Cisco Firewall Services Module (FWSM) Version 3.1.(3.17) for: Cisco Catalyst 6500 Switches and Cisco 7600 Series routers

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status archived
Valid from 05.03.2007
Valid until 06.09.2012
Scheme 🇺🇸 US
Manufacturer Cisco Systems, Inc.
Category Boundary Protection Devices and Systems
Security level EAL4+
Maintenance updates Cisco Firewall Services Module (FWSM) Version 3.1.(4) for Cisco Catalyst 6500 Switches and Cisco 7600 Series Routers with IOS 12.2 (18) SXF5 (05.03.2007) Certification report
Cisco Firewall Services Module (FWSM) Version 3.1(7) for Cisco Catalyst 6500 switches and Cisco 7600 Series routers with IOS 12.2(18)SXF5 (08.04.2009) Certification report Security target

Heuristics summary ?

Certificate ID: CCEVS-VR-0027-2007

Certificate ?

Certification report ?

Extracted keywords

Schemes
MAC
Protocols
SSL, TLS

Vendor
Microsoft, Cisco, Cisco Systems, Cisco Systems, Inc

Security level
EAL 4, EAL 1, EAL4+, EAL4
Security Assurance Requirements (SAR)
ACM_CAP.4, ACM_AUT.1, ACM_SCP.2, ADO_DEL.2, ADO_IGS.1, ADV_FSP.2, ADV_HLD.2, ADV_LLD.1, ADV_IMP.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_TAT.1, ALC_LCD.1, ALC_FLR.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VLA.3, AVA_MSU.2, AVA_VLA.2, AVA_SOF.1
Security Functional Requirements (SFR)
FAU_STG.1
Certificates
CCEVS-VR-07-0027

File metadata

Title VID6016-VR-0001 DRAFT
Subject CCEVS Validation Report - Cisco TPIX Security Appliances 515, 515E, 525, 535 and Adaptive Security Appliances 5510, 5520 and 5540, Version 7.0
Creation date D:20070726114739-04'00'
Modification date D:20070726115034-04'00'
Pages 19
Creator Acrobat PDFMaker 7.0 for Word
Producer Acrobat Distiller 7.0 (Windows)

Frontpage

Certificate ID CCEVS-VR-07-0027
Certified item Cisco Firewall Services Module (FWSM) Version 3.1 (3.17) for Cisco Catalyst® 6500 switches and Cisco 7600 Series routers
Certification lab US NIAP

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDEA, Triple-DES, Skinny
Protocols
SSH

Vendor
Microsoft, Cisco Systems, Inc, Cisco, Cisco Systems

Security level
EAL4, EAL4 augmented
Claims
O.IDAUTH, O.SINUSE, O.MEDIAT, O.SECSTA, O.ENCRYP, O.SELPRO, O.AUDREC, O.ACCOUN, O.SECFUN, O.LIMEXT, O.EAL, T.NOAUTH, T.REPEAT, T.REPLAY, T.ASPOOF, T.TUSAGE, T.MEDIAT, T.OLDINF, T.PROCOM, T.AUDACC, T.SELPRO, T.AUDFUL, T.MODEXP, A.PHYSEC, A.MODEXP, A.GENPUR, A.PUBLIC, A.NOEVIL, A.SINGEN, A.DIRECT, A.NOREMO, A.REMACC, OE.IDAUTH, OE.SINUSE, OE.PHYSEC, OE.MODEXP, OE.GENPUR, OE.PUBLIC, OE.NOEVIL, OE.SINGEN, OE.DIRECT, OE.NOREMO, OE.REMACC, OE.GUIDAN, OE.ADMTRA
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_CAP.3, ACM_SCP.1, ADO_DEL.2, ADO_IGS.1, ADO_DEL.1, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, ADV_FSP.1, ADV_RCR, ADV_HLD.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ALC_TAT, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV.1, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2, AVA_VLA.3
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_SAR.3, FAU_STG.1, FAU_STG.4, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.3.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.4, FDP_RIP.1, FDP_IFC.1, FDP_IFF.1, FDP_ITC.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FDP_RIP.1.1, FDP_ACC.1, FIA_AFL.1, FIA_ATD.1, FIA_UAU.5, FIA_UID.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_ATD.1.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.2.1, FIA_UID.1, FIA_UAU.2, FMT_SMR.1, FMT_MSA, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_MTD.2, FMT_SMF.1, FMT_MSA.2, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_MTD.2.1, FMT_MTD.2.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SEP.1.2, FPT_RVM.1, FPT_SEP.1, FPT_STM.1, FPT_STM.1.1, FPT_RVM.1.1, FPT_SEP.1.1

Standards
FIPS 197, FIPS 46-3, FIPS PUB 46-3, FIPS PUB 197, FIPS 140-1, RFC 4251

File metadata

Title fwsmstd.fm
Author sheema
Creation date D:19920624090927Z
Modification date D:20070725080816-04'00'
Pages 78
Creator FrameMaker 7.2
Producer Acrobat Distiller 6.0 (Windows)

Heuristics ?

Certificate ID: CCEVS-VR-0027-2007

Extracted SARs

ADV_LLD.1, AVA_MSU.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ADV_HLD.2, ADV_IMP.1, ALC_TAT.1, ATE_COV.2, AVA_SOF.1, ALC_DVS.1, ADV_RCR.1, AGD_USR.1, ADV_SPM.1, AGD_ADM.1, ADV_FSP.2, AVA_VLA.3, ALC_LCD.1, ALC_FLR.1

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2003-1001
C M N
MEDIUM 5.0 2.9 05.01.2004 05:00
CVE-2003-1002
C M N
MEDIUM 5.0 2.9 05.01.2004 05:00
CVE-2004-0079
C M N
HIGH 7.5 3.6 23.11.2004 05:00
CVE-2004-0081
C M N
MEDIUM 5.0 2.9 23.11.2004 05:00
CVE-2004-0112
C M N
MEDIUM 5.0 2.9 23.11.2004 05:00
CVE-2005-3669
C M N
MEDIUM 5.0 2.9 18.11.2005 21:03
CVE-2007-0962
C M N
HIGH 7.8 6.9 16.02.2007 00:28
CVE-2007-0963
C M N
HIGH 7.8 6.9 16.02.2007 00:28
CVE-2007-0964
C M N
MEDIUM 5.4 6.9 16.02.2007 00:28
CVE-2007-0965
C M N
HIGH 7.8 6.9 16.02.2007 00:28
CVE-2007-0966
C M N
HIGH 7.8 6.9 16.02.2007 00:28
CVE-2007-0967
C M N
HIGH 7.8 6.9 16.02.2007 00:28
CVE-2007-0968
C M N
HIGH 9.0 10.0 16.02.2007 00:28
CVE-2007-5568
C M N
HIGH 7.1 6.9 18.10.2007 21:17
CVE-2007-5570
C M N
HIGH 7.8 6.9 18.10.2007 21:17
CVE-2007-5571
C M N
MEDIUM 6.8 6.4 18.10.2007 21:17
CVE-2013-1195
C M N
MEDIUM 5.0 2.9 24.04.2013 10:28

Similar certificates

Name Certificate ID
Cisco Aggregation Services Router 1000 Series (ASR1K), Cisco Cloud Services Router 1000V (CSR1000V), Cisco Integrated Services Router 1100 Series (ISR1100), Cisco Integrated Services Router 4200 Series (ISR4K) running IOS-XE 17.3 CCEVS-VR-11186-2021 Compare
Cisco Catalyst 3850 Series Switches running IOS-XE 3.6.0E and Catalyst 6500 Series Switches running IOS 15.1(2)SY3 NSCIB-CC-14-39582-CR Compare
Cisco Catalyst 8000V Edge (C8000V), Cisco 1000 Series Integrated Services Routers (ISR1000), Cisco Catalyst 1800 Rugged Series Routers (IR1800), Cisco Catalyst 8300 Rugged Series Routers (IR8300) CCEVS-VR-VID-11332-2023 Compare
Cisco Aggregation Services Router (ASR) 9000 series with Carrier Routing System (CSR) routers CRS-1 and CRS-3, version 4.1.1 CCEVS-VR-VID-10439-2011 Compare
Cisco Systems (1100, 1200, 1300, 1400 series Wireless Devices running IOS 12.3 (8JA2; 3200 series Wireless Router running IOS 12..4(6)XE3; AS5350, 5400, 5850 Universal Gateway running IOS 12.4(17); IAD2430 Integrated Access Device running IOS 12.4(17) with Cisco Secure Access Control Server (ACS) version 4.1.4.13 for Microsoft Windows Server CCEVS-VR-VID-6013-2008 Compare
Cisco Catalyst 6500-E Series Switches Cisco IOS Software, Version 15.1(1)SY1, RELEASE SOFTWARE (fc5) BSI-DSZ-CC-0937-2014 Compare
Cisco Catalyst 6500-E Series Switches Cisco IOS Software, Version 15.1(1)SY1, RELEASE SOFTWARE (fc5) BSI-DSZ-CC-0838-2014 Compare
Cisco Unified Wireless Network Solution composed of the following components: Cisco Aironet 1130, 1230, and 1240 AG Series Access Points; Cisco 4400 Series Wireless LAN Controllers; Cisco Catalyst 6500 Series Wireless Integrated Services Module (WiSM); Cisco Wireless Control System (WCS); Cisco Secure Access Control Server (ACS); Cisco 2710 Wireless Location CCEVS-VR-VID-10324-2009 Compare
Showing 5 out of 8.

Scheme data ?

Product Cisco Firewall Services Module (FWSM) Version 3.1 (3.17) for Cisco Catalyst 6500 Switches and Cisco 7600 Series Routers
Id CCEVS-VR-VID6015
Url https://www.niap-ccevs.org/product/6015
Certification Date 05.03.2007
Expiration Date None
Category Firewall
Vendor Cisco Systems, Inc.
Evaluation Facility Arca CCTL
Scheme US

References ?

No references are available for this certificate.

Updates ?

  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '2007-03-05'} data.
  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Maintenance Updates of the certificate were updated.

    • The following values were removed: {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2009-04-08', 'maintenance_title': 'Cisco Firewall Services Module (FWSM) Version 3.1(7) for Cisco Catalyst 6500 switches and Cisco 7600 Series routers with IOS 12.2(18)SXF5', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6015-add2.pdf', 'maintenance_st_link': None}]}.
    • The following values were added: {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2009-04-08', 'maintenance_title': 'Cisco Firewall Services Module (FWSM) Version 3.1(7) for Cisco Catalyst 6500 switches and Cisco 7600 Series routers with IOS 12.2(18)SXF5', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6015-add2.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6015-st.pdf'}]}.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2004-0112', 'CVE-2007-5568', 'CVE-2007-0966', 'CVE-2007-0963', 'CVE-2005-3669', 'CVE-2004-0081', 'CVE-2007-0964', 'CVE-2003-1001', 'CVE-2007-5570', 'CVE-2004-0079', 'CVE-2007-0967', 'CVE-2007-0968', 'CVE-2007-0962', 'CVE-2007-0965', 'CVE-2007-5571', 'CVE-2003-1002']} values added.
  • 30.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2004-0112', 'CVE-2007-5568', 'CVE-2004-0081', 'CVE-2007-0963', 'CVE-2003-1001', 'CVE-2005-3669', 'CVE-2007-0964', 'CVE-2007-0966', 'CVE-2007-5570', 'CVE-2004-0079', 'CVE-2007-0967', 'CVE-2007-0968', 'CVE-2007-0962', 'CVE-2007-0965', 'CVE-2007-5571', 'CVE-2003-1002']} values discarded.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '94e7a8cc475a2e454de3c60184bc4aded160c8ebcd6db77ee172f8a6c7b3825c', 'txt_hash': '8ebd017425d89718d082f759ff30fd9c4cdf5d6c3604e69a193e00e20abc5697'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b9504d6f2e88da7b00ec6ef535f4aac8c65a6874d6be5ac74d4562ecd60221dc', 'txt_hash': 'db0a31e3cd20deeeb4416a9f5eb1fc1f8fc933a79b8ceac04063083c6e8547dc'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 388339, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 19, '/CreationDate': "D:20070726114739-04'00'", '/Subject': 'CCEVS Validation Report - Cisco TPIX Security Appliances 515, 515E, 525, 535 and Adaptive Security Appliances 5510, 5520 and 5540, Version 7.0', '/Author': '', '/Creator': 'Acrobat PDFMaker 7.0 for Word', '/Producer': 'Acrobat Distiller 7.0 (Windows)', '/ModDate': "D:20070726115034-04'00'", '/SourceModified': 'D:20070726154644', '/Title': 'VID6016-VR-0001 DRAFT', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1434560, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 78, '/CreationDate': 'D:19920624090927Z', '/Author': 'sheema', '/Creator': 'FrameMaker 7.2', '/Producer': 'Acrobat Distiller 6.0 (Windows)', '/ModDate': "D:20070725080816-04'00'", '/Title': 'fwsmstd.fm', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html']}}.
    • The report_frontpage property was set to {'US': {'cert_id': 'CCEVS-VR-07-0027', 'cert_item': 'Cisco Firewall Services Module (FWSM) Version 3.1 (3.17) for Cisco Catalyst® 6500 switches and Cisco 7600 Series routers', 'cert_lab': 'US NIAP'}}.
    • The report_keywords property was set to {'cc_cert_id': {'US': {'CCEVS-VR-07-0027': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 3, 'EAL 1': 1, 'EAL4+': 1, 'EAL4': 3}}, 'cc_sar': {'ACM': {'ACM_CAP.4': 1, 'ACM_AUT.1': 1, 'ACM_SCP.2': 1}, 'ADO': {'ADO_DEL.2': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_FSP.2': 1, 'ADV_HLD.2': 1, 'ADV_LLD.1': 1, 'ADV_IMP.1': 1, 'ADV_RCR.1': 1, 'ADV_SPM.1': 1}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1}, 'ALC': {'ALC_DVS.1': 1, 'ALC_TAT.1': 1, 'ALC_LCD.1': 1, 'ALC_FLR.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VLA.3': 1, 'AVA_MSU.2': 1, 'AVA_VLA.2': 1, 'AVA_SOF.1': 1}}, 'cc_sfr': {'FAU': {'FAU_STG.1': 1}}, 'cc_claims': {}, 'vendor': {'Microsoft': {'Microsoft': 1}, 'Cisco': {'Cisco': 55, 'Cisco Systems': 2, 'Cisco Systems, Inc': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 11, 'EAL4 augmented': 2}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 12, 'ACM_CAP.4': 21, 'ACM_SCP.2': 7, 'ACM_CAP.3': 3, 'ACM_SCP.1': 1}, 'ADO': {'ADO_DEL.2': 10, 'ADO_IGS.1': 9, 'ADO_DEL.1': 1}, 'ADV': {'ADV_FSP.2': 12, 'ADV_HLD.2': 16, 'ADV_IMP.1': 9, 'ADV_LLD.1': 18, 'ADV_RCR.1': 10, 'ADV_SPM.1': 11, 'ADV_FSP.1': 10, 'ADV_RCR': 2, 'ADV_HLD.1': 2}, 'AGD': {'AGD_ADM.1': 17, 'AGD_USR.1': 14}, 'ALC': {'ALC_FLR.1': 17, 'ALC_DVS.1': 10, 'ALC_LCD.1': 9, 'ALC_TAT.1': 9, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.2': 7, 'ATE_DPT.1': 6, 'ATE_FUN.1': 15, 'ATE_IND.2': 9, 'ATE_COV.1': 1}, 'AVA': {'AVA_MSU.2': 15, 'AVA_SOF.1': 8, 'AVA_VLA.2': 15, 'AVA_VLA.3': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 16, 'FAU_SAR.1': 7, 'FAU_SAR.3': 6, 'FAU_STG.1': 6, 'FAU_STG.4': 6, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.3.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3': 1}, 'FCS': {'FCS_COP.1': 10, 'FCS_COP.1.1': 1, 'FCS_CKM.1': 2, 'FCS_CKM.4': 2}, 'FDP': {'FDP_RIP.1': 7, 'FDP_IFC.1': 22, 'FDP_IFF.1': 29, 'FDP_ITC.1': 1, 'FDP_IFC.1.1': 2, 'FDP_IFF.1.1': 2, 'FDP_IFF.1.2': 4, 'FDP_IFF.1.3': 2, 'FDP_IFF.1.4': 2, 'FDP_IFF.1.5': 2, 'FDP_IFF.1.6': 2, 'FDP_RIP.1.1': 1, 'FDP_ACC.1': 4}, 'FIA': {'FIA_AFL.1': 9, 'FIA_ATD.1': 10, 'FIA_UAU.5': 18, 'FIA_UID.2': 10, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 2, 'FIA_UAU.1': 3, 'FIA_ATD.1.1': 5, 'FIA_UAU.5.1': 2, 'FIA_UAU.5.2': 3, 'FIA_UID.2.1': 2, 'FIA_UID.1': 1, 'FIA_UAU.2': 1}, 'FMT': {'FMT_SMR.1': 24, 'FMT_MSA': 1, 'FMT_MOF.1': 15, 'FMT_MSA.1': 28, 'FMT_MSA.3': 9, 'FMT_MTD.1': 15, 'FMT_MTD.2': 7, 'FMT_SMF.1': 18, 'FMT_MSA.2': 2, 'FMT_MOF.1.1': 2, 'FMT_MSA.1.1': 4, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 2, 'FMT_MTD.2.1': 1, 'FMT_MTD.2.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SEP.1.2': 1}, 'FPT': {'FPT_RVM.1': 7, 'FPT_SEP.1': 6, 'FPT_STM.1': 8, 'FPT_STM.1.1': 3, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1}}, 'cc_claims': {'O': {'O.IDAUTH': 8, 'O.SINUSE': 4, 'O.MEDIAT': 14, 'O.SECSTA': 13, 'O.ENCRYP': 4, 'O.SELPRO': 8, 'O.AUDREC': 7, 'O.ACCOUN': 5, 'O.SECFUN': 17, 'O.LIMEXT': 5, 'O.EAL': 6}, 'T': {'T.NOAUTH': 9, 'T.REPEAT': 3, 'T.REPLAY': 5, 'T.ASPOOF': 2, 'T.TUSAGE': 3, 'T.MEDIAT': 2, 'T.OLDINF': 2, 'T.PROCOM': 2, 'T.AUDACC': 6, 'T.SELPRO': 3, 'T.AUDFUL': 3, 'T.MODEXP': 2}, 'A': {'A.PHYSEC': 1, 'A.MODEXP': 1, 'A.GENPUR': 1, 'A.PUBLIC': 1, 'A.NOEVIL': 1, 'A.SINGEN': 1, 'A.DIRECT': 1, 'A.NOREMO': 1, 'A.REMACC': 1}, 'OE': {'OE.IDAUTH': 8, 'OE.SINUSE': 6, 'OE.PHYSEC': 3, 'OE.MODEXP': 2, 'OE.GENPUR': 2, 'OE.PUBLIC': 3, 'OE.NOEVIL': 2, 'OE.SINGEN': 2, 'OE.DIRECT': 2, 'OE.NOREMO': 2, 'OE.REMACC': 2, 'OE.GUIDAN': 3, 'OE.ADMTRA': 3}}, 'vendor': {'Microsoft': {'Microsoft': 2}, 'Cisco': {'Cisco Systems, Inc': 6, 'Cisco': 212, 'Cisco Systems': 6}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 7}}, 'DES': {'DES': {'DES': 4}, '3DES': {'TDEA': 1, 'Triple-DES': 1}}, 'miscellaneous': {'Skinny': {'Skinny': 6}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 5}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 197': 3, 'FIPS 46-3': 3, 'FIPS PUB 46-3': 3, 'FIPS PUB 197': 2, 'FIPS 140-1': 1}, 'RFC': {'RFC 4251': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to st_vid6015-vr.pdf.
    • The st_filename property was set to st_vid6015-st.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['US'].
    • The cert_id property was set to CCEVS-VR-0027-2007.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}]}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6015-vr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6015-st.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The extracted_sars property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Cisco Firewall Services Module (FWSM) Version 3.1.(3.17) for: Cisco Catalyst 6500 Switches and Cisco 7600 Series routers was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Boundary Protection Devices and Systems",
  "cert_link": null,
  "dgst": "56eb8e6d2bd44eed",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-0027-2007",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:h:cisco:firewall_services_module:3.1:*:*:*:*:*:*:*",
        "cpe:2.3:h:cisco:firewall_services_module:3.1\\(6\\):*:*:*:*:*:*:*",
        "cpe:2.3:h:cisco:firewall_services_module:3.1\\(5\\):*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "3.17",
        "3.1"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2007-5570",
        "CVE-2007-0968",
        "CVE-2007-0963",
        "CVE-2013-1195",
        "CVE-2007-5571",
        "CVE-2007-0965",
        "CVE-2005-3669",
        "CVE-2007-5568",
        "CVE-2007-0967",
        "CVE-2003-1002",
        "CVE-2004-0081",
        "CVE-2007-0966",
        "CVE-2004-0079",
        "CVE-2004-0112",
        "CVE-2007-0964",
        "CVE-2007-0962",
        "CVE-2003-1001"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Firewall",
      "certification_date": "2007-03-05",
      "evaluation_facility": "Arca CCTL",
      "expiration_date": null,
      "id": "CCEVS-VR-VID6015",
      "product": "Cisco Firewall Services Module (FWSM) Version 3.1 (3.17) for Cisco Catalyst 6500 Switches and Cisco 7600 Series Routers",
      "scheme": "US",
      "url": "https://www.niap-ccevs.org/product/6015",
      "vendor": "Cisco Systems, Inc."
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2007-03-05",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6015-add1.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Cisco Firewall Services Module (FWSM) Version 3.1.(4) for Cisco Catalyst 6500 Switches and Cisco 7600 Series Routers with IOS 12.2 (18) SXF5"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2009-04-08",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6015-add2.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6015-st.pdf",
        "maintenance_title": "Cisco Firewall Services Module (FWSM) Version 3.1(7) for Cisco Catalyst 6500 switches and Cisco 7600 Series routers with IOS 12.2(18)SXF5"
      }
    ]
  },
  "manufacturer": "Cisco Systems, Inc.",
  "manufacturer_web": "https://www.cisco.com",
  "name": "Cisco Firewall Services Module (FWSM) Version 3.1.(3.17) for: Cisco Catalyst 6500 Switches and Cisco 7600 Series routers",
  "not_valid_after": "2012-09-06",
  "not_valid_before": "2007-03-05",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "st_vid6015-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-07-0027",
        "cert_item": "Cisco Firewall Services Module (FWSM) Version 3.1 (3.17) for Cisco Catalyst\u00ae 6500 switches and Cisco 7600 Series routers",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-07-0027": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 1,
          "ACM_CAP.4": 1,
          "ACM_SCP.2": 1
        },
        "ADO": {
          "ADO_DEL.2": 1,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP.2": 1,
          "ADV_HLD.2": 1,
          "ADV_IMP.1": 1,
          "ADV_LLD.1": 1,
          "ADV_RCR.1": 1,
          "ADV_SPM.1": 1
        },
        "AGD": {
          "AGD_ADM.1": 1,
          "AGD_USR.1": 1
        },
        "ALC": {
          "ALC_DVS.1": 1,
          "ALC_FLR.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_MSU.2": 1,
          "AVA_SOF.1": 1,
          "AVA_VLA.2": 1,
          "AVA_VLA.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 4": 3,
          "EAL4": 3,
          "EAL4+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_STG.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 1
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 55,
          "Cisco Systems": 2,
          "Cisco Systems, Inc": 1
        },
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/CreationDate": "D:20070726114739-04\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 7.0 for Word",
      "/ModDate": "D:20070726115034-04\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0 (Windows)",
      "/SourceModified": "D:20070726154644",
      "/Subject": "CCEVS Validation Report - Cisco TPIX Security Appliances 515, 515E, 525, 535 and Adaptive Security Appliances 5510, 5520 and 5540, Version 7.0",
      "/Title": "VID6016-VR-0001 DRAFT",
      "pdf_file_size_bytes": 388339,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 19
    },
    "st_filename": "st_vid6015-st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.DIRECT": 1,
          "A.GENPUR": 1,
          "A.MODEXP": 1,
          "A.NOEVIL": 1,
          "A.NOREMO": 1,
          "A.PHYSEC": 1,
          "A.PUBLIC": 1,
          "A.REMACC": 1,
          "A.SINGEN": 1
        },
        "O": {
          "O.ACCOUN": 5,
          "O.AUDREC": 7,
          "O.EAL": 6,
          "O.ENCRYP": 4,
          "O.IDAUTH": 8,
          "O.LIMEXT": 5,
          "O.MEDIAT": 14,
          "O.SECFUN": 17,
          "O.SECSTA": 13,
          "O.SELPRO": 8,
          "O.SINUSE": 4
        },
        "OE": {
          "OE.ADMTRA": 3,
          "OE.DIRECT": 2,
          "OE.GENPUR": 2,
          "OE.GUIDAN": 3,
          "OE.IDAUTH": 8,
          "OE.MODEXP": 2,
          "OE.NOEVIL": 2,
          "OE.NOREMO": 2,
          "OE.PHYSEC": 3,
          "OE.PUBLIC": 3,
          "OE.REMACC": 2,
          "OE.SINGEN": 2,
          "OE.SINUSE": 6
        },
        "T": {
          "T.ASPOOF": 2,
          "T.AUDACC": 6,
          "T.AUDFUL": 3,
          "T.MEDIAT": 2,
          "T.MODEXP": 2,
          "T.NOAUTH": 9,
          "T.OLDINF": 2,
          "T.PROCOM": 2,
          "T.REPEAT": 3,
          "T.REPLAY": 5,
          "T.SELPRO": 3,
          "T.TUSAGE": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 12,
          "ACM_CAP.3": 3,
          "ACM_CAP.4": 21,
          "ACM_SCP.1": 1,
          "ACM_SCP.2": 7
        },
        "ADO": {
          "ADO_DEL.1": 1,
          "ADO_DEL.2": 10,
          "ADO_IGS.1": 9
        },
        "ADV": {
          "ADV_FSP.1": 10,
          "ADV_FSP.2": 12,
          "ADV_HLD.1": 2,
          "ADV_HLD.2": 16,
          "ADV_IMP.1": 9,
          "ADV_LLD.1": 18,
          "ADV_RCR": 2,
          "ADV_RCR.1": 10,
          "ADV_SPM.1": 11
        },
        "AGD": {
          "AGD_ADM.1": 17,
          "AGD_USR.1": 14
        },
        "ALC": {
          "ALC_DVS.1": 10,
          "ALC_FLR.1": 17,
          "ALC_LCD.1": 9,
          "ALC_TAT": 1,
          "ALC_TAT.1": 9
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_COV.2": 7,
          "ATE_DPT.1": 6,
          "ATE_FUN.1": 15,
          "ATE_IND.2": 9
        },
        "AVA": {
          "AVA_MSU.2": 15,
          "AVA_SOF.1": 8,
          "AVA_VLA.2": 15,
          "AVA_VLA.3": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 11,
          "EAL4 augmented": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 16,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_SAR.1": 7,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.3": 6,
          "FAU_SAR.3.1": 1,
          "FAU_STG.1": 6,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.3": 1,
          "FAU_STG.4": 6
        },
        "FCS": {
          "FCS_CKM.1": 2,
          "FCS_CKM.4": 2,
          "FCS_COP.1": 10,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 4,
          "FDP_IFC.1": 22,
          "FDP_IFC.1.1": 2,
          "FDP_IFF.1": 29,
          "FDP_IFF.1.1": 2,
          "FDP_IFF.1.2": 4,
          "FDP_IFF.1.3": 2,
          "FDP_IFF.1.4": 2,
          "FDP_IFF.1.5": 2,
          "FDP_IFF.1.6": 2,
          "FDP_ITC.1": 1,
          "FDP_RIP.1": 7,
          "FDP_RIP.1.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 9,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 2,
          "FIA_ATD.1": 10,
          "FIA_ATD.1.1": 5,
          "FIA_UAU.1": 3,
          "FIA_UAU.2": 1,
          "FIA_UAU.5": 18,
          "FIA_UAU.5.1": 2,
          "FIA_UAU.5.2": 3,
          "FIA_UID.1": 1,
          "FIA_UID.2": 10,
          "FIA_UID.2.1": 2
        },
        "FMT": {
          "FMT_MOF.1": 15,
          "FMT_MOF.1.1": 2,
          "FMT_MSA": 1,
          "FMT_MSA.1": 28,
          "FMT_MSA.1.1": 4,
          "FMT_MSA.2": 2,
          "FMT_MSA.3": 9,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 15,
          "FMT_MTD.1.1": 2,
          "FMT_MTD.2": 7,
          "FMT_MTD.2.1": 1,
          "FMT_MTD.2.2": 1,
          "FMT_SEP.1.2": 1,
          "FMT_SMF.1": 18,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 24,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_RVM.1": 7,
          "FPT_RVM.1.1": 1,
          "FPT_SEP.1": 6,
          "FPT_SEP.1.1": 1,
          "FPT_STM.1": 8,
          "FPT_STM.1.1": 3
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 5
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-1": 1,
          "FIPS 197": 3,
          "FIPS 46-3": 3,
          "FIPS PUB 197": 2,
          "FIPS PUB 46-3": 3
        },
        "RFC": {
          "RFC 4251": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 7
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "Triple-DES": 1
          },
          "DES": {
            "DES": 4
          }
        },
        "miscellaneous": {
          "Skinny": {
            "Skinny": 6
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 212,
          "Cisco Systems": 6,
          "Cisco Systems, Inc": 6
        },
        "Microsoft": {
          "Microsoft": 2
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "sheema",
      "/CreationDate": "D:19920624090927Z",
      "/Creator": "FrameMaker 7.2",
      "/ModDate": "D:20070725080816-04\u002700\u0027",
      "/Producer": "Acrobat Distiller 6.0 (Windows)",
      "/Title": "fwsmstd.fm",
      "pdf_file_size_bytes": 1434560,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 78
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6015-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6015-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "94e7a8cc475a2e454de3c60184bc4aded160c8ebcd6db77ee172f8a6c7b3825c",
      "txt_hash": "8ebd017425d89718d082f759ff30fd9c4cdf5d6c3604e69a193e00e20abc5697"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "b9504d6f2e88da7b00ec6ef535f4aac8c65a6874d6be5ac74d4562ecd60221dc",
      "txt_hash": "db0a31e3cd20deeeb4416a9f5eb1fc1f8fc933a79b8ceac04063083c6e8547dc"
    }
  },
  "status": "archived"
}