acrobat PDFMaker 9.0 for Word', '/Developer Long Name': 'McAfee, Incorporated', '/Developer Short Name': 'McAfee', '/EAL Level': '3+', '/EAL Level Base': '3', '/EAL Level Text': '3 augmented', '/EAL Long': 'EAL 3 Augmented', '/EAL Short': 'EAL 3+', '/ETPlan_Doc#': '1657-000-D003', '/ETPlan_Title': 'Evaluation Test Plan', '/ETPlan_Version': '1.0', '/ETPlan_date': '1 December 2010', '/ETProcRes_Date': 'dd month yyyyy', '/ETProcRes_Doc#': '1657-000-D005', '/ETProcRes_Title': 'Evaluation Test Results', '/ETProcRes_Version': 'X.X', '/ETProc_Date': '1 December 2010', '/ETProc_Doc#': '1657-000-D004', '/ETProc_Title': 'Evaluation Test Procedures and Test Results', '/ETProc_Version': '1.0', '/ETReport_Date': '16 December 2010', '/ETReport_Doc#': '1657-000-D002', '/ETReport_Title': 'Evaluation Technical Report', '/ETReport_TitleShort': 'ETR', '/ETReport_Version': '1.3', '/EWP_Date': '5 March 2010', '/EWP_Doc#': '1657-000-D001', '/EWP_Title': 'Evaluation Work Plan', '/EWP_Version': '1.1', '/Eval number': '383-4-153', '/Eval_End_Date': '[dd month yyyy (date on certificate)]', '/Eval_Start_Date': 'dd month yyyy', '/ModDate': "D:20110207085320-05'00'", '/Producer': 'Acrobat Distiller 9.0.0 (Windows)', '/ProjectNumber': '1657', '/ST_Date': '14 December 2010', '/ST_Title': 'McAfee Application Control v5.0, Change Control v5.0, and Integrity Monitor v5.0 with McAfee Agent v4.5 and ePolicy Orchestrator v4.5 Security Target', '/ST_Version': '0.6', '/SVC_Date': 'dd month yyyyy', '/SVC_Doc#': '1657-000-D007', '/SVC_Title': 'Site Visit Checklist', '/SVC_Version': 'X.X', '/SVR_Date': '25 October 2010', '/SVR_Doc#': '1657-000-D006', '/SVR_Title': 'Site Visit Report', '/SVR_Version': '1.0', '/SV_City': 'Gurgaon', '/Security Classification': 'EWA-Canada & McAfee Proprietary', '/SourceModified': 'D:20110207135109', '/Sponsor': 'tbd', '/Sponsor City': 'tbd', '/Sponsor Country': 'tbd', '/Sponsor Postal Code': 'tbd', '/Sponsor State': 'tbd', '/Sponsor Street': 'tbd', '/TOE': 'McAfee Application Control v5.0, Change Control v5.0, and Integrity Monitor v5.0 with McAfee Agent v4.5 and ePolicy Orchestrator v4.5', '/TOE Line1': '[TOE Line1 - enter later for PCR or web page]', '/TOE Line2': '[TOE Line2 - enter later for PCR or web page]', '/TOE Line3': '[TOE Line3 - enter later for PCR or web page]', '/TOE Line4': '[TOE Line4 - enter later for PCR or web page]', '/TOE Line5': '[TOE Line5 - enter later for PCR or web page]', '/TOE Short': 'McAfee AC, CC & IM + Agent and ePO', '/TOE Short with version': 'McAfee AC v5.0, CCv5.0 & IM v5.0 + Agent v4.5 and ePO v4.5', '/TOE Short-NoTM': 'McAfee AC, CC, & IM with Agent & ePO', '/TOE Version': '5.0', '/TOE with version': 'McAfee Application Control v5.0, Change Control v5.0, and Integrity Monitor v5.0 with McAfee Agent v4.5 and ePolicy Orchestrator v4.5', '/TOE-NoTM': 'McAfee AC, CC & IM + Agent and ePO', '/Title': 'EAL 3+ Evaluation of McAfee Application Control v5', '/_AdHocReviewCycleID': '-2122720358', '/_AuthorEmail': '[email protected]', '/_AuthorEmailDisplayName': 'Reade, Rick A.', '/_EmailSubject': 'CCS CPL post request ... rick', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 3727387, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 55, '/Author': 'anicewick', '/CreationDate': "D:20101216082458-05'00'", '/Creator': 'PDFCreator Version 0.9.3', '/Keywords': '', '/ModDate': "D:20110117101915-05'00'", '/Producer': 'GPL Ghostscript 8.54', '/Subject': '', '/Title': 'McAfee Application Control and Change Control v5.0 ST v0.6', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'CA': {}}
. - The report_keywords property was set to
{'cc_cert_id': {'CA': {'383-4-153-CR': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3+': 3, 'EAL 3': 4, 'EAL 3 augmented': 2}}, 'cc_sar': {'ALC': {'ALC_FLR': 1, 'ALC_FLR.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Microsoft': {'Microsoft Corporation': 1, 'Microsoft': 1}}, 'eval_facility': {'EWA': {'EWA-Canada': 4}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'3DES': {'Triple-DES': 1, '3DES': 1}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'FF': {'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 1, 'FIPS 46-3': 1, 'FIPS 197': 1, 'FIPS 186-2': 1, 'FIPS 180-2': 1, 'FIPS 198': 1}, 'ISO': {'ISO/IEC 17025:2005': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3+': 1, 'EAL3': 4, 'EAL3 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 4, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 10, 'FAU_SAR.1': 9, 'FAU_SAR.2': 7, 'FAU_SAR.3': 7, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1}, 'FCS': {'FCS_COP.1': 5, 'FCS_COP.1.1': 1, 'FCS_CKM.1': 1, 'FCS_CKM.4': 2}, 'FDP': {'FDP_ITC.1': 1, 'FDP_ITC.2': 1}, 'FIA': {'FIA_ATD.1': 7, 'FIA_UID.2': 8, 'FIA_USB.1': 8, 'FIA_ATD.1.1': 1, 'FIA_UID.1': 5, 'FIA_UID.2.1': 1, 'FIA_USB': 1}, 'FMT': {'FMT_MTD.1': 7, 'FMT_SMF.1': 8, 'FMT_SMR.1': 9, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_ITT.1': 6, 'FPT_STM.1': 3, 'FPT_ITT.1.1': 1}}, 'cc_claims': {'O': {'O.AUDIT': 4, 'O.ACCESS': 5, 'O.AUDIT_REVIEW': 4, 'O.IDENTIFY': 4, 'O.EADMIN': 4, 'O.PROTECT': 6, 'O.COLLECT': 4, 'O.ANALYZE': 4, 'O.REACT': 4}, 'T': {'T.AUTHENTICATE': 2, 'T.COMPROMISE': 2, 'T.PROTECT': 2, 'T.APP_CHG_CONTROL': 2}, 'A': {'A.ACCESS': 2, 'A.ASCOPE': 2, 'A.TIME': 2, 'A.LOCATE': 2, 'A.PROTECT': 2, 'A.MANAGE': 2, 'A.NOEVIL': 2, 'A.DYNAMIC': 2}, 'OE': {'OE.TIME': 3, 'OE.INTEROP': 7, 'OE.AUTHENTICATE': 3, 'OE.MANAGE': 2}}, 'vendor': {'Microsoft': {'Microsoft': 3}, 'Cisco': {'Cisco': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'3DES': {'3DES': 1}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'FF': {'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'PRNG': {'PRNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 4, 'FIPS 186-2': 3, 'FIPS 197': 1, 'FIPS 46-3': 1, 'FIPS 198': 1, 'FIPS 180-3': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
mcafee-appl-v50-cert-eng.pdf
. - The st_filename property was set to
mcafee-appl-v50-sec-eng.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
383-4-153
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/mcafee-appl-v50-cert-eng.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/mcafee-appl-v50-sec-eng.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]}
values discarded.
- The st property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name McAfee Application Control v5.0, Change Control v5.0, and Integrity Monitor v5.0 with McAfee Agent v4.5 and ePolicy Orchestrator v4.5 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Data Protection",
"cert_link": null,
"dgst": "3b51c1b9523740c7",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "383-4-153",
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:mcafee_agent:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:agent:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.5:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"4.5",
"5.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2023-5445",
"CVE-2014-2205",
"CVE-2015-4559",
"CVE-2022-3339",
"CVE-2022-3338",
"CVE-2021-2161",
"CVE-2015-2859",
"CVE-2023-5444",
"CVE-2022-0859",
"CVE-2022-1257",
"CVE-2021-3712",
"CVE-2021-31834",
"CVE-2021-23889",
"CVE-2013-3627",
"CVE-2016-3984",
"CVE-2020-13938",
"CVE-2020-7317",
"CVE-2013-0141",
"CVE-2021-30639",
"CVE-2013-0140",
"CVE-2015-0921",
"CVE-2015-8765",
"CVE-2022-1258",
"CVE-2021-23840",
"CVE-2023-3946",
"CVE-2022-0857",
"CVE-2015-0922",
"CVE-2022-0842",
"CVE-2013-4882",
"CVE-2021-31835",
"CVE-2021-23888",
"CVE-2012-4594",
"CVE-2022-0861",
"CVE-2017-3980",
"CVE-2017-3896",
"CVE-2021-23890",
"CVE-2021-2432",
"CVE-2015-8987",
"CVE-2019-3604",
"CVE-2022-0862",
"CVE-2013-4883",
"CVE-2021-33037",
"CVE-2022-0858"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2012-03-23",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-7-73%20MR%20v1.0e.pdf",
"maintenance_st_link": null,
"maintenance_title": "McAfee Application Control v6.0 and Change Control v6.0 with McAfee Agent v4.6 and ePolicy Orchestrator v4.6"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2012-12-27",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/mcafee-appl-v61-feb-maint-eng.pdf",
"maintenance_st_link": null,
"maintenance_title": "McAfee Application Control v6.1 and Change Control v6.1 with McAfee Agent v4.6 and ePolicy Orchestrator v4.6"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2011-06-16",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-7-63%20MR%20v1.0e.pdf",
"maintenance_st_link": null,
"maintenance_title": "Maintenance Report for McAfee Application Control v5.1, Change Control v5.1, and Integrity Monitor v5.1 with McAfee Agent v4.5 and ePolicy Orchestrator v4.5"
}
]
},
"manufacturer": "McAfee, Inc.",
"manufacturer_web": "https://www.mcafee.com/",
"name": "McAfee Application Control v5.0, Change Control v5.0, and Integrity Monitor v5.0 with McAfee Agent v4.5 and ePolicy Orchestrator v4.5",
"not_valid_after": "2017-05-15",
"not_valid_before": "2011-01-14",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "mcafee-appl-v50-cert-eng.pdf",
"report_frontpage": {
"CA": {}
},
"report_keywords": {
"asymmetric_crypto": {
"FF": {
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {
"CA": {
"383-4-153-CR": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 4,
"EAL 3 augmented": 2,
"EAL 3+": 3
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"EWA": {
"EWA-Canada": 4
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 1,
"FIPS 180-2": 1,
"FIPS 186-2": 1,
"FIPS 197": 1,
"FIPS 198": 1,
"FIPS 46-3": 1
},
"ISO": {
"ISO/IEC 17025:2005": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"3DES": {
"3DES": 1,
"Triple-DES": 1
}
},
"constructions": {
"MAC": {
"HMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1,
"Microsoft Corporation": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/AM_ACPP_Date": "[dd month yyyy]",
"/AM_ACPP_Doc#": "[AM_AMCPP_Doc#]",
"/AM_ACPP_Title": "Assurance Continuity Program Plan (ACPP)",
"/AM_ACPP_Version": "[AM_AMCPP_Version]",
"/AM_IAR_Date": "[dd month yyyy]",
"/AM_IAR_Doc#": "[AM_IAR_Doc#]",
"/AM_IAR_Title": "Assurance Maintenace Impact Analysis Report",
"/AM_IAR_Version": "[AM_IAR_Version]",
"/AM_ST Date": "[dd month yyyy]",
"/AM_ST Title": "[AM_ST Title]",
"/AM_ST Version": "[AM_ST Version]",
"/AM_TOE": "[AM_TOE]",
"/AM_TOE Short": "[AM_TOE Short]",
"/AM_TOE Version": "[AM_TOE Version]",
"/Author": "rareade",
"/CC Version": "3.1R3",
"/CC date": "July 2009",
"/CEM Version": "3.1R3",
"/CEM date": "July 2009",
"/CR_Date": "[dd month yyyy]",
"/CR_Version": "X.X",
"/Client City": "Santa Clara",
"/Client Country": "USA",
"/Client Full Name": "McAfee, Inc.",
"/Client Postal Code": "95054",
"/Client Short Name": "McAfee",
"/Client State": "California",
"/Client Street": "3965 Freedom Circle",
"/CreationDate": "D:20110207085153-05\u002700\u0027",
"/Creator": "Acrobat PDFMaker 9.0 for Word",
"/Developer Long Name": "McAfee, Incorporated",
"/Developer Short Name": "McAfee",
"/EAL Level": "3+",
"/EAL Level Base": "3",
"/EAL Level Text": "3 augmented",
"/EAL Long": "EAL 3 Augmented",
"/EAL Short": "EAL 3+",
"/ETPlan_Doc#": "1657-000-D003",
"/ETPlan_Title": "Evaluation Test Plan",
"/ETPlan_Version": "1.0",
"/ETPlan_date": "1 December 2010",
"/ETProcRes_Date": "dd month yyyyy",
"/ETProcRes_Doc#": "1657-000-D005",
"/ETProcRes_Title": "Evaluation Test Results",
"/ETProcRes_Version": "X.X",
"/ETProc_Date": "1 December 2010",
"/ETProc_Doc#": "1657-000-D004",
"/ETProc_Title": "Evaluation Test Procedures and Test Results",
"/ETProc_Version": "1.0",
"/ETReport_Date": "16 December 2010",
"/ETReport_Doc#": "1657-000-D002",
"/ETReport_Title": "Evaluation Technical Report",
"/ETReport_TitleShort": "ETR",
"/ETReport_Version": "1.3",
"/EWP_Date": "5 March 2010",
"/EWP_Doc#": "1657-000-D001",
"/EWP_Title": "Evaluation Work Plan",
"/EWP_Version": "1.1",
"/Eval number": "383-4-153",
"/Eval_End_Date": "[dd month yyyy (date on certificate)]",
"/Eval_Start_Date": "dd month yyyy",
"/ModDate": "D:20110207085320-05\u002700\u0027",
"/Producer": "Acrobat Distiller 9.0.0 (Windows)",
"/ProjectNumber": "1657",
"/ST_Date": "14 December 2010",
"/ST_Title": "McAfee Application Control v5.0, Change Control v5.0, and Integrity Monitor v5.0 with McAfee Agent v4.5 and ePolicy Orchestrator v4.5 Security Target",
"/ST_Version": "0.6",
"/SVC_Date": "dd month yyyyy",
"/SVC_Doc#": "1657-000-D007",
"/SVC_Title": "Site Visit Checklist",
"/SVC_Version": "X.X",
"/SVR_Date": "25 October 2010",
"/SVR_Doc#": "1657-000-D006",
"/SVR_Title": "Site Visit Report",
"/SVR_Version": "1.0",
"/SV_City": "Gurgaon",
"/Security Classification": "EWA-Canada \u0026 McAfee Proprietary",
"/SourceModified": "D:20110207135109",
"/Sponsor": "tbd",
"/Sponsor City": "tbd",
"/Sponsor Country": "tbd",
"/Sponsor Postal Code": "tbd",
"/Sponsor State": "tbd",
"/Sponsor Street": "tbd",
"/TOE": "McAfee Application Control v5.0, Change Control v5.0, and Integrity Monitor v5.0 with McAfee Agent v4.5 and ePolicy Orchestrator v4.5",
"/TOE Line1": "[TOE Line1 - enter later for PCR or web page]",
"/TOE Line2": "[TOE Line2 - enter later for PCR or web page]",
"/TOE Line3": "[TOE Line3 - enter later for PCR or web page]",
"/TOE Line4": "[TOE Line4 - enter later for PCR or web page]",
"/TOE Line5": "[TOE Line5 - enter later for PCR or web page]",
"/TOE Short": "McAfee AC, CC \u0026 IM + Agent and ePO",
"/TOE Short with version": "McAfee AC v5.0, CCv5.0 \u0026 IM v5.0 + Agent v4.5 and ePO v4.5",
"/TOE Short-NoTM": "McAfee AC, CC, \u0026 IM with Agent \u0026 ePO",
"/TOE Version": "5.0",
"/TOE with version": "McAfee Application Control v5.0, Change Control v5.0, and Integrity Monitor v5.0 with McAfee Agent v4.5 and ePolicy Orchestrator v4.5",
"/TOE-NoTM": "McAfee AC, CC \u0026 IM + Agent and ePO",
"/Title": "EAL 3+ Evaluation of McAfee Application Control v5",
"/_AdHocReviewCycleID": "-2122720358",
"/_AuthorEmail": "[email protected]",
"/_AuthorEmailDisplayName": "Reade, Rick A.",
"/_EmailSubject": "CCS CPL post request ... rick",
"pdf_file_size_bytes": 91704,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 15
},
"st_filename": "mcafee-appl-v50-sec-eng.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ACCESS": 2,
"A.ASCOPE": 2,
"A.DYNAMIC": 2,
"A.LOCATE": 2,
"A.MANAGE": 2,
"A.NOEVIL": 2,
"A.PROTECT": 2,
"A.TIME": 2
},
"O": {
"O.ACCESS": 5,
"O.ANALYZE": 4,
"O.AUDIT": 4,
"O.AUDIT_REVIEW": 4,
"O.COLLECT": 4,
"O.EADMIN": 4,
"O.IDENTIFY": 4,
"O.PROTECT": 6,
"O.REACT": 4
},
"OE": {
"OE.AUTHENTICATE": 3,
"OE.INTEROP": 7,
"OE.MANAGE": 2,
"OE.TIME": 3
},
"T": {
"T.APP_CHG_CONTROL": 2,
"T.AUTHENTICATE": 2,
"T.COMPROMISE": 2,
"T.PROTECT": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.3": 1,
"ADV_TDS.2": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.3": 1,
"ALC_CMS.3": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR.2": 4,
"ALC_LCD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL3": 4,
"EAL3 augmented": 1,
"EAL3+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 10,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAR.1": 9,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 7,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 7,
"FAU_SAR.3.1": 1
},
"FCS": {
"FCS_CKM.1": 1,
"FCS_CKM.4": 2,
"FCS_COP.1": 5,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ITC.1": 1,
"FDP_ITC.2": 1
},
"FIA": {
"FIA_ATD.1": 7,
"FIA_ATD.1.1": 1,
"FIA_UID.1": 5,
"FIA_UID.2": 8,
"FIA_UID.2.1": 1,
"FIA_USB": 1,
"FIA_USB.1": 8
},
"FMT": {
"FMT_MTD.1": 7,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 8,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 9,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_ITT.1": 6,
"FPT_ITT.1.1": 1,
"FPT_STM.1": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 4,
"FIPS 180-3": 1,
"FIPS 186-2": 3,
"FIPS 197": 1,
"FIPS 198": 1,
"FIPS 46-3": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"3DES": {
"3DES": 1
}
},
"constructions": {
"MAC": {
"HMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 1
},
"Microsoft": {
"Microsoft": 3
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "anicewick",
"/CreationDate": "D:20101216082458-05\u002700\u0027",
"/Creator": "PDFCreator Version 0.9.3",
"/Keywords": "",
"/ModDate": "D:20110117101915-05\u002700\u0027",
"/Producer": "GPL Ghostscript 8.54",
"/Subject": "",
"/Title": "McAfee Application Control and Change Control v5.0 ST v0.6",
"pdf_file_size_bytes": 3727387,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 55
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/mcafee-appl-v50-cert-eng.pdf",
"scheme": "CA",
"security_level": {
"_type": "Set",
"elements": [
"EAL3+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/mcafee-appl-v50-sec-eng.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ca811c64885104b76b91dba1dcdc3e242feb2acb2d52d49b10fbb35822a1eaf4",
"txt_hash": "f67d05d606081d709a15ab5ca5d42fb1e37fc4d95be82b4606c5708544d56ff6"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "0e7bfe3e8189179779e482fb2b3bbb4c6ada921a90e4da063be22a1bb076b650",
"txt_hash": "2d15aefeea005403a4d1011d3cd023be8f228807ff178a898a45a7af4fc9da83"
}
},
"status": "archived"
}