This page was not yet optimized for use on mobile
devices.
CONEXA 3.0, Version 1.7
CSV information
| Status | active |
|---|---|
| Valid from | 03.07.2025 |
| Valid until | 02.07.2033 |
| Scheme | 🇩🇪 DE |
| Manufacturer | Theben Smart Energy GmbH |
| Category | Other Devices and Systems |
| Security level | ALC_FLR.2, EAL4+, AVA_VAN.5 |
| Maintenance updates | CONEXA 3.0 Version 1.7, (Hardware: HW V01.00 & V01.01 & V01.02, Software: v3.87.1-cc) (28.11.2025) Certification report Security target |
Heuristics summary
Certificate ID: BSI-DSZ-CC-0918-V8-2025
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Security level
EAL 4, EAL 5, EAL 2, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.2, ALC_FLR, AVA_VAN.5Certificates
BSI-DSZ-CC-0918-V8-2025Standards
ISO/IEC 15408, ISO/IEC 18045Certification report
Extracted keywords
Symmetric Algorithms
AES-, AES, HMAC, CMACAsymmetric Algorithms
ECC, Diffie-HellmanHash functions
SHA-256, SHA-384, SHA-512Schemes
MAC, Key Exchange, Key agreementProtocols
SSH, TLS 1.2, TLS, IKEv2, IPsecElliptic Curves
secp256r1, secp384r1Block cipher modes
CBC, GCMSecurity level
EAL 4, EAL 5, EAL 2, EAL 1, EAL 5+, EAL 6, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.2, ALC_FLR, ALC_CMS.4, AVA_VAN.5Protection profiles
BSI-CC-PP-0073-2014Certificates
BSI-DSZ-CC-0918-V8-2025, BSI-DSZ-CC-0918-V7-2025, BSI-DSZ-CC-0957-V2-2016, BSI-DSZ-CC-1217-2024, BSI-DSZ-CC-0918-V8-Evaluation facilities
TĂśV InformationstechnikCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Energy GmbH [6] Evaluation Technical Report, Version 2, 13.06.2025, TÜV Informationstechnik GmbH, (confidential document) [7] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, 4 Konfigurationsliste Smart Meter Gateway CONEXA 3.0, Version 1.0, Theben Smart Energy GmbH (confidential document) [9] Configuration list for the TOE SW, “ASSURANCE LIFE CYCLE – CONFIGURATION MANAGEMENT” DER, 3.0 (ALC_CMS.4), Version 3.87.0-cc, Theben Smart Energy GmbH (confidential document) [10] Handbuch CONEXA 3.0 für Gateway Administrator, Version 2.14.0, 2025-02-17, Theben Smart, Analysis Report – Smart Meter Gateway CONEXA, Version 0.5, 2025-05-27, Theben Smart Energy GmbH (confidential document) [20] BSI. Anforderungskatalog zur MSB-Lieferkette, in der aktuell gültigen Fassung. URLStandards
FIPS 197, FIPS 180-4, AIS 34, AIS 46, AIS 48, AIS 32, AIS 38, RFC 5246, RFC 5289, RFC 2104, RFC 5639, RFC 5114, RFC 3394, RFC 4493, RFC 5084, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI TR-02102, BSI TR-03109-1File metadata
| Title | Certification Report BSI-DSZ-CC-0918-V8-2025 |
|---|---|
| Subject | Common Criteria, Certification, Zertifizierung, Theben, SMGW, Smart Meter Gateway, BSI-DSZ-CC-0918-V8-2025 |
| Keywords | "Common Criteria, Certification, Zertifizierung, Theben, SMGW, Smart Meter Gateway, BSI-DSZ-CC-0918-V8-2025" |
| Author | Federal Office for Information Security |
| Pages | 27 |
Frontpage
| Certificate ID | BSI-DSZ-CC-0918-V8-2025 |
|---|---|
| Certified item | CONEXA 3.0 Version 1.7 |
| Certification lab | BSI |
| Developer | Theben Smart Energy GmbH |
References
Outgoing- BSI-DSZ-CC-1217-2024 - active - TCOS eEnergy Security Module Version 2.0 Release 1/P71
- BSI-DSZ-CC-0957-V2-2016 - active - TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE
- BSI-DSZ-CC-0918-V7-2025 - active - CONEXA 3.0, Version 1.6
Security target
Extracted keywords
Symmetric Algorithms
AESAsymmetric Algorithms
ECDSA, ECC, Diffie-HellmanHash functions
SHA-256, SHA-384Schemes
MACProtocols
TLS, TLS 1.2Randomness
PRNG, RNGElliptic Curves
P-256, P-384, NIST P-256, NIST P-384, secp256r1, secp384r1Block cipher modes
GCMTLS cipher suites
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384Security level
EAL 4, EAL4, EAL 4 augmented, EAL4 augmentedClaims
OE.SM, OSP.SMSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_IMP.1, ADV_FSP.4, AGD_OPE.1, ALC_DEL.1, ALC_FLR.2, ALC_CMC.4, ALC_LCD.1, ATE_COV.2, ATE_FUN.1, AVA_VAN.5, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP, FAU_GEN, FAU_SAA, FAU_SAR, FAU_STG, FAU_GEN.2, FAU_STG.2, FAU_ARP.1, FAU_SAA.1, FAU_GEN.1, FAU_SAR.1, FAU_STG.4, FAU_STG.3, FAU_STG.1, FAU_GEN.2.1, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FCO_NRO, FCO_NRO.2, FCO_NRO.2.1, FCO_NRO.2.2, FCO_NRO.2.3, FCO_NRO.1, FCS_CKM, FCS_COP, FCS_CKM.4, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_COP.1.1, FCS_CKM.4.1, FDP_IFC, FDP_ACC.2, FDP_ACF.1, FDP_IFF, FDP_RIP.2, FDP_SDI.2, FDP_ITC.1, FDP_ITC.2, FDP_ACC, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACC.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.2, FDP_IFC.1, FDP_IFF.1, FDP_IFF.1.3, FDP_RIP, FDP_RIP.2.1, FDP_RIP.1, FDP_SDI, FDP_SDI.2.1, FDP_SDI.2.2, FDP_SDI.1, FIA_ATD, FIA_AFL, FIA_UAU, FIA_UID, FIA_USB, FIA_ATD.1, FIA_AFL.1, FIA_UAU.2, FIA_UAU.5, FIA_UAU.6, FIA_UID.2, FIA_USB.1, FIA_UID.1, FIA_ATD.1.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_UAU.2.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6.1, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_SMR, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA, FMT_MSA.3, FMT_MOF, FMT_MOF.1.1, FMT_SMF, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.1, FPR_CON, FPR_CON.1, FPR_PSE, FPR_CON.1.2, FPR_CON.1.1, FPR_PSE.1, FPR_PSE.1.1, FPR_PSE.1.2, FPR_PSE.1.3, FPT_FLS, FPT_RPL, FPT_STM, FPT_TST, FPT_PHP, FPT_FLS.1, FPT_RPL.1, FPT_STM.1, FPT_TST.1, FPT_PHP.1, FPT_FLS.1.1, FPT_RPL.1.1, FPT_RPL.1.2, FPT_STM.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.1.1, FPT_PHP.1.2, FTP_ITC, FTP_ITC.1Protection profiles
BSI-CC-PP-0077, BSI-CC-PP-0073Certificates
BSI-DSZ-CC-0918-V8-2025, BSI-DSZ-CC-0957-V2-2016, CC-1217-2024Side-channel analysis
physical tampering, malfunctionStandards
FIPS 180-4, FIPS 197, FIPS 140-2, RFC 5289, RFC 5246, RFC 2104, RFC 4493, RFC 5084, RFC 5905, RFC 2616, RFC 5114, RFC 5639, RFC 3394, RFC5246Technical reports
BSI TR-03109, BSI TR-03109-1File metadata
| Title | Security Target v1.98.0 - CONEXA 3.0 |
|---|---|
| Subject | Security Target |
| Author | Theben Smart Energy GmbH |
| Pages | 132 |
References
Outgoing- BSI-DSZ-CC-0957-V2-2016 - active - TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-0918-V8-2025Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, AGD_OPE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_FLR.2, ALC_LCD.1, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1, ATE_COV.2, ATE_FUN.1, AVA_VAN.5Similar certificates
| Name | Certificate ID | |
|---|---|---|
| NXP JCOP 7.x on SN300 Secure Element, versions JCOP 7.0 R1.62.0.1, JCOP 7.1 R1.04.0.1, JCOP 7.2 R1.09.0.1, JCOP 7.3 R1.07.0.1 | NSCIB-CC-3110-2026-03-2500075-01-CR | Compare |
| NXP JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element, versions JCOP 7.0 R1.64.0.2, JCOP 7.0 R2.04.0.2, JCOP... | NSCIB-CC-3110-2025-08-2500052-01-CR | Compare |
Scheme data
| Cert Id | BSI-DSZ-CC-0918-V8-2025 | |
|---|---|---|
| Product | CONEXA 3.0, Version 1.7 | |
| Vendor | Theben Smart Energy GmbH | |
| Certification Date | 03.07.2025 | |
| Category | Intelligent measuring systems | |
| Url | https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartMeter_Gateway/0918.html | |
| Enhanced | ||
| Product | CONEXA 3.0, Version 1.7 | |
| Applicant | Theben Smart Energy GmbH Schlossfeld 9 72401 Haigerloch | |
| Evaluation Facility | TĂśV Informationstechnik GmbH | |
| Assurance Level | EAL4+,ALC_FLR.2,AVA_VAN.5 | |
| Protection Profile | Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI-CC-PP-0073-2014 | |
| Certification Date | 03.07.2025 | |
| Expiration Date | 02.07.2033 | |
| Entries | [frozendict({'id': 'BSI-DSZ-CC-0918-V8-2025-MA-01', 'description': 'The changes are related to an update of the communication in the LMN.'}), frozendict({'id': 'BSI-DSZ-CC-0918-V8-2025 (Ausstellungsdatum / Certification Date 03.07.2025, gültig bis / valid until 02.07.2033)', 'description': 'The Target of Evaluation (TOE) presented in this document is called "Smart Meter Gateway", “SMGW” or “Gateway” and uniquely identified as CONEXA 3.0 (CC), Version 1.7. It is the communication unit used within such an intelligent metering system and represented by the product CONEXA 3.0 except for the integrated Security Module. Besides data processing, Smart Meter Gateway offers possibility to generate tariff rates in order to enable network operators and consumers to control energy consumption in an intelligent way. The changes regarding this re-certification are based on using a new security module and some bug fixing.'}), frozendict({'id': 'BSI-DSZ-CC-0918-V7-2025 (Ausstellungsdatum / Certification Date 06.02.2025, gültig bis / valid until 05.02.2033)', 'description': 'The Target of Evaluation (TOE) presented in this document is called "Smart Meter Gateway", “SMGW” or “Gateway” and uniquely identified as CONEXA 3.0 (CC), Version 1.6. It is the communication unit used within such an intelligent metering system and represented by the product CONEXA 3.0 except for the integrated Security Module. Besides data processing, Smart Meter Gateway offers possibility to generate tariff rates in order to enable network operators and consumers to control energy consumption in an intelligent way. The following changes on the evaluated product have been in the focus of this re-evaluation procedure: Adjustment in assignment of counter register to measured value list, optimization GWA change process, compression of data at the WAN interface, documentation adaptions, implementation of the MPO delivery method, further changes and bugfixes, kernel update and editorial changes.'}), frozendict({'id': 'BSI-DSZ-CC-0918-V6-2024-RA-01 (Ausstellungsdatum / Certification Date 29.01.2025)', 'description': 'Successful Re-Assessment with update of the vulnerability analysis. The CC-certificate BSI-DSZ-CC-0918-V6-2024 remains valid for 2 further years.'}), frozendict({'id': 'BSI-DSZ-CC-0918-V6-2024-MA-03', 'description': 'The changes are related to an update of the user guidance and to the certified scope of the delivery procedures. For the certified scope of the delivery procedures, the assurance component ALC_DEL.1 (ALC_DEL.1.1D, ALC_DEL.1.1C) has been refined in the ST to only cover the delivery of the TOE from the manufacturer to the MPO (metering point operator), who is the customer of the developer and the recipient of the TOE.'}), frozendict({'id': 'BSI-DSZ-CC-0918-V6-2024-MA-02', 'description': 'The changes are related to an update of the user guidance and to the certified scope of the delivery procedures. For the certified scope of the delivery procedures, the assurance component ALC_DEL.1 (ALC_DEL.1.1D, ALC_DEL.1.1C) has been refined in the ST to only cover the delivery of the TOE from the manufacturer to the MPO (metering point operator), who is the customer of the developer and the recipient of the TOE.'}), frozendict({'id': 'BSI-DSZ-CC-0918-V6-2024-MA-01', 'description': 'The maintenance consists of a bug fix that was necessary to eliminate problems with connection interruptions both when tariffing with compact profiles and during network Management.'}), frozendict({'id': 'BSI-DSZ-CC-0918-V6-2024 (Ausstellungsdatum / Certification Date 08.02.2024, gültig bis / valid until 07.02.2032)', 'description': ', some software adjustments and adjustment of kernel-hardening. And last but not least the boot process was improved, some further adjustments with impact on documentation and editorial changes were made.'}), frozendict({'id': 'BSI-DSZ-CC-0918-V5-2023-MA-02', 'description': 'The change to the certified product is at the level of vendor’s renaming.'}), frozendict({'id': 'BSI-DSZ-CC-0918-V5-2023-MA-01', 'description': 'The description of the secure delivery procedure was extended due to adding an alternative delivery procedure (cardbox delivery).'}), frozendict({'id': 'BSI-DSZ-CC-0918-V5-2023 (Ausstellungsdatum / Certification Date 11.05.2023, gültig bis / valid until 10.05.2031)', 'description': 'The focus of this re-evaluation was on certification obligations following BSI-K-TR-0507-2022, mobile phone signal validation without tools, adaption reaction of >36h no time synchronization and some further small changes, adjustments and updates.'}), frozendict({'id': 'BSI-DSZ-CC-0918-V4-2022-MA-03'}), frozendict({'id': 'BSI-DSZ-CC-0918-V4-2022-MA-02', 'description': 'The assembly space for the Fakra socket was adapted.'}), frozendict({'id': 'BSI-DSZ-CC-0918-V4-2022-MA-01', 'description': 'The order of the configuration parameters regarding the LTE module were corrected.'}), frozendict({'id': 'BSI-DSZ-CC-0918-V4-2022 (Ausstellungsdatum / Certification Date 08.03.2022, gültig bis / valid until 07.03.2030)', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-0918-V3-2022 (Ausstellungsdatum / Certification Date 24.01.2022, gültig bis / valid until 23.01.2030)', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-0918-V2-2021 (Ausstellungsdatum / Certification Date 01.07.2021, gültig bis / valid until 30.06.2029)', 'description': '), Version 1.1 was enhanced due to the new tariff use cases (TAF) 9, 10 and 14. Further optimizations and some minor bugfixing were also performed.'}), frozendict({'id': 'BSI-DSZ-CC-0918-2020-MA-01', 'description': 'alive values. Therefore the version number changed for the Software from v3.33.0-cc to v3.33.3-cc.'})] | |
| Report Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0918V8a_pdf.pdf?__blob=publicationFile&v=2 | |
| Target Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0918V8b_pdf.pdf?__blob=publicationFile&v=2 | |
| Cert Link | https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0918V8c_pdf.pdf?__blob=publicationFile&v=2 | |
| Description | The Target of Evaluation (TOE) is the Smart Meter Gateway (SMGW) CONEXA 3.0, Version 1.0. The Smart Meter Gateway is the communication unit in a smart metering system. The main functionality of the gateway is the reception and the storage of measured consumption and status values of the connected meters as well as the processing and the transfer of these consumption and status values to authorized entities. | |
| Subcategory | (Smart Meter Gateway) | |
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V8c_pdf.pdf",
"dgst": "c6cce97ca39f1234",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0918-V8-2025",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3.0",
"1.7"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0918-V7-2025",
"BSI-DSZ-CC-1217-2024",
"BSI-DSZ-CC-0957-V2-2016"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1149-V3-2023",
"BSI-DSZ-CC-0918-V6-2024",
"BSI-DSZ-CC-0918-V4-2022",
"BSI-DSZ-CC-0918-V2-2021",
"BSI-DSZ-CC-0845-V2-2013",
"BSI-DSZ-CC-1217-2024",
"BSI-DSZ-CC-0845-2012",
"BSI-DSZ-CC-0918-V7-2025",
"BSI-DSZ-CC-1149-2022",
"BSI-DSZ-CC-0918-2020",
"BSI-DSZ-CC-0957-2015",
"BSI-DSZ-CC-0957-V2-2016",
"BSI-DSZ-CC-0918-V3-2022",
"BSI-DSZ-CC-0918-V5-2023",
"BSI-DSZ-CC-1149-V2-2023",
"BSI-DSZ-CC-0666-2012",
"BSI-DSZ-CC-0978-2016"
]
}
},
"scheme_data": {
"category": "Intelligent measuring systems",
"cert_id": "BSI-DSZ-CC-0918-V8-2025",
"certification_date": "2025-07-03",
"enhanced": {
"applicant": "Theben Smart Energy GmbH Schlossfeld 9 72401 Haigerloch",
"assurance_level": "EAL4+,ALC_FLR.2,AVA_VAN.5",
"cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0918V8c_pdf.pdf?__blob=publicationFile\u0026v=2",
"certification_date": "2025-07-03",
"description": "The Target of Evaluation (TOE) is the Smart Meter Gateway (SMGW) CONEXA 3.0, Version 1.0. The Smart Meter Gateway is the communication unit in a smart metering system. The main functionality of the gateway is the reception and the storage of measured consumption and status values of the connected meters as well as the processing and the transfer of these consumption and status values to authorized entities.",
"entries": [
{
"description": "The changes are related to an update of the communication in the LMN.",
"id": "BSI-DSZ-CC-0918-V8-2025-MA-01"
},
{
"description": "The Target of Evaluation (TOE) presented in this document is called \"Smart Meter Gateway\", \u201cSMGW\u201d or \u201cGateway\u201d and uniquely identified as CONEXA 3.0 (CC), Version 1.7. It is the communication unit used within such an intelligent metering system and represented by the product CONEXA 3.0 except for the integrated Security Module. Besides data processing, Smart Meter Gateway offers possibility to generate tariff rates in order to enable network operators and consumers to control energy consumption in an intelligent way. The changes regarding this re-certification are based on using a new security module and some bug fixing.",
"id": "BSI-DSZ-CC-0918-V8-2025 (Ausstellungsdatum / Certification Date 03.07.2025, g\u00fcltig bis / valid until 02.07.2033)"
},
{
"description": "The Target of Evaluation (TOE) presented in this document is called \"Smart Meter Gateway\", \u201cSMGW\u201d or \u201cGateway\u201d and uniquely identified as CONEXA 3.0 (CC), Version 1.6. It is the communication unit used within such an intelligent metering system and represented by the product CONEXA 3.0 except for the integrated Security Module. Besides data processing, Smart Meter Gateway offers possibility to generate tariff rates in order to enable network operators and consumers to control energy consumption in an intelligent way. The following changes on the evaluated product have been in the focus of this re-evaluation procedure: Adjustment in assignment of counter register to measured value list, optimization GWA change process, compression of data at the WAN interface, documentation adaptions, implementation of the MPO delivery method, further changes and bugfixes, kernel update and editorial changes.",
"id": "BSI-DSZ-CC-0918-V7-2025 (Ausstellungsdatum / Certification Date 06.02.2025, g\u00fcltig bis / valid until 05.02.2033)"
},
{
"description": "Successful Re-Assessment with update of the vulnerability analysis. The CC-certificate BSI-DSZ-CC-0918-V6-2024 remains valid for 2 further years.",
"id": "BSI-DSZ-CC-0918-V6-2024-RA-01 (Ausstellungsdatum / Certification Date 29.01.2025)"
},
{
"description": "The changes are related to an update of the user guidance and to the certified scope of the delivery procedures. For the certified scope of the delivery procedures, the assurance component ALC_DEL.1 (ALC_DEL.1.1D, ALC_DEL.1.1C) has been refined in the ST to only cover the delivery of the TOE from the manufacturer to the MPO (metering point operator), who is the customer of the developer and the recipient of the TOE.",
"id": "BSI-DSZ-CC-0918-V6-2024-MA-03"
},
{
"description": "The changes are related to an update of the user guidance and to the certified scope of the delivery procedures. For the certified scope of the delivery procedures, the assurance component ALC_DEL.1 (ALC_DEL.1.1D, ALC_DEL.1.1C) has been refined in the ST to only cover the delivery of the TOE from the manufacturer to the MPO (metering point operator), who is the customer of the developer and the recipient of the TOE.",
"id": "BSI-DSZ-CC-0918-V6-2024-MA-02"
},
{
"description": "The maintenance consists of a bug fix that was necessary to eliminate problems with connection interruptions both when tariffing with compact profiles and during network Management.",
"id": "BSI-DSZ-CC-0918-V6-2024-MA-01"
},
{
"description": ", some software adjustments and adjustment of kernel-hardening. And last but not least the boot process was improved, some further adjustments with impact on documentation and editorial changes were made.",
"id": "BSI-DSZ-CC-0918-V6-2024 (Ausstellungsdatum / Certification Date 08.02.2024, g\u00fcltig bis / valid until 07.02.2032)"
},
{
"description": "The change to the certified product is at the level of vendor\u2019s renaming.",
"id": "BSI-DSZ-CC-0918-V5-2023-MA-02"
},
{
"description": "The description of the secure delivery procedure was extended due to adding an alternative delivery procedure (cardbox delivery).",
"id": "BSI-DSZ-CC-0918-V5-2023-MA-01"
},
{
"description": "The focus of this re-evaluation was on certification obligations following BSI-K-TR-0507-2022, mobile phone signal validation without tools, adaption reaction of \u003e36h no time synchronization and some further small changes, adjustments and updates.",
"id": "BSI-DSZ-CC-0918-V5-2023 (Ausstellungsdatum / Certification Date 11.05.2023, g\u00fcltig bis / valid until 10.05.2031)"
},
{
"id": "BSI-DSZ-CC-0918-V4-2022-MA-03"
},
{
"description": "The assembly space for the Fakra socket was adapted.",
"id": "BSI-DSZ-CC-0918-V4-2022-MA-02"
},
{
"description": "The order of the configuration parameters regarding the LTE module were corrected.",
"id": "BSI-DSZ-CC-0918-V4-2022-MA-01"
},
{
"description": "Certificate",
"id": "BSI-DSZ-CC-0918-V4-2022 (Ausstellungsdatum / Certification Date 08.03.2022, g\u00fcltig bis / valid until 07.03.2030)"
},
{
"description": "Certificate",
"id": "BSI-DSZ-CC-0918-V3-2022 (Ausstellungsdatum / Certification Date 24.01.2022, g\u00fcltig bis / valid until 23.01.2030)"
},
{
"description": "), Version 1.1 was enhanced due to the new tariff use cases (TAF) 9, 10 and 14. Further optimizations and some minor bugfixing were also performed.",
"id": "BSI-DSZ-CC-0918-V2-2021 (Ausstellungsdatum / Certification Date 01.07.2021, g\u00fcltig bis / valid until 30.06.2029)"
},
{
"description": "alive values. Therefore the version number changed for the Software from v3.33.0-cc to v3.33.3-cc.",
"id": "BSI-DSZ-CC-0918-2020-MA-01"
}
],
"evaluation_facility": "T\u00dcV Informationstechnik GmbH",
"expiration_date": "2033-07-02",
"product": "CONEXA 3.0, Version 1.7",
"protection_profile": "Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI-CC-PP-0073-2014",
"report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0918V8a_pdf.pdf?__blob=publicationFile\u0026v=2",
"target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0918V8b_pdf.pdf?__blob=publicationFile\u0026v=2"
},
"product": "CONEXA 3.0, Version 1.7",
"subcategory": "(Smart Meter Gateway)",
"url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartMeter_Gateway/0918.html",
"vendor": "Theben Smart Energy GmbH"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0957-V2-2016"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0957-V2-2016",
"BSI-DSZ-CC-0978-2016"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2025-11-28",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V8ma1a_pdf.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V8ma1b_pdf.pdf",
"maintenance_title": "CONEXA 3.0 Version 1.7, (Hardware: HW V01.00 \u0026 V01.01 \u0026 V01.02, Software: v3.87.1-cc)"
}
]
},
"manufacturer": "Theben Smart Energy GmbH",
"manufacturer_web": "https://www.theben.de",
"name": "CONEXA 3.0, Version 1.7",
"not_valid_after": "2033-07-02",
"not_valid_before": "2025-07-03",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "0918V8c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0918-V8-2025": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 2,
"EAL 4 augmented": 1,
"EAL 5": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "0918V8a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2, AVA_VAN.5 valid until: 2 July 2033",
"cc_version": "PP conformant Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-0918-V8-2025",
"cert_item": "CONEXA 3.0 Version 1.7",
"cert_lab": "BSI",
"developer": "Theben Smart Energy GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI- CC-PP-0073-2014"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 4
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0918-V7-2025": 3,
"BSI-DSZ-CC-0918-V8-": 1,
"BSI-DSZ-CC-0918-V8-2025": 13,
"BSI-DSZ-CC-0957-V2-2016": 1,
"BSI-DSZ-CC-1217-2024": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0073-2014": 3
}
},
"cc_sar": {
"ALC": {
"ALC_CMS.4": 2,
"ALC_FLR": 3,
"ALC_FLR.2": 4
},
"AVA": {
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 3,
"EAL 4": 8,
"EAL 4 augmented": 3,
"EAL 5": 3,
"EAL 5+": 1,
"EAL 6": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"3.0 (ALC_CMS.4), Version 3.87.0-cc, Theben Smart Energy GmbH (confidential document) [10] Handbuch CONEXA 3.0 f\u00fcr Gateway Administrator, Version 2.14.0, 2025-02-17, Theben Smart": 1,
"4 Konfigurationsliste Smart Meter Gateway CONEXA 3.0, Version 1.0, Theben Smart Energy GmbH (confidential document) [9] Configuration list for the TOE SW, \u201cASSURANCE LIFE CYCLE \u2013 CONFIGURATION MANAGEMENT\u201d DER": 1,
"Analysis Report \u2013 Smart Meter Gateway CONEXA, Version 0.5, 2025-05-27, Theben Smart Energy GmbH (confidential document) [20] BSI. Anforderungskatalog zur MSB-Lieferkette, in der aktuell g\u00fcltigen Fassung. URL": 1,
"Energy GmbH [6] Evaluation Technical Report, Version 2, 13.06.2025, T\u00dcV Informationstechnik GmbH, (confidential document) [7] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"GCM": {
"GCM": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKEv2": 1
},
"IPsec": {
"IPsec": 1
},
"SSH": {
"SSH": 3
},
"TLS": {
"TLS": {
"TLS": 5,
"TLS 1.2": 1
}
}
},
"crypto_scheme": {
"KA": {
"Key agreement": 1
},
"KEX": {
"Key Exchange": 1
},
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"secp256r1": 1,
"secp384r1": 1
}
},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 3
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 1,
"SHA-384": 1,
"SHA-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 32": 1,
"AIS 34": 2,
"AIS 38": 1,
"AIS 46": 2,
"AIS 48": 2
},
"FIPS": {
"FIPS 180-4": 4,
"FIPS 197": 6
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"RFC": {
"RFC 2104": 3,
"RFC 3394": 3,
"RFC 4493": 5,
"RFC 5084": 3,
"RFC 5114": 3,
"RFC 5246": 4,
"RFC 5289": 3,
"RFC 5639": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3,
"AES-": 1
}
},
"constructions": {
"MAC": {
"CMAC": 2,
"HMAC": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-02102": 1,
"BSI TR-03109-1": 3
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Federal Office for Information Security",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Theben, SMGW, Smart Meter Gateway, BSI-DSZ-CC-0918-V8-2025\"",
"/Subject": "Common Criteria, Certification, Zertifizierung, Theben, SMGW, Smart Meter Gateway, BSI-DSZ-CC-0918-V8-2025",
"/Title": "Certification Report BSI-DSZ-CC-0918-V8-2025",
"pdf_file_size_bytes": 370407,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/AIS",
"https://www.commoncriteriaportal.org/",
"https://www.sogis.eu/",
"https://www.bsi.bund.de/",
"https://www.bsi.bund.de/zertifizierung",
"https://www.bsi.bund.de/dok/Zertifizierung-Gesamtlisten",
"http://www.commoncriteriaportal.org/cc/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 27
},
"st_filename": "0918V8b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 5
},
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0918-V8-2025": 1,
"BSI-DSZ-CC-0957-V2-2016": 1
},
"NL": {
"CC-1217-2024": 1
}
},
"cc_claims": {
"OE": {
"OE.SM": 4
},
"OSP": {
"OSP.SM": 5
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0073": 1,
"BSI-CC-PP-0077": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1
},
"AGD": {
"AGD_OPE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_DEL.1": 6,
"ALC_FLR.2": 6,
"ALC_LCD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_INT.1": 1,
"ASE_REQ.2": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_FUN.1": 1
},
"AVA": {
"AVA_VAN.5": 7
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 5,
"EAL 4 augmented": 2,
"EAL4": 1,
"EAL4 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP": 10,
"FAU_ARP.1": 1,
"FAU_GEN": 38,
"FAU_GEN.1": 22,
"FAU_GEN.2": 8,
"FAU_GEN.2.1": 1,
"FAU_SAA": 11,
"FAU_SAA.1": 4,
"FAU_SAR": 30,
"FAU_SAR.1": 7,
"FAU_STG": 32,
"FAU_STG.1": 8,
"FAU_STG.2": 15,
"FAU_STG.2.1": 1,
"FAU_STG.2.2": 1,
"FAU_STG.2.3": 1,
"FAU_STG.3": 3,
"FAU_STG.4": 3
},
"FCO": {
"FCO_NRO": 3,
"FCO_NRO.1": 1,
"FCO_NRO.2": 9,
"FCO_NRO.2.1": 1,
"FCO_NRO.2.2": 1,
"FCO_NRO.2.3": 1
},
"FCS": {
"FCS_CKM": 44,
"FCS_CKM.1": 16,
"FCS_CKM.2": 6,
"FCS_CKM.4": 32,
"FCS_CKM.4.1": 1,
"FCS_COP": 63,
"FCS_COP.1": 10,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC": 2,
"FDP_ACC.1": 9,
"FDP_ACC.2": 11,
"FDP_ACC.2.1": 1,
"FDP_ACC.2.2": 1,
"FDP_ACF.1": 11,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 4,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 3,
"FDP_IFC": 29,
"FDP_IFC.1": 12,
"FDP_IFC.2": 4,
"FDP_IFF": 25,
"FDP_IFF.1": 24,
"FDP_IFF.1.3": 1,
"FDP_ITC.1": 12,
"FDP_ITC.2": 12,
"FDP_RIP": 2,
"FDP_RIP.1": 1,
"FDP_RIP.2": 9,
"FDP_RIP.2.1": 1,
"FDP_SDI": 2,
"FDP_SDI.1": 1,
"FDP_SDI.2": 8,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1
},
"FIA": {
"FIA_AFL": 3,
"FIA_AFL.1": 8,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD": 3,
"FIA_ATD.1": 13,
"FIA_ATD.1.1": 1,
"FIA_UAU": 5,
"FIA_UAU.1": 2,
"FIA_UAU.2": 8,
"FIA_UAU.2.1": 1,
"FIA_UAU.5": 7,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 8,
"FIA_UAU.6.1": 1,
"FIA_UID": 3,
"FIA_UID.1": 8,
"FIA_UID.2": 12,
"FIA_UID.2.1": 1,
"FIA_USB": 3,
"FIA_USB.1": 8,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MOF": 1,
"FMT_MOF.1": 10,
"FMT_MOF.1.1": 1,
"FMT_MSA": 64,
"FMT_MSA.1": 9,
"FMT_MSA.3": 12,
"FMT_SMF": 2,
"FMT_SMF.1": 19,
"FMT_SMF.1.1": 1,
"FMT_SMR": 3,
"FMT_SMR.1": 30,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_CON": 6,
"FPR_CON.1": 10,
"FPR_CON.1.1": 3,
"FPR_CON.1.2": 5,
"FPR_PSE": 2,
"FPR_PSE.1": 8,
"FPR_PSE.1.1": 3,
"FPR_PSE.1.2": 2,
"FPR_PSE.1.3": 2
},
"FPT": {
"FPT_FLS": 3,
"FPT_FLS.1": 10,
"FPT_FLS.1.1": 1,
"FPT_PHP": 3,
"FPT_PHP.1": 8,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_RPL": 3,
"FPT_RPL.1": 8,
"FPT_RPL.1.1": 1,
"FPT_RPL.1.2": 1,
"FPT_STM": 3,
"FPT_STM.1": 18,
"FPT_STM.1.1": 1,
"FPT_TST": 3,
"FPT_TST.1": 9,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC": 30,
"FTP_ITC.1": 9
}
},
"certification_process": {},
"cipher_mode": {
"GCM": {
"GCM": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 62,
"TLS 1.2": 5
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 9
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"NIST P-256": 3,
"NIST P-384": 3,
"P-256": 3,
"P-384": 3,
"secp256r1": 3,
"secp384r1": 3
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 13,
"SHA-384": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 1
},
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"malfunction": 2,
"physical tampering": 4
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 3,
"FIPS 180-4": 8,
"FIPS 197": 12
},
"RFC": {
"RFC 2104": 6,
"RFC 2616": 5,
"RFC 3394": 3,
"RFC 4493": 8,
"RFC 5084": 4,
"RFC 5114": 5,
"RFC 5246": 7,
"RFC 5289": 6,
"RFC 5639": 5,
"RFC 5905": 4,
"RFC5246": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 7
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-03109": 1,
"BSI TR-03109-1": 2
}
},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256": 2,
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 2,
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384": 2,
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 2
}
},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Theben Smart Energy GmbH",
"/Subject": "Security Target",
"/Title": "Security Target v1.98.0 - CONEXA 3.0",
"pdf_file_size_bytes": 1745490,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.jtc1sc27.din.de/sce/sd6",
"https://www.bsi.bund.de/DE/Themen/Unternehmen-und-Organisationen/Standards-und-Zertifizierung/Smart-metering/Smart-Meter-Gateway/MSB/MSB_node.html",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf",
"https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 132
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V8a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"EAL4+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V8b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "3c7c1f8d2f775f25a6bf3dfc280643320263f5dcd9de15e31fec4add9e5befc5",
"txt_hash": "7111a5847ed0d389e6767a8d0177fdc4caedd164a56d2554928e31991d3bbdc9"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "cd6f3e237128c897ff0db91c965453ed01d027e4fa6a68031cf364e48cd684b8",
"txt_hash": "d0c95683c749f19dec832a4243e42774a7d3b063e03d60f0e0d34f625ef13560"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "d6bdf2d0f08dd8015963e1137ddda3d548efe22e757a10654efacccb695f980c",
"txt_hash": "8a5db36c25e7010c09b496841e6f7946fa0085f335e431565478b82f80bc2faf"
}
},
"status": "active"
}