Sourcefire 3D System Version 5.2.0.1

CSV information ?

Status archived
Valid from 06.08.2014
Valid until 21.03.2016
Scheme 🇺🇸 US
Manufacturer Sourcefire Inc.
Category Detection Devices and Systems
Security level
Protection profiles

Heuristics summary ?

Certificate ID: CCEVS-VR-VID-10537-2014

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, HMAC-SHA-384, HMAC-SHA-512
Hash functions
SHA-1, SHA-224, SHA-384
Protocols
SSH
Randomness
RBG
Block cipher modes
CBC

Certificates
CCEVS-VR-VID10537-2014

Standards
FIPS PUB 197, FIPS PUB 186-2, FIPS PUB 180-3, FIPS PUB 198-1, FIPS PUB 140-2, NIST SP 800-38A

File metadata

Title
Author Robert Roland
Creation date D:20140807135046-04'00'
Modification date D:20140807135101-04'00'
Pages 20
Creator Acrobat PDFMaker 10.1 for Word
Producer Adobe PDF Library 10.0

Frontpage

Certificate ID CCEVS-VR-VID10537-2014
Certified item Sourcefire 3D System Version 5.2.0.1
Certification lab US NIAP

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512
Asymmetric Algorithms
Diffie-Hellman, DH
Hash functions
SHA-1, SHA-224, SHA-384, SHA-512, SHA-256
Schemes
Key Agreement, Key agreement
Protocols
SSH, TLS, TLS 1.0, VPN
Randomness
PRNG, RNG, RBG
Libraries
OpenSSL
Block cipher modes
CBC
TLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA

Claims
O.ADDRESS_FILTERING, O.PORT_FILTERING, O.RELATED_CONNECTION_FILTERING, O.STATEFUL_INSPECTION, O.DISPLAY_BANNER, O.PROTECTED_COMMUNICATIONS, O.RESIDUAL_INFORMATION_CLEARING, O.SESSION_LOCK, O.SYSTEM_MONITORING, O.TOE_ADMINISTRATION, O.TSF_SELF_TEST, O.VERIFIABLE_UPDATES, T.NETWORK_DISCLOSURE, T.NETWORK_MISUSE, T.NETWORK_DOS, T.NETWORK_ACCESS, T.ADMIN_ERROR, T.TSF_FAILURE, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_UPDATE, T.UNDETECTED_ACTIONS, T.USER_DATA_REUSE, A.CONNECTIONS, A.NO_GENERAL_PURPOSE, A.PHYSICAL, A.TRUSTED_ADMIN, OE.CONNECTIONS
Security Assurance Requirements (SAR)
ADV_FSP, ADV_FSP.1, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_CMC, ALC_CMS, ALC_CMC.1, ALC_CMS.1, ATE_IND, ATE_IND.1, AVA_VAN, AVA_VAN.1
Security Functional Requirements (SFR)
FAU_STG_EXT.1, FAU_GEN, FAU_STG_EXT, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FAU_STG_EXT.1.1, FCS_TLS_EXT.1.1, FCS_CKM_EXT.4, FCS_RBG_EXT.1, FCS_SSH_EXT.1, FCS_TLS_EXT.1, FCS_CKM, FCS_CKM_EXT, FCS_COP.1, FCS_RBG_EXT, FCS_SSH_EXT, FCS_TLS_EXT, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM_EXT.4.1, FCS_COP.1.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_SSH_EXT.1.1, FCS_SSH_EXT.1.2, FCS_SSH_EXT.1.3, FCS_SSH_EXT.1.4, FCS_SSH_EXT.1.5, FCS_SSH_EXT.1.6, FCS_SSH_EXT.1.7, FCS_CKM.2, FCS_CKM.4, FDP_RIP, FDP_RIP.2, FDP_RIP.2.1, FDP_ITC.1, FDP_ITC.2, FIA_PMG_EXT.1, FIA_UAU_EXT.2, FIA_UIA_EXT.1, FIA_PMG_EXT, FIA_UIA_EXT, FIA_UAU_EXT, FIA_UAU, FIA_UAU.7, FIA_PMG_EXT.1.1, FIA_UIA_EXT.1.1, FIA_UIA_EXT.1.2, FIA_UAU_EXT.2.1, FIA_UAU.7.1, FIA_UID.1, FIA_UID_EXT, FMT_MTD, FMT_SMF, FMT_SMR, FMT_SMF.1, FMT_MTD.1, FMT_SMR.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FPT_ITT.1, FPT_SKP_EXT.1, FPT_APW_EXT.1, FPT_TUD_EXT.1, FPT_TST_EXT.1, FPT_ITT, FPT_SKP_EXT, FPT_APW_EXT, FPT_STM, FPT_TUD_EXT, FPT_TST_EXT, FPT_STM.1, FPT_ITT.1.1, FPT_SKP_EXT.1.1, FPT_APW_EXT.1.1, FPT_APW_EXT.1.2, FPT_STM.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_TST_EXT.1.1, FPT_AWP_EXT, FTA_SSL_EXT.1, FTA_SSL_EXT, FTA_SSL, FTA_TAB, FTA_SSL.3, FTA_SSL.4, FTA_TAB.1, FTA_SSL_EXT.1.1, FTA_SSL.3.1, FTA_SSL.4.1, FTA_TAB.1.1, FTP_ITC, FTP_TRP, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3

Certification process
Out of Scope, out of scope, NTP Server SMTP Server Audit Server SNMP Server Network Assets Legend TOE Operational Environment Out of Scope … … Sourcefire 3D System Security Target 13 The TOE main subsystems are summarized as followed: •, in the update header to ensure they match. 12 This process requires access to the Internet and is out of scope of the evaluation. Sourcefire 3D System Security Target 61 During the update process, if the Snort

Standards
FIPS PUB 197, FIPS PUB 186-2, FIPS PUB 186-3, FIPS 140-2, FIPS PUB 180-3, FIPS PUB 198-1, FIPS PUB 140-2, FIPS 186-2, FIPS 186-3, NIST SP 800-38A, NIST SP 800-56B, SP 800-56B, SP 800-90, RFC 2818, RFC 4253, RFC 2246, RFC 792, RFC 4443, RFC 791, RFC 2460, RFC 793, RFC 768, RFC 959, RFC 5735, RFC 3513

File metadata

Title Sourcefire v5.2 Security Target
Author Sourcefire
Creation date D:20140807084734-04'00'
Modification date D:20140807084758-04'00'
Pages 80
Creator Acrobat PDFMaker 10.1 for Word
Producer Adobe PDF Library 10.0

Heuristics ?

Certificate ID: CCEVS-VR-VID-10537-2014

Extracted SARs

ADV_FSP.1, AGD_PRE.1, ALC_CMS.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, AGD_OPE.1

Similar certificates

Name Certificate ID
secunet konnektor 2.0.0 und 2.0.1, Version 5.50.1:2.0.0 und 5.50.1:2.0.1 BSI-DSZ-CC-1044-V7-2023 Compare
secunet konnektor 2.1.0, Version 5.0.5:2.1.0 BSI-DSZ-CC-1190-2022 Compare
secunet konnektor 2.1.0, Version 5.0.5:2.1.0 BSI-DSZ-CC-1128-V4-2022 Compare
HaltDos Mitigation Platform version 1.1 comprising of hdInspector version 1.0, hdDeviceUI version 2.0, hdDetectionService version 1.0 and hdCLI version 2.0. IC3S/BG01/HALTDOS/EAL2/0317/0008 Compare
secunet konnektor 2.1.0, Version 5.1.2:2.1.0 BSI-DSZ-CC-1202-2022 Compare
secunet konnektor 2.1.0, Version 5.1.2:2.1.0 BSI-DSZ-CC-1128-V5-2022 Compare
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6 BSI-DSZ-CC-0772-2014 Compare
Composite system comprised of ECI LightSoft Software Version 11.2 (build 04113) with fixes NSx1120_4113-100 10, NC1120_4113-100 10 EMS-APT Software Version 4.0 (build 20) with fixes BC0400-01 1, BC0400-02 1, BS0400-01 1, BS0400-02 1; NPT-1010 Software Version 4.0 (build 35); NPT-1020/1021 Software Version 4.0 (build 35); and NPT-1200 Software Version 4.0 (build 35) None Compare
NCR E10 New Generation FCR 2.0 (FCR Application Version 2.0, OpenSSL Version 1.0.2d Secure-IC firmware and hardware crypto library Version 0.0.6) 21.0.03/TSE-CCCS-48 Compare
Showing 5 out of 9.

Scheme data ?

Product Sourcefire 3D System Version 5.2.0.1
Id CCEVS-VR-VID10537
Url https://www.niap-ccevs.org/product/10537
Certification Date 2014-08-06T00:00:00Z
Expiration Date 2016-08-06T00:00:00Z
Category Firewall, Wireless Monitoring
Vendor Sourcefire, Inc.
Evaluation Facility COACT, Inc. Labs
Scheme US

References ?

No references are available for this certificate.

Updates ?

  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Network Devices', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_nd_v1.1.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_ND_V1.1']}}]}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2b46f0c9d4165e656ecb60c5679e9e1e9bf2c09bac1adbf5ab14e660f49fce8d', 'txt_hash': 'a102e36c448e5c4b1b121fcfcbfdc92b78dd0d1b27c5f3439de5a5d1df53bbbe'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ff7d9c51c64807446f33de76ebe642a9574ef181a07ac95a73ef9b5019b2dfa2', 'txt_hash': 'a324072ff212c3228de22433dfe42b49566441dd1675494a996d3eeca9588aa5'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 136944, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 20, '/Author': 'Robert Roland', '/Comments': '', '/Company': 'COACT', '/CreationDate': "D:20140807135046-04'00'", '/Creator': 'Acrobat PDFMaker 10.1 for Word', '/Keywords': '', '/ModDate': "D:20140807135101-04'00'", '/Producer': 'Adobe PDF Library 10.0', '/SourceModified': 'D:20140807175026', '/Subject': '', '/Title': ' ', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 747356, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 80, '/Author': 'Sourcefire', '/CRTarget': '4092', '/Company': 'Sourcefire, Inc', '/CreationDate': "D:20140807084734-04'00'", '/Creator': 'Acrobat PDFMaker 10.1 for Word', '/Keywords': '', '/ModDate': "D:20140807084758-04'00'", '/Producer': 'Adobe PDF Library 10.0', '/SourceModified': 'D:20140807124122', '/Subject': '', '/Title': 'Sourcefire v5.2 Security Target', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://support.sourcefire.com/', 'http://jitc.fhu.disa.mil/tssi/cert_pdfs/sourcefire_3d_ips_ids_aug12.pdf', 'https://www.icsalabs.com/technology-program/ipv6-/-usgv6/usgv6-tested-products']}}.
    • The report_frontpage property was set to {'US': {'cert_id': 'CCEVS-VR-VID10537-2014', 'cert_item': 'Sourcefire 3D System Version 5.2.0.1', 'cert_lab': 'US NIAP'}}.
    • The report_keywords property was set to {'cc_cert_id': {'US': {'CCEVS-VR-VID10537-2014': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}, 'constructions': {'MAC': {'HMAC-SHA-384': 1, 'HMAC-SHA-512': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-224': 2, 'SHA-384': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 2}}, 'randomness': {'RNG': {'RBG': 3}}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 1, 'FIPS PUB 186-2': 1, 'FIPS PUB 180-3': 1, 'FIPS PUB 198-1': 1, 'FIPS PUB 140-2': 1}, 'NIST': {'NIST SP 800-38A': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'ADV': {'ADV_FSP': 1, 'ADV_FSP.1': 16}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 15, 'AGD_PRE.1': 11}, 'ALC': {'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_CMC.1': 5, 'ALC_CMS.1': 6}, 'ATE': {'ATE_IND': 1, 'ATE_IND.1': 6}, 'AVA': {'AVA_VAN': 1, 'AVA_VAN.1': 7}}, 'cc_sfr': {'FAU': {'FAU_STG_EXT.1': 4, 'FAU_GEN': 11, 'FAU_STG_EXT': 5, 'FAU_GEN.1': 6, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2': 3, 'FAU_GEN.2.1': 1, 'FAU_STG_EXT.1.1': 1}, 'FCS': {'FCS_TLS_EXT.1.1': 2, 'FCS_CKM_EXT.4': 8, 'FCS_RBG_EXT.1': 4, 'FCS_SSH_EXT.1': 4, 'FCS_TLS_EXT.1': 6, 'FCS_CKM': 5, 'FCS_CKM_EXT': 5, 'FCS_COP.1': 33, 'FCS_RBG_EXT': 5, 'FCS_SSH_EXT': 5, 'FCS_TLS_EXT': 5, 'FCS_CKM.1': 9, 'FCS_CKM.1.1': 1, 'FCS_CKM_EXT.4.1': 1, 'FCS_COP.1.1': 4, 'FCS_RBG_EXT.1.1': 1, 'FCS_RBG_EXT.1.2': 1, 'FCS_SSH_EXT.1.1': 1, 'FCS_SSH_EXT.1.2': 1, 'FCS_SSH_EXT.1.3': 1, 'FCS_SSH_EXT.1.4': 1, 'FCS_SSH_EXT.1.5': 1, 'FCS_SSH_EXT.1.6': 1, 'FCS_SSH_EXT.1.7': 1, 'FCS_CKM.2': 1, 'FCS_CKM.4': 5}, 'FDP': {'FDP_RIP': 5, 'FDP_RIP.2': 3, 'FDP_RIP.2.1': 1, 'FDP_ITC.1': 5, 'FDP_ITC.2': 5}, 'FIA': {'FIA_PMG_EXT.1': 4, 'FIA_UAU_EXT.2': 4, 'FIA_UIA_EXT.1': 7, 'FIA_PMG_EXT': 5, 'FIA_UIA_EXT': 4, 'FIA_UAU_EXT': 5, 'FIA_UAU': 5, 'FIA_UAU.7': 3, 'FIA_PMG_EXT.1.1': 1, 'FIA_UIA_EXT.1.1': 1, 'FIA_UIA_EXT.1.2': 1, 'FIA_UAU_EXT.2.1': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1': 2, 'FIA_UID_EXT': 1}, 'FMT': {'FMT_MTD': 5, 'FMT_SMF': 6, 'FMT_SMR': 5, 'FMT_SMF.1': 5, 'FMT_MTD.1': 3, 'FMT_SMR.2': 3, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1}, 'FPT': {'FPT_ITT.1': 7, 'FPT_SKP_EXT.1': 4, 'FPT_APW_EXT.1': 4, 'FPT_TUD_EXT.1': 4, 'FPT_TST_EXT.1': 4, 'FPT_ITT': 5, 'FPT_SKP_EXT': 5, 'FPT_APW_EXT': 3, 'FPT_STM': 5, 'FPT_TUD_EXT': 5, 'FPT_TST_EXT': 5, 'FPT_STM.1': 4, 'FPT_ITT.1.1': 1, 'FPT_SKP_EXT.1.1': 1, 'FPT_APW_EXT.1.1': 1, 'FPT_APW_EXT.1.2': 1, 'FPT_STM.1.1': 1, 'FPT_TUD_EXT.1.1': 1, 'FPT_TUD_EXT.1.2': 1, 'FPT_TUD_EXT.1.3': 1, 'FPT_TST_EXT.1.1': 1, 'FPT_AWP_EXT': 2}, 'FTA': {'FTA_SSL_EXT.1': 4, 'FTA_SSL_EXT': 6, 'FTA_SSL': 12, 'FTA_TAB': 5, 'FTA_SSL.3': 3, 'FTA_SSL.4': 4, 'FTA_TAB.1': 4, 'FTA_SSL_EXT.1.1': 1, 'FTA_SSL.3.1': 1, 'FTA_SSL.4.1': 1, 'FTA_TAB.1.1': 1}, 'FTP': {'FTP_ITC': 5, 'FTP_TRP': 6, 'FTP_ITC.1': 3, 'FTP_TRP.1': 3, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.ADDRESS_FILTERING': 5, 'O.PORT_FILTERING': 5, 'O.RELATED_CONNECTION_FILTERING': 5, 'O.STATEFUL_INSPECTION': 5, 'O.DISPLAY_BANNER': 1, 'O.PROTECTED_COMMUNICATIONS': 1, 'O.RESIDUAL_INFORMATION_CLEARING': 1, 'O.SESSION_LOCK': 1, 'O.SYSTEM_MONITORING': 1, 'O.TOE_ADMINISTRATION': 1, 'O.TSF_SELF_TEST': 1, 'O.VERIFIABLE_UPDATES': 1}, 'T': {'T.NETWORK_DISCLOSURE': 2, 'T.NETWORK_MISUSE': 2, 'T.NETWORK_DOS': 4, 'T.NETWORK_ACCESS': 3, 'T.ADMIN_ERROR': 1, 'T.TSF_FAILURE': 1, 'T.UNAUTHORIZED_ACCESS': 1, 'T.UNAUTHORIZED_UPDATE': 1, 'T.UNDETECTED_ACTIONS': 1, 'T.USER_DATA_REUSE': 1}, 'A': {'A.CONNECTIONS': 4, 'A.NO_GENERAL_PURPOSE': 1, 'A.PHYSICAL': 1, 'A.TRUSTED_ADMIN': 1}, 'OE': {'OE.CONNECTIONS': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 13}}, 'DES': {'DES': {'DES': 1}, '3DES': {'3DES': 1}}, 'constructions': {'MAC': {'HMAC-SHA-256': 2, 'HMAC-SHA-384': 1, 'HMAC-SHA-512': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 1, 'DH': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-224': 4, 'SHA-384': 5, 'SHA-512': 12, 'SHA-256': 2}}}, 'crypto_scheme': {'KA': {'Key Agreement': 1, 'Key agreement': 1}}, 'crypto_protocol': {'SSH': {'SSH': 37}, 'TLS': {'TLS': {'TLS': 16, 'TLS 1.0': 1}}, 'VPN': {'VPN': 4}}, 'randomness': {'PRNG': {'PRNG': 3}, 'RNG': {'RNG': 4, 'RBG': 5}}, 'cipher_mode': {'CBC': {'CBC': 4}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_RSA_WITH_AES_128_CBC_SHA': 2, 'TLS_RSA_WITH_AES_256_CBC_SHA': 2, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA': 2, 'TLS_DHE_RSA_WITH_AES_128_CBC_SHA': 1}}, 'crypto_library': {'OpenSSL': {'OpenSSL': 4}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 2, 'FIPS PUB 186-2': 2, 'FIPS PUB 186-3': 1, 'FIPS 140-2': 4, 'FIPS PUB 180-3': 1, 'FIPS PUB 198-1': 1, 'FIPS PUB 140-2': 1, 'FIPS 186-2': 1, 'FIPS 186-3': 1}, 'NIST': {'NIST SP 800-38A': 2, 'NIST SP 800-56B': 1, 'SP 800-56B': 3, 'SP 800-90': 1}, 'RFC': {'RFC 2818': 2, 'RFC 4253': 1, 'RFC 2246': 2, 'RFC 792': 2, 'RFC 4443': 2, 'RFC 791': 2, 'RFC 2460': 2, 'RFC 793': 2, 'RFC 768': 2, 'RFC 959': 1, 'RFC 5735': 2, 'RFC 3513': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'Out of Scope': 1, 'out of scope': 1, 'NTP Server SMTP Server Audit Server SNMP Server Network Assets Legend TOE Operational Environment Out of Scope … … Sourcefire 3D System Security Target 13 The TOE main subsystems are summarized as followed: •': 1, 'in the update header to ensure they match. 12 This process requires access to the Internet and is out of scope of the evaluation. Sourcefire 3D System Security Target 61 During the update process, if the Snort': 1}}}.
    • The report_filename property was set to st_vid10537-vr.pdf.
    • The st_filename property was set to st_vid10537-st.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['US'].
    • The cert_id property was set to CCEVS-VR-VID-10537-2014.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10537-vr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10537-st.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Sourcefire 3D System Version 5.2.0.1 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Detection Devices and Systems",
  "cert_link": null,
  "dgst": "79f1b9da6ca5a71c",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-VID-10537-2014",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.2.0.1"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Firewall, Wireless Monitoring",
      "certification_date": "2014-08-06T00:00:00Z",
      "evaluation_facility": "COACT, Inc. Labs",
      "expiration_date": "2016-08-06T00:00:00Z",
      "id": "CCEVS-VR-VID10537",
      "product": "Sourcefire 3D System Version 5.2.0.1",
      "scheme": "US",
      "url": "https://www.niap-ccevs.org/product/10537",
      "vendor": "Sourcefire, Inc."
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Sourcefire Inc.",
  "manufacturer_web": "https://www.sourcefire.com/",
  "name": "Sourcefire 3D System Version 5.2.0.1",
  "not_valid_after": "2016-03-21",
  "not_valid_before": "2014-08-06",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "st_vid10537-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-VID10537-2014",
        "cert_item": "Sourcefire 3D System Version 5.2.0.1",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID10537-2014": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 2
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-224": 2,
            "SHA-384": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RBG": 3
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS PUB 140-2": 1,
          "FIPS PUB 180-3": 1,
          "FIPS PUB 186-2": 1,
          "FIPS PUB 197": 1,
          "FIPS PUB 198-1": 1
        },
        "NIST": {
          "NIST SP 800-38A": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 2
          }
        },
        "constructions": {
          "MAC": {
            "HMAC-SHA-384": 1,
            "HMAC-SHA-512": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Robert Roland",
      "/Comments": "",
      "/Company": "COACT",
      "/CreationDate": "D:20140807135046-04\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 10.1 for Word",
      "/Keywords": "",
      "/ModDate": "D:20140807135101-04\u002700\u0027",
      "/Producer": "Adobe PDF Library 10.0",
      "/SourceModified": "D:20140807175026",
      "/Subject": "",
      "/Title": " ",
      "pdf_file_size_bytes": 136944,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 20
    },
    "st_filename": "st_vid10537-st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 2,
            "Diffie-Hellman": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CONNECTIONS": 4,
          "A.NO_GENERAL_PURPOSE": 1,
          "A.PHYSICAL": 1,
          "A.TRUSTED_ADMIN": 1
        },
        "O": {
          "O.ADDRESS_FILTERING": 5,
          "O.DISPLAY_BANNER": 1,
          "O.PORT_FILTERING": 5,
          "O.PROTECTED_COMMUNICATIONS": 1,
          "O.RELATED_CONNECTION_FILTERING": 5,
          "O.RESIDUAL_INFORMATION_CLEARING": 1,
          "O.SESSION_LOCK": 1,
          "O.STATEFUL_INSPECTION": 5,
          "O.SYSTEM_MONITORING": 1,
          "O.TOE_ADMINISTRATION": 1,
          "O.TSF_SELF_TEST": 1,
          "O.VERIFIABLE_UPDATES": 1
        },
        "OE": {
          "OE.CONNECTIONS": 2
        },
        "T": {
          "T.ADMIN_ERROR": 1,
          "T.NETWORK_ACCESS": 3,
          "T.NETWORK_DISCLOSURE": 2,
          "T.NETWORK_DOS": 4,
          "T.NETWORK_MISUSE": 2,
          "T.TSF_FAILURE": 1,
          "T.UNAUTHORIZED_ACCESS": 1,
          "T.UNAUTHORIZED_UPDATE": 1,
          "T.UNDETECTED_ACTIONS": 1,
          "T.USER_DATA_REUSE": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP": 1,
          "ADV_FSP.1": 16
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 15,
          "AGD_PRE": 1,
          "AGD_PRE.1": 11
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.1": 5,
          "ALC_CMS": 1,
          "ALC_CMS.1": 6
        },
        "ATE": {
          "ATE_IND": 1,
          "ATE_IND.1": 6
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.1": 7
        }
      },
      "cc_security_level": {},
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 11,
          "FAU_GEN.1": 6,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 3,
          "FAU_GEN.2.1": 1,
          "FAU_STG_EXT": 5,
          "FAU_STG_EXT.1": 4,
          "FAU_STG_EXT.1.1": 1
        },
        "FCS": {
          "FCS_CKM": 5,
          "FCS_CKM.1": 9,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 1,
          "FCS_CKM.4": 5,
          "FCS_CKM_EXT": 5,
          "FCS_CKM_EXT.4": 8,
          "FCS_CKM_EXT.4.1": 1,
          "FCS_COP.1": 33,
          "FCS_COP.1.1": 4,
          "FCS_RBG_EXT": 5,
          "FCS_RBG_EXT.1": 4,
          "FCS_RBG_EXT.1.1": 1,
          "FCS_RBG_EXT.1.2": 1,
          "FCS_SSH_EXT": 5,
          "FCS_SSH_EXT.1": 4,
          "FCS_SSH_EXT.1.1": 1,
          "FCS_SSH_EXT.1.2": 1,
          "FCS_SSH_EXT.1.3": 1,
          "FCS_SSH_EXT.1.4": 1,
          "FCS_SSH_EXT.1.5": 1,
          "FCS_SSH_EXT.1.6": 1,
          "FCS_SSH_EXT.1.7": 1,
          "FCS_TLS_EXT": 5,
          "FCS_TLS_EXT.1": 6,
          "FCS_TLS_EXT.1.1": 2
        },
        "FDP": {
          "FDP_ITC.1": 5,
          "FDP_ITC.2": 5,
          "FDP_RIP": 5,
          "FDP_RIP.2": 3,
          "FDP_RIP.2.1": 1
        },
        "FIA": {
          "FIA_PMG_EXT": 5,
          "FIA_PMG_EXT.1": 4,
          "FIA_PMG_EXT.1.1": 1,
          "FIA_UAU": 5,
          "FIA_UAU.7": 3,
          "FIA_UAU.7.1": 1,
          "FIA_UAU_EXT": 5,
          "FIA_UAU_EXT.2": 4,
          "FIA_UAU_EXT.2.1": 1,
          "FIA_UIA_EXT": 4,
          "FIA_UIA_EXT.1": 7,
          "FIA_UIA_EXT.1.1": 1,
          "FIA_UIA_EXT.1.2": 1,
          "FIA_UID.1": 2,
          "FIA_UID_EXT": 1
        },
        "FMT": {
          "FMT_MTD": 5,
          "FMT_MTD.1": 3,
          "FMT_MTD.1.1": 1,
          "FMT_SMF": 6,
          "FMT_SMF.1": 5,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 5,
          "FMT_SMR.2": 3,
          "FMT_SMR.2.1": 1,
          "FMT_SMR.2.2": 1,
          "FMT_SMR.2.3": 1
        },
        "FPT": {
          "FPT_APW_EXT": 3,
          "FPT_APW_EXT.1": 4,
          "FPT_APW_EXT.1.1": 1,
          "FPT_APW_EXT.1.2": 1,
          "FPT_AWP_EXT": 2,
          "FPT_ITT": 5,
          "FPT_ITT.1": 7,
          "FPT_ITT.1.1": 1,
          "FPT_SKP_EXT": 5,
          "FPT_SKP_EXT.1": 4,
          "FPT_SKP_EXT.1.1": 1,
          "FPT_STM": 5,
          "FPT_STM.1": 4,
          "FPT_STM.1.1": 1,
          "FPT_TST_EXT": 5,
          "FPT_TST_EXT.1": 4,
          "FPT_TST_EXT.1.1": 1,
          "FPT_TUD_EXT": 5,
          "FPT_TUD_EXT.1": 4,
          "FPT_TUD_EXT.1.1": 1,
          "FPT_TUD_EXT.1.2": 1,
          "FPT_TUD_EXT.1.3": 1
        },
        "FTA": {
          "FTA_SSL": 12,
          "FTA_SSL.3": 3,
          "FTA_SSL.3.1": 1,
          "FTA_SSL.4": 4,
          "FTA_SSL.4.1": 1,
          "FTA_SSL_EXT": 6,
          "FTA_SSL_EXT.1": 4,
          "FTA_SSL_EXT.1.1": 1,
          "FTA_TAB": 5,
          "FTA_TAB.1": 4,
          "FTA_TAB.1.1": 1
        },
        "FTP": {
          "FTP_ITC": 5,
          "FTP_ITC.1": 3,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP": 6,
          "FTP_TRP.1": 3,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "NTP Server SMTP Server Audit Server SNMP Server Network Assets Legend TOE Operational Environment Out of Scope \u2026 \u2026 Sourcefire 3D System Security Target 13 The TOE main subsystems are summarized as followed: \u2022": 1,
          "Out of Scope": 1,
          "in the update header to ensure they match. 12 This process requires access to the Internet and is out of scope of the evaluation. Sourcefire 3D System Security Target 61 During the update process, if the Snort": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 4
        }
      },
      "crypto_protocol": {
        "SSH": {
          "SSH": 37
        },
        "TLS": {
          "TLS": {
            "TLS": 16,
            "TLS 1.0": 1
          }
        },
        "VPN": {
          "VPN": 4
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1,
          "Key agreement": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          },
          "SHA2": {
            "SHA-224": 4,
            "SHA-256": 2,
            "SHA-384": 5,
            "SHA-512": 12
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 3
        },
        "RNG": {
          "RBG": 5,
          "RNG": 4
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 4,
          "FIPS 186-2": 1,
          "FIPS 186-3": 1,
          "FIPS PUB 140-2": 1,
          "FIPS PUB 180-3": 1,
          "FIPS PUB 186-2": 2,
          "FIPS PUB 186-3": 1,
          "FIPS PUB 197": 2,
          "FIPS PUB 198-1": 1
        },
        "NIST": {
          "NIST SP 800-38A": 2,
          "NIST SP 800-56B": 1,
          "SP 800-56B": 3,
          "SP 800-90": 1
        },
        "RFC": {
          "RFC 2246": 2,
          "RFC 2460": 2,
          "RFC 2818": 2,
          "RFC 3513": 2,
          "RFC 4253": 1,
          "RFC 4443": 2,
          "RFC 5735": 2,
          "RFC 768": 2,
          "RFC 791": 2,
          "RFC 792": 2,
          "RFC 793": 2,
          "RFC 959": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 13
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC-SHA-256": 2,
            "HMAC-SHA-384": 1,
            "HMAC-SHA-512": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {
        "TLS": {
          "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 1,
          "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 2,
          "TLS_RSA_WITH_AES_128_CBC_SHA": 2,
          "TLS_RSA_WITH_AES_256_CBC_SHA": 2
        }
      },
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Sourcefire",
      "/CRTarget": "4092",
      "/Company": "Sourcefire, Inc",
      "/CreationDate": "D:20140807084734-04\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 10.1 for Word",
      "/Keywords": "",
      "/ModDate": "D:20140807084758-04\u002700\u0027",
      "/Producer": "Adobe PDF Library 10.0",
      "/SourceModified": "D:20140807124122",
      "/Subject": "",
      "/Title": "Sourcefire v5.2 Security Target",
      "pdf_file_size_bytes": 747356,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://support.sourcefire.com/",
          "http://jitc.fhu.disa.mil/tssi/cert_pdfs/sourcefire_3d_ips_ids_aug12.pdf",
          "https://www.icsalabs.com/technology-program/ipv6-/-usgv6/usgv6-tested-products"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 80
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "PP_ND_V1.1"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp_nd_v1.1.pdf",
        "pp_name": "Protection Profile for Network Devices"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10537-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": []
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10537-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "2b46f0c9d4165e656ecb60c5679e9e1e9bf2c09bac1adbf5ab14e660f49fce8d",
      "txt_hash": "a102e36c448e5c4b1b121fcfcbfdc92b78dd0d1b27c5f3439de5a5d1df53bbbe"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ff7d9c51c64807446f33de76ebe642a9574ef181a07ac95a73ef9b5019b2dfa2",
      "txt_hash": "a324072ff212c3228de22433dfe42b49566441dd1675494a996d3eeca9588aa5"
    }
  },
  "status": "archived"
}