Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4(watchOS 9.4 (build 20T253)) ( ANSSI-CC-2023/60)

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status active
Valid from 19.01.2024
Valid until 19.01.2029
Scheme 🇫🇷 FR
Manufacturer Apple Inc.
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ADV_FSP.3, EAL2+

Heuristics summary ?

Certificate ID: ANSSI-CC-2023/60

Certificate ?

Extracted keywords

Security level
EAL2
Security Assurance Requirements (SAR)
ADV_FSP.3
Certificates
ANSSI-CC-2023/60
Evaluation facilities
THALES/CNES

File metadata

Creation date D:20240222154647+01'00'
Modification date D:20240222155209+01'00'
Pages 2
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

Certification report ?

Extracted keywords

Security level
EAL2, EAL4, EAL2 augmented, ITSEC E3 Basic
Security Assurance Requirements (SAR)
ADV_FSP.3, ALC_FLR
Certificates
ANSSI-CC-2023/60
Evaluation facilities
THALES/CNES

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Creation date D:20240222154716+01'00'
Modification date D:20240222155205+01'00'
Pages 13
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

Security target ?

Extracted keywords

Symmetric Algorithms
AES
Schemes
MAC
Protocols
TLS

Trusted Execution Environments
SE

Security level
EAL 2, EAL2
Claims
D.OS, D.SEP_SE, T.CORRUPT, T.PHYSICAL, T.RECOVER, T.REPLAY, T.SILENT, T.SKIMMING, T.USURP, A.DE-, A.PERSO, A.CDCVM, A.IPH-, A.DEVICE_AUTH, A.IPHONE_USER, OE.CDCVM
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.1, ADV_FSP.2, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1
Security Functional Requirements (SFR)
FDP_DAU.1, FDP_DAU.1.1, FDP_DAU.1.2, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_ETC, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_UCT, FDP_UCT.1, FDP_UIT, FDP_UIT.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.1.1, FDP_ACC.1, FDP_IFC.1, FDP_ETC.2, FIA_UID.2, FIA_UID.2.1, FIA_UAU.2, FIA_UAU.2.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_AFL, FIA_AFL.1, FIA_UAU.6.1, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.1, FIA_UID.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1.1, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.3, FMT_MTD.3.1, FPR_UNO.1, FPR_UNO.1.1, FPT_ITC.1, FPT_ITC.1.1, FPT_RPL, FPT_RPL.1, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1

Certification process
out of scope, Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by, pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.Card_Data D.Unlock_Secret* D.SEP_iPhone* T.RECOVER Card Recovery An attacker

Standards
FIPS 140-3, FIPS 140-2

File metadata

Title Microsoft Word - [ST] Watch_S8_watchOS9_SecurityTarget_v1.4.docx
Creation date D:20231109133713Z
Modification date D:20231109133737Z
Pages 54
Creator Word
Producer Adobe Mac PDF Plug-in

Heuristics ?

Certificate ID: ANSSI-CC-2023/60

Extracted SARs

ADV_ARC.1, ADV_FSP.3, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2023-27930
C M N
HIGH 7.8 5.9 23.06.2023 18:15
CVE-2023-28191
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-28202
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-28204
C M N
MEDIUM 6.5 3.6 23.06.2023 18:15
CVE-2023-32352
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32354
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32357
C M N
HIGH 7.1 5.2 23.06.2023 18:15
CVE-2023-32361
C M N
MEDIUM 5.5 3.6 27.09.2023 15:18
CVE-2023-32368
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32372
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32373
C M N
HIGH 8.8 5.9 23.06.2023 18:15
CVE-2023-32376
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32381
C M N
HIGH 7.8 5.9 27.07.2023 00:15
CVE-2023-32384
C M N
HIGH 7.8 5.9 23.06.2023 18:15
CVE-2023-32388
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32389
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32390
C M N
LOW 2.4 1.4 23.06.2023 18:15
CVE-2023-32391
C M N
MEDIUM 4.6 3.6 23.06.2023 18:15
CVE-2023-32392
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32394
C M N
LOW 2.4 1.4 23.06.2023 18:15
CVE-2023-32396
C M N
HIGH 7.8 5.9 27.09.2023 15:18
CVE-2023-32398
C M N
HIGH 7.8 5.9 23.06.2023 18:15
CVE-2023-32399
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32400
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32402
C M N
MEDIUM 6.5 3.6 23.06.2023 18:15
CVE-2023-32403
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32404
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32407
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32408
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32409
C M N
HIGH 8.6 4.0 23.06.2023 18:15
CVE-2023-32412
C M N
CRITICAL 9.8 5.9 23.06.2023 18:15
CVE-2023-32413
C M N
HIGH 7.0 5.9 23.06.2023 18:15
CVE-2023-32416
C M N
MEDIUM 5.5 3.6 27.07.2023 01:15
CVE-2023-32417
C M N
LOW 2.4 1.4 23.06.2023 18:15
CVE-2023-32420
C M N
HIGH 7.1 5.2 23.06.2023 18:15
CVE-2023-32423
C M N
MEDIUM 6.5 3.6 23.06.2023 18:15
CVE-2023-32425
C M N
HIGH 7.8 5.9 06.09.2023 02:15
CVE-2023-32428
C M N
HIGH 7.8 5.9 06.09.2023 02:15
CVE-2023-32432
C M N
MEDIUM 5.5 3.6 06.09.2023 02:15
CVE-2023-32433
C M N
HIGH 7.8 5.9 27.07.2023 00:15
CVE-2023-32434
C M N
HIGH 7.8 5.9 23.06.2023 18:15
CVE-2023-32441
C M N
HIGH 7.8 5.9 27.07.2023 01:15
CVE-2023-32445
C M N
MEDIUM 6.1 2.7 28.07.2023 05:15
CVE-2023-32734
C M N
HIGH 7.8 5.9 27.07.2023 01:15
CVE-2023-34352
C M N
MEDIUM 5.3 1.4 06.09.2023 02:15
CVE-2023-34425
C M N
CRITICAL 9.8 5.9 28.07.2023 05:15
CVE-2023-35074
C M N
HIGH 8.8 5.9 27.09.2023 15:18
CVE-2023-35984
C M N
MEDIUM 4.3 3.4 27.09.2023 15:18
CVE-2023-35990
C M N
LOW 3.3 1.4 27.09.2023 15:18
CVE-2023-35993
C M N
HIGH 7.8 5.9 27.07.2023 01:15
CVE-2023-36495
C M N
CRITICAL 9.8 5.9 28.07.2023 05:15
CVE-2023-37450
C M N
HIGH 8.8 5.9 27.07.2023 00:15
CVE-2023-38133
C M N
MEDIUM 6.5 3.6 27.07.2023 00:15
CVE-2023-38136
C M N
HIGH 7.8 5.9 27.07.2023 01:15
CVE-2023-38565
C M N
HIGH 7.8 5.9 27.07.2023 01:15
CVE-2023-38572
C M N
HIGH 7.5 3.6 27.07.2023 01:15
CVE-2023-38580
C M N
HIGH 7.8 5.9 27.07.2023 01:15
CVE-2023-38590
C M N
HIGH 8.8 5.9 28.07.2023 05:15
CVE-2023-38592
C M N
HIGH 8.8 5.9 28.07.2023 05:15
CVE-2023-38593
C M N
MEDIUM 5.5 3.6 27.07.2023 01:15
CVE-2023-38594
C M N
HIGH 8.8 5.9 27.07.2023 00:15
CVE-2023-38595
C M N
HIGH 8.8 5.9 27.07.2023 01:15
CVE-2023-38596
C M N
MEDIUM 5.5 3.6 27.09.2023 15:18
CVE-2023-38598
C M N
CRITICAL 9.8 5.9 28.07.2023 05:15
CVE-2023-38599
C M N
MEDIUM 6.5 3.6 28.07.2023 05:15
CVE-2023-38600
C M N
HIGH 8.8 5.9 27.07.2023 01:15
CVE-2023-38604
C M N
CRITICAL 9.8 5.9 28.07.2023 05:15
CVE-2023-38606
C M N
MEDIUM 5.5 3.6 27.07.2023 00:15
CVE-2023-38611
C M N
HIGH 8.8 5.9 27.07.2023 01:15
CVE-2023-39434
C M N
HIGH 8.8 5.9 27.09.2023 15:18
CVE-2023-40395
C M N
LOW 3.3 1.4 27.09.2023 15:19
CVE-2023-40396
C M N
HIGH 7.8 5.9 29.07.2024 21:15
CVE-2023-40399
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-40400
C M N
CRITICAL 9.8 5.9 27.09.2023 15:19
CVE-2023-40403
C M N
MEDIUM 6.5 3.6 27.09.2023 15:19
CVE-2023-40408
C M N
MEDIUM 5.3 1.4 25.10.2023 19:15
CVE-2023-40409
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-40410
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-40412
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-40413
C M N
MEDIUM 5.5 3.6 25.10.2023 19:15
CVE-2023-40414
C M N
CRITICAL 9.8 5.9 10.01.2024 22:15
CVE-2023-40417
C M N
MEDIUM 5.4 2.5 27.09.2023 15:19
CVE-2023-40419
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-40420
C M N
MEDIUM 6.5 3.6 27.09.2023 15:19
CVE-2023-40424
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-40427
C M N
LOW 3.3 1.4 27.09.2023 15:19
CVE-2023-40429
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-40432
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-40447
C M N
HIGH 8.8 5.9 25.10.2023 19:15
CVE-2023-40448
C M N
HIGH 8.6 4.0 27.09.2023 15:19
CVE-2023-40452
C M N
HIGH 7.1 5.2 27.09.2023 15:19
CVE-2023-40454
C M N
HIGH 7.1 5.2 27.09.2023 15:19
CVE-2023-40456
C M N
LOW 3.3 1.4 27.09.2023 15:19
CVE-2023-40520
C M N
LOW 3.3 1.4 27.09.2023 15:19
CVE-2023-40528
C M N
MEDIUM 5.5 3.6 23.01.2024 01:15
CVE-2023-41061
C M N
HIGH 7.8 5.9 07.09.2023 18:15
CVE-2023-41065
C M N
LOW 3.3 1.4 27.09.2023 15:19
CVE-2023-41068
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-41070
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-41071
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-41073
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-41074
C M N
HIGH 8.8 5.9 27.09.2023 15:19
CVE-2023-41174
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-41254
C M N
MEDIUM 5.5 3.6 25.10.2023 19:15
CVE-2023-41968
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-41976
C M N
HIGH 8.8 5.9 25.10.2023 19:15
CVE-2023-41981
C M N
MEDIUM 4.4 3.6 27.09.2023 15:19
CVE-2023-41982
C M N
MEDIUM 4.6 3.6 25.10.2023 19:15
CVE-2023-41984
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-41988
C M N
MEDIUM 6.8 5.9 25.10.2023 19:15
CVE-2023-41997
C M N
MEDIUM 4.6 3.6 25.10.2023 19:15
CVE-2023-42823
C M N
MEDIUM 5.5 3.6 21.02.2024 07:15
CVE-2023-42834
C M N
MEDIUM 5.5 3.6 21.02.2024 07:15
CVE-2023-42839
C M N
MEDIUM 5.5 3.6 21.02.2024 07:15
CVE-2023-42846
C M N
MEDIUM 5.3 1.4 25.10.2023 19:15
CVE-2023-42848
C M N
HIGH 7.8 5.9 21.02.2024 07:15
CVE-2023-42849
C M N
MEDIUM 6.5 3.6 25.10.2023 19:15
CVE-2023-42852
C M N
HIGH 8.8 5.9 25.10.2023 19:15
CVE-2023-42866
C M N
HIGH 8.8 5.9 10.01.2024 22:15
CVE-2023-42878
C M N
MEDIUM 5.5 3.6 21.02.2024 07:15
CVE-2023-42883
C M N
MEDIUM 5.5 3.6 12.12.2023 01:15
CVE-2023-42888
C M N
MEDIUM 5.5 3.6 23.01.2024 01:15
CVE-2023-42890
C M N
HIGH 8.8 5.9 12.12.2023 01:15
CVE-2023-42893
C M N
MEDIUM 5.5 3.6 28.03.2024 16:15
CVE-2023-42898
C M N
MEDIUM 5.5 3.6 12.12.2023 01:15
CVE-2023-42899
C M N
HIGH 7.8 5.9 12.12.2023 01:15
CVE-2023-42914
C M N
MEDIUM 6.3 4.0 12.12.2023 01:15
CVE-2023-42936
C M N
MEDIUM 5.5 3.6 28.03.2024 16:15
CVE-2023-42937
C M N
MEDIUM 5.5 3.6 23.01.2024 01:15
CVE-2023-42942
C M N
HIGH 7.8 5.9 21.02.2024 07:15
CVE-2023-42946
C M N
MEDIUM 5.5 3.6 21.02.2024 07:15
CVE-2023-42947
C M N
HIGH 8.6 6.0 28.03.2024 16:15
CVE-2023-42949
C M N
LOW 3.3 1.4 29.07.2024 21:15
CVE-2023-42950
C M N
HIGH 8.8 5.9 28.03.2024 16:15
CVE-2023-42953
C M N
MEDIUM 5.5 3.6 21.02.2024 07:15
CVE-2023-42957
C M N
LOW 3.3 1.4 29.07.2024 21:15
CVE-2024-0258
C M N
HIGH 8.6 6.0 08.03.2024 02:15
CVE-2024-23201
C M N
MEDIUM 5.5 3.6 08.03.2024 02:15
CVE-2024-23204
C M N
HIGH 7.5 3.6 23.01.2024 01:15
CVE-2024-23206
C M N
MEDIUM 6.5 3.6 23.01.2024 01:15
CVE-2024-23207
C M N
MEDIUM 5.5 3.6 23.01.2024 01:15
CVE-2024-23208
C M N
HIGH 7.8 5.9 23.01.2024 01:15
CVE-2024-23210
C M N
LOW 3.3 1.4 23.01.2024 01:15
CVE-2024-23211
C M N
LOW 3.3 1.4 23.01.2024 01:15
CVE-2024-23212
C M N
HIGH 7.8 5.9 23.01.2024 01:15
CVE-2024-23213
C M N
HIGH 8.8 5.9 23.01.2024 01:15
CVE-2024-23215
C M N
MEDIUM 5.5 3.6 23.01.2024 01:15
CVE-2024-23217
C M N
LOW 3.3 1.4 23.01.2024 01:15
CVE-2024-23218
C M N
MEDIUM 5.9 3.6 23.01.2024 01:15
CVE-2024-23223
C M N
MEDIUM 6.2 3.6 23.01.2024 01:15
CVE-2024-23225
C M N
HIGH 7.8 5.9 05.03.2024 20:16
CVE-2024-23226
C M N
HIGH 8.8 5.9 08.03.2024 02:15
CVE-2024-23231
C M N
MEDIUM 5.5 3.6 08.03.2024 02:15
CVE-2024-23235
C M N
MEDIUM 4.7 3.6 08.03.2024 02:15
CVE-2024-23239
C M N
MEDIUM 4.7 3.6 08.03.2024 02:15
CVE-2024-23246
C M N
HIGH 8.6 6.0 08.03.2024 02:15
CVE-2024-23250
C M N
MEDIUM 5.5 3.6 08.03.2024 02:15
CVE-2024-23251
C M N
MEDIUM 4.6 3.6 10.06.2024 21:15
CVE-2024-23254
C M N
MEDIUM 6.5 3.6 08.03.2024 02:15
CVE-2024-23263
C M N
MEDIUM 6.5 3.6 08.03.2024 02:15
CVE-2024-23265
C M N
HIGH 7.8 5.9 08.03.2024 02:15
CVE-2024-23271
C M N
MEDIUM 6.5 3.6 24.04.2024 17:15
CVE-2024-23278
C M N
HIGH 8.6 6.0 08.03.2024 02:15
CVE-2024-23280
C M N
MEDIUM 6.5 3.6 08.03.2024 02:15
CVE-2024-23282
C M N
MEDIUM 5.5 3.6 10.06.2024 21:15
CVE-2024-23284
C M N
MEDIUM 6.5 3.6 08.03.2024 02:15
CVE-2024-23286
C M N
HIGH 7.8 5.9 08.03.2024 02:15
CVE-2024-23287
C M N
MEDIUM 5.5 3.6 08.03.2024 02:15
CVE-2024-23288
C M N
HIGH 7.8 5.9 08.03.2024 02:15
CVE-2024-23289
C M N
LOW 3.3 1.4 08.03.2024 02:15
CVE-2024-23290
C M N
MEDIUM 5.5 3.6 08.03.2024 02:15
CVE-2024-23291
C M N
LOW 3.3 1.4 08.03.2024 02:15
CVE-2024-23293
C M N
MEDIUM 4.6 3.6 08.03.2024 02:15
CVE-2024-23296
C M N
HIGH 7.8 5.9 05.03.2024 20:16
CVE-2024-23297
C M N
MEDIUM 5.5 3.6 08.03.2024 02:15
CVE-2024-27800
C M N
MEDIUM 6.5 3.6 10.06.2024 21:15
CVE-2024-27801
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27804
C M N
MEDIUM 5.5 3.6 14.05.2024 15:13
CVE-2024-27805
C M N
MEDIUM 5.5 3.6 10.06.2024 21:15
CVE-2024-27806
C M N
MEDIUM 5.5 3.6 10.06.2024 21:15
CVE-2024-27808
C M N
HIGH 8.8 5.9 10.06.2024 21:15
CVE-2024-27810
C M N
MEDIUM 5.5 3.6 14.05.2024 15:13
CVE-2024-27811
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27814
C M N
LOW 2.4 1.4 10.06.2024 21:15
CVE-2024-27815
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27816
C M N
MEDIUM 5.5 3.6 14.05.2024 15:13
CVE-2024-27820
C M N
HIGH 8.8 5.9 10.06.2024 21:15
CVE-2024-27821
C M N
MEDIUM 4.7 3.6 14.05.2024 15:13
CVE-2024-27823
C M N
MEDIUM 5.9 3.6 29.07.2024 23:15
CVE-2024-27826
C M N
HIGH 7.8 5.9 29.07.2024 23:15
CVE-2024-27828
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27830
C M N
MEDIUM 6.5 3.6 10.06.2024 21:15
CVE-2024-27832
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27834
C M N
MEDIUM 5.5 3.6 14.05.2024 15:13
CVE-2024-27838
C M N
MEDIUM 6.5 3.6 10.06.2024 21:15
CVE-2024-27840
C M N
MEDIUM 6.3 4.0 10.06.2024 21:15
CVE-2024-27851
C M N
HIGH 8.8 5.9 10.06.2024 21:15
CVE-2024-27863
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-27880
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-27884
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40774
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40776
C M N
MEDIUM 4.3 1.4 29.07.2024 23:15
CVE-2024-40777
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40779
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40780
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40782
C M N
MEDIUM 6.5 3.6 29.07.2024 23:15
CVE-2024-40784
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40785
C M N
MEDIUM 6.1 2.7 29.07.2024 23:15
CVE-2024-40787
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40788
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40789
C M N
MEDIUM 6.5 3.6 29.07.2024 23:15
CVE-2024-40793
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40795
C M N
LOW 3.3 1.4 29.07.2024 23:15
CVE-2024-40799
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40805
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40806
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40809
C M N
HIGH 7.8 5.9 29.07.2024 23:15
CVE-2024-40812
C M N
HIGH 7.8 5.9 29.07.2024 23:15
CVE-2024-40813
C M N
MEDIUM 4.6 3.6 29.07.2024 23:15
CVE-2024-40815
C M N
HIGH 7.5 5.9 29.07.2024 23:15
CVE-2024-40818
C M N
MEDIUM 4.6 3.6 29.07.2024 23:15
CVE-2024-40822
C M N
LOW 2.4 1.4 29.07.2024 23:15
CVE-2024-40824
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40829
C M N
MEDIUM 4.6 3.6 29.07.2024 23:15
CVE-2024-40835
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40836
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40850
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40857
C M N
MEDIUM 6.1 2.7 17.09.2024 00:15
CVE-2024-44144
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44155
C M N
MEDIUM 6.5 3.6 28.10.2024 21:15
CVE-2024-44169
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44170
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44171
C M N
MEDIUM 4.6 3.6 17.09.2024 00:15
CVE-2024-44176
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44183
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44185
C M N
MEDIUM 5.5 3.6 24.10.2024 17:15
CVE-2024-44187
C M N
MEDIUM 6.5 3.6 17.09.2024 00:15
CVE-2024-44191
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44194
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44198
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44212
C M N
MEDIUM 5.3 1.4 12.12.2024 02:15
CVE-2024-44215
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44232
C M N
MEDIUM 5.5 3.6 01.11.2024 21:15
CVE-2024-44233
C M N
MEDIUM 5.5 3.6 01.11.2024 21:15
CVE-2024-44234
C M N
MEDIUM 5.5 3.6 01.11.2024 21:15
CVE-2024-44239
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44240
C M N
MEDIUM 5.5 3.6 28.10.2024 22:15
CVE-2024-44244
C M N
MEDIUM 4.3 1.4 28.10.2024 21:15
CVE-2024-44254
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44255
C M N
HIGH 7.8 5.9 28.10.2024 21:15
CVE-2024-44269
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44273
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44274
C M N
MEDIUM 4.6 3.6 28.10.2024 21:15
CVE-2024-44278
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44282
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-44285
C M N
HIGH 7.8 5.9 28.10.2024 21:15
CVE-2024-44290
C M N
LOW 3.3 1.4 12.12.2024 02:15
CVE-2024-44296
C M N
MEDIUM 5.4 2.5 28.10.2024 21:15
CVE-2024-44297
C M N
MEDIUM 6.5 3.6 28.10.2024 21:15
CVE-2024-44302
C M N
MEDIUM 5.5 3.6 28.10.2024 21:15
CVE-2024-54479
C M N
HIGH 7.5 3.6 12.12.2024 02:15
CVE-2024-54486
C M N
MEDIUM 6.5 3.6 12.12.2024 02:15
CVE-2024-54494
C M N
MEDIUM 5.9 3.6 12.12.2024 02:15
CVE-2024-54500
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54505
C M N
HIGH 8.8 5.9 12.12.2024 02:15
CVE-2024-54508
C M N
HIGH 7.5 3.6 12.12.2024 02:15
CVE-2024-54510
C M N
MEDIUM 5.1 3.6 12.12.2024 02:15
CVE-2024-54513
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54526
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54527
C M N
MEDIUM 5.5 3.6 12.12.2024 02:15
CVE-2024-54534
C M N
CRITICAL 9.8 5.9 12.12.2024 02:15
Showing 5 out of 271.

Similar certificates

Name Certificate ID
Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1Version iOS 16.4.1 (build 20E252) ( ANSSI-CC-2023/59) ANSSI-CC-2023/59 Compare
Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1iOS 16.4.1 (build 20E252) (ANSSI-CC-2023/58) ANSSI-CC-2023/58 Compare
Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1 , macOS Ventura 13.3.1 (build 22E261) ( ANSSI-CC-2023/61) ANSSI-CC-2023/61 Compare
Strong customer authentication pour Apple Pay sur Apple Watch série 4 exécutant watchOS 7.4.1 (Version 18T201) ANSSI-CC-2023/13 Compare
Strong Customer Authentication pour Apple Pay sur Apple Watch avec S7 exécutant watchOS 8.5.1 (Version 8.5.1 (build 19T252)) ANSSI-CC-2023/17 Compare
Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1 Version 15.4.1 (build 19E258) ANSSI-CC-2023/18 Compare
Strong Customer Authentication pour Apple Pay sur iPhone SE (2nde génération) avec A13 Bionic exécutant iOS 15.4.1 (Version 15.4.1 (build 19E258)) ANSSI-CC-2023/15 Compare
Strong Customer Authentication pour Apple Pay sur MacBook Air 2020 avec M1 exécutant macOS Monterey 12.3.1 (Version 12.3.1 (build 21E258)) ANSSI-CC-2023/16 Compare
Strong Customer Authentication pour Apple Pay sur Mac mini avec M1 et Magic keyboard avec Touch ID, exécutant macOS Monterey 12.3.1 (Version 12.3.1 (build 21E258)) ANSSI-CC-2023/19 Compare
Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1 2023-9-INF-4307 Compare
IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-2023/57 ) ANSSI-CC-2023/57 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in SSCD configuration Version 4.1.1.52 (ANSSI-CC-2023/69) ANSSI-CC-2023/69 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO BAC configuration Version 4.1.1.52 ( ANSSI-CC-2023/67) ANSSI-CC-2023/67 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration Version 4.1.1.52 ( ANSSI-CC-2023/68) ANSSI-CC-2023/68 Compare
ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01) ANSSI-CC-2023/12-R01 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO BAC configuration (Version 4.0.1.52) ( ANSSI-CC-2023/10-R01 ) ANSSI-CC-2023/10-R01 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration (Version 4.0.1.52) (ANSSI-CC-2023/11-R01) ANSSI-CC-2023/11-R01 Compare
Showing 5 out of 17.

Scheme data ?

Product Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4 watchOS 9.4 (Build 20T253)
Url https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-apple-watch-s8-running-watchos-94
Description Le produit évalué est « Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4, watchOS 9.4 (build 20T253) » développé par APPLE INC.. Apple Pay est une solution de paiement mobile développée par la société APPLE INC. Après avoir enregistré une carte bancaire dans son équipement Apple, l’utilisateur peut faire des paiements au travers de celui-ci. Pour que le paie
Sponsor APPLE INC
Developer APPLE INC
Cert Id ANSSI-CC-2023/60
Level EAL2+
Expiration Date 19.01.2029
Enhanced
Cert Id ANSSI-CC-2023/60
Certification Date 19.01.2024
Expiration Date 19.01.2029
Category Divers
Cc Version Critères Communs version 3.1r5
Developer APPLE INC
Sponsor APPLE INC
Evaluation Facility THALES / CNES
Level EAL2+
Protection Profile
Mutual Recognition CCRA SOG-IS
Augmented ADV_FSP.3
Report Link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_60en.pdf
Target Link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_60en.pdf
Cert Link https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_60en.pdf

References ?

No references are available for this certificate.

Updates ?

  • 16.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2024-54526', 'CVE-2024-54479', 'CVE-2024-54505', 'CVE-2024-40824', 'CVE-2024-23288', 'CVE-2024-54500', 'CVE-2024-40829', 'CVE-2024-54510', 'CVE-2024-44278', 'CVE-2023-40396', 'CVE-2024-40777', 'CVE-2024-44212', 'CVE-2024-23289', 'CVE-2023-42848', 'CVE-2024-23286', 'CVE-2024-23293', 'CVE-2024-54494', 'CVE-2024-23271', 'CVE-2024-40784', 'CVE-2024-54513', 'CVE-2024-27826', 'CVE-2024-23287', 'CVE-2024-54534', 'CVE-2024-23291', 'CVE-2024-23297', 'CVE-2024-23263', 'CVE-2024-23284', 'CVE-2024-27810', 'CVE-2024-23290', 'CVE-2024-27834', 'CVE-2024-44169', 'CVE-2024-54527', 'CVE-2024-40782', 'CVE-2024-27816', 'CVE-2024-27821', 'CVE-2024-54486', 'CVE-2024-40805', 'CVE-2024-27804', 'CVE-2024-40836', 'CVE-2024-54508', 'CVE-2024-44240', 'CVE-2024-44290', 'CVE-2024-23265']} values added.
    • The scheme_data property was set to {'product': 'Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4 watchOS 9.4 (Build 20T253)', 'url': 'https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-apple-watch-s8-running-watchos-94', 'description': 'Le produit évalué est « Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4, watchOS 9.4 (build 20T253) » développé par APPLE INC.. Apple Pay est une solution de paiement mobile développée par la société APPLE INC. Après avoir enregistré une carte bancaire dans son équipement Apple, l’utilisateur peut faire des paiements au travers de celui-ci. Pour que le paie', 'sponsor': 'APPLE INC', 'developer': 'APPLE INC', 'cert_id': 'ANSSI-CC-2023/60', 'level': 'EAL2+', 'expiration_date': '2029-01-19', 'enhanced': {'cert_id': 'ANSSI-CC-2023/60', 'certification_date': '2024-01-19', 'expiration_date': '2029-01-19', 'category': 'Divers', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'APPLE INC', 'sponsor': 'APPLE INC', 'evaluation_facility': 'THALES / CNES', 'level': 'EAL2+', 'protection_profile': '', 'mutual_recognition': 'CCRA SOG-IS', 'augmented': 'ADV_FSP.3', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_60en.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_60en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_60en.pdf'}}.
  • 09.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2023-42942', 'CVE-2023-42953', 'CVE-2024-23254', 'CVE-2024-23239', 'CVE-2024-23250', 'CVE-2023-42834', 'CVE-2024-0258', 'CVE-2023-42839', 'CVE-2024-23226', 'CVE-2024-23246', 'CVE-2023-42878', 'CVE-2024-23231', 'CVE-2023-42946', 'CVE-2023-42823', 'CVE-2024-23280', 'CVE-2024-23201', 'CVE-2024-23278', 'CVE-2024-23235']} values added.
    • The scheme_data property was set to None.
  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 18.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2024-44296']} values added.
  • 12.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2024-44255', 'CVE-2024-44282', 'CVE-2024-44285', 'CVE-2024-44274', 'CVE-2024-44194', 'CVE-2024-44302', 'CVE-2024-44244', 'CVE-2024-44273', 'CVE-2024-44215', 'CVE-2024-44254', 'CVE-2024-44234', 'CVE-2024-44232', 'CVE-2024-44233', 'CVE-2024-44269', 'CVE-2024-44239']} values added.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'description': 'Le produit évalué est « Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4, watchOS 9.4 (build 20T253) » développé par APPLE INC.. Apple Pay est une solution de paiement mobile développée par la société APPLE INC. Après avoir enregistré une carte bancaire dans son équipement Apple, l’utilisateur peut faire des paiements au travers de celui-ci. Pour que le paie', 'expiration_date': '2029-01-19', 'enhanced': {'__update__': {'certification_date': '2024-01-19', 'expiration_date': '2029-01-19', 'mutual_recognition': 'CCRA SOG-IS'}}} data.
  • 30.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2024-44155', 'CVE-2024-44297', 'CVE-2024-44144', 'CVE-2024-44185']} values added.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:o:apple:watchos:9.4:*:*:*:*:*:*:*']}.
    • The related_cves property was set to {'_type': 'Set', 'elements': ['CVE-2023-32408', 'CVE-2023-41988', 'CVE-2023-32404', 'CVE-2024-40818', 'CVE-2023-32445', 'CVE-2023-32361', 'CVE-2023-32381', 'CVE-2024-23223', 'CVE-2023-41074', 'CVE-2023-32373', 'CVE-2023-32400', 'CVE-2023-41174', 'CVE-2023-32391', 'CVE-2023-38136', 'CVE-2023-38600', 'CVE-2023-32734', 'CVE-2023-41982', 'CVE-2023-42947', 'CVE-2023-32388', 'CVE-2023-40427', 'CVE-2024-27800', 'CVE-2024-27863', 'CVE-2023-40413', 'CVE-2023-40419', 'CVE-2023-40454', 'CVE-2023-32417', 'CVE-2023-40400', 'CVE-2023-40395', 'CVE-2023-40520', 'CVE-2024-44198', 'CVE-2024-27815', 'CVE-2023-41997', 'CVE-2024-23218', 'CVE-2024-23217', 'CVE-2023-38604', 'CVE-2023-40409', 'CVE-2023-32432', 'CVE-2023-42866', 'CVE-2023-27930', 'CVE-2023-42950', 'CVE-2024-40789', 'CVE-2023-42893', 'CVE-2024-40850', 'CVE-2024-23225', 'CVE-2024-40806', 'CVE-2023-38565', 'CVE-2023-32409', 'CVE-2023-32403', 'CVE-2023-28191', 'CVE-2024-27851', 'CVE-2023-41976', 'CVE-2023-42914', 'CVE-2024-23204', 'CVE-2024-27838', 'CVE-2023-32423', 'CVE-2024-23282', 'CVE-2023-32357', 'CVE-2023-38572', 'CVE-2024-27811', 'CVE-2023-32384', 'CVE-2023-38594', 'CVE-2024-27820', 'CVE-2023-40414', 'CVE-2024-44176', 'CVE-2024-40788', 'CVE-2023-35990', 'CVE-2023-40403', 'CVE-2023-28204', 'CVE-2024-40776', 'CVE-2023-32416', 'CVE-2023-37450', 'CVE-2023-32407', 'CVE-2024-27880', 'CVE-2024-40857', 'CVE-2023-40452', 'CVE-2024-27884', 'CVE-2024-23215', 'CVE-2024-40779', 'CVE-2024-40774', 'CVE-2023-42849', 'CVE-2023-32420', 'CVE-2024-23206', 'CVE-2023-38598', 'CVE-2023-32433', 'CVE-2023-38580', 'CVE-2023-32394', 'CVE-2023-42852', 'CVE-2023-42949', 'CVE-2023-40399', 'CVE-2023-41070', 'CVE-2024-40787', 'CVE-2023-32412', 'CVE-2024-27823', 'CVE-2024-23212', 'CVE-2024-27840', 'CVE-2024-23213', 'CVE-2023-42898', 'CVE-2023-32398', 'CVE-2023-41968', 'CVE-2023-38606', 'CVE-2023-32352', 'CVE-2023-38593', 'CVE-2023-38133', 'CVE-2023-40528', 'CVE-2023-34352', 'CVE-2024-23207', 'CVE-2024-40822', 'CVE-2024-23210', 'CVE-2023-42937', 'CVE-2023-38611', 'CVE-2023-38590', 'CVE-2023-42883', 'CVE-2023-41984', 'CVE-2023-32434', 'CVE-2024-27832', 'CVE-2023-40412', 'CVE-2023-40432', 'CVE-2023-41065', 'CVE-2024-40793', 'CVE-2024-23296', 'CVE-2023-39434', 'CVE-2024-27828', 'CVE-2024-23211', 'CVE-2023-32389', 'CVE-2024-27814', 'CVE-2023-35074', 'CVE-2023-40408', 'CVE-2023-32372', 'CVE-2024-40812', 'CVE-2024-27830', 'CVE-2023-42890', 'CVE-2024-27801', 'CVE-2024-40780', 'CVE-2023-41981', 'CVE-2023-35984', 'CVE-2023-32428', 'CVE-2023-42936', 'CVE-2023-40429', 'CVE-2024-44191', 'CVE-2023-41254', 'CVE-2023-32396', 'CVE-2024-40795', 'CVE-2023-28202', 'CVE-2024-40809', 'CVE-2024-40799', 'CVE-2023-42957', 'CVE-2023-40447', 'CVE-2023-34425', 'CVE-2023-40424', 'CVE-2023-32392', 'CVE-2024-40785', 'CVE-2023-32425', 'CVE-2023-42899', 'CVE-2023-42888', 'CVE-2024-40813', 'CVE-2024-23208', 'CVE-2024-27806', 'CVE-2024-44171', 'CVE-2023-38596', 'CVE-2023-35993', 'CVE-2023-42846', 'CVE-2023-36495', 'CVE-2023-41073', 'CVE-2024-27805', 'CVE-2024-40815', 'CVE-2023-38595', 'CVE-2023-38592', 'CVE-2023-32399', 'CVE-2023-40410', 'CVE-2023-32413', 'CVE-2023-38599', 'CVE-2023-41068', 'CVE-2024-44170', 'CVE-2023-32354', 'CVE-2023-40417', 'CVE-2023-32402', 'CVE-2023-40456', 'CVE-2023-32390', 'CVE-2023-41071', 'CVE-2023-32376', 'CVE-2023-32368', 'CVE-2023-32441', 'CVE-2024-44187', 'CVE-2024-44183', 'CVE-2023-40448', 'CVE-2024-40835', 'CVE-2024-27808', 'CVE-2024-23251', 'CVE-2023-40420', 'CVE-2023-41061']}.
    • The scheme_data property was set to {'product': 'Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4 watchOS 9.4 (Build 20T253)', 'url': 'https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-apple-watch-s8-running-watchos-94', 'description': 'Le produit évalué est « Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4, watchOS 9.4 (build 20T253) » développé par APPLE INC..\nApple Pay est une solution de paiement mobile développée par la société APPLE INC. Après avoir enregistré une carte bancaire dans son équipement Apple, l’utilisateur peut faire des paiements au travers de celui-ci. Pour que le paie', 'sponsor': 'APPLE INC', 'developer': 'APPLE INC', 'cert_id': 'ANSSI-CC-2023/60', 'level': 'EAL2+', 'expiration_date': '19 Janvier 2029', 'enhanced': {'cert_id': 'ANSSI-CC-2023/60', 'certification_date': '19/01/2024', 'expiration_date': '19/01/2029', 'category': 'Divers', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'APPLE INC', 'sponsor': 'APPLE INC', 'evaluation_facility': 'THALES / CNES', 'level': 'EAL2+', 'protection_profile': '', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ADV_FSP.3', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_60en.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_60en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_60en.pdf'}}.
  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e723453c42e1b2a7775e09dbac95077a96bfde5f91be9ffac6144e43102c1d99', 'txt_hash': '577b9a17afa8f6ef94207e56754ef3e0d82be3ac29742c9ab7d913ad6464bb55'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5484f9225194fb80f4936f7fc05e17a6b4193024fabd540321f557163e7ea14e', 'txt_hash': '1e00b0721b5e01d10f2e0ba7052fc0b0478f1196180bcee7b9bc21c27965fd4f'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 2365643, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 54, '/CreationDate': 'D:20231109133713Z', '/Creator': 'Word', '/ModDate': 'D:20231109133737Z', '/Producer': 'Adobe Mac PDF Plug-in', '/Title': 'Microsoft Word - [ST] Watch_S8_watchOS9_SecurityTarget_v1.4.docx', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 138059, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20240222154647+01'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20240222155209+01'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL2': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 3, 'ADV_FSP.3': 2, 'ADV_TDS.1': 4, 'ADV_FSP.2': 4, 'ADV_FSP.1': 2}, 'AGD': {'AGD_OPE.1': 4, 'AGD_PRE.1': 4}, 'ALC': {'ALC_CMC.2': 2, 'ALC_CMS.2': 2, 'ALC_DEL.1': 2}, 'ATE': {'ATE_COV.1': 4, 'ATE_FUN.1': 3, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 2}, 'ASE': {'ASE_CCL.1': 2, 'ASE_ECD.1': 3, 'ASE_INT.1': 2, 'ASE_OBJ.2': 2, 'ASE_REQ.2': 2, 'ASE_SPD.1': 1, 'ASE_TSS.1': 2, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FDP': {'FDP_DAU.1': 4, 'FDP_DAU.1.1': 1, 'FDP_DAU.1.2': 1, 'FDP_ACC': 22, 'FDP_ACC.2': 4, 'FDP_ACF': 20, 'FDP_ACF.1': 12, 'FDP_ETC': 7, 'FDP_ETC.2.1': 2, 'FDP_ETC.2.2': 2, 'FDP_ETC.2.3': 2, 'FDP_ETC.2.4': 2, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_ITC': 5, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_UCT': 10, 'FDP_UCT.1': 1, 'FDP_UIT': 10, 'FDP_UIT.1': 2, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_RIP.1': 12, 'FDP_RIP.1.1': 1, 'FDP_SDI.1': 9, 'FDP_SDI.1.1': 1, 'FDP_ACC.1': 11, 'FDP_IFC.1': 8, 'FDP_ETC.2': 2}, 'FIA': {'FIA_UID.2': 6, 'FIA_UID.2.1': 1, 'FIA_UAU.2': 8, 'FIA_UAU.2.1': 1, 'FIA_UAU.5': 5, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6': 11, 'FIA_AFL': 9, 'FIA_AFL.1': 5, 'FIA_UAU.6.1': 2, 'FIA_ATD.1': 5, 'FIA_ATD.1.1': 2, 'FIA_SOS.2': 4, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_UAU.1': 2, 'FIA_UID.1': 1}, 'FMT': {'FMT_SMR.1': 10, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 7, 'FMT_SMF.1.1': 1, 'FMT_MSA.1': 6, 'FMT_MSA.3': 11, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.1.1': 2, 'FMT_MTD.1': 4, 'FMT_MTD.1.1': 1, 'FMT_MTD.3': 4, 'FMT_MTD.3.1': 1}, 'FPR': {'FPR_UNO.1': 12, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_ITC.1': 4, 'FPT_ITC.1.1': 1, 'FPT_RPL': 8, 'FPT_RPL.1': 6}, 'FTP': {'FTP_ITC': 14, 'FTP_ITC.1': 7, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 4}}, 'cc_claims': {'D': {'D.OS': 16, 'D.SEP_SE': 3}, 'T': {'T.CORRUPT': 2, 'T.PHYSICAL': 2, 'T.RECOVER': 2, 'T.REPLAY': 2, 'T.SILENT': 2, 'T.SKIMMING': 2, 'T.USURP': 2}, 'A': {'A.DE-': 2, 'A.PERSO': 3, 'A.CDCVM': 3, 'A.IPH-': 2, 'A.DEVICE_AUTH': 1, 'A.IPHONE_USER': 1}, 'OE': {'OE.CDCVM': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 3}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 4}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-3': 1, 'FIPS 140-2': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by': 1, 'pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.Card_Data D.Unlock_Secret* D.SEP_iPhone* T.RECOVER Card Recovery An attacker': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2023/60': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 2}}, 'cc_sar': {'ADV': {'ADV_FSP.3': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Thales': {'THALES/CNES': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to ANSSI-cible-CC-2023_60en.pdf.
    • The cert_filename property was set to certificat-CC-2023_60en.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_60en.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_60en.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4 watchOS 9.4 (Build 20T253)', 'url': 'https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-apple-watch-s8-running-watchos-94', 'description': 'Le produit évalué est « Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4, watchOS 9.4 (build 20T253) » développé par APPLE INC..\nApple Pay est une solution de paiement mobile développée par la société APPLE INC. Après avoir enregistré une carte bancaire dans son équipement Apple, l’utilisateur peut faire des paiements au travers de celui-ci. Pour que le paie', 'sponsor': 'APPLE INC', 'developer': 'APPLE INC', 'cert_id': 'ANSSI-CC-2023/60', 'level': 'EAL2+', 'expiration_date': '19 Janvier 2029', 'enhanced': {'cert_id': 'ANSSI-CC-2023/60', 'certification_date': '19/01/2024', 'expiration_date': '19/01/2029', 'category': 'Divers', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'APPLE INC', 'sponsor': 'APPLE INC', 'evaluation_facility': 'THALES / CNES', 'level': 'EAL2+', 'protection_profile': '', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ADV_FSP.3', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_60en.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_60en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_60en.pdf'}}.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4(watchOS 9.4 (build 20T253)) ( ANSSI-CC-2023/60) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_60en.pdf",
  "dgst": "6207e27699db6695",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2023/60",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:o:apple:watchos:9.4:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "9.4"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2024-23271",
        "CVE-2024-44255",
        "CVE-2023-32352",
        "CVE-2023-41074",
        "CVE-2023-42866",
        "CVE-2024-23235",
        "CVE-2023-41070",
        "CVE-2023-41065",
        "CVE-2023-41071",
        "CVE-2024-23290",
        "CVE-2023-38595",
        "CVE-2023-32368",
        "CVE-2024-27832",
        "CVE-2023-42942",
        "CVE-2023-38611",
        "CVE-2023-38596",
        "CVE-2023-42834",
        "CVE-2024-23225",
        "CVE-2023-40409",
        "CVE-2023-40395",
        "CVE-2023-32428",
        "CVE-2023-40420",
        "CVE-2024-44234",
        "CVE-2023-38592",
        "CVE-2023-42823",
        "CVE-2023-42946",
        "CVE-2024-44274",
        "CVE-2024-27851",
        "CVE-2023-42852",
        "CVE-2023-38606",
        "CVE-2024-54527",
        "CVE-2024-27805",
        "CVE-2023-32396",
        "CVE-2023-38572",
        "CVE-2024-44212",
        "CVE-2024-44171",
        "CVE-2024-44169",
        "CVE-2023-32389",
        "CVE-2023-42957",
        "CVE-2023-42878",
        "CVE-2024-23212",
        "CVE-2023-32417",
        "CVE-2023-38590",
        "CVE-2023-40454",
        "CVE-2023-40520",
        "CVE-2023-38136",
        "CVE-2024-44278",
        "CVE-2024-40795",
        "CVE-2023-28204",
        "CVE-2023-40456",
        "CVE-2024-23282",
        "CVE-2023-42888",
        "CVE-2024-54505",
        "CVE-2024-23278",
        "CVE-2024-23296",
        "CVE-2024-40777",
        "CVE-2023-32357",
        "CVE-2024-27816",
        "CVE-2023-32434",
        "CVE-2023-38594",
        "CVE-2024-23210",
        "CVE-2023-41984",
        "CVE-2024-44239",
        "CVE-2023-32391",
        "CVE-2024-40776",
        "CVE-2024-27806",
        "CVE-2023-40528",
        "CVE-2024-27863",
        "CVE-2023-42950",
        "CVE-2024-40780",
        "CVE-2023-35993",
        "CVE-2024-23218",
        "CVE-2023-38599",
        "CVE-2024-27838",
        "CVE-2023-32412",
        "CVE-2024-23211",
        "CVE-2024-23217",
        "CVE-2023-32403",
        "CVE-2024-40806",
        "CVE-2024-44194",
        "CVE-2023-40399",
        "CVE-2024-23286",
        "CVE-2024-44155",
        "CVE-2024-40788",
        "CVE-2023-32433",
        "CVE-2024-40812",
        "CVE-2023-42937",
        "CVE-2023-41976",
        "CVE-2023-40432",
        "CVE-2024-44269",
        "CVE-2023-40447",
        "CVE-2023-32420",
        "CVE-2023-42947",
        "CVE-2024-23251",
        "CVE-2024-27814",
        "CVE-2024-40829",
        "CVE-2024-23204",
        "CVE-2024-23291",
        "CVE-2023-32376",
        "CVE-2024-54508",
        "CVE-2023-42890",
        "CVE-2024-23246",
        "CVE-2024-54486",
        "CVE-2024-27808",
        "CVE-2023-41174",
        "CVE-2024-40782",
        "CVE-2024-40818",
        "CVE-2023-32398",
        "CVE-2024-23263",
        "CVE-2024-44198",
        "CVE-2024-40779",
        "CVE-2024-40787",
        "CVE-2024-27828",
        "CVE-2024-27840",
        "CVE-2024-44170",
        "CVE-2024-27800",
        "CVE-2024-40822",
        "CVE-2024-27821",
        "CVE-2023-32361",
        "CVE-2024-23280",
        "CVE-2024-40774",
        "CVE-2023-37450",
        "CVE-2023-42936",
        "CVE-2024-27884",
        "CVE-2023-40413",
        "CVE-2023-32404",
        "CVE-2023-32354",
        "CVE-2024-40836",
        "CVE-2024-40784",
        "CVE-2024-44282",
        "CVE-2024-54479",
        "CVE-2024-23213",
        "CVE-2023-40417",
        "CVE-2024-27801",
        "CVE-2023-38598",
        "CVE-2024-23208",
        "CVE-2023-40427",
        "CVE-2024-44185",
        "CVE-2023-32408",
        "CVE-2023-32372",
        "CVE-2023-41061",
        "CVE-2024-44273",
        "CVE-2023-32384",
        "CVE-2024-40857",
        "CVE-2024-23265",
        "CVE-2023-41073",
        "CVE-2024-23297",
        "CVE-2024-40789",
        "CVE-2024-40813",
        "CVE-2024-40824",
        "CVE-2024-27834",
        "CVE-2023-35990",
        "CVE-2023-32441",
        "CVE-2023-35984",
        "CVE-2024-44254",
        "CVE-2023-40400",
        "CVE-2023-32445",
        "CVE-2024-54510",
        "CVE-2023-42883",
        "CVE-2024-44187",
        "CVE-2023-34425",
        "CVE-2024-23284",
        "CVE-2024-23215",
        "CVE-2024-27823",
        "CVE-2024-44232",
        "CVE-2024-44233",
        "CVE-2023-32381",
        "CVE-2023-40410",
        "CVE-2023-41981",
        "CVE-2024-23206",
        "CVE-2024-44244",
        "CVE-2023-32390",
        "CVE-2023-41968",
        "CVE-2023-32394",
        "CVE-2024-23288",
        "CVE-2024-27810",
        "CVE-2023-39434",
        "CVE-2023-38604",
        "CVE-2024-40793",
        "CVE-2023-42846",
        "CVE-2023-41982",
        "CVE-2024-23223",
        "CVE-2023-40452",
        "CVE-2024-27815",
        "CVE-2024-23254",
        "CVE-2023-32373",
        "CVE-2023-32416",
        "CVE-2023-35074",
        "CVE-2023-41068",
        "CVE-2023-40429",
        "CVE-2024-44297",
        "CVE-2023-40396",
        "CVE-2024-54526",
        "CVE-2024-23226",
        "CVE-2023-38593",
        "CVE-2023-32392",
        "CVE-2023-42899",
        "CVE-2024-27811",
        "CVE-2024-54494",
        "CVE-2024-40809",
        "CVE-2023-32388",
        "CVE-2024-23231",
        "CVE-2024-54500",
        "CVE-2024-23293",
        "CVE-2023-36495",
        "CVE-2024-27826",
        "CVE-2023-40408",
        "CVE-2024-44215",
        "CVE-2023-42898",
        "CVE-2024-40799",
        "CVE-2023-41997",
        "CVE-2023-42839",
        "CVE-2023-40403",
        "CVE-2023-32399",
        "CVE-2023-42848",
        "CVE-2023-38133",
        "CVE-2024-23287",
        "CVE-2024-44302",
        "CVE-2023-32413",
        "CVE-2023-38580",
        "CVE-2023-32432",
        "CVE-2023-42849",
        "CVE-2023-41254",
        "CVE-2024-23239",
        "CVE-2023-32407",
        "CVE-2024-44240",
        "CVE-2023-42914",
        "CVE-2024-44183",
        "CVE-2023-40448",
        "CVE-2023-28202",
        "CVE-2023-32400",
        "CVE-2024-27820",
        "CVE-2024-44290",
        "CVE-2024-40815",
        "CVE-2023-41988",
        "CVE-2024-23201",
        "CVE-2023-42949",
        "CVE-2024-44191",
        "CVE-2023-32402",
        "CVE-2023-32425",
        "CVE-2024-27830",
        "CVE-2023-42953",
        "CVE-2024-23207",
        "CVE-2023-40414",
        "CVE-2024-0258",
        "CVE-2023-40419",
        "CVE-2023-40412",
        "CVE-2024-54513",
        "CVE-2024-54534",
        "CVE-2024-23289",
        "CVE-2023-40424",
        "CVE-2024-44176",
        "CVE-2023-34352",
        "CVE-2023-28191",
        "CVE-2023-27930",
        "CVE-2023-38600",
        "CVE-2023-32423",
        "CVE-2023-32409",
        "CVE-2024-40805",
        "CVE-2024-40835",
        "CVE-2024-40785",
        "CVE-2024-40850",
        "CVE-2024-44285",
        "CVE-2024-27804",
        "CVE-2024-27880",
        "CVE-2024-44144",
        "CVE-2023-38565",
        "CVE-2023-32734",
        "CVE-2024-44296",
        "CVE-2024-23250",
        "CVE-2023-42893"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "ANSSI-CC-2023/60",
      "description": "Le produit \u00e9valu\u00e9 est \u00ab Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4, watchOS 9.4 (build 20T253) \u00bb d\u00e9velopp\u00e9 par APPLE INC.. Apple Pay est une solution de paiement mobile d\u00e9velopp\u00e9e par la soci\u00e9t\u00e9 APPLE INC. Apr\u00e8s avoir enregistr\u00e9 une carte bancaire dans son \u00e9quipement Apple, l\u2019utilisateur peut faire des paiements au travers de celui-ci. Pour que le paie",
      "developer": "APPLE INC",
      "enhanced": {
        "augmented": "ADV_FSP.3",
        "category": "Divers",
        "cc_version": "Crit\u00e8res Communs version 3.1r5",
        "cert_id": "ANSSI-CC-2023/60",
        "cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_60en.pdf",
        "certification_date": "2024-01-19",
        "developer": "APPLE INC",
        "evaluation_facility": "THALES / CNES",
        "expiration_date": "2029-01-19",
        "level": "EAL2+",
        "mutual_recognition": "CCRA SOG-IS",
        "protection_profile": "",
        "report_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_60en.pdf",
        "sponsor": "APPLE INC",
        "target_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_60en.pdf"
      },
      "expiration_date": "2029-01-19",
      "level": "EAL2+",
      "product": "Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4 watchOS 9.4 (Build 20T253)",
      "sponsor": "APPLE INC",
      "url": "https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-apple-watch-s8-running-watchos-94"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Apple Inc.",
  "manufacturer_web": "https://www.apple.com/",
  "name": "Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4(watchOS 9.4 (build 20T253)) ( ANSSI-CC-2023/60)",
  "not_valid_after": "2029-01-19",
  "not_valid_before": "2024-01-19",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "certificat-CC-2023_60en.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2023/60": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 2
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Thales": {
          "THALES/CNES": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20240222154647+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20240222155209+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 138059,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "ANSSI-CC-2023_60en.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2023/60": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.3": 1
        },
        "ALC": {
          "ALC_FLR": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 3,
          "EAL2 augmented": 1,
          "EAL4": 1
        },
        "ITSEC": {
          "ITSEC E3 Basic": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Thales": {
          "THALES/CNES": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20240222154716+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20240222155205+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 403804,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]",
          "http://www.sogis.eu/",
          "http://www.ssi.gouv.fr/",
          "http://www.commoncriteriaportal.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 13
    },
    "st_filename": "ANSSI-cible-CC-2023_60en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CDCVM": 3,
          "A.DE-": 2,
          "A.DEVICE_AUTH": 1,
          "A.IPH-": 2,
          "A.IPHONE_USER": 1,
          "A.PERSO": 3
        },
        "D": {
          "D.OS": 16,
          "D.SEP_SE": 3
        },
        "OE": {
          "OE.CDCVM": 3
        },
        "T": {
          "T.CORRUPT": 2,
          "T.PHYSICAL": 2,
          "T.RECOVER": 2,
          "T.REPLAY": 2,
          "T.SILENT": 2,
          "T.SKIMMING": 2,
          "T.USURP": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 3,
          "ADV_FSP.1": 2,
          "ADV_FSP.2": 4,
          "ADV_FSP.3": 2,
          "ADV_TDS.1": 4
        },
        "AGD": {
          "AGD_OPE.1": 4,
          "AGD_PRE.1": 4
        },
        "ALC": {
          "ALC_CMC.2": 2,
          "ALC_CMS.2": 2,
          "ALC_DEL.1": 2
        },
        "ASE": {
          "ASE_CCL.1": 2,
          "ASE_ECD.1": 3,
          "ASE_INT.1": 2,
          "ASE_OBJ.2": 2,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 2
        },
        "ATE": {
          "ATE_COV.1": 4,
          "ATE_FUN.1": 3,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL2": 1
        }
      },
      "cc_sfr": {
        "FDP": {
          "FDP_ACC": 22,
          "FDP_ACC.1": 11,
          "FDP_ACC.2": 4,
          "FDP_ACC.2.1": 1,
          "FDP_ACC.2.2": 1,
          "FDP_ACF": 20,
          "FDP_ACF.1": 12,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_DAU.1": 4,
          "FDP_DAU.1.1": 1,
          "FDP_DAU.1.2": 1,
          "FDP_ETC": 7,
          "FDP_ETC.2": 2,
          "FDP_ETC.2.1": 2,
          "FDP_ETC.2.2": 2,
          "FDP_ETC.2.3": 2,
          "FDP_ETC.2.4": 2,
          "FDP_IFC.1": 8,
          "FDP_ITC": 5,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_RIP.1": 12,
          "FDP_RIP.1.1": 1,
          "FDP_SDI.1": 9,
          "FDP_SDI.1.1": 1,
          "FDP_UCT": 10,
          "FDP_UCT.1": 1,
          "FDP_UCT.1.1": 1,
          "FDP_UIT": 10,
          "FDP_UIT.1": 2,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_AFL": 9,
          "FIA_AFL.1": 5,
          "FIA_ATD.1": 5,
          "FIA_ATD.1.1": 2,
          "FIA_SOS.2": 4,
          "FIA_SOS.2.1": 1,
          "FIA_SOS.2.2": 1,
          "FIA_UAU.1": 2,
          "FIA_UAU.2": 8,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.5": 5,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 11,
          "FIA_UAU.6.1": 2,
          "FIA_UID.1": 1,
          "FIA_UID.2": 6,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MSA.1": 6,
          "FMT_MSA.1.1": 2,
          "FMT_MSA.3": 11,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 4,
          "FMT_MTD.1.1": 1,
          "FMT_MTD.3": 4,
          "FMT_MTD.3.1": 1,
          "FMT_SMF.1": 7,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 10,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO.1": 12,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_ITC.1": 4,
          "FPT_ITC.1.1": 1,
          "FPT_RPL": 8,
          "FPT_RPL.1": 6
        },
        "FTP": {
          "FTP_ITC": 14,
          "FTP_ITC.1": 7,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {
        "OutOfScope": {
          "Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by": 1,
          "out of scope": 2,
          "pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.Card_Data D.Unlock_Secret* D.SEP_iPhone* T.RECOVER Card Recovery An attacker": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 3
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS 140-3": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 4
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20231109133713Z",
      "/Creator": "Word",
      "/ModDate": "D:20231109133737Z",
      "/Producer": "Adobe Mac PDF Plug-in",
      "/Title": "Microsoft Word - [ST] Watch_S8_watchOS9_SecurityTarget_v1.4.docx",
      "pdf_file_size_bytes": 2365643,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 54
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_60en.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ADV_FSP.3",
      "EAL2+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_60en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "5484f9225194fb80f4936f7fc05e17a6b4193024fabd540321f557163e7ea14e",
      "txt_hash": "1e00b0721b5e01d10f2e0ba7052fc0b0478f1196180bcee7b9bc21c27965fd4f"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "c7fe41baa75b869067263842cc44bb4f43ffa4d0b42bc8c332d44a58d24f7808",
      "txt_hash": "73c0b750b752064dc9c6b7257313bf1ea6b2f89bee4040eb27ec6ab8dd2ed61f"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e723453c42e1b2a7775e09dbac95077a96bfde5f91be9ffac6144e43102c1d99",
      "txt_hash": "577b9a17afa8f6ef94207e56754ef3e0d82be3ac29742c9ab7d913ad6464bb55"
    }
  },
  "status": "active"
}