Splunk 4.1.7

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information

Status archived
Valid from 18.03.2011
Valid until 01.11.2014
Scheme 🇺🇸 US
Manufacturer Splunk, Inc.
Category Other Devices and Systems
Security level EAL2+, ALC_FLR.1

Heuristics summary

Certificate ID: CCEVS-VR-VID-10437-2011

Certificate

certificate file processing did not finish successfully.
Download pdf: ERROR
Convert pdf to text: ERROR
Extract keywords: ERROR

Certification report

Extracted keywords

Protocols
SSL
Libraries
OpenSSL

Security level
EAL2, EAL2 augmented
Security Assurance Requirements (SAR)
AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Certificates
CCEVS-VR-VID10437-2011
Evaluation facilities
Booz Allen Hamilton

Standards
X.509

File metadata

Creation date D:20110408105650
Modification date D:20110408105650
Pages 18
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

Frontpage

Certificate ID CCEVS-VR-VID10437-2011
Certified item Splunk 4.1.7
Certification lab US NIAP

Security target

Extracted keywords

Symmetric Algorithms
AES
Hash functions
SHA1, SHA256
Protocols
SSL
Libraries
OpenSSL

Security level
EAL2, EAL2 augmented
Claims
O.ACCESS, O.ALERT, O.AUDIT, O.AUTH, O.EAVESDROPPING, O.INDEX, O.MANAGE, O.ROBUST_ADMIN_GUIDANCE, O.SELF_PROTECTION, O.ROBUST_ADMIN_GUIDA, O.ROBUST_ADMIN_GUID, T.ACCESS, T.ADMIN_ERROR, T.AUDIT_COMPROMISE, T.EAVESDROPPING, T.INTERFACE_ABUSE, T.MASK, T.MISUSE, T.STEALTH, T.CONFIG_ERROR, A.ADMIN, A.NOEVIL, A.PATCHES, A.FILESYS, A.SECURE, A.LOCATE, OE.ADMIN, OE.AUDIT, OE.FILESYS, OE.LOCATE, OE.NOEVIL, OE.SECURE, OE.SYSTIME
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.1, ALC_DVS.1, ALC_FLR.2, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN_EXT.1, FAU_SAR_EXT.1, FAU_SAR_EXT.2, FAU_SAR_EXT.3, FAU_STG_EXT.2, FAU_STG_EXT.3, FAU_STG_EXT.4, FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_STG.2, FAU_STG.3, FAU_STG.4, FAU_EXT, FAU_GEN_EXT.1.1, FAU_GEN_EXT.1.2, FAU_SAR_EXT.1.1, FAU_SAR_EXT.1.2, FAU_SAR_EXT.2.1, FAU_SAR_EXT.3.1, FAU_STG_EXT.2.1, FAU_STG_EXT.2.2, FAU_STG_EXT.2.3, FAU_STG_EXT.3.1, FAU_STG_EXT.4.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_STG.1, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FAU_STG.3.1, FAU_STG.4.1, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.4.1, FCS_COP.1.1, FDP_ACC.1, FDP_ACF.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FIA_ATD.1, FIA_UAU.2, FIA_UAU.5, FIA_UAU.6, FIA_UID.2, FIA_USB.1, FIA_UID.1, FIA_ATD.1.1, FIA_UAU.1, FIA_UAU.2.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6.1, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_REV.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_FLS.1, FPT_ITC.1, FPT_ITI.1, FPT_ITT.1, FPT_STM.1, FPT_FLS.1.1, FPT_ITC.1.1, FPT_ITI.1.1, FPT_ITI.1.2, FPT_ITT.1.1, FRU_FLT.1, FRU_FLT.1.1, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3
Evaluation facilities
Booz Allen Hamilton

Standards
RFC 3565, X.509, CCMB-2009-07-004

File metadata

Creation date D:20110408105853
Modification date D:20110408105853
Pages 94
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

Heuristics

Certificate ID: CCEVS-VR-VID-10437-2011

Extracted SARs

ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2010-2502
C M N
HIGH 7.5 8.5 28.06.2010 18:30
CVE-2010-2503
C M N
MEDIUM 4.3 2.9 28.06.2010 18:30
CVE-2010-2504
C M N
MEDIUM 6.0 6.4 28.06.2010 18:30
CVE-2010-3322
C M N
HIGH 8.8 5.9 14.09.2010 17:00
CVE-2010-3323
C M N
MEDIUM 4.6 6.4 14.09.2010 17:00
CVE-2011-4643
C M N
MEDIUM 4.0 2.9 03.01.2012 11:55
CVE-2011-4644
C M N
HIGH 9.3 10.0 03.01.2012 11:55
CVE-2012-1908
C M N
MEDIUM 4.3 2.9 17.08.2012 00:55
CVE-2013-6771
C M N
HIGH 9.3 10.0 07.08.2014 11:13
CVE-2013-6772
C M N
MEDIUM 4.3 1.4 23.01.2020 15:15
CVE-2013-6870
C M N
MEDIUM 4.3 2.9 25.11.2013 19:55
CVE-2013-7394
C M N
HIGH 9.0 10.0 07.08.2014 11:13
CVE-2014-2578
C M N
MEDIUM 4.3 2.9 02.04.2014 16:06
CVE-2014-3147
C M N
LOW 3.5 2.9 10.10.2014 01:55
CVE-2018-11409
C M N
MEDIUM 5.3 1.4 08.06.2018 12:29
Showing 5 out of 15.

References

No references are available for this certificate.

Updates

  • 12.05.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 10.02.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Splunk 4.1.7', 'id': 'CCEVS-VR-VID10437', 'url': 'https://www.niap-ccevs.org/product/10437', 'certification_date': '2011-03-18', 'expiration_date': '2014-11-01', 'category': 'Enterprise Security Management', 'vendor': 'Splunk, Inc.', 'evaluation_facility': 'Booz Allen Hamilton Common Criteria Testing Laboratory', 'scheme': 'US'}.
  • 05.02.2025 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The st property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The cert property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.

    The computed heuristics were updated.

    • The following values were inserted: {'protection_profiles': None, 'eal': 'EAL2+'}.
    • The prev_certificates property was set to None.
    • The next_certificates property was set to None.
    • The scheme_data property was set to None.
  • 06.01.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Splunk 4.1.7', 'id': 'CCEVS-VR-VID10437', 'url': 'https://www.niap-ccevs.org/product/10437', 'certification_date': '2011-03-18', 'expiration_date': '2014-11-01', 'category': 'Enterprise Security Management', 'vendor': 'Splunk, Inc.', 'evaluation_facility': 'Booz Allen Hamilton Common Criteria Testing Laboratory', 'scheme': 'US'}.
  • 30.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 16.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Splunk 4.1.7', 'id': 'CCEVS-VR-VID10437', 'url': 'https://www.niap-ccevs.org/product/10437', 'certification_date': '2011-03-18', 'expiration_date': '2014-11-01', 'category': 'Enterprise Security Management', 'vendor': 'Splunk, Inc.', 'evaluation_facility': 'Booz Allen Hamilton Common Criteria Testing Laboratory', 'scheme': 'US'}.
  • 09.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '2011-03-18', 'expiration_date': '2014-11-01'} data.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2013-6772', 'CVE-2018-11409', 'CVE-2010-3322']} values added.
  • 30.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2013-6772', 'CVE-2018-11409', 'CVE-2010-3322']} values discarded.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4f1fd5af8f01d5b5d4f605d78bde0309fb80b401a4b93a2d732854d2dc70db6f', 'txt_hash': 'dcf71960cb93599955ae72502356590a53d228084a909030f491111836b680ca'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '24a5b3acbabf5a13e9d23ddfca211ecf37d73aca78e5f62c15b3380bc6000fe2', 'txt_hash': 'e754eb7d317e1d677b42dcda67d37ea055910b056f01dc7d9695fd1944c55ddd'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 325924, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/Producer': 'Microsoft® Office Word 2007', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20110408105650', '/ModDate': 'D:20110408105650', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 992043, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 94, '/Producer': 'Microsoft® Office Word 2007', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20110408105853', '/ModDate': 'D:20110408105853', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'US': {'cert_id': 'CCEVS-VR-VID10437-2011', 'cert_item': 'Splunk 4.1.7', 'cert_lab': 'US NIAP'}}.
    • The report_keywords property was set to {'cc_cert_id': {'US': {'CCEVS-VR-VID10437-2011': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 4, 'EAL2 augmented': 1}}, 'cc_sar': {'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 3}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'BoozAllenHamilton': {'Booz Allen Hamilton': 3}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 7}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 6}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'X509': {'X.509': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 10, 'EAL2 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 12, 'ADV_FSP.2': 13, 'ADV_TDS.1': 13}, 'AGD': {'AGD_OPE.1': 14, 'AGD_PRE.1': 8}, 'ALC': {'ALC_CMC.2': 10, 'ALC_CMS.2': 8, 'ALC_DEL.1': 7, 'ALC_FLR.1': 15, 'ALC_DVS.1': 1, 'ALC_FLR.2': 1}, 'ATE': {'ATE_COV.1': 6, 'ATE_FUN.1': 10, 'ATE_IND.2': 9}, 'AVA': {'AVA_VAN.2': 9}, 'ASE': {'ASE_CCL.1': 13, 'ASE_ECD.1': 12, 'ASE_INT.1': 14, 'ASE_OBJ.2': 12, 'ASE_REQ.2': 15, 'ASE_SPD.1': 9, 'ASE_TSS.1': 7}}, 'cc_sfr': {'FAU': {'FAU_GEN_EXT.1': 20, 'FAU_SAR_EXT.1': 17, 'FAU_SAR_EXT.2': 11, 'FAU_SAR_EXT.3': 11, 'FAU_STG_EXT.2': 14, 'FAU_STG_EXT.3': 14, 'FAU_STG_EXT.4': 14, 'FAU_GEN.1': 15, 'FAU_GEN.2': 9, 'FAU_SAR.1': 12, 'FAU_SAR.2': 10, 'FAU_SAR.3': 10, 'FAU_STG.2': 11, 'FAU_STG.3': 11, 'FAU_STG.4': 9, 'FAU_EXT': 1, 'FAU_GEN_EXT.1.1': 2, 'FAU_GEN_EXT.1.2': 2, 'FAU_SAR_EXT.1.1': 2, 'FAU_SAR_EXT.1.2': 2, 'FAU_SAR_EXT.2.1': 2, 'FAU_SAR_EXT.3.1': 2, 'FAU_STG_EXT.2.1': 2, 'FAU_STG_EXT.2.2': 2, 'FAU_STG_EXT.2.3': 2, 'FAU_STG_EXT.3.1': 2, 'FAU_STG_EXT.4.1': 2, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1, 'FAU_STG.1': 2, 'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1, 'FAU_STG.3.1': 1, 'FAU_STG.4.1': 1}, 'FCS': {'FCS_CKM.1': 16, 'FCS_CKM.4': 14, 'FCS_COP.1': 17, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ACC.1': 14, 'FDP_ACF.1': 12, 'FDP_ITC.1': 4, 'FDP_ITC.2': 4, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 1}, 'FIA': {'FIA_ATD.1': 12, 'FIA_UAU.2': 10, 'FIA_UAU.5': 9, 'FIA_UAU.6': 9, 'FIA_UID.2': 11, 'FIA_USB.1': 12, 'FIA_UID.1': 5, 'FIA_ATD.1.1': 1, 'FIA_UAU.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6.1': 1, 'FIA_UID.2.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_MOF.1': 10, 'FMT_MSA.1': 11, 'FMT_MSA.3': 12, 'FMT_MTD.1': 10, 'FMT_REV.1': 10, 'FMT_SMF.1': 13, 'FMT_SMR.1': 16, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_REV.1.1': 1, 'FMT_REV.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FLS.1': 11, 'FPT_ITC.1': 9, 'FPT_ITI.1': 9, 'FPT_ITT.1': 9, 'FPT_STM.1': 5, 'FPT_FLS.1.1': 1, 'FPT_ITC.1.1': 1, 'FPT_ITI.1.1': 1, 'FPT_ITI.1.2': 1, 'FPT_ITT.1.1': 1}, 'FRU': {'FRU_FLT.1': 10, 'FRU_FLT.1.1': 1}, 'FTP': {'FTP_TRP.1': 9, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.ACCESS': 8, 'O.ALERT': 6, 'O.AUDIT': 8, 'O.AUTH': 6, 'O.EAVESDROPPING': 4, 'O.INDEX': 4, 'O.MANAGE': 6, 'O.ROBUST_ADMIN_GUIDANCE': 2, 'O.SELF_PROTECTION': 6, 'O.ROBUST_ADMIN_GUIDA': 1, 'O.ROBUST_ADMIN_GUID': 1}, 'T': {'T.ACCESS': 5, 'T.ADMIN_ERROR': 3, 'T.AUDIT_COMPROMISE': 7, 'T.EAVESDROPPING': 3, 'T.INTERFACE_ABUSE': 3, 'T.MASK': 4, 'T.MISUSE': 3, 'T.STEALTH': 7, 'T.CONFIG_ERROR': 1}, 'A': {'A.ADMIN': 2, 'A.NOEVIL': 3, 'A.PATCHES': 2, 'A.FILESYS': 3, 'A.SECURE': 3, 'A.LOCATE': 3}, 'OE': {'OE.ADMIN': 5, 'OE.AUDIT': 5, 'OE.FILESYS': 3, 'OE.LOCATE': 3, 'OE.NOEVIL': 3, 'OE.SECURE': 3, 'OE.SYSTIME': 7}}, 'vendor': {}, 'eval_facility': {'BoozAllenHamilton': {'Booz Allen Hamilton': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 4}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 7}, 'SHA2': {'SHA256': 3}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 15}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 19}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'RFC': {'RFC 3565': 2}, 'X509': {'X.509': 5}, 'CC': {'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to st_vid10437-vr.pdf.
    • The st_filename property was set to st_vid10437-st.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['US'].
    • The cert_id property was set to CCEVS-VR-VID-10437-2011.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10437-vr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10437-st.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Splunk 4.1.7 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": null,
  "dgst": "dcc005a720906b97",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-VID-10437-2011",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:a:splunk:splunk:4.1.7:*:*:*:*:*:*:*",
        "cpe:2.3:a:splunk:splunk:4.1:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "eal": "EAL2+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.1.7"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2013-6870",
        "CVE-2010-3323",
        "CVE-2010-3322",
        "CVE-2018-11409",
        "CVE-2011-4644",
        "CVE-2010-2502",
        "CVE-2013-6771",
        "CVE-2014-3147",
        "CVE-2012-1908",
        "CVE-2014-2578",
        "CVE-2010-2503",
        "CVE-2013-7394",
        "CVE-2013-6772",
        "CVE-2010-2504",
        "CVE-2011-4643"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Splunk, Inc.",
  "manufacturer_web": "https://www.splunk.com/",
  "name": "Splunk 4.1.7",
  "not_valid_after": "2014-11-01",
  "not_valid_before": "2011-03-18",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "st_vid10437-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-VID10437-2011",
        "cert_item": "Splunk 4.1.7",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID10437-2011": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_FLR.1": 3
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 4,
          "EAL2 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 6
        }
      },
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 7
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BoozAllenHamilton": {
          "Booz Allen Hamilton": 3
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "X509": {
          "X.509": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20110408105650",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20110408105650",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "pdf_file_size_bytes": 325924,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 18
    },
    "st_filename": "st_vid10437-st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ADMIN": 2,
          "A.FILESYS": 3,
          "A.LOCATE": 3,
          "A.NOEVIL": 3,
          "A.PATCHES": 2,
          "A.SECURE": 3
        },
        "O": {
          "O.ACCESS": 8,
          "O.ALERT": 6,
          "O.AUDIT": 8,
          "O.AUTH": 6,
          "O.EAVESDROPPING": 4,
          "O.INDEX": 4,
          "O.MANAGE": 6,
          "O.ROBUST_ADMIN_GUID": 1,
          "O.ROBUST_ADMIN_GUIDA": 1,
          "O.ROBUST_ADMIN_GUIDANCE": 2,
          "O.SELF_PROTECTION": 6
        },
        "OE": {
          "OE.ADMIN": 5,
          "OE.AUDIT": 5,
          "OE.FILESYS": 3,
          "OE.LOCATE": 3,
          "OE.NOEVIL": 3,
          "OE.SECURE": 3,
          "OE.SYSTIME": 7
        },
        "T": {
          "T.ACCESS": 5,
          "T.ADMIN_ERROR": 3,
          "T.AUDIT_COMPROMISE": 7,
          "T.CONFIG_ERROR": 1,
          "T.EAVESDROPPING": 3,
          "T.INTERFACE_ABUSE": 3,
          "T.MASK": 4,
          "T.MISUSE": 3,
          "T.STEALTH": 7
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 12,
          "ADV_FSP.2": 13,
          "ADV_TDS.1": 13
        },
        "AGD": {
          "AGD_OPE.1": 14,
          "AGD_PRE.1": 8
        },
        "ALC": {
          "ALC_CMC.2": 10,
          "ALC_CMS.2": 8,
          "ALC_DEL.1": 7,
          "ALC_DVS.1": 1,
          "ALC_FLR.1": 15,
          "ALC_FLR.2": 1
        },
        "ASE": {
          "ASE_CCL.1": 13,
          "ASE_ECD.1": 12,
          "ASE_INT.1": 14,
          "ASE_OBJ.2": 12,
          "ASE_REQ.2": 15,
          "ASE_SPD.1": 9,
          "ASE_TSS.1": 7
        },
        "ATE": {
          "ATE_COV.1": 6,
          "ATE_FUN.1": 10,
          "ATE_IND.2": 9
        },
        "AVA": {
          "AVA_VAN.2": 9
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 10,
          "EAL2 augmented": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_EXT": 1,
          "FAU_GEN.1": 15,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 9,
          "FAU_GEN.2.1": 1,
          "FAU_GEN_EXT.1": 20,
          "FAU_GEN_EXT.1.1": 2,
          "FAU_GEN_EXT.1.2": 2,
          "FAU_SAR.1": 12,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 10,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3": 10,
          "FAU_SAR.3.1": 1,
          "FAU_SAR_EXT.1": 17,
          "FAU_SAR_EXT.1.1": 2,
          "FAU_SAR_EXT.1.2": 2,
          "FAU_SAR_EXT.2": 11,
          "FAU_SAR_EXT.2.1": 2,
          "FAU_SAR_EXT.3": 11,
          "FAU_SAR_EXT.3.1": 2,
          "FAU_STG.1": 2,
          "FAU_STG.2": 11,
          "FAU_STG.2.1": 1,
          "FAU_STG.2.2": 1,
          "FAU_STG.2.3": 1,
          "FAU_STG.3": 11,
          "FAU_STG.3.1": 1,
          "FAU_STG.4": 9,
          "FAU_STG.4.1": 1,
          "FAU_STG_EXT.2": 14,
          "FAU_STG_EXT.2.1": 2,
          "FAU_STG_EXT.2.2": 2,
          "FAU_STG_EXT.2.3": 2,
          "FAU_STG_EXT.3": 14,
          "FAU_STG_EXT.3.1": 2,
          "FAU_STG_EXT.4": 14,
          "FAU_STG_EXT.4.1": 2
        },
        "FCS": {
          "FCS_CKM.1": 16,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 1,
          "FCS_CKM.4": 14,
          "FCS_CKM.4.1": 1,
          "FCS_COP.1": 17,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 14,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 12,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 1,
          "FDP_ITC.1": 4,
          "FDP_ITC.2": 4
        },
        "FIA": {
          "FIA_ATD.1": 12,
          "FIA_ATD.1.1": 1,
          "FIA_UAU.1": 1,
          "FIA_UAU.2": 10,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.5": 9,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 9,
          "FIA_UAU.6.1": 1,
          "FIA_UID.1": 5,
          "FIA_UID.2": 11,
          "FIA_UID.2.1": 1,
          "FIA_USB.1": 12,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MOF.1": 10,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 11,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 12,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 10,
          "FMT_MTD.1.1": 1,
          "FMT_REV.1": 10,
          "FMT_REV.1.1": 1,
          "FMT_REV.1.2": 1,
          "FMT_SMF.1": 13,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 16,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS.1": 11,
          "FPT_FLS.1.1": 1,
          "FPT_ITC.1": 9,
          "FPT_ITC.1.1": 1,
          "FPT_ITI.1": 9,
          "FPT_ITI.1.1": 1,
          "FPT_ITI.1.2": 1,
          "FPT_ITT.1": 9,
          "FPT_ITT.1.1": 1,
          "FPT_STM.1": 5
        },
        "FRU": {
          "FRU_FLT.1": 10,
          "FRU_FLT.1.1": 1
        },
        "FTP": {
          "FTP_TRP.1": 9,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 19
        }
      },
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 15
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BoozAllenHamilton": {
          "Booz Allen Hamilton": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA1": 7
          },
          "SHA2": {
            "SHA256": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2009-07-004": 1
        },
        "RFC": {
          "RFC 3565": 2
        },
        "X509": {
          "X.509": 5
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 4
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20110408105853",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20110408105853",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "pdf_file_size_bytes": 992043,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 94
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10437-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.1",
      "EAL2+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10437-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4f1fd5af8f01d5b5d4f605d78bde0309fb80b401a4b93a2d732854d2dc70db6f",
      "txt_hash": "dcf71960cb93599955ae72502356590a53d228084a909030f491111836b680ca"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "24a5b3acbabf5a13e9d23ddfca211ecf37d73aca78e5f62c15b3380bc6000fe2",
      "txt_hash": "e754eb7d317e1d677b42dcda67d37ea055910b056f01dc7d9695fd1944c55ddd"
    }
  },
  "status": "archived"
}