This page was not yet optimized for use on mobile
devices.
Cisco AnyConnect Secure Mobility Client v4.6 for Apple iOS
CSV information
| Status | archived |
|---|---|
| Valid from | 08.06.2018 |
| Valid until | 08.12.2020 |
| Scheme | 🇺🇸 US |
| Manufacturer | Cisco Systems, Inc. |
| Category | Other Devices and Systems |
| Security level | |
| Protection profiles | |
| Maintenance updates | Cisco AnyConnect Secure Mobility Client v4.7 for Apple iOS 11.2 (11.02.2019) Certification report Security target |
Heuristics summary
Certificate ID: CCEVS-VR-10880-2018
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Protocols
IPsec, VPNVendor
Cisco Systems, Inc, CiscoCertificates
CCEVS-VR-VID10880-2018Evaluation facilities
Gossamer SecurityCertification report
Extracted keywords
Symmetric Algorithms
AESAsymmetric Algorithms
Diffie-HellmanHash functions
SHA-2Protocols
SSH, IKEv2, IKE, IPsec, VPNRandomness
DRBGVendor
Cisco Systems, Inc, CiscoCertificates
CCEVS-VR-10880-2018Evaluation facilities
Gossamer SecurityStandards
X.509File metadata
| Creation date | D:20180608115722-04'00' |
|---|---|
| Modification date | D:20180608115722-04'00' |
| Pages | 14 |
Frontpage
| Certificate ID | CCEVS-VR-10880-2018 |
|---|---|
| Certified item | Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 94002, USA Cisco AnyConnect Secure Mobility Client 4.6 for Apple iOS11.2 |
| Certification lab | US NIAP |
Security target
Extracted keywords
Symmetric Algorithms
AES, HMAC, HMAC-SHA-256Asymmetric Algorithms
ECDSA, ECC, Diffie-Hellman, DH, DSAHash functions
SHA-256, SHA-384, SHA-2Schemes
MAC, Key ExchangeProtocols
SSL, IKE, IKEv2, IKEv1, IPsec, VPNRandomness
DRBG, RBGElliptic Curves
P-256, P-384Block cipher modes
CBC, GCMTrusted Execution Environments
TrustZoneVendor
Cisco Systems, Inc, CiscoClaims
O.VPN_TUNNEL, O.RESIDUAL_INFORMATION_CLEARING, O.TOE_ADMINISTRATION, O.TSF_SELF_TEST, O.VERIFIABLE_UPDATES, T.TSF_CONFIGURATION, T.TSF_FAILURE, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_UPDATE, T.USER_DATA_REUSE, A.NO_TOE_BYPASS, A.PHYSICAL, A.TRUSTED_CONFIG, OE.NO_TOE_BYPASS, OE.PHYSICAL, OE.TRUSTED_CONFIGSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, AGD_OPR, AGD_PRE, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1Security Functional Requirements (SFR)
FCS_CKM, FCS_CKM.1, FCS_CKM_EXT.2, FCS_CKM_EXT.4, FCS_COP.1, FCS_RBG_EXT.1, FCS_CKM.1.1, FCS_CKM.1.2, FCS_CKM_EXT.2.1, FCS_CKM_EXT.4.1, FCS_COP.1.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FDP_RIP.2, FDP_RIP.2.1, FMT_SMF.1, FMT_SMF.1.1, FPT_TST_EXT.1, FPT_TUD_EXT.1, FPT_TST_EXT, FPT_TST_EXT.1.1, FPT_TST_EXT.1.2, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2Standards
FIPS PUB 186-4, FIPS PUB 197, FIPS 180-4, NIST SP 800-131A, NIST SP 800-38D, NIST SP 800-38A, NIST SP 800-57, NIST SP 800-56A, RFC 4301, RFC 4303, RFC 4106, RFC 3602, RFC 6379, RFC 5282, RFC 4945, RFC 5280, RFC 2560, X.509, CCMB-20012-09-001, CCMB-2012-09-002, CCMB-20012-09-003, CCMB-2012-09-004File metadata
| Title | 1 |
|---|---|
| Author | Cisco Systems, Inc. |
| Creation date | D:20190211095214-05'00' |
| Modification date | D:20190211095214-05'00' |
| Pages | 34 |
| Creator | Microsoft® Word 2016 |
| Producer | Microsoft® Word 2016 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
CCEVS-VR-10880-2018Extracted SARs
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1Scheme data
| Product | Cisco AnyConnect Secure Mobility Client v4.6 for Apple iOS | |
|---|---|---|
| Id | CCEVS-VR-VID10880 | |
| Url | https://www.niap-ccevs.org/products/10880 | |
| Api Url | https://www.niap-ccevs.org/api/project/product/pcl_products/10880/ | |
| Certification Date | 08.06.2018 | |
| Expiration Date | 08.03.2021 | |
| Category | Virtual Private Network | |
| Categories | ['Virtual Private Network'] | |
| Vendor | Cisco Systems, Inc. | |
| Evaluation Facility | Gossamer Security Solutions | |
| Scheme | US | |
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10880-ci.pdf",
"dgst": "fe85eea8686b54d0",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "CCEVS-VR-10880-2018",
"cert_lab": [
"US"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL1",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"4.6"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"db7434eb64f09c94"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"api_url": "https://www.niap-ccevs.org/api/project/product/pcl_products/10880/",
"categories": [
"Virtual Private Network"
],
"category": "Virtual Private Network",
"certification_date": "2018-06-08",
"evaluation_facility": "Gossamer Security Solutions",
"expiration_date": "2021-03-08",
"id": "CCEVS-VR-VID10880",
"product": "Cisco AnyConnect Secure Mobility Client v4.6 for Apple iOS",
"scheme": "US",
"url": "https://www.niap-ccevs.org/products/10880",
"vendor": "Cisco Systems, Inc."
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2019-02-11",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10880-add1.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10880-st.pdf",
"maintenance_title": "Cisco AnyConnect Secure Mobility Client v4.7 for Apple iOS 11.2"
}
]
},
"manufacturer": "Cisco Systems, Inc.",
"manufacturer_web": "https://www.cisco.com",
"name": "Cisco AnyConnect Secure Mobility Client v4.6 for Apple iOS",
"not_valid_after": "2020-12-08",
"not_valid_before": "2018-06-08",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "st_vid10880-ci.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"US": {
"CCEVS-VR-VID10880-2018": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 1
},
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Gossamer": {
"Gossamer Security": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 1,
"Cisco Systems, Inc": 1
}
},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "st_vid10880-vr.pdf",
"report_frontpage": {
"US": {
"cert_id": "CCEVS-VR-10880-2018",
"cert_item": "Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 94002, USA Cisco AnyConnect Secure Mobility Client 4.6 for Apple iOS11.2",
"cert_lab": "US NIAP"
}
},
"report_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"Diffie-Hellman": 1
}
}
},
"cc_cert_id": {
"US": {
"CCEVS-VR-10880-2018": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 2,
"IKEv2": 2
},
"IPsec": {
"IPsec": 10
},
"SSH": {
"SSH": 1
},
"VPN": {
"VPN": 22
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Gossamer": {
"Gossamer Security": 4
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-2": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 23,
"Cisco Systems, Inc": 4
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20180608115722-04\u002700\u0027",
"/ModDate": "D:20180608115722-04\u002700\u0027",
"pdf_file_size_bytes": 603581,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.kb.cert.org/vuls/",
"https://www.niap-ccevs.org/MMO/Product/st_vid10851-st.pdf",
"http://www.cisco.com/go/license",
"https://web.nvd.nist.gov/view/vuln/search"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 14
},
"st_filename": "st_vid10880-st.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDSA": {
"ECDSA": 9
}
},
"FF": {
"DH": {
"DH": 12,
"Diffie-Hellman": 3
},
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NO_TOE_BYPASS": 1,
"A.PHYSICAL": 1,
"A.TRUSTED_CONFIG": 1
},
"O": {
"O.RESIDUAL_INFORMATION_CLEARING": 1,
"O.TOE_ADMINISTRATION": 1,
"O.TSF_SELF_TEST": 1,
"O.VERIFIABLE_UPDATES": 1,
"O.VPN_TUNNEL": 1
},
"OE": {
"OE.NO_TOE_BYPASS": 1,
"OE.PHYSICAL": 1,
"OE.TRUSTED_CONFIG": 1
},
"T": {
"T.TSF_CONFIGURATION": 1,
"T.TSF_FAILURE": 1,
"T.UNAUTHORIZED_ACCESS": 1,
"T.UNAUTHORIZED_UPDATE": 1,
"T.USER_DATA_REUSE": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 2
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_OPR": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.1": 2,
"ALC_CMS.1": 1
},
"ATE": {
"ATE_IND.1": 2
},
"AVA": {
"AVA_VAN.1": 2
}
},
"cc_security_level": {},
"cc_sfr": {
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 6,
"FCS_CKM.1.1": 1,
"FCS_CKM.1.2": 1,
"FCS_CKM_EXT.2": 3,
"FCS_CKM_EXT.2.1": 1,
"FCS_CKM_EXT.4": 3,
"FCS_CKM_EXT.4.1": 1,
"FCS_COP.1": 12,
"FCS_COP.1.1": 4,
"FCS_RBG_EXT.1": 5,
"FCS_RBG_EXT.1.1": 1,
"FCS_RBG_EXT.1.2": 1
},
"FDP": {
"FDP_RIP.2": 3,
"FDP_RIP.2.1": 1
},
"FMT": {
"FMT_SMF.1": 7,
"FMT_SMF.1.1": 2
},
"FPT": {
"FPT_TST_EXT": 1,
"FPT_TST_EXT.1": 2,
"FPT_TST_EXT.1.1": 1,
"FPT_TST_EXT.1.2": 1,
"FPT_TUD_EXT.1": 2
},
"FTP": {
"FTP_ITC.1": 3,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"GCM": {
"GCM": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 26,
"IKEv1": 4,
"IKEv2": 22
},
"IPsec": {
"IPsec": 62
},
"TLS": {
"SSL": {
"SSL": 1
}
},
"VPN": {
"VPN": 79
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 2
},
"MAC": {
"MAC": 3
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 6,
"P-384": 6
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-2": 1,
"SHA-256": 4,
"SHA-384": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 9
},
"RNG": {
"RBG": 4
}
},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-20012-09-001": 1,
"CCMB-20012-09-003": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-004": 1
},
"FIPS": {
"FIPS 180-4": 1,
"FIPS PUB 186-4": 5,
"FIPS PUB 197": 1
},
"NIST": {
"NIST SP 800-131A": 1,
"NIST SP 800-38A": 2,
"NIST SP 800-38D": 1,
"NIST SP 800-56A": 2,
"NIST SP 800-57": 1
},
"RFC": {
"RFC 2560": 1,
"RFC 3602": 1,
"RFC 4106": 1,
"RFC 4301": 2,
"RFC 4303": 1,
"RFC 4945": 1,
"RFC 5280": 3,
"RFC 5282": 1,
"RFC 6379": 1
},
"X509": {
"X.509": 5
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 8
}
},
"constructions": {
"MAC": {
"HMAC": 6,
"HMAC-SHA-256": 1
}
}
},
"technical_report_id": {},
"tee_name": {
"ARM": {
"TrustZone": 1
}
},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 13,
"Cisco Systems, Inc": 5
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Cisco Systems, Inc.",
"/CreationDate": "D:20190211095214-05\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20190211095214-05\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Title": "1",
"pdf_file_size_bytes": 1089047,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://developer.apple.com/library/prerelease/mac/documentation/Security/Reference/certifkeytrustservices/#//apple_ref/c/func/SecTrustEvaluate",
"https://www.niap-ccevs.org/MMO/Product/st_vid10851-st.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 34
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_vpn_ipsec_client_v1.4.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10880-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": []
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10880-st.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "712ff336f413a3e06a03ec761e8225b15c77514e1b30a2091e8991c7bf84241e",
"txt_hash": "1fee8fc326d36a67ba297fe4cb12b501a76c07310d3e32b65c19855f2697b320"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "07d9863d08f736b521aae5c7daa880866cdce29ebdf1e1d12067d4fe5a5230fc",
"txt_hash": "2ea55c5419453ca330ad048373325fea1b96f57dba950276a7b4d4f5fb0e1619"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "7a449a19295a833013f23fa70f98e054ff3aafe44205aae94e16d4d33ef5f317",
"txt_hash": "d8ec77d9e9814dd03736a2a06b90a2fb9bf452b3a2184c6c6d72c0d82eba3ae2"
}
},
"status": "archived"
}