This page was not yet optimized for use on mobile
devices.
Cisco Unified Wireless Network Solution composed of the following components: Cisco Aironet 1130, 1230, and 1240 AG Series Access Points; Cisco 4400 Series Wireless LAN Controllers; Cisco Catalyst 6500 Series Wireless Integrated Services Module (WiSM); Cisco Wireless Control System (WCS); Cisco Secure Access Control Server (ACS); Cisco 2710 Wireless Location
Known vulnerabilities detected
Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.CSV information
| Status | archived |
|---|---|
| Valid from | 25.03.2009 |
| Valid until | 20.07.2012 |
| Scheme | 🇺🇸 US |
| Manufacturer | Cisco Systems, Inc. |
| Category | Network and Network-Related Devices and Systems |
| Security level | AVA_MSU.1, ALC_FLR.2, EAL2+, ACM_SCP.1 |
Heuristics summary
Certificate ID: CCEVS-VR-VID-10324-2009
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Vendor
Cisco Systems, Inc, Cisco, Cisco SystemsSecurity level
EAL 2, EAL2, EAL 4, EAL 2 augmented, EAL2 augmentedSecurity Assurance Requirements (SAR)
ACM_SCP.1, ALC_FLR.2, AVA_MSU.1Certificates
CCEVS-VR-VID10324-2009File metadata
| Title | Validation Report for WLAN |
|---|---|
| Author | root |
| Creation date | D:20090410185059 |
| Modification date | D:20090410185059 |
| Pages | 20 |
| Creator | Microsoft® Office Word 2007 |
| Producer | Microsoft® Office Word 2007 |
Frontpage
| Certificate ID | CCEVS-VR-VID10324-2009 |
|---|---|
| Certified item | Cisco Systems, Inc., 170 West Tasman Dr., San Jose, CA 95134 Cisco Unified Wireless Network & Wireless Intrusion Detection System |
| Certification lab | US NIAP |
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, CBC-MACHash functions
SHA-1Schemes
MACProtocols
SSH, SSL, TLSBlock cipher modes
CCMVendor
Microsoft, Cisco Systems, Inc, Cisco, Cisco SystemsSecurity level
EAL2, EAL 4, EAL2 augmentedClaims
O.ADMIN_GUIDANCE, O.AUDIT_GENERATION, O.CONFIGURATION_IDENTIFICATION, O.CORRECT_TSF_OPERATION, O.CRYPTOGRAPHY, O.CRYPTOGRAPHY_VALIDATED, O.DISPLAY_BANNER, O.DOCUMENTED_DESIGN, O.IDS_AUDIT_GENERATION, O.MANAGE, O.MEDIATE, O.PARTIAL_FUNCTIONAL_TESTING, O.RESIDUAL_INFORMATION, O.SELF_PROTECTION, O.TIME_STAMPS, O.TOE_ACCESS, O.VULNERABILITY_ANALYSIS, O.VULNERABILITY_ANALYSIS_TEST, O.CORRECT_, O.TOE, O.CONFIGURATION_, O.CORRECT_TSF_, O.CRYPTOGRAPHY_, O.DOCUMENTED_, O.IDS_AUDIT_, O.PARTIAL_, O.FUNCTIONAL_TESTING, O.RESIDUAL_, O.VULNERABILITY_, T.ACCIDENTAL_ADMIN_ERROR, T.ACCIDENTAL_, T.MASQUERADE, T.POOR_DESIGN, T.POOR_IMPLEMENTATION, T.POOR_TEST, T.RESIDUAL_DATA, T.TSF_COMPROMISE, T.UNATTENDED_SESSION, T.UNAUTHORIZED_ACCESS, T.UNAUTH_ADMIN_ACCESS, T.UNIDENTIFIED_, T.POOR_, T.UNATTENDED_, T.UNAUTHORIZED_, T.UNAUTH_ADMIN_, T.ACCIDENTAL_ADMIN_, T.ACCIDENTAL_CRYPTO_, A.NO_EVIL, A.NO_GENERAL_PURPOSE, A.PHYSICAL, A.TOE_NO_BYPASS, A.ONE_WCS_ADMIN, A.SYSLOG_SEP, A.SYSLOG_ADMIN, A.NO_GENERAL_, OE.AUDIT_PROTECTION, OE.AUDIT_REVIEW, OE.MANAGE, OE.NO_EVIL, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.PROTECT_MGMT_COMMS, OE.RESIDUAL_INFORMATION, OE.SELF_PROTECTION, OE.TIME_STAMPS, OE.TOE_ACCESS, OE.TOE_NO_BYPASS, OE.ONE_WCS_ADMIN, OE.TOESecurity Assurance Requirements (SAR)
ACM_SCP.1, ACM_CAP.2, ACM_SCP, ACM_CAP.3, ADO_DEL, ADO_IGS.1, ADO_DEL.1, ADV_FSP.1, ADV_HLD.1, ADV_RCR, ADV_RCR.1, ADV_SPM.1, AGD_ADM, AGD_USR, AGD_ADM.1, AGD_USR.1, ALC_FLR.2, ATE_COV, ATE_FUN, ATE_IND.2, ATE_COV.1, ATE_FUN.1, ATE_HLD.1, AVA_MSU.1, AVA_MSU, AVA_SOF, AVA_VLA, AVA_SOF.1, AVA_VLA.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_GEN_EXP.1, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL.1, FAU_STG.1, FAU_STG.3, FAU_SAR.1.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_GEN_EXP.1.1, FAU_GEN_EXP.1.2, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FCS_BCM_EXP.1, FCS_CKM.1, FCS_CKM_EXP.2, FCS_CKM.4, FCS_COP.1, FCS_COP_EXP.1, FCS_COP_EXP.2, FCS_BCM_EXP.1.1, FCS_BCM_EXP.1.2, FCS_BCM_EXP.1.3, FCS_CKM.1.1, FCS_CKM_EXP.2.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_COP_EXP.1.1, FCS_COP_EXP.2.1, FCS_CKM.2, FDP_PUD_EXP.1, FDP_RIP.1, FDP_PUD_EXP.1.1, FDP_RIP.1.1, FDP_PUD_EXP, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_IFC.1, FDP_PUP_EXP.1, FIA_AFL.1, FIA_ATD.1, FIA_UAU.1, FIA_UAU_EXP.5, FIA_UID.2, FIA_USB.1, FIA_UAU.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU_EXP.5.1, FIA_UAU_EXP.5.2, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UID.1, FIA_UAU.2.1, FIA_UAU, FMT_MOF.1, FMT_MSA.2, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_REV.1, FMT_MOF.1.1, FMT_MSA.2.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF, FMT_MSA, FMT_MSA.1, FPT_ITT.1, FPT_RVM.1, FPT_SEP.1, FPT_STM_EXP.1, FPT_TST_EXP.1, FPT_TST_EXP.2, FPT_STM.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_STM_EXP.1.1, FPT_TST_EXP.1.1, FPT_TST_EXP.1.2, FPT_TST_EXP.1.3, FPT_TST_EXP.2.1, FPT_TST_EXP.2.2, FPT_STM.1.1, FPT_TST_EXP, FPT_TST, FTA_SSL.3, FTA_TAB.1, FTA_SSL.3.1, FTA_TAB.1.1, FTA_TAB, FTP_ITC_EXP.1, FTP_TRP.1, FTP_ITC_EXP.1.1, FTP_ITC_EXP.1.2, FTP_ITC_EXP.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Standards
FIPS 140-2, FIPS 140-1, FIPS 140, FIPS 46-3, FIPS 180-2, FIPS PUB 140-2, FIPS PUB 46-3, FIPS PUB 180-2, SP 800-56, RFC 2716, RFC 2246, RFC 2284, x.509, X.509, CCMB-2005-08-001, CCMB-2005-08-003, CCMB-2005-08-004File metadata
| Title | WLAN_ST.fm |
|---|---|
| Author | lholmqui |
| Creation date | D:20090526110050-04'00' |
| Modification date | D:20090526110251-04'00' |
| Pages | 112 |
| Creator | PScript5.dll Version 5.2.2 |
| Producer | Acrobat Distiller 9.0.0 (Windows) |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
CCEVS-VR-VID-10324-2009Extracted SARs
ADV_FSP.1, ADV_HLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.2, ATE_COV.1, ATE_FUN.1, ATE_HLD.1, ATE_IND.2, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1CPE matches
Related CVEs
| ID | Links | Severity | CVSS Score | Published on | ||
|---|---|---|---|---|---|---|
| Base | Exploitability | Impact | ||||
| CVE-2003-1001 | MEDIUM | 5.0 | 2.9 | 05.01.2004 | ||
| CVE-2003-1002 | MEDIUM | 5.0 | 2.9 | 05.01.2004 | ||
| CVE-2005-4258 | HIGH | 7.8 | 6.9 | 15.12.2005 | ||
| CVE-2007-1258 | MEDIUM | 6.1 | 6.9 | 03.03.2007 | ||
| CVE-2007-2038 | MEDIUM | 6.1 | 6.9 | 16.04.2007 | ||
| CVE-2007-2041 | MEDIUM | 4.0 | 4.9 | 16.04.2007 | ||
| CVE-2007-5134 | MEDIUM | 5.0 | 2.9 | 27.09.2007 | ||
| CVE-2013-1235 | MEDIUM | 5.0 | 2.9 | 04.05.2013 | ||
Showing 5 out of 8.
Similar certificates
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": null,
"dgst": "c46fedfa2cf2d8a1",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CCEVS-VR-VID-10324-2009",
"cert_lab": [
"US"
],
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:h:cisco:1240:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4400_wireless_lan_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_6500:-:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"eal": "EAL2+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_HLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"4400",
"2710",
"6500",
"1240",
"1130",
"1230"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2003-1001",
"CVE-2007-5134",
"CVE-2007-2038",
"CVE-2013-1235",
"CVE-2003-1002",
"CVE-2005-4258",
"CVE-2007-1258",
"CVE-2007-2041"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Cisco Systems, Inc.",
"manufacturer_web": "https://www.cisco.com",
"name": "Cisco Unified Wireless Network Solution composed of the following components: Cisco Aironet 1130, 1230, and 1240 AG Series Access Points; Cisco 4400 Series Wireless LAN Controllers; Cisco Catalyst 6500 Series Wireless Integrated Services Module (WiSM); Cisco Wireless Control System (WCS); Cisco Secure Access Control Server (ACS); Cisco 2710 Wireless Location",
"not_valid_after": "2012-07-20",
"not_valid_before": "2009-03-25",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "st_vid10324-vr.pdf",
"report_frontpage": {
"US": {
"cert_id": "CCEVS-VR-VID10324-2009",
"cert_item": "Cisco Systems, Inc., 170 West Tasman Dr., San Jose, CA 95134 Cisco Unified Wireless Network \u0026 Wireless Intrusion Detection System",
"cert_lab": "US NIAP"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"US": {
"CCEVS-VR-VID10324-2009": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_SCP.1": 5
},
"ALC": {
"ALC_FLR.2": 5
},
"AVA": {
"AVA_MSU.1": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 8,
"EAL 2 augmented": 4,
"EAL 4": 1,
"EAL2": 2,
"EAL2 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 59,
"Cisco Systems": 2,
"Cisco Systems, Inc": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "root",
"/CreationDate": "D:20090410185059",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20090410185059",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Title": "Validation Report for WLAN",
"pdf_file_size_bytes": 345953,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 20
},
"st_filename": "st_vid10324-st.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NO_EVIL": 2,
"A.NO_GENERAL_": 1,
"A.NO_GENERAL_PURPOSE": 1,
"A.ONE_WCS_ADMIN": 3,
"A.PHYSICAL": 2,
"A.SYSLOG_ADMIN": 3,
"A.SYSLOG_SEP": 5,
"A.TOE_NO_BYPASS": 2
},
"O": {
"O.ADMIN_GUIDANCE": 9,
"O.AUDIT_GENERATION": 3,
"O.CONFIGURATION_": 1,
"O.CONFIGURATION_IDENTIFICATION": 8,
"O.CORRECT_": 1,
"O.CORRECT_TSF_": 1,
"O.CORRECT_TSF_OPERATION": 1,
"O.CRYPTOGRAPHY": 10,
"O.CRYPTOGRAPHY_": 1,
"O.CRYPTOGRAPHY_VALIDATED": 4,
"O.DISPLAY_BANNER": 8,
"O.DOCUMENTED_": 1,
"O.DOCUMENTED_DESIGN": 3,
"O.FUNCTIONAL_TESTING": 1,
"O.IDS_AUDIT_": 1,
"O.IDS_AUDIT_GENERATION": 10,
"O.MANAGE": 7,
"O.MEDIATE": 10,
"O.PARTIAL_": 1,
"O.PARTIAL_FUNCTIONAL_TESTING": 3,
"O.RESIDUAL_": 1,
"O.RESIDUAL_INFORMATION": 10,
"O.SELF_PROTECTION": 5,
"O.TIME_STAMPS": 8,
"O.TOE": 1,
"O.TOE_ACCESS": 6,
"O.VULNERABILITY_": 1,
"O.VULNERABILITY_ANALYSIS": 7,
"O.VULNERABILITY_ANALYSIS_TEST": 3
},
"OE": {
"OE.AUDIT_PROTECTION": 6,
"OE.AUDIT_REVIEW": 3,
"OE.MANAGE": 8,
"OE.NO_EVIL": 5,
"OE.NO_GENERAL_PURPOSE": 5,
"OE.ONE_WCS_ADMIN": 5,
"OE.PHYSICAL": 2,
"OE.PROTECT_MGMT_COMMS": 7,
"OE.RESIDUAL_INFORMATION": 5,
"OE.SELF_PROTECTION": 8,
"OE.TIME_STAMPS": 4,
"OE.TOE": 1,
"OE.TOE_ACCESS": 7,
"OE.TOE_NO_BYPASS": 6
},
"T": {
"T.ACCIDENTAL_": 3,
"T.ACCIDENTAL_ADMIN_": 1,
"T.ACCIDENTAL_ADMIN_ERROR": 1,
"T.ACCIDENTAL_CRYPTO_": 1,
"T.MASQUERADE": 1,
"T.POOR_": 1,
"T.POOR_DESIGN": 1,
"T.POOR_IMPLEMENTATION": 2,
"T.POOR_TEST": 3,
"T.RESIDUAL_DATA": 3,
"T.TSF_COMPROMISE": 3,
"T.UNATTENDED_": 2,
"T.UNATTENDED_SESSION": 1,
"T.UNAUTHORIZED_": 2,
"T.UNAUTHORIZED_ACCESS": 1,
"T.UNAUTH_ADMIN_": 1,
"T.UNAUTH_ADMIN_ACCESS": 2,
"T.UNIDENTIFIED_": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_CAP.2": 5,
"ACM_CAP.3": 1,
"ACM_SCP": 1,
"ACM_SCP.1": 9
},
"ADO": {
"ADO_DEL": 2,
"ADO_DEL.1": 3,
"ADO_IGS.1": 6
},
"ADV": {
"ADV_FSP.1": 13,
"ADV_HLD.1": 6,
"ADV_RCR": 3,
"ADV_RCR.1": 6,
"ADV_SPM.1": 3
},
"AGD": {
"AGD_ADM": 2,
"AGD_ADM.1": 9,
"AGD_USR": 2,
"AGD_USR.1": 6
},
"ALC": {
"ALC_FLR.2": 9
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 4,
"ATE_FUN": 1,
"ATE_FUN.1": 6,
"ATE_HLD.1": 1,
"ATE_IND.2": 5
},
"AVA": {
"AVA_MSU": 2,
"AVA_MSU.1": 7,
"AVA_SOF": 1,
"AVA_SOF.1": 5,
"AVA_VLA": 2,
"AVA_VLA.1": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL2": 11,
"EAL2 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 31,
"FAU_GEN.1.1": 2,
"FAU_GEN.1.2": 2,
"FAU_GEN.2": 10,
"FAU_GEN.2.1": 1,
"FAU_GEN_EXP.1": 12,
"FAU_GEN_EXP.1.1": 3,
"FAU_GEN_EXP.1.2": 1,
"FAU_SAR.1": 29,
"FAU_SAR.1.1": 3,
"FAU_SAR.1.2": 2,
"FAU_SAR.2": 23,
"FAU_SAR.2.1": 3,
"FAU_SAR.3": 16,
"FAU_SAR.3.1": 2,
"FAU_SEL.1": 11,
"FAU_SEL.1.1": 3,
"FAU_STG.1": 9,
"FAU_STG.1.1": 2,
"FAU_STG.1.2": 3,
"FAU_STG.3": 8,
"FAU_STG.3.1": 1
},
"FCS": {
"FCS_BCM_EXP.1": 13,
"FCS_BCM_EXP.1.1": 1,
"FCS_BCM_EXP.1.2": 1,
"FCS_BCM_EXP.1.3": 1,
"FCS_CKM.1": 54,
"FCS_CKM.1.1": 3,
"FCS_CKM.2": 5,
"FCS_CKM.4": 30,
"FCS_CKM.4.1": 1,
"FCS_CKM_EXP.2": 17,
"FCS_CKM_EXP.2.1": 1,
"FCS_COP.1": 31,
"FCS_COP.1.1": 2,
"FCS_COP_EXP.1": 16,
"FCS_COP_EXP.1.1": 1,
"FCS_COP_EXP.2": 22,
"FCS_COP_EXP.2.1": 1
},
"FDP": {
"FDP_ACC.1": 2,
"FDP_IFC.1": 2,
"FDP_ITC.1": 6,
"FDP_ITC.2": 2,
"FDP_PUD_EXP": 1,
"FDP_PUD_EXP.1": 12,
"FDP_PUD_EXP.1.1": 2,
"FDP_PUP_EXP.1": 1,
"FDP_RIP.1": 20,
"FDP_RIP.1.1": 2
},
"FIA": {
"FIA_AFL.1": 21,
"FIA_AFL.1.1": 2,
"FIA_AFL.1.2": 2,
"FIA_ATD.1": 29,
"FIA_ATD.1.1": 3,
"FIA_UAU": 6,
"FIA_UAU.1": 12,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.2": 9,
"FIA_UAU.2.1": 1,
"FIA_UAU_EXP.5": 25,
"FIA_UAU_EXP.5.1": 2,
"FIA_UAU_EXP.5.2": 2,
"FIA_UID.1": 11,
"FIA_UID.2": 29,
"FIA_UID.2.1": 2,
"FIA_USB.1": 22,
"FIA_USB.1.1": 2,
"FIA_USB.1.2": 2,
"FIA_USB.1.3": 2
},
"FMT": {
"FMT_MOF": 6,
"FMT_MOF.1": 34,
"FMT_MOF.1.1": 4,
"FMT_MSA": 1,
"FMT_MSA.1": 2,
"FMT_MSA.2": 29,
"FMT_MSA.2.1": 1,
"FMT_MTD.1": 39,
"FMT_MTD.1.1": 4,
"FMT_REV.1": 1,
"FMT_SMF.1": 38,
"FMT_SMF.1.1": 3,
"FMT_SMR.1": 30,
"FMT_SMR.1.1": 2,
"FMT_SMR.1.2": 2
},
"FPT": {
"FPT_ITT.1": 13,
"FPT_RVM.1": 18,
"FPT_RVM.1.1": 2,
"FPT_SEP.1": 18,
"FPT_SEP.1.1": 2,
"FPT_SEP.1.2": 2,
"FPT_STM.1": 11,
"FPT_STM.1.1": 1,
"FPT_STM_EXP.1": 15,
"FPT_STM_EXP.1.1": 1,
"FPT_TST": 3,
"FPT_TST_EXP": 1,
"FPT_TST_EXP.1": 10,
"FPT_TST_EXP.1.1": 1,
"FPT_TST_EXP.1.2": 1,
"FPT_TST_EXP.1.3": 1,
"FPT_TST_EXP.2": 12,
"FPT_TST_EXP.2.1": 1,
"FPT_TST_EXP.2.2": 1
},
"FTA": {
"FTA_SSL.3": 11,
"FTA_SSL.3.1": 1,
"FTA_TAB": 1,
"FTA_TAB.1": 10,
"FTA_TAB.1.1": 1
},
"FTP": {
"FTP_ITC_EXP.1": 22,
"FTP_ITC_EXP.1.1": 2,
"FTP_ITC_EXP.1.2": 2,
"FTP_ITC_EXP.1.3": 2,
"FTP_TRP.1": 11,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {
"CCM": {
"CCM": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 2
},
"TLS": {
"SSL": {
"SSL": 2
},
"TLS": {
"TLS": 6
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 8
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2005-08-001": 1,
"CCMB-2005-08-003": 1,
"CCMB-2005-08-004": 1
},
"FIPS": {
"FIPS 140": 3,
"FIPS 140-1": 1,
"FIPS 140-2": 21,
"FIPS 180-2": 1,
"FIPS 46-3": 1,
"FIPS PUB 140-2": 6,
"FIPS PUB 180-2": 2,
"FIPS PUB 46-3": 2
},
"NIST": {
"SP 800-56": 1
},
"RFC": {
"RFC 2246": 1,
"RFC 2284": 1,
"RFC 2716": 1
},
"X509": {
"X.509": 1,
"x.509": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 20
}
},
"DES": {
"DES": {
"DES": 5
}
},
"constructions": {
"MAC": {
"CBC-MAC": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 267,
"Cisco Systems": 3,
"Cisco Systems, Inc": 5
},
"Microsoft": {
"Microsoft": 2
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "lholmqui",
"/CreationDate": "D:20090526110050-04\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20090526110251-04\u002700\u0027",
"/Producer": "Acrobat Distiller 9.0.0 (Windows)",
"/Title": "WLAN_ST.fm",
"pdf_file_size_bytes": 672856,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 112
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10324-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.2",
"AVA_MSU.1",
"ACM_SCP.1",
"EAL2+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10324-st.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4508866f37d96c6c94fe881c1f45d94ffcea0638b980a1fb239c81cc1d68d4af",
"txt_hash": "2652b2cfe7d08f0ea74d1c62913b10189bac52da556a97a174f4a1a2aec36dbc"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "5e18314016b8d7f84839b85e748f10af48d8521d4a0a667a8fb1544649e4b044",
"txt_hash": "98b277bce829562639d8623d1dea69f041e370646979fa05392c7386dfe483e7"
}
},
"status": "archived"
}