This page was not yet optimized for use on mobile
devices.
Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4(watchOS 9.4 (build 20T253)) ( ANSSI-CC-2023/60)
Known vulnerabilities detected
Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.CSV information
| Status | active |
|---|---|
| Valid from | 19.01.2024 |
| Valid until | 19.01.2029 |
| Scheme | 🇫🇷 FR |
| Manufacturer | Apple Inc. |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | ADV_FSP.3, EAL2+ |
Heuristics summary
Certificate ID: ANSSI-CC-2023/60
Certificate
Extracted keywords
Security level
EAL2Security Assurance Requirements (SAR)
ADV_FSP.3Certificates
ANSSI-CC-2023/60Evaluation facilities
THALES/CNESFile metadata
| Creation date | D:20240222154647+01'00' |
|---|---|
| Modification date | D:20240222155209+01'00' |
| Pages | 2 |
| Creator | Acrobat PDFMaker 23 pour Word |
| Producer | Adobe PDF Library 23.1.175 |
Certification report
Extracted keywords
Security level
EAL2, EAL4, EAL2 augmented, ITSEC E3 BasicSecurity Assurance Requirements (SAR)
ADV_FSP.3, ALC_FLRCertificates
ANSSI-CC-2023/60Evaluation facilities
THALES/CNESStandards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
| Creation date | D:20240222154716+01'00' |
|---|---|
| Modification date | D:20240222155205+01'00' |
| Pages | 13 |
| Creator | Acrobat PDFMaker 23 pour Word |
| Producer | Adobe PDF Library 23.1.175 |
Security target
Extracted keywords
Symmetric Algorithms
AESSchemes
MACProtocols
TLSTrusted Execution Environments
SESecurity level
EAL 2, EAL2Claims
D.OS, D.SEP_SE, T.CORRUPT, T.PHYSICAL, T.RECOVER, T.REPLAY, T.SILENT, T.SKIMMING, T.USURP, A.DE-, A.PERSO, A.CDCVM, A.IPH-, A.DEVICE_AUTH, A.IPHONE_USER, OE.CDCVMSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.1, ADV_FSP.2, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1Security Functional Requirements (SFR)
FDP_DAU.1, FDP_DAU.1.1, FDP_DAU.1.2, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_ETC, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_UCT, FDP_UCT.1, FDP_UIT, FDP_UIT.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.1.1, FDP_ACC.1, FDP_IFC.1, FDP_ETC.2, FIA_UID.2, FIA_UID.2.1, FIA_UAU.2, FIA_UAU.2.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_AFL, FIA_AFL.1, FIA_UAU.6.1, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.1, FIA_UID.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1.1, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.3, FMT_MTD.3.1, FPR_UNO.1, FPR_UNO.1.1, FPT_ITC.1, FPT_ITC.1.1, FPT_RPL, FPT_RPL.1, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1Certification process
out of scope, Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by, pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.Card_Data D.Unlock_Secret* D.SEP_iPhone* T.RECOVER Card Recovery An attackerStandards
FIPS 140-3, FIPS 140-2File metadata
| Title | Microsoft Word - [ST] Watch_S8_watchOS9_SecurityTarget_v1.4.docx |
|---|---|
| Creation date | D:20231109133713Z |
| Modification date | D:20231109133737Z |
| Pages | 54 |
| Creator | Word |
| Producer | Adobe Mac PDF Plug-in |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ANSSI-CC-2023/60Extracted SARs
ADV_ARC.1, ADV_FSP.3, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2CPE matches
Related CVEs
| ID | Links | Severity | CVSS Score | Published on | ||
|---|---|---|---|---|---|---|
| Base | Exploitability | Impact | ||||
| CVE-2023-27930 | HIGH | 7.8 | 5.9 | 23.06.2023 | ||
| CVE-2023-28191 | MEDIUM | 5.5 | 3.6 | 23.06.2023 | ||
| CVE-2023-28202 | MEDIUM | 5.5 | 3.6 | 23.06.2023 | ||
| CVE-2023-28204 | MEDIUM | 6.5 | 3.6 | 23.06.2023 | ||
| CVE-2023-32352 | MEDIUM | 5.5 | 3.6 | 23.06.2023 | ||
| CVE-2023-32354 | MEDIUM | 5.5 | 3.6 | 23.06.2023 | ||
| CVE-2023-32357 | HIGH | 7.1 | 5.2 | 23.06.2023 | ||
| CVE-2023-32361 | MEDIUM | 5.5 | 3.6 | 27.09.2023 | ||
| CVE-2023-32368 | MEDIUM | 5.5 | 3.6 | 23.06.2023 | ||
| CVE-2023-32372 | MEDIUM | 5.5 | 3.6 | 23.06.2023 | ||
| CVE-2023-32373 | HIGH | 8.8 | 5.9 | 23.06.2023 | ||
| CVE-2023-32376 | MEDIUM | 5.5 | 3.6 | 23.06.2023 | ||
| CVE-2023-32381 | HIGH | 7.8 | 5.9 | 27.07.2023 | ||
| CVE-2023-32384 | HIGH | 7.8 | 5.9 | 23.06.2023 | ||
| CVE-2023-32388 | MEDIUM | 5.5 | 3.6 | 23.06.2023 | ||
| CVE-2023-32389 | MEDIUM | 5.5 | 3.6 | 23.06.2023 | ||
| CVE-2023-32390 | LOW | 2.4 | 1.4 | 23.06.2023 | ||
| CVE-2023-32391 | MEDIUM | 4.6 | 3.6 | 23.06.2023 | ||
| CVE-2023-32392 | MEDIUM | 5.5 | 3.6 | 23.06.2023 | ||
| CVE-2023-32394 | LOW | 2.4 | 1.4 | 23.06.2023 | ||
| CVE-2023-32396 | HIGH | 7.8 | 5.9 | 27.09.2023 | ||
| CVE-2023-32398 | HIGH | 7.8 | 5.9 | 23.06.2023 | ||
| CVE-2023-32399 | MEDIUM | 5.5 | 3.6 | 23.06.2023 | ||
| CVE-2023-32400 | MEDIUM | 5.5 | 3.6 | 23.06.2023 | ||
| CVE-2023-32402 | MEDIUM | 6.5 | 3.6 | 23.06.2023 | ||
| CVE-2023-32403 | MEDIUM | 5.5 | 3.6 | 23.06.2023 | ||
| CVE-2023-32404 | MEDIUM | 5.5 | 3.6 | 23.06.2023 | ||
| CVE-2023-32407 | MEDIUM | 5.5 | 3.6 | 23.06.2023 | ||
| CVE-2023-32408 | MEDIUM | 5.5 | 3.6 | 23.06.2023 | ||
| CVE-2023-32409 | HIGH | 8.6 | 4.0 | 23.06.2023 | ||
| CVE-2023-32412 | CRITICAL | 9.8 | 5.9 | 23.06.2023 | ||
| CVE-2023-32413 | HIGH | 7.0 | 5.9 | 23.06.2023 | ||
| CVE-2023-32416 | MEDIUM | 5.5 | 3.6 | 27.07.2023 | ||
| CVE-2023-32417 | LOW | 2.4 | 1.4 | 23.06.2023 | ||
| CVE-2023-32420 | HIGH | 7.1 | 5.2 | 23.06.2023 | ||
| CVE-2023-32423 | MEDIUM | 6.5 | 3.6 | 23.06.2023 | ||
| CVE-2023-32425 | HIGH | 7.8 | 5.9 | 06.09.2023 | ||
| CVE-2023-32428 | HIGH | 7.8 | 5.9 | 06.09.2023 | ||
| CVE-2023-32432 | MEDIUM | 5.5 | 3.6 | 06.09.2023 | ||
| CVE-2023-32433 | HIGH | 7.8 | 5.9 | 27.07.2023 | ||
| CVE-2023-32434 | HIGH | 7.8 | 5.9 | 23.06.2023 | ||
| CVE-2023-32441 | HIGH | 7.8 | 5.9 | 27.07.2023 | ||
| CVE-2023-32445 | MEDIUM | 6.1 | 2.7 | 28.07.2023 | ||
| CVE-2023-32734 | HIGH | 7.8 | 5.9 | 27.07.2023 | ||
| CVE-2023-34352 | MEDIUM | 5.3 | 1.4 | 06.09.2023 | ||
| CVE-2023-34425 | CRITICAL | 9.8 | 5.9 | 28.07.2023 | ||
| CVE-2023-35074 | HIGH | 8.8 | 5.9 | 27.09.2023 | ||
| CVE-2023-35984 | MEDIUM | 4.3 | 3.4 | 27.09.2023 | ||
| CVE-2023-35990 | LOW | 3.3 | 1.4 | 27.09.2023 | ||
| CVE-2023-35993 | HIGH | 7.8 | 5.9 | 27.07.2023 | ||
| CVE-2023-36495 | CRITICAL | 9.8 | 5.9 | 28.07.2023 | ||
| CVE-2023-37450 | HIGH | 8.8 | 5.9 | 27.07.2023 | ||
| CVE-2023-38133 | MEDIUM | 6.5 | 3.6 | 27.07.2023 | ||
| CVE-2023-38136 | HIGH | 7.8 | 5.9 | 27.07.2023 | ||
| CVE-2023-38565 | HIGH | 7.8 | 5.9 | 27.07.2023 | ||
| CVE-2023-38572 | HIGH | 7.5 | 3.6 | 27.07.2023 | ||
| CVE-2023-38580 | HIGH | 7.8 | 5.9 | 27.07.2023 | ||
| CVE-2023-38590 | HIGH | 8.8 | 5.9 | 28.07.2023 | ||
| CVE-2023-38592 | HIGH | 8.8 | 5.9 | 28.07.2023 | ||
| CVE-2023-38593 | MEDIUM | 5.5 | 3.6 | 27.07.2023 | ||
| CVE-2023-38594 | HIGH | 8.8 | 5.9 | 27.07.2023 | ||
| CVE-2023-38595 | HIGH | 8.8 | 5.9 | 27.07.2023 | ||
| CVE-2023-38596 | MEDIUM | 5.5 | 3.6 | 27.09.2023 | ||
| CVE-2023-38598 | CRITICAL | 9.8 | 5.9 | 28.07.2023 | ||
| CVE-2023-38599 | MEDIUM | 6.5 | 3.6 | 28.07.2023 | ||
| CVE-2023-38600 | HIGH | 8.8 | 5.9 | 27.07.2023 | ||
| CVE-2023-38604 | CRITICAL | 9.8 | 5.9 | 28.07.2023 | ||
| CVE-2023-38606 | MEDIUM | 5.5 | 3.6 | 27.07.2023 | ||
| CVE-2023-38611 | HIGH | 8.8 | 5.9 | 27.07.2023 | ||
| CVE-2023-39434 | HIGH | 8.8 | 5.9 | 27.09.2023 | ||
| CVE-2023-40395 | LOW | 3.3 | 1.4 | 27.09.2023 | ||
| CVE-2023-40396 | HIGH | 7.8 | 5.9 | 29.07.2024 | ||
| CVE-2023-40399 | MEDIUM | 5.5 | 3.6 | 27.09.2023 | ||
| CVE-2023-40400 | CRITICAL | 9.8 | 5.9 | 27.09.2023 | ||
| CVE-2023-40403 | MEDIUM | 6.5 | 3.6 | 27.09.2023 | ||
| CVE-2023-40408 | MEDIUM | 5.3 | 1.4 | 25.10.2023 | ||
| CVE-2023-40409 | HIGH | 7.8 | 5.9 | 27.09.2023 | ||
| CVE-2023-40410 | MEDIUM | 5.5 | 3.6 | 27.09.2023 | ||
| CVE-2023-40412 | HIGH | 7.8 | 5.9 | 27.09.2023 | ||
| CVE-2023-40413 | MEDIUM | 5.5 | 3.6 | 25.10.2023 | ||
| CVE-2023-40414 | CRITICAL | 9.8 | 5.9 | 10.01.2024 | ||
| CVE-2023-40417 | MEDIUM | 5.4 | 2.5 | 27.09.2023 | ||
| CVE-2023-40419 | HIGH | 7.8 | 5.9 | 27.09.2023 | ||
| CVE-2023-40420 | MEDIUM | 6.5 | 3.6 | 27.09.2023 | ||
| CVE-2023-40424 | MEDIUM | 5.5 | 3.6 | 27.09.2023 | ||
| CVE-2023-40427 | LOW | 3.3 | 1.4 | 27.09.2023 | ||
| CVE-2023-40429 | MEDIUM | 5.5 | 3.6 | 27.09.2023 | ||
| CVE-2023-40432 | HIGH | 7.8 | 5.9 | 27.09.2023 | ||
| CVE-2023-40447 | HIGH | 8.8 | 5.9 | 25.10.2023 | ||
| CVE-2023-40448 | HIGH | 8.6 | 4.0 | 27.09.2023 | ||
| CVE-2023-40452 | HIGH | 7.1 | 5.2 | 27.09.2023 | ||
| CVE-2023-40454 | HIGH | 7.1 | 5.2 | 27.09.2023 | ||
| CVE-2023-40456 | LOW | 3.3 | 1.4 | 27.09.2023 | ||
| CVE-2023-40520 | LOW | 3.3 | 1.4 | 27.09.2023 | ||
| CVE-2023-40528 | MEDIUM | 5.5 | 3.6 | 23.01.2024 | ||
| CVE-2023-41061 | HIGH | 7.8 | 5.9 | 07.09.2023 | ||
| CVE-2023-41065 | LOW | 3.3 | 1.4 | 27.09.2023 | ||
| CVE-2023-41068 | HIGH | 7.8 | 5.9 | 27.09.2023 | ||
| CVE-2023-41070 | MEDIUM | 5.5 | 3.6 | 27.09.2023 | ||
| CVE-2023-41071 | HIGH | 7.8 | 5.9 | 27.09.2023 | ||
| CVE-2023-41073 | MEDIUM | 5.5 | 3.6 | 27.09.2023 | ||
| CVE-2023-41074 | HIGH | 8.8 | 5.9 | 27.09.2023 | ||
| CVE-2023-41174 | HIGH | 7.8 | 5.9 | 27.09.2023 | ||
| CVE-2023-41254 | MEDIUM | 5.5 | 3.6 | 25.10.2023 | ||
| CVE-2023-41968 | MEDIUM | 5.5 | 3.6 | 27.09.2023 | ||
| CVE-2023-41976 | HIGH | 8.8 | 5.9 | 25.10.2023 | ||
| CVE-2023-41981 | MEDIUM | 4.4 | 3.6 | 27.09.2023 | ||
| CVE-2023-41982 | MEDIUM | 4.6 | 3.6 | 25.10.2023 | ||
| CVE-2023-41984 | HIGH | 7.8 | 5.9 | 27.09.2023 | ||
| CVE-2023-41988 | MEDIUM | 6.8 | 5.9 | 25.10.2023 | ||
| CVE-2023-41997 | MEDIUM | 4.6 | 3.6 | 25.10.2023 | ||
| CVE-2023-42823 | MEDIUM | 5.5 | 3.6 | 21.02.2024 | ||
| CVE-2023-42834 | MEDIUM | 5.5 | 3.6 | 21.02.2024 | ||
| CVE-2023-42839 | MEDIUM | 5.5 | 3.6 | 21.02.2024 | ||
| CVE-2023-42846 | MEDIUM | 5.3 | 1.4 | 25.10.2023 | ||
| CVE-2023-42848 | HIGH | 7.8 | 5.9 | 21.02.2024 | ||
| CVE-2023-42849 | MEDIUM | 6.5 | 3.6 | 25.10.2023 | ||
| CVE-2023-42852 | HIGH | 8.8 | 5.9 | 25.10.2023 | ||
| CVE-2023-42866 | HIGH | 8.8 | 5.9 | 10.01.2024 | ||
| CVE-2023-42875 | HIGH | 7.3 | 5.2 | 11.04.2025 | ||
| CVE-2023-42878 | MEDIUM | 5.5 | 3.6 | 21.02.2024 | ||
| CVE-2023-42883 | MEDIUM | 5.5 | 3.6 | 12.12.2023 | ||
| CVE-2023-42888 | MEDIUM | 5.5 | 3.6 | 23.01.2024 | ||
| CVE-2023-42890 | HIGH | 8.8 | 5.9 | 12.12.2023 | ||
| CVE-2023-42893 | MEDIUM | 5.5 | 3.6 | 28.03.2024 | ||
| CVE-2023-42898 | MEDIUM | 5.5 | 3.6 | 12.12.2023 | ||
| CVE-2023-42899 | HIGH | 7.8 | 5.9 | 12.12.2023 | ||
| CVE-2023-42914 | MEDIUM | 6.3 | 4.0 | 12.12.2023 | ||
| CVE-2023-42936 | MEDIUM | 5.5 | 3.6 | 28.03.2024 | ||
| CVE-2023-42937 | MEDIUM | 5.5 | 3.6 | 23.01.2024 | ||
| CVE-2023-42942 | HIGH | 7.8 | 5.9 | 21.02.2024 | ||
| CVE-2023-42946 | MEDIUM | 5.5 | 3.6 | 21.02.2024 | ||
| CVE-2023-42947 | HIGH | 8.6 | 6.0 | 28.03.2024 | ||
| CVE-2023-42949 | LOW | 3.3 | 1.4 | 29.07.2024 | ||
| CVE-2023-42950 | HIGH | 8.8 | 5.9 | 28.03.2024 | ||
| CVE-2023-42953 | MEDIUM | 5.5 | 3.6 | 21.02.2024 | ||
| CVE-2023-42957 | LOW | 3.3 | 1.4 | 29.07.2024 | ||
| CVE-2023-42970 | HIGH | 8.8 | 5.9 | 11.04.2025 | ||
| CVE-2024-0258 | HIGH | 8.6 | 6.0 | 08.03.2024 | ||
| CVE-2024-23201 | MEDIUM | 5.5 | 3.6 | 08.03.2024 | ||
| CVE-2024-23204 | HIGH | 7.5 | 3.6 | 23.01.2024 | ||
| CVE-2024-23206 | MEDIUM | 6.5 | 3.6 | 23.01.2024 | ||
| CVE-2024-23207 | MEDIUM | 5.5 | 3.6 | 23.01.2024 | ||
| CVE-2024-23208 | HIGH | 7.8 | 5.9 | 23.01.2024 | ||
| CVE-2024-23210 | LOW | 3.3 | 1.4 | 23.01.2024 | ||
| CVE-2024-23211 | LOW | 3.3 | 1.4 | 23.01.2024 | ||
| CVE-2024-23212 | HIGH | 7.8 | 5.9 | 23.01.2024 | ||
| CVE-2024-23213 | HIGH | 8.8 | 5.9 | 23.01.2024 | ||
| CVE-2024-23215 | MEDIUM | 5.5 | 3.6 | 23.01.2024 | ||
| CVE-2024-23217 | LOW | 3.3 | 1.4 | 23.01.2024 | ||
| CVE-2024-23218 | MEDIUM | 5.9 | 3.6 | 23.01.2024 | ||
| CVE-2024-23223 | MEDIUM | 6.2 | 3.6 | 23.01.2024 | ||
| CVE-2024-23225 | HIGH | 7.8 | 5.9 | 05.03.2024 | ||
| CVE-2024-23226 | HIGH | 8.8 | 5.9 | 08.03.2024 | ||
| CVE-2024-23231 | MEDIUM | 5.5 | 3.6 | 08.03.2024 | ||
| CVE-2024-23235 | MEDIUM | 4.7 | 3.6 | 08.03.2024 | ||
| CVE-2024-23239 | MEDIUM | 4.7 | 3.6 | 08.03.2024 | ||
| CVE-2024-23246 | HIGH | 8.6 | 6.0 | 08.03.2024 | ||
| CVE-2024-23250 | MEDIUM | 5.5 | 3.6 | 08.03.2024 | ||
| CVE-2024-23251 | MEDIUM | 4.6 | 3.6 | 10.06.2024 | ||
| CVE-2024-23254 | MEDIUM | 6.5 | 3.6 | 08.03.2024 | ||
| CVE-2024-23263 | MEDIUM | 6.5 | 3.6 | 08.03.2024 | ||
| CVE-2024-23265 | HIGH | 7.8 | 5.9 | 08.03.2024 | ||
| CVE-2024-23271 | MEDIUM | 6.5 | 3.6 | 24.04.2024 | ||
| CVE-2024-23278 | HIGH | 8.6 | 6.0 | 08.03.2024 | ||
| CVE-2024-23280 | MEDIUM | 6.5 | 3.6 | 08.03.2024 | ||
| CVE-2024-23282 | MEDIUM | 5.5 | 3.6 | 10.06.2024 | ||
| CVE-2024-23284 | MEDIUM | 6.5 | 3.6 | 08.03.2024 | ||
| CVE-2024-23286 | HIGH | 7.8 | 5.9 | 08.03.2024 | ||
| CVE-2024-23287 | MEDIUM | 5.5 | 3.6 | 08.03.2024 | ||
| CVE-2024-23288 | HIGH | 7.8 | 5.9 | 08.03.2024 | ||
| CVE-2024-23289 | LOW | 3.3 | 1.4 | 08.03.2024 | ||
| CVE-2024-23290 | MEDIUM | 5.5 | 3.6 | 08.03.2024 | ||
| CVE-2024-23291 | LOW | 3.3 | 1.4 | 08.03.2024 | ||
| CVE-2024-23293 | MEDIUM | 4.6 | 3.6 | 08.03.2024 | ||
| CVE-2024-23296 | HIGH | 7.8 | 5.9 | 05.03.2024 | ||
| CVE-2024-23297 | MEDIUM | 5.5 | 3.6 | 08.03.2024 | ||
| CVE-2024-27800 | MEDIUM | 6.5 | 3.6 | 10.06.2024 | ||
| CVE-2024-27801 | HIGH | 7.8 | 5.9 | 10.06.2024 | ||
| CVE-2024-27804 | MEDIUM | 5.5 | 3.6 | 14.05.2024 | ||
| CVE-2024-27805 | MEDIUM | 5.5 | 3.6 | 10.06.2024 | ||
| CVE-2024-27806 | MEDIUM | 5.5 | 3.6 | 10.06.2024 | ||
| CVE-2024-27808 | HIGH | 8.8 | 5.9 | 10.06.2024 | ||
| CVE-2024-27810 | MEDIUM | 5.5 | 3.6 | 14.05.2024 | ||
| CVE-2024-27811 | HIGH | 7.8 | 5.9 | 10.06.2024 | ||
| CVE-2024-27814 | LOW | 2.4 | 1.4 | 10.06.2024 | ||
| CVE-2024-27815 | HIGH | 7.8 | 5.9 | 10.06.2024 | ||
| CVE-2024-27816 | MEDIUM | 5.5 | 3.6 | 14.05.2024 | ||
| CVE-2024-27820 | HIGH | 8.8 | 5.9 | 10.06.2024 | ||
| CVE-2024-27821 | MEDIUM | 4.7 | 3.6 | 14.05.2024 | ||
| CVE-2024-27823 | MEDIUM | 5.9 | 3.6 | 29.07.2024 | ||
| CVE-2024-27826 | HIGH | 7.8 | 5.9 | 29.07.2024 | ||
| CVE-2024-27828 | HIGH | 7.8 | 5.9 | 10.06.2024 | ||
| CVE-2024-27830 | MEDIUM | 6.5 | 3.6 | 10.06.2024 | ||
| CVE-2024-27832 | HIGH | 7.8 | 5.9 | 10.06.2024 | ||
| CVE-2024-27834 | MEDIUM | 5.5 | 3.6 | 14.05.2024 | ||
| CVE-2024-27838 | MEDIUM | 6.5 | 3.6 | 10.06.2024 | ||
| CVE-2024-27840 | MEDIUM | 6.3 | 4.0 | 10.06.2024 | ||
| CVE-2024-27851 | HIGH | 8.8 | 5.9 | 10.06.2024 | ||
| CVE-2024-27856 | HIGH | 7.8 | 5.9 | 15.01.2025 | ||
| CVE-2024-27859 | HIGH | 8.8 | 5.9 | 10.02.2025 | ||
| CVE-2024-27863 | MEDIUM | 5.5 | 3.6 | 29.07.2024 | ||
| CVE-2024-27880 | MEDIUM | 5.5 | 3.6 | 17.09.2024 | ||
| CVE-2024-27884 | MEDIUM | 5.5 | 3.6 | 29.07.2024 | ||
| CVE-2024-40774 | HIGH | 7.1 | 5.2 | 29.07.2024 | ||
| CVE-2024-40776 | MEDIUM | 4.3 | 1.4 | 29.07.2024 | ||
| CVE-2024-40777 | MEDIUM | 5.5 | 3.6 | 29.07.2024 | ||
| CVE-2024-40779 | MEDIUM | 5.5 | 3.6 | 29.07.2024 | ||
| CVE-2024-40780 | MEDIUM | 5.5 | 3.6 | 29.07.2024 | ||
| CVE-2024-40782 | MEDIUM | 6.5 | 3.6 | 29.07.2024 | ||
| CVE-2024-40784 | MEDIUM | 5.5 | 3.6 | 29.07.2024 | ||
| CVE-2024-40785 | MEDIUM | 6.1 | 2.7 | 29.07.2024 | ||
| CVE-2024-40787 | HIGH | 7.1 | 5.2 | 29.07.2024 | ||
| CVE-2024-40788 | MEDIUM | 5.5 | 3.6 | 29.07.2024 | ||
| CVE-2024-40789 | MEDIUM | 6.5 | 3.6 | 29.07.2024 | ||
| CVE-2024-40793 | MEDIUM | 5.5 | 3.6 | 29.07.2024 | ||
| CVE-2024-40795 | LOW | 3.3 | 1.4 | 29.07.2024 | ||
| CVE-2024-40799 | HIGH | 7.1 | 5.2 | 29.07.2024 | ||
| CVE-2024-40805 | HIGH | 7.1 | 5.2 | 29.07.2024 | ||
| CVE-2024-40806 | MEDIUM | 5.5 | 3.6 | 29.07.2024 | ||
| CVE-2024-40809 | HIGH | 7.8 | 5.9 | 29.07.2024 | ||
| CVE-2024-40812 | HIGH | 7.8 | 5.9 | 29.07.2024 | ||
| CVE-2024-40813 | MEDIUM | 4.6 | 3.6 | 29.07.2024 | ||
| CVE-2024-40815 | HIGH | 7.5 | 5.9 | 29.07.2024 | ||
| CVE-2024-40818 | MEDIUM | 4.6 | 3.6 | 29.07.2024 | ||
| CVE-2024-40822 | LOW | 2.4 | 1.4 | 29.07.2024 | ||
| CVE-2024-40824 | MEDIUM | 5.5 | 3.6 | 29.07.2024 | ||
| CVE-2024-40829 | MEDIUM | 4.6 | 3.6 | 29.07.2024 | ||
| CVE-2024-40835 | MEDIUM | 5.5 | 3.6 | 29.07.2024 | ||
| CVE-2024-40836 | MEDIUM | 5.5 | 3.6 | 29.07.2024 | ||
| CVE-2024-40850 | MEDIUM | 5.5 | 3.6 | 17.09.2024 | ||
| CVE-2024-40857 | MEDIUM | 6.1 | 2.7 | 17.09.2024 | ||
| CVE-2024-44144 | MEDIUM | 5.5 | 3.6 | 28.10.2024 | ||
| CVE-2024-44155 | MEDIUM | 6.5 | 3.6 | 28.10.2024 | ||
| CVE-2024-44169 | MEDIUM | 5.5 | 3.6 | 17.09.2024 | ||
| CVE-2024-44170 | MEDIUM | 5.5 | 3.6 | 17.09.2024 | ||
| CVE-2024-44171 | MEDIUM | 4.6 | 3.6 | 17.09.2024 | ||
| CVE-2024-44176 | MEDIUM | 5.5 | 3.6 | 17.09.2024 | ||
| CVE-2024-44183 | MEDIUM | 5.5 | 3.6 | 17.09.2024 | ||
| CVE-2024-44185 | MEDIUM | 5.5 | 3.6 | 24.10.2024 | ||
| CVE-2024-44187 | MEDIUM | 6.5 | 3.6 | 17.09.2024 | ||
| CVE-2024-44191 | MEDIUM | 5.5 | 3.6 | 17.09.2024 | ||
| CVE-2024-44192 | MEDIUM | 5.5 | 3.6 | 10.03.2025 | ||
| CVE-2024-44194 | MEDIUM | 5.5 | 3.6 | 28.10.2024 | ||
| CVE-2024-44198 | MEDIUM | 5.5 | 3.6 | 17.09.2024 | ||
| CVE-2024-44212 | MEDIUM | 5.3 | 1.4 | 12.12.2024 | ||
| CVE-2024-44215 | MEDIUM | 5.5 | 3.6 | 28.10.2024 | ||
| CVE-2024-44225 | HIGH | 7.8 | 5.9 | 12.12.2024 | ||
| CVE-2024-44232 | MEDIUM | 5.5 | 3.6 | 01.11.2024 | ||
| CVE-2024-44233 | MEDIUM | 5.5 | 3.6 | 01.11.2024 | ||
| CVE-2024-44234 | MEDIUM | 5.5 | 3.6 | 01.11.2024 | ||
| CVE-2024-44239 | MEDIUM | 5.5 | 3.6 | 28.10.2024 | ||
| CVE-2024-44240 | MEDIUM | 5.5 | 3.6 | 28.10.2024 | ||
| CVE-2024-44244 | MEDIUM | 4.3 | 1.4 | 28.10.2024 | ||
| CVE-2024-44254 | MEDIUM | 5.5 | 3.6 | 28.10.2024 | ||
| CVE-2024-44255 | HIGH | 7.8 | 5.9 | 28.10.2024 | ||
| CVE-2024-44269 | MEDIUM | 5.5 | 3.6 | 28.10.2024 | ||
| CVE-2024-44273 | MEDIUM | 5.5 | 3.6 | 28.10.2024 | ||
| CVE-2024-44274 | MEDIUM | 4.6 | 3.6 | 28.10.2024 | ||
| CVE-2024-44278 | MEDIUM | 5.5 | 3.6 | 28.10.2024 | ||
| CVE-2024-44282 | MEDIUM | 5.5 | 3.6 | 28.10.2024 | ||
| CVE-2024-44285 | HIGH | 7.8 | 5.9 | 28.10.2024 | ||
| CVE-2024-44290 | LOW | 3.3 | 1.4 | 12.12.2024 | ||
| CVE-2024-44296 | MEDIUM | 5.4 | 2.5 | 28.10.2024 | ||
| CVE-2024-44297 | MEDIUM | 6.5 | 3.6 | 28.10.2024 | ||
| CVE-2024-44302 | MEDIUM | 5.5 | 3.6 | 28.10.2024 | ||
| CVE-2024-54467 | MEDIUM | 6.5 | 3.6 | 10.03.2025 | ||
| CVE-2024-54468 | HIGH | 8.2 | 5.8 | 27.01.2025 | ||
| CVE-2024-54478 | MEDIUM | 6.5 | 3.6 | 27.01.2025 | ||
| CVE-2024-54479 | HIGH | 7.5 | 3.6 | 12.12.2024 | ||
| CVE-2024-54486 | MEDIUM | 6.5 | 3.6 | 12.12.2024 | ||
| CVE-2024-54494 | MEDIUM | 5.9 | 3.6 | 12.12.2024 | ||
| CVE-2024-54497 | MEDIUM | 6.5 | 3.6 | 27.01.2025 | ||
| CVE-2024-54499 | HIGH | 8.8 | 5.9 | 27.01.2025 | ||
| CVE-2024-54500 | MEDIUM | 5.5 | 3.6 | 12.12.2024 | ||
| CVE-2024-54501 | MEDIUM | 5.5 | 3.6 | 12.12.2024 | ||
| CVE-2024-54502 | MEDIUM | 6.5 | 3.6 | 12.12.2024 | ||
| CVE-2024-54505 | HIGH | 8.8 | 5.9 | 12.12.2024 | ||
| CVE-2024-54508 | HIGH | 7.5 | 3.6 | 12.12.2024 | ||
| CVE-2024-54510 | MEDIUM | 5.1 | 3.6 | 12.12.2024 | ||
| CVE-2024-54512 | CRITICAL | 9.1 | 5.2 | 27.01.2025 | ||
| CVE-2024-54513 | MEDIUM | 5.5 | 3.6 | 12.12.2024 | ||
| CVE-2024-54514 | HIGH | 8.6 | 6.0 | 12.12.2024 | ||
| CVE-2024-54517 | HIGH | 7.8 | 5.9 | 27.01.2025 | ||
| CVE-2024-54518 | MEDIUM | 5.3 | 3.4 | 27.01.2025 | ||
| CVE-2024-54522 | HIGH | 7.8 | 5.9 | 27.01.2025 | ||
| CVE-2024-54523 | MEDIUM | 6.3 | 4.0 | 27.01.2025 | ||
| CVE-2024-54525 | HIGH | 8.8 | 5.9 | 17.03.2025 | ||
| CVE-2024-54526 | MEDIUM | 5.5 | 3.6 | 12.12.2024 | ||
| CVE-2024-54527 | MEDIUM | 5.5 | 3.6 | 12.12.2024 | ||
| CVE-2024-54530 | CRITICAL | 9.1 | 5.2 | 27.01.2025 | ||
| CVE-2024-54534 | CRITICAL | 9.8 | 5.9 | 12.12.2024 | ||
| CVE-2024-54535 | MEDIUM | 4.3 | 1.4 | 15.01.2025 | ||
| CVE-2024-54538 | HIGH | 7.5 | 3.6 | 20.12.2024 | ||
| CVE-2024-54541 | MEDIUM | 5.5 | 3.6 | 27.01.2025 | ||
| CVE-2024-54542 | CRITICAL | 9.1 | 5.2 | 27.01.2025 | ||
| CVE-2024-54543 | HIGH | 8.8 | 5.9 | 27.01.2025 | ||
| CVE-2024-54551 | HIGH | 7.5 | 3.6 | 21.03.2025 | ||
| CVE-2024-54560 | MEDIUM | 5.5 | 3.6 | 10.03.2025 | ||
| CVE-2024-54658 | MEDIUM | 6.5 | 3.6 | 10.02.2025 | ||
| CVE-2025-24085 | CRITICAL | 10.0 | 6.0 | 27.01.2025 | ||
| CVE-2025-24086 | MEDIUM | 5.5 | 3.6 | 27.01.2025 | ||
| CVE-2025-24107 | HIGH | 7.8 | 5.9 | 27.01.2025 | ||
| CVE-2025-24111 | MEDIUM | 5.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-24117 | MEDIUM | 5.5 | 3.6 | 27.01.2025 | ||
| CVE-2025-24123 | MEDIUM | 5.5 | 3.6 | 27.01.2025 | ||
| CVE-2025-24124 | MEDIUM | 5.5 | 3.6 | 27.01.2025 | ||
| CVE-2025-24126 | HIGH | 7.3 | 5.2 | 27.01.2025 | ||
| CVE-2025-24129 | HIGH | 7.5 | 3.6 | 27.01.2025 | ||
| CVE-2025-24131 | MEDIUM | 6.5 | 3.6 | 27.01.2025 | ||
| CVE-2025-24137 | HIGH | 8.0 | 5.9 | 27.01.2025 | ||
| CVE-2025-24144 | MEDIUM | 5.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-24149 | MEDIUM | 5.5 | 3.6 | 27.01.2025 | ||
| CVE-2025-24158 | MEDIUM | 6.5 | 3.6 | 27.01.2025 | ||
| CVE-2025-24159 | HIGH | 7.8 | 5.9 | 27.01.2025 | ||
| CVE-2025-24160 | MEDIUM | 4.3 | 1.4 | 27.01.2025 | ||
| CVE-2025-24161 | MEDIUM | 5.5 | 3.6 | 27.01.2025 | ||
| CVE-2025-24162 | MEDIUM | 6.5 | 3.6 | 27.01.2025 | ||
| CVE-2025-24163 | MEDIUM | 5.5 | 3.6 | 27.01.2025 | ||
| CVE-2025-24184 | MEDIUM | 5.5 | 3.6 | 19.05.2025 | ||
| CVE-2025-24189 | HIGH | 8.8 | 5.9 | 19.05.2025 | ||
| CVE-2025-24223 | HIGH | 8.0 | 5.9 | 12.05.2025 | ||
| CVE-2025-24224 | HIGH | 7.5 | 3.6 | 30.07.2025 | ||
| CVE-2025-24251 | MEDIUM | 6.5 | 3.6 | 29.04.2025 | ||
| CVE-2025-30438 | MEDIUM | 5.5 | 3.6 | 31.03.2025 | ||
| CVE-2025-31203 | MEDIUM | 6.5 | 3.6 | 29.04.2025 | ||
| CVE-2025-31204 | HIGH | 8.8 | 5.9 | 12.05.2025 | ||
| CVE-2025-31205 | MEDIUM | 6.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-31206 | MEDIUM | 4.3 | 1.4 | 12.05.2025 | ||
| CVE-2025-31208 | HIGH | 7.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-31209 | MEDIUM | 6.3 | 3.4 | 12.05.2025 | ||
| CVE-2025-31212 | MEDIUM | 5.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-31215 | MEDIUM | 6.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-31217 | MEDIUM | 6.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-31219 | HIGH | 7.1 | 4.2 | 12.05.2025 | ||
| CVE-2025-31221 | HIGH | 7.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-31222 | HIGH | 7.8 | 5.9 | 12.05.2025 | ||
| CVE-2025-31223 | HIGH | 8.0 | 5.9 | 12.05.2025 | ||
| CVE-2025-31226 | MEDIUM | 5.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-31233 | MEDIUM | 6.3 | 3.4 | 12.05.2025 | ||
| CVE-2025-31238 | HIGH | 7.3 | 3.4 | 12.05.2025 | ||
| CVE-2025-31239 | MEDIUM | 4.3 | 1.4 | 12.05.2025 | ||
| CVE-2025-31241 | MEDIUM | 5.3 | 1.4 | 12.05.2025 | ||
| CVE-2025-31251 | MEDIUM | 5.5 | 3.6 | 12.05.2025 | ||
| CVE-2025-31255 | CRITICAL | 9.8 | 5.9 | 15.09.2025 | ||
| CVE-2025-31257 | MEDIUM | 4.7 | 1.4 | 12.05.2025 | ||
| CVE-2025-31262 | MEDIUM | 5.5 | 3.6 | 19.05.2025 | ||
| CVE-2025-31273 | HIGH | 8.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-31277 | HIGH | 8.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-31278 | HIGH | 8.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43186 | CRITICAL | 9.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43190 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43200 | MEDIUM | 4.2 | 2.5 | 16.06.2025 | ||
| CVE-2025-43209 | CRITICAL | 9.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43211 | MEDIUM | 6.2 | 3.6 | 30.07.2025 | ||
| CVE-2025-43212 | MEDIUM | 6.5 | 3.6 | 30.07.2025 | ||
| CVE-2025-43213 | MEDIUM | 6.5 | 3.6 | 30.07.2025 | ||
| CVE-2025-43214 | MEDIUM | 6.5 | 3.6 | 30.07.2025 | ||
| CVE-2025-43216 | MEDIUM | 6.5 | 3.6 | 30.07.2025 | ||
| CVE-2025-43223 | HIGH | 7.5 | 3.6 | 30.07.2025 | ||
| CVE-2025-43226 | MEDIUM | 4.0 | 1.4 | 30.07.2025 | ||
| CVE-2025-43227 | HIGH | 7.5 | 3.6 | 30.07.2025 | ||
| CVE-2025-43230 | MEDIUM | 4.0 | 1.4 | 30.07.2025 | ||
| CVE-2025-43234 | CRITICAL | 9.8 | 5.9 | 30.07.2025 | ||
| CVE-2025-43265 | MEDIUM | 4.0 | 1.4 | 30.07.2025 | ||
| CVE-2025-43272 | MEDIUM | 6.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43282 | MEDIUM | 5.5 | 3.6 | 15.10.2025 | ||
| CVE-2025-43302 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43303 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43317 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43329 | HIGH | 8.8 | 6.0 | 15.09.2025 | ||
| CVE-2025-43342 | CRITICAL | 9.8 | 5.9 | 15.09.2025 | ||
| CVE-2025-43343 | CRITICAL | 9.8 | 5.9 | 15.09.2025 | ||
| CVE-2025-43344 | LOW | 3.3 | 1.4 | 15.09.2025 | ||
| CVE-2025-43346 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43347 | CRITICAL | 9.8 | 5.9 | 15.09.2025 | ||
| CVE-2025-43349 | LOW | 2.8 | 1.4 | 15.09.2025 | ||
| CVE-2025-43354 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43355 | MEDIUM | 5.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43356 | MEDIUM | 6.5 | 3.6 | 15.09.2025 | ||
| CVE-2025-43359 | CRITICAL | 9.8 | 5.9 | 15.09.2025 | ||
| CVE-2025-43372 | HIGH | 7.8 | 5.9 | 15.09.2025 | ||
Showing 5 out of 382.
Similar certificates
Showing 5 out of 24.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_60en.pdf",
"dgst": "6207e27699db6695",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2023/60",
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:apple:watchos:9.4:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"eal": "EAL2+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"9.4"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2023-38600",
"CVE-2024-54551",
"CVE-2023-38596",
"CVE-2024-27801",
"CVE-2023-41988",
"CVE-2023-32376",
"CVE-2023-32734",
"CVE-2024-27832",
"CVE-2025-43344",
"CVE-2024-23218",
"CVE-2023-32425",
"CVE-2023-32388",
"CVE-2024-54479",
"CVE-2023-32404",
"CVE-2023-40408",
"CVE-2023-40427",
"CVE-2023-40528",
"CVE-2024-54468",
"CVE-2023-38598",
"CVE-2025-31251",
"CVE-2025-43200",
"CVE-2024-23239",
"CVE-2023-42970",
"CVE-2024-44170",
"CVE-2023-42849",
"CVE-2023-32384",
"CVE-2023-32412",
"CVE-2023-42947",
"CVE-2023-41984",
"CVE-2023-41065",
"CVE-2023-38572",
"CVE-2024-54542",
"CVE-2024-44169",
"CVE-2024-23284",
"CVE-2023-32373",
"CVE-2023-42878",
"CVE-2023-32409",
"CVE-2025-43317",
"CVE-2024-44269",
"CVE-2023-36495",
"CVE-2025-24085",
"CVE-2025-31203",
"CVE-2024-40785",
"CVE-2024-40857",
"CVE-2023-41068",
"CVE-2024-40805",
"CVE-2023-32445",
"CVE-2023-42883",
"CVE-2023-40417",
"CVE-2024-23208",
"CVE-2024-54513",
"CVE-2023-40412",
"CVE-2023-38136",
"CVE-2024-23290",
"CVE-2025-43359",
"CVE-2023-42953",
"CVE-2024-27830",
"CVE-2024-23226",
"CVE-2024-27800",
"CVE-2024-54543",
"CVE-2024-54658",
"CVE-2025-30438",
"CVE-2023-32417",
"CVE-2024-23271",
"CVE-2025-24137",
"CVE-2023-40432",
"CVE-2024-23288",
"CVE-2023-41976",
"CVE-2024-54502",
"CVE-2023-40429",
"CVE-2023-40410",
"CVE-2024-23201",
"CVE-2025-31226",
"CVE-2024-44244",
"CVE-2024-44185",
"CVE-2025-43329",
"CVE-2025-31233",
"CVE-2023-40395",
"CVE-2025-43209",
"CVE-2025-24163",
"CVE-2024-44155",
"CVE-2024-23212",
"CVE-2024-23213",
"CVE-2024-23265",
"CVE-2024-44278",
"CVE-2023-40520",
"CVE-2023-32403",
"CVE-2023-32398",
"CVE-2023-32434",
"CVE-2023-41254",
"CVE-2023-38580",
"CVE-2025-43272",
"CVE-2025-24223",
"CVE-2025-24126",
"CVE-2024-54501",
"CVE-2023-40399",
"CVE-2023-32432",
"CVE-2024-40784",
"CVE-2024-40777",
"CVE-2024-44274",
"CVE-2025-24189",
"CVE-2023-32433",
"CVE-2024-40789",
"CVE-2023-38604",
"CVE-2024-27826",
"CVE-2025-43230",
"CVE-2024-27823",
"CVE-2023-42899",
"CVE-2025-43343",
"CVE-2025-43356",
"CVE-2023-40419",
"CVE-2023-38599",
"CVE-2024-54535",
"CVE-2024-44240",
"CVE-2023-32394",
"CVE-2024-54478",
"CVE-2023-38565",
"CVE-2023-38593",
"CVE-2023-32372",
"CVE-2024-54508",
"CVE-2024-44176",
"CVE-2025-24123",
"CVE-2024-27806",
"CVE-2024-27828",
"CVE-2023-41073",
"CVE-2024-44187",
"CVE-2025-24107",
"CVE-2025-43354",
"CVE-2024-44282",
"CVE-2024-23280",
"CVE-2024-54526",
"CVE-2024-54560",
"CVE-2023-42946",
"CVE-2024-27805",
"CVE-2023-34352",
"CVE-2024-40806",
"CVE-2025-43372",
"CVE-2025-31278",
"CVE-2024-23217",
"CVE-2023-32392",
"CVE-2024-40793",
"CVE-2024-40776",
"CVE-2023-42823",
"CVE-2024-54514",
"CVE-2025-43223",
"CVE-2024-40835",
"CVE-2025-24086",
"CVE-2024-40829",
"CVE-2024-23215",
"CVE-2024-27815",
"CVE-2024-54500",
"CVE-2023-32396",
"CVE-2023-32354",
"CVE-2024-40782",
"CVE-2023-42950",
"CVE-2024-40779",
"CVE-2023-40396",
"CVE-2023-42875",
"CVE-2023-40414",
"CVE-2023-41997",
"CVE-2024-27880",
"CVE-2024-44194",
"CVE-2023-32361",
"CVE-2024-54510",
"CVE-2023-35993",
"CVE-2023-28191",
"CVE-2023-40409",
"CVE-2024-23287",
"CVE-2025-43347",
"CVE-2025-31223",
"CVE-2023-42942",
"CVE-2025-43190",
"CVE-2024-40774",
"CVE-2025-43213",
"CVE-2025-31273",
"CVE-2025-43214",
"CVE-2023-40447",
"CVE-2024-27840",
"CVE-2024-54522",
"CVE-2024-54499",
"CVE-2025-43355",
"CVE-2023-41070",
"CVE-2024-23235",
"CVE-2023-40413",
"CVE-2024-40836",
"CVE-2024-44233",
"CVE-2024-44302",
"CVE-2023-41074",
"CVE-2024-54518",
"CVE-2024-23293",
"CVE-2024-23263",
"CVE-2025-43212",
"CVE-2025-31239",
"CVE-2025-24144",
"CVE-2023-38611",
"CVE-2023-38133",
"CVE-2023-41981",
"CVE-2024-54512",
"CVE-2023-27930",
"CVE-2024-27884",
"CVE-2025-43342",
"CVE-2023-40424",
"CVE-2024-44234",
"CVE-2023-32368",
"CVE-2025-24224",
"CVE-2023-41968",
"CVE-2024-54494",
"CVE-2025-43226",
"CVE-2023-32381",
"CVE-2024-27811",
"CVE-2023-42848",
"CVE-2024-44144",
"CVE-2025-24161",
"CVE-2024-23231",
"CVE-2023-32423",
"CVE-2025-31205",
"CVE-2024-44290",
"CVE-2023-42949",
"CVE-2025-24111",
"CVE-2024-27810",
"CVE-2023-40456",
"CVE-2025-24124",
"CVE-2023-32441",
"CVE-2023-42936",
"CVE-2024-44191",
"CVE-2025-43216",
"CVE-2023-35984",
"CVE-2023-28204",
"CVE-2024-54538",
"CVE-2023-42893",
"CVE-2024-44273",
"CVE-2024-40822",
"CVE-2024-54486",
"CVE-2025-43303",
"CVE-2024-40795",
"CVE-2024-23225",
"CVE-2023-40452",
"CVE-2023-41061",
"CVE-2023-32402",
"CVE-2024-23250",
"CVE-2025-43282",
"CVE-2023-32416",
"CVE-2023-32357",
"CVE-2025-43265",
"CVE-2025-31219",
"CVE-2023-38594",
"CVE-2024-27838",
"CVE-2024-40780",
"CVE-2023-42898",
"CVE-2024-54517",
"CVE-2023-42937",
"CVE-2025-24149",
"CVE-2025-24162",
"CVE-2023-42846",
"CVE-2025-24131",
"CVE-2025-31262",
"CVE-2023-38590",
"CVE-2023-38606",
"CVE-2023-35074",
"CVE-2025-31215",
"CVE-2024-44225",
"CVE-2023-41174",
"CVE-2024-23282",
"CVE-2024-44183",
"CVE-2024-54497",
"CVE-2024-40818",
"CVE-2023-42890",
"CVE-2023-37450",
"CVE-2024-27808",
"CVE-2024-44254",
"CVE-2024-44285",
"CVE-2024-44215",
"CVE-2025-24251",
"CVE-2024-54505",
"CVE-2023-32400",
"CVE-2023-32408",
"CVE-2025-43346",
"CVE-2025-31204",
"CVE-2025-24158",
"CVE-2025-31221",
"CVE-2023-42852",
"CVE-2024-23223",
"CVE-2023-32399",
"CVE-2024-23296",
"CVE-2024-23251",
"CVE-2025-31255",
"CVE-2025-24159",
"CVE-2025-43227",
"CVE-2024-40812",
"CVE-2024-40815",
"CVE-2025-31241",
"CVE-2024-54541",
"CVE-2024-23291",
"CVE-2024-23289",
"CVE-2024-27856",
"CVE-2024-23207",
"CVE-2024-54467",
"CVE-2025-24117",
"CVE-2025-43302",
"CVE-2024-44232",
"CVE-2024-23204",
"CVE-2023-42914",
"CVE-2024-27820",
"CVE-2025-24184",
"CVE-2025-31222",
"CVE-2025-24129",
"CVE-2024-23254",
"CVE-2024-44297",
"CVE-2024-54527",
"CVE-2024-27834",
"CVE-2024-23286",
"CVE-2024-40788",
"CVE-2024-27804",
"CVE-2025-31257",
"CVE-2024-54534",
"CVE-2023-32420",
"CVE-2024-54523",
"CVE-2025-24160",
"CVE-2025-31208",
"CVE-2025-31277",
"CVE-2024-27821",
"CVE-2025-43211",
"CVE-2024-40850",
"CVE-2023-41982",
"CVE-2024-40787",
"CVE-2024-40824",
"CVE-2023-42866",
"CVE-2024-44255",
"CVE-2023-39434",
"CVE-2024-44192",
"CVE-2024-0258",
"CVE-2024-44239",
"CVE-2024-40813",
"CVE-2023-32428",
"CVE-2023-38592",
"CVE-2023-32389",
"CVE-2023-38595",
"CVE-2023-42888",
"CVE-2025-43349",
"CVE-2025-43234",
"CVE-2023-42834",
"CVE-2025-31212",
"CVE-2025-31217",
"CVE-2024-54525",
"CVE-2023-40400",
"CVE-2024-23210",
"CVE-2024-44198",
"CVE-2024-23297",
"CVE-2024-23211",
"CVE-2023-35990",
"CVE-2023-32407",
"CVE-2023-34425",
"CVE-2023-28202",
"CVE-2023-40454",
"CVE-2024-44212",
"CVE-2023-42839",
"CVE-2025-31238",
"CVE-2023-32413",
"CVE-2024-23278",
"CVE-2024-27859",
"CVE-2024-54530",
"CVE-2023-32352",
"CVE-2024-44171",
"CVE-2023-41071",
"CVE-2024-27851",
"CVE-2024-27814",
"CVE-2024-23206",
"CVE-2024-27816",
"CVE-2024-40809",
"CVE-2024-40799",
"CVE-2023-32391",
"CVE-2023-42957",
"CVE-2024-23246",
"CVE-2023-32390",
"CVE-2025-31209",
"CVE-2025-31206",
"CVE-2023-40403",
"CVE-2023-40448",
"CVE-2023-40420",
"CVE-2024-44296",
"CVE-2024-27863",
"CVE-2025-43186"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Apple Inc.",
"manufacturer_web": "https://www.apple.com/",
"name": "Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4(watchOS 9.4 (build 20T253)) ( ANSSI-CC-2023/60)",
"not_valid_after": "2029-01-19",
"not_valid_before": "2024-01-19",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "certificat-CC-2023_60en.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2023/60": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 2
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Thales": {
"THALES/CNES": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20240222154647+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 23 pour Word",
"/Keywords": "",
"/ModDate": "D:20240222155209+01\u002700\u0027",
"/Producer": "Adobe PDF Library 23.1.175",
"pdf_file_size_bytes": 138059,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "ANSSI-CC-2023_60en.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2023/60": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.3": 1
},
"ALC": {
"ALC_FLR": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 3,
"EAL2 augmented": 1,
"EAL4": 1
},
"ITSEC": {
"ITSEC E3 Basic": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Thales": {
"THALES/CNES": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20240222154716+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 23 pour Word",
"/Keywords": "",
"/ModDate": "D:20240222155205+01\u002700\u0027",
"/Producer": "Adobe PDF Library 23.1.175",
"pdf_file_size_bytes": 403804,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"mailto:[email protected]",
"http://www.ssi.gouv.fr/",
"http://www.sogis.eu/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 13
},
"st_filename": "ANSSI-cible-CC-2023_60en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CDCVM": 3,
"A.DE-": 2,
"A.DEVICE_AUTH": 1,
"A.IPH-": 2,
"A.IPHONE_USER": 1,
"A.PERSO": 3
},
"D": {
"D.OS": 16,
"D.SEP_SE": 3
},
"OE": {
"OE.CDCVM": 3
},
"T": {
"T.CORRUPT": 2,
"T.PHYSICAL": 2,
"T.RECOVER": 2,
"T.REPLAY": 2,
"T.SILENT": 2,
"T.SKIMMING": 2,
"T.USURP": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 3,
"ADV_FSP.1": 2,
"ADV_FSP.2": 4,
"ADV_FSP.3": 2,
"ADV_TDS.1": 4
},
"AGD": {
"AGD_OPE.1": 4,
"AGD_PRE.1": 4
},
"ALC": {
"ALC_CMC.2": 2,
"ALC_CMS.2": 2,
"ALC_DEL.1": 2
},
"ASE": {
"ASE_CCL.1": 2,
"ASE_ECD.1": 3,
"ASE_INT.1": 2,
"ASE_OBJ.2": 2,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 1,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_COV.1": 4,
"ATE_FUN.1": 3,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL2": 1
}
},
"cc_sfr": {
"FDP": {
"FDP_ACC": 22,
"FDP_ACC.1": 11,
"FDP_ACC.2": 4,
"FDP_ACC.2.1": 1,
"FDP_ACC.2.2": 1,
"FDP_ACF": 20,
"FDP_ACF.1": 12,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_DAU.1": 4,
"FDP_DAU.1.1": 1,
"FDP_DAU.1.2": 1,
"FDP_ETC": 7,
"FDP_ETC.2": 2,
"FDP_ETC.2.1": 2,
"FDP_ETC.2.2": 2,
"FDP_ETC.2.3": 2,
"FDP_ETC.2.4": 2,
"FDP_IFC.1": 8,
"FDP_ITC": 5,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_RIP.1": 12,
"FDP_RIP.1.1": 1,
"FDP_SDI.1": 9,
"FDP_SDI.1.1": 1,
"FDP_UCT": 10,
"FDP_UCT.1": 1,
"FDP_UCT.1.1": 1,
"FDP_UIT": 10,
"FDP_UIT.1": 2,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL": 9,
"FIA_AFL.1": 5,
"FIA_ATD.1": 5,
"FIA_ATD.1.1": 2,
"FIA_SOS.2": 4,
"FIA_SOS.2.1": 1,
"FIA_SOS.2.2": 1,
"FIA_UAU.1": 2,
"FIA_UAU.2": 8,
"FIA_UAU.2.1": 1,
"FIA_UAU.5": 5,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 11,
"FIA_UAU.6.1": 2,
"FIA_UID.1": 1,
"FIA_UID.2": 6,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MSA.1": 6,
"FMT_MSA.1.1": 2,
"FMT_MSA.3": 11,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 4,
"FMT_MTD.1.1": 1,
"FMT_MTD.3": 4,
"FMT_MTD.3.1": 1,
"FMT_SMF.1": 7,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 10,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 12,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_ITC.1": 4,
"FPT_ITC.1.1": 1,
"FPT_RPL": 8,
"FPT_RPL.1": 6
},
"FTP": {
"FTP_ITC": 14,
"FTP_ITC.1": 7,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 4
}
},
"certification_process": {
"OutOfScope": {
"Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by": 1,
"out of scope": 2,
"pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.Card_Data D.Unlock_Secret* D.SEP_iPhone* T.RECOVER Card Recovery An attacker": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 3
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 1,
"FIPS 140-3": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 4
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20231109133713Z",
"/Creator": "Word",
"/ModDate": "D:20231109133737Z",
"/Producer": "Adobe Mac PDF Plug-in",
"/Title": "Microsoft Word - [ST] Watch_S8_watchOS9_SecurityTarget_v1.4.docx",
"pdf_file_size_bytes": 2365643,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 54
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_60en.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ADV_FSP.3",
"EAL2+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_60en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "5484f9225194fb80f4936f7fc05e17a6b4193024fabd540321f557163e7ea14e",
"txt_hash": "1e00b0721b5e01d10f2e0ba7052fc0b0478f1196180bcee7b9bc21c27965fd4f"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "c7fe41baa75b869067263842cc44bb4f43ffa4d0b42bc8c332d44a58d24f7808",
"txt_hash": "73c0b750b752064dc9c6b7257313bf1ea6b2f89bee4040eb27ec6ab8dd2ed61f"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e723453c42e1b2a7775e09dbac95077a96bfde5f91be9ffac6144e43102c1d99",
"txt_hash": "577b9a17afa8f6ef94207e56754ef3e0d82be3ac29742c9ab7d913ad6464bb55"
}
},
"status": "active"
}