Cisco Unified Wireless Network Solution composed of the following components: Cisco Aironet 1130, 1230, and 1240 AG Series Access Points; Cisco 4400 Series Wireless LAN Controllers; Cisco Catalyst 6500 Series Wireless Integrated Services Module (WiSM); Cisco Wireless Control System (WCS); Cisco Secure Access Control Server (ACS); Cisco 2710 Wireless Location

Known vulnerabilities detected

Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.

CSV information

Status archived
Valid from 25.03.2009
Valid until 20.07.2012
Scheme 🇺🇸 US
Manufacturer Cisco Systems, Inc.
Category Network and Network-Related Devices and Systems
Security level AVA_MSU.1, ALC_FLR.2, EAL2+, ACM_SCP.1

Heuristics summary

Certificate ID: CCEVS-VR-VID-10324-2009

Certificate

certificate could not be downloaded, no link is available.

Certification report

Extracted keywords

Vendor
Cisco Systems, Inc, Cisco, Cisco Systems

Security level
EAL 2, EAL2, EAL 4, EAL 2 augmented, EAL2 augmented
Security Assurance Requirements (SAR)
ACM_SCP.1, ALC_FLR.2, AVA_MSU.1
Certificates
CCEVS-VR-VID10324-2009

File metadata

Title Validation Report for WLAN
Author root
Creation date D:20090410185059
Modification date D:20090410185059
Pages 20
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

Frontpage

Certificate ID CCEVS-VR-VID10324-2009
Certified item Cisco Systems, Inc., 170 West Tasman Dr., San Jose, CA 95134 Cisco Unified Wireless Network & Wireless Intrusion Detection System
Certification lab US NIAP

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, CBC-MAC
Hash functions
SHA-1
Schemes
MAC
Protocols
SSH, SSL, TLS
Block cipher modes
CCM

Vendor
Microsoft, Cisco Systems, Inc, Cisco, Cisco Systems

Security level
EAL2, EAL 4, EAL2 augmented
Claims
O.ADMIN_GUIDANCE, O.AUDIT_GENERATION, O.CONFIGURATION_IDENTIFICATION, O.CORRECT_TSF_OPERATION, O.CRYPTOGRAPHY, O.CRYPTOGRAPHY_VALIDATED, O.DISPLAY_BANNER, O.DOCUMENTED_DESIGN, O.IDS_AUDIT_GENERATION, O.MANAGE, O.MEDIATE, O.PARTIAL_FUNCTIONAL_TESTING, O.RESIDUAL_INFORMATION, O.SELF_PROTECTION, O.TIME_STAMPS, O.TOE_ACCESS, O.VULNERABILITY_ANALYSIS, O.VULNERABILITY_ANALYSIS_TEST, O.CORRECT_, O.TOE, O.CONFIGURATION_, O.CORRECT_TSF_, O.CRYPTOGRAPHY_, O.DOCUMENTED_, O.IDS_AUDIT_, O.PARTIAL_, O.FUNCTIONAL_TESTING, O.RESIDUAL_, O.VULNERABILITY_, T.ACCIDENTAL_ADMIN_ERROR, T.ACCIDENTAL_, T.MASQUERADE, T.POOR_DESIGN, T.POOR_IMPLEMENTATION, T.POOR_TEST, T.RESIDUAL_DATA, T.TSF_COMPROMISE, T.UNATTENDED_SESSION, T.UNAUTHORIZED_ACCESS, T.UNAUTH_ADMIN_ACCESS, T.UNIDENTIFIED_, T.POOR_, T.UNATTENDED_, T.UNAUTHORIZED_, T.UNAUTH_ADMIN_, T.ACCIDENTAL_ADMIN_, T.ACCIDENTAL_CRYPTO_, A.NO_EVIL, A.NO_GENERAL_PURPOSE, A.PHYSICAL, A.TOE_NO_BYPASS, A.ONE_WCS_ADMIN, A.SYSLOG_SEP, A.SYSLOG_ADMIN, A.NO_GENERAL_, OE.AUDIT_PROTECTION, OE.AUDIT_REVIEW, OE.MANAGE, OE.NO_EVIL, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.PROTECT_MGMT_COMMS, OE.RESIDUAL_INFORMATION, OE.SELF_PROTECTION, OE.TIME_STAMPS, OE.TOE_ACCESS, OE.TOE_NO_BYPASS, OE.ONE_WCS_ADMIN, OE.TOE
Security Assurance Requirements (SAR)
ACM_SCP.1, ACM_CAP.2, ACM_SCP, ACM_CAP.3, ADO_DEL, ADO_IGS.1, ADO_DEL.1, ADV_FSP.1, ADV_HLD.1, ADV_RCR, ADV_RCR.1, ADV_SPM.1, AGD_ADM, AGD_USR, AGD_ADM.1, AGD_USR.1, ALC_FLR.2, ATE_COV, ATE_FUN, ATE_IND.2, ATE_COV.1, ATE_FUN.1, ATE_HLD.1, AVA_MSU.1, AVA_MSU, AVA_SOF, AVA_VLA, AVA_SOF.1, AVA_VLA.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_GEN_EXP.1, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL.1, FAU_STG.1, FAU_STG.3, FAU_SAR.1.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_GEN_EXP.1.1, FAU_GEN_EXP.1.2, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FCS_BCM_EXP.1, FCS_CKM.1, FCS_CKM_EXP.2, FCS_CKM.4, FCS_COP.1, FCS_COP_EXP.1, FCS_COP_EXP.2, FCS_BCM_EXP.1.1, FCS_BCM_EXP.1.2, FCS_BCM_EXP.1.3, FCS_CKM.1.1, FCS_CKM_EXP.2.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_COP_EXP.1.1, FCS_COP_EXP.2.1, FCS_CKM.2, FDP_PUD_EXP.1, FDP_RIP.1, FDP_PUD_EXP.1.1, FDP_RIP.1.1, FDP_PUD_EXP, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_IFC.1, FDP_PUP_EXP.1, FIA_AFL.1, FIA_ATD.1, FIA_UAU.1, FIA_UAU_EXP.5, FIA_UID.2, FIA_USB.1, FIA_UAU.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU_EXP.5.1, FIA_UAU_EXP.5.2, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UID.1, FIA_UAU.2.1, FIA_UAU, FMT_MOF.1, FMT_MSA.2, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_REV.1, FMT_MOF.1.1, FMT_MSA.2.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF, FMT_MSA, FMT_MSA.1, FPT_ITT.1, FPT_RVM.1, FPT_SEP.1, FPT_STM_EXP.1, FPT_TST_EXP.1, FPT_TST_EXP.2, FPT_STM.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_STM_EXP.1.1, FPT_TST_EXP.1.1, FPT_TST_EXP.1.2, FPT_TST_EXP.1.3, FPT_TST_EXP.2.1, FPT_TST_EXP.2.2, FPT_STM.1.1, FPT_TST_EXP, FPT_TST, FTA_SSL.3, FTA_TAB.1, FTA_SSL.3.1, FTA_TAB.1.1, FTA_TAB, FTP_ITC_EXP.1, FTP_TRP.1, FTP_ITC_EXP.1.1, FTP_ITC_EXP.1.2, FTP_ITC_EXP.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3

Standards
FIPS 140-2, FIPS 140-1, FIPS 140, FIPS 46-3, FIPS 180-2, FIPS PUB 140-2, FIPS PUB 46-3, FIPS PUB 180-2, SP 800-56, RFC 2716, RFC 2246, RFC 2284, x.509, X.509, CCMB-2005-08-001, CCMB-2005-08-003, CCMB-2005-08-004

File metadata

Title WLAN_ST.fm
Author lholmqui
Creation date D:20090526110050-04'00'
Modification date D:20090526110251-04'00'
Pages 112
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 9.0.0 (Windows)

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

CCEVS-VR-VID-10324-2009

Extracted SARs

ADV_FSP.1, ADV_HLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.2, ATE_COV.1, ATE_FUN.1, ATE_HLD.1, ATE_IND.2, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2003-1001
C N
MEDIUM 5.0 2.9 05.01.2004
CVE-2003-1002
C N
MEDIUM 5.0 2.9 05.01.2004
CVE-2005-4258
C N
HIGH 7.8 6.9 15.12.2005
CVE-2007-1258
C N
MEDIUM 6.1 6.9 03.03.2007
CVE-2007-2038
C N
MEDIUM 6.1 6.9 16.04.2007
CVE-2007-2041
C N
MEDIUM 4.0 4.9 16.04.2007
CVE-2007-5134
C N
MEDIUM 5.0 2.9 27.09.2007
CVE-2013-1235
C N
MEDIUM 5.0 2.9 04.05.2013
Showing 5 out of 8.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": null,
  "dgst": "c46fedfa2cf2d8a1",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-VID-10324-2009",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:h:cisco:1240:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:cisco:4400_wireless_lan_controller:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:cisco:catalyst_6500:-:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "eal": "EAL2+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_HLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4400",
        "2710",
        "6500",
        "1240",
        "1130",
        "1230"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2003-1001",
        "CVE-2007-5134",
        "CVE-2007-2038",
        "CVE-2013-1235",
        "CVE-2003-1002",
        "CVE-2005-4258",
        "CVE-2007-1258",
        "CVE-2007-2041"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Cisco Systems, Inc.",
  "manufacturer_web": "https://www.cisco.com",
  "name": "Cisco Unified Wireless Network Solution composed of the following components: Cisco Aironet 1130, 1230, and 1240 AG Series Access Points; Cisco 4400 Series Wireless LAN Controllers; Cisco Catalyst 6500 Series Wireless Integrated Services Module (WiSM); Cisco Wireless Control System (WCS); Cisco Secure Access Control Server (ACS); Cisco 2710 Wireless Location",
  "not_valid_after": "2012-07-20",
  "not_valid_before": "2009-03-25",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "st_vid10324-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-VID10324-2009",
        "cert_item": "Cisco Systems, Inc., 170 West Tasman Dr., San Jose, CA 95134 Cisco Unified Wireless Network \u0026 Wireless Intrusion Detection System",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID10324-2009": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_SCP.1": 5
        },
        "ALC": {
          "ALC_FLR.2": 5
        },
        "AVA": {
          "AVA_MSU.1": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 8,
          "EAL 2 augmented": 4,
          "EAL 4": 1,
          "EAL2": 2,
          "EAL2 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 59,
          "Cisco Systems": 2,
          "Cisco Systems, Inc": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "root",
      "/CreationDate": "D:20090410185059",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20090410185059",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Title": "Validation Report for WLAN",
      "pdf_file_size_bytes": 345953,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 20
    },
    "st_filename": "st_vid10324-st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.NO_EVIL": 2,
          "A.NO_GENERAL_": 1,
          "A.NO_GENERAL_PURPOSE": 1,
          "A.ONE_WCS_ADMIN": 3,
          "A.PHYSICAL": 2,
          "A.SYSLOG_ADMIN": 3,
          "A.SYSLOG_SEP": 5,
          "A.TOE_NO_BYPASS": 2
        },
        "O": {
          "O.ADMIN_GUIDANCE": 9,
          "O.AUDIT_GENERATION": 3,
          "O.CONFIGURATION_": 1,
          "O.CONFIGURATION_IDENTIFICATION": 8,
          "O.CORRECT_": 1,
          "O.CORRECT_TSF_": 1,
          "O.CORRECT_TSF_OPERATION": 1,
          "O.CRYPTOGRAPHY": 10,
          "O.CRYPTOGRAPHY_": 1,
          "O.CRYPTOGRAPHY_VALIDATED": 4,
          "O.DISPLAY_BANNER": 8,
          "O.DOCUMENTED_": 1,
          "O.DOCUMENTED_DESIGN": 3,
          "O.FUNCTIONAL_TESTING": 1,
          "O.IDS_AUDIT_": 1,
          "O.IDS_AUDIT_GENERATION": 10,
          "O.MANAGE": 7,
          "O.MEDIATE": 10,
          "O.PARTIAL_": 1,
          "O.PARTIAL_FUNCTIONAL_TESTING": 3,
          "O.RESIDUAL_": 1,
          "O.RESIDUAL_INFORMATION": 10,
          "O.SELF_PROTECTION": 5,
          "O.TIME_STAMPS": 8,
          "O.TOE": 1,
          "O.TOE_ACCESS": 6,
          "O.VULNERABILITY_": 1,
          "O.VULNERABILITY_ANALYSIS": 7,
          "O.VULNERABILITY_ANALYSIS_TEST": 3
        },
        "OE": {
          "OE.AUDIT_PROTECTION": 6,
          "OE.AUDIT_REVIEW": 3,
          "OE.MANAGE": 8,
          "OE.NO_EVIL": 5,
          "OE.NO_GENERAL_PURPOSE": 5,
          "OE.ONE_WCS_ADMIN": 5,
          "OE.PHYSICAL": 2,
          "OE.PROTECT_MGMT_COMMS": 7,
          "OE.RESIDUAL_INFORMATION": 5,
          "OE.SELF_PROTECTION": 8,
          "OE.TIME_STAMPS": 4,
          "OE.TOE": 1,
          "OE.TOE_ACCESS": 7,
          "OE.TOE_NO_BYPASS": 6
        },
        "T": {
          "T.ACCIDENTAL_": 3,
          "T.ACCIDENTAL_ADMIN_": 1,
          "T.ACCIDENTAL_ADMIN_ERROR": 1,
          "T.ACCIDENTAL_CRYPTO_": 1,
          "T.MASQUERADE": 1,
          "T.POOR_": 1,
          "T.POOR_DESIGN": 1,
          "T.POOR_IMPLEMENTATION": 2,
          "T.POOR_TEST": 3,
          "T.RESIDUAL_DATA": 3,
          "T.TSF_COMPROMISE": 3,
          "T.UNATTENDED_": 2,
          "T.UNATTENDED_SESSION": 1,
          "T.UNAUTHORIZED_": 2,
          "T.UNAUTHORIZED_ACCESS": 1,
          "T.UNAUTH_ADMIN_": 1,
          "T.UNAUTH_ADMIN_ACCESS": 2,
          "T.UNIDENTIFIED_": 4
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_CAP.2": 5,
          "ACM_CAP.3": 1,
          "ACM_SCP": 1,
          "ACM_SCP.1": 9
        },
        "ADO": {
          "ADO_DEL": 2,
          "ADO_DEL.1": 3,
          "ADO_IGS.1": 6
        },
        "ADV": {
          "ADV_FSP.1": 13,
          "ADV_HLD.1": 6,
          "ADV_RCR": 3,
          "ADV_RCR.1": 6,
          "ADV_SPM.1": 3
        },
        "AGD": {
          "AGD_ADM": 2,
          "AGD_ADM.1": 9,
          "AGD_USR": 2,
          "AGD_USR.1": 6
        },
        "ALC": {
          "ALC_FLR.2": 9
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 4,
          "ATE_FUN": 1,
          "ATE_FUN.1": 6,
          "ATE_HLD.1": 1,
          "ATE_IND.2": 5
        },
        "AVA": {
          "AVA_MSU": 2,
          "AVA_MSU.1": 7,
          "AVA_SOF": 1,
          "AVA_SOF.1": 5,
          "AVA_VLA": 2,
          "AVA_VLA.1": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL2": 11,
          "EAL2 augmented": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 31,
          "FAU_GEN.1.1": 2,
          "FAU_GEN.1.2": 2,
          "FAU_GEN.2": 10,
          "FAU_GEN.2.1": 1,
          "FAU_GEN_EXP.1": 12,
          "FAU_GEN_EXP.1.1": 3,
          "FAU_GEN_EXP.1.2": 1,
          "FAU_SAR.1": 29,
          "FAU_SAR.1.1": 3,
          "FAU_SAR.1.2": 2,
          "FAU_SAR.2": 23,
          "FAU_SAR.2.1": 3,
          "FAU_SAR.3": 16,
          "FAU_SAR.3.1": 2,
          "FAU_SEL.1": 11,
          "FAU_SEL.1.1": 3,
          "FAU_STG.1": 9,
          "FAU_STG.1.1": 2,
          "FAU_STG.1.2": 3,
          "FAU_STG.3": 8,
          "FAU_STG.3.1": 1
        },
        "FCS": {
          "FCS_BCM_EXP.1": 13,
          "FCS_BCM_EXP.1.1": 1,
          "FCS_BCM_EXP.1.2": 1,
          "FCS_BCM_EXP.1.3": 1,
          "FCS_CKM.1": 54,
          "FCS_CKM.1.1": 3,
          "FCS_CKM.2": 5,
          "FCS_CKM.4": 30,
          "FCS_CKM.4.1": 1,
          "FCS_CKM_EXP.2": 17,
          "FCS_CKM_EXP.2.1": 1,
          "FCS_COP.1": 31,
          "FCS_COP.1.1": 2,
          "FCS_COP_EXP.1": 16,
          "FCS_COP_EXP.1.1": 1,
          "FCS_COP_EXP.2": 22,
          "FCS_COP_EXP.2.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 2,
          "FDP_IFC.1": 2,
          "FDP_ITC.1": 6,
          "FDP_ITC.2": 2,
          "FDP_PUD_EXP": 1,
          "FDP_PUD_EXP.1": 12,
          "FDP_PUD_EXP.1.1": 2,
          "FDP_PUP_EXP.1": 1,
          "FDP_RIP.1": 20,
          "FDP_RIP.1.1": 2
        },
        "FIA": {
          "FIA_AFL.1": 21,
          "FIA_AFL.1.1": 2,
          "FIA_AFL.1.2": 2,
          "FIA_ATD.1": 29,
          "FIA_ATD.1.1": 3,
          "FIA_UAU": 6,
          "FIA_UAU.1": 12,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.2": 9,
          "FIA_UAU.2.1": 1,
          "FIA_UAU_EXP.5": 25,
          "FIA_UAU_EXP.5.1": 2,
          "FIA_UAU_EXP.5.2": 2,
          "FIA_UID.1": 11,
          "FIA_UID.2": 29,
          "FIA_UID.2.1": 2,
          "FIA_USB.1": 22,
          "FIA_USB.1.1": 2,
          "FIA_USB.1.2": 2,
          "FIA_USB.1.3": 2
        },
        "FMT": {
          "FMT_MOF": 6,
          "FMT_MOF.1": 34,
          "FMT_MOF.1.1": 4,
          "FMT_MSA": 1,
          "FMT_MSA.1": 2,
          "FMT_MSA.2": 29,
          "FMT_MSA.2.1": 1,
          "FMT_MTD.1": 39,
          "FMT_MTD.1.1": 4,
          "FMT_REV.1": 1,
          "FMT_SMF.1": 38,
          "FMT_SMF.1.1": 3,
          "FMT_SMR.1": 30,
          "FMT_SMR.1.1": 2,
          "FMT_SMR.1.2": 2
        },
        "FPT": {
          "FPT_ITT.1": 13,
          "FPT_RVM.1": 18,
          "FPT_RVM.1.1": 2,
          "FPT_SEP.1": 18,
          "FPT_SEP.1.1": 2,
          "FPT_SEP.1.2": 2,
          "FPT_STM.1": 11,
          "FPT_STM.1.1": 1,
          "FPT_STM_EXP.1": 15,
          "FPT_STM_EXP.1.1": 1,
          "FPT_TST": 3,
          "FPT_TST_EXP": 1,
          "FPT_TST_EXP.1": 10,
          "FPT_TST_EXP.1.1": 1,
          "FPT_TST_EXP.1.2": 1,
          "FPT_TST_EXP.1.3": 1,
          "FPT_TST_EXP.2": 12,
          "FPT_TST_EXP.2.1": 1,
          "FPT_TST_EXP.2.2": 1
        },
        "FTA": {
          "FTA_SSL.3": 11,
          "FTA_SSL.3.1": 1,
          "FTA_TAB": 1,
          "FTA_TAB.1": 10,
          "FTA_TAB.1.1": 1
        },
        "FTP": {
          "FTP_ITC_EXP.1": 22,
          "FTP_ITC_EXP.1.1": 2,
          "FTP_ITC_EXP.1.2": 2,
          "FTP_ITC_EXP.1.3": 2,
          "FTP_TRP.1": 11,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CCM": {
          "CCM": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 2
        },
        "TLS": {
          "SSL": {
            "SSL": 2
          },
          "TLS": {
            "TLS": 6
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 8
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2005-08-001": 1,
          "CCMB-2005-08-003": 1,
          "CCMB-2005-08-004": 1
        },
        "FIPS": {
          "FIPS 140": 3,
          "FIPS 140-1": 1,
          "FIPS 140-2": 21,
          "FIPS 180-2": 1,
          "FIPS 46-3": 1,
          "FIPS PUB 140-2": 6,
          "FIPS PUB 180-2": 2,
          "FIPS PUB 46-3": 2
        },
        "NIST": {
          "SP 800-56": 1
        },
        "RFC": {
          "RFC 2246": 1,
          "RFC 2284": 1,
          "RFC 2716": 1
        },
        "X509": {
          "X.509": 1,
          "x.509": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 20
          }
        },
        "DES": {
          "DES": {
            "DES": 5
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 3
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 267,
          "Cisco Systems": 3,
          "Cisco Systems, Inc": 5
        },
        "Microsoft": {
          "Microsoft": 2
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "lholmqui",
      "/CreationDate": "D:20090526110050-04\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20090526110251-04\u002700\u0027",
      "/Producer": "Acrobat Distiller 9.0.0 (Windows)",
      "/Title": "WLAN_ST.fm",
      "pdf_file_size_bytes": 672856,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 112
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10324-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.2",
      "AVA_MSU.1",
      "ACM_SCP.1",
      "EAL2+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10324-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4508866f37d96c6c94fe881c1f45d94ffcea0638b980a1fb239c81cc1d68d4af",
      "txt_hash": "2652b2cfe7d08f0ea74d1c62913b10189bac52da556a97a174f4a1a2aec36dbc"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "5e18314016b8d7f84839b85e748f10af48d8521d4a0a667a8fb1544649e4b044",
      "txt_hash": "98b277bce829562639d8623d1dea69f041e370646979fa05392c7386dfe483e7"
    }
  },
  "status": "archived"
}