Cisco Secure PIX Firewall V6.2(2)
CSV information ?
Status | archived |
---|---|
Valid from | 01.12.2002 |
Valid until | 27.02.2013 |
Scheme | 🇬🇧 UK |
Manufacturer | Cisco Systems, Inc. |
Category | Boundary Protection Devices and Systems |
Security level | EAL4 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
SkinnyHash functions
MD5Vendor
Microsoft, Microsoft Corporation, Cisco, Cisco SystemsSecurity level
EAL4, EAL1, EAL7, EAL0, EAL4 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLRSecurity Functional Requirements (SFR)
FAU_AUD.1, FAU_GEN.1Certificates
CERTIFICATION REPORT No. P180Standards
CCIMB-99-031, CCIMB-99-032, CCIMB-99-033File metadata
Title | CRP180.PDF |
---|---|
Author | djgreg1 |
Creation date | D:20030106101657Z |
Modification date | D:20131204151142Z |
Pages | 38 |
Creator | Microsoft Word - CRP180.doc |
Producer | Acrobat PDFWriter 4.0 for Windows NT |
Security target ?
Extracted keywords
Symmetric Algorithms
SkinnyHash functions
MD5Schemes
MACProtocols
SSHVendor
Microsoft, Cisco, Cisco SystemsSecurity level
EAL4, EAL 4, EAL4 augmented, ITSEC E3 or, ITSEC E3 equivalentClaims
O.VALID, O.HOSTILE, O.PRIVATE, O.ATTEMPT, O.SECPROC, T.INTERN, T.EXTERN, T.SPOOF, A.PHYSICAL, A.HOSTILE, A.AUDIT, A.AUDFUL, A.REMOTE, OE.AUDITSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL.2, ADO_IGS.1, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2Security Functional Requirements (SFR)
FAU_AUD.1, FAU_GEN.1, FAU_AUD.1.1, FAU_AUD.1.2, FAU_STG.1, FAU_SAR.1, FAU_STG.1.1, FAU_STG.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_AUD, FDP_ACC.1, FDP_ACF.1, FDP_IFC.1, FDP_IFF.1, FDP_RIP.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FDP_RIP.1.1, FDP_ACC, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_MTD.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.1, FMT_MSA, FPT_RVM.1, FPT_SEP.1, FPT_STM.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_STM.1.1File metadata
Title | ST v2.4public.doc |
---|---|
Author | djgreg1 |
Creation date | D:20030106103621 |
Pages | 55 |
Creator | Microsoft Word - ST v2.4public.doc |
Producer | Acrobat PDFWriter 4.0 for Windows NT |
Heuristics ?
Extracted SARs
ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_FLR.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2CPE matches
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*
Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-2017-12244 | HIGH | 8.6 | 4.0 | 05.10.2017 07:29 | ||
CVE-2017-12245 | HIGH | 8.6 | 4.0 | 05.10.2017 07:29 | ||
CVE-2017-3847 | MEDIUM | 5.4 | 2.7 | 22.02.2017 02:59 | ||
CVE-2017-6673 | MEDIUM | 6.5 | 3.6 | 13.06.2017 06:29 | ||
CVE-2017-6717 | MEDIUM | 5.4 | 2.7 | 04.07.2017 00:29 | ||
CVE-2018-0233 | HIGH | 8.6 | 4.0 | 19.04.2018 20:29 | ||
CVE-2018-0278 | MEDIUM | 6.5 | 3.6 | 02.05.2018 22:29 | ||
CVE-2018-0281 | MEDIUM | 5.8 | 1.4 | 02.05.2018 22:29 | ||
CVE-2018-0283 | MEDIUM | 5.8 | 1.4 | 02.05.2018 22:29 | ||
CVE-2018-0333 | MEDIUM | 5.8 | 1.4 | 07.06.2018 21:29 | ||
CVE-2018-0365 | HIGH | 8.8 | 5.9 | 21.06.2018 11:29 | ||
CVE-2018-0370 | HIGH | 7.5 | 3.6 | 16.07.2018 17:29 | ||
CVE-2018-0383 | HIGH | 8.6 | 4.0 | 16.07.2018 17:29 | ||
CVE-2018-0384 | MEDIUM | 5.8 | 1.4 | 16.07.2018 17:29 | ||
CVE-2018-0385 | HIGH | 7.5 | 3.6 | 16.07.2018 17:29 | ||
CVE-2018-15397 | MEDIUM | 6.8 | 4.0 | 05.10.2018 14:29 | ||
CVE-2018-15458 | HIGH | 7.5 | 3.6 | 10.01.2019 19:29 | ||
CVE-2019-12679 | HIGH | 8.8 | 5.9 | 02.10.2019 19:15 | ||
CVE-2019-12680 | HIGH | 8.8 | 5.9 | 02.10.2019 19:15 | ||
CVE-2019-12681 | HIGH | 8.8 | 5.9 | 02.10.2019 19:15 | ||
CVE-2019-12682 | HIGH | 8.8 | 5.9 | 02.10.2019 19:15 | ||
CVE-2019-12683 | HIGH | 8.8 | 5.9 | 02.10.2019 19:15 | ||
CVE-2019-12684 | HIGH | 8.8 | 5.9 | 02.10.2019 19:15 | ||
CVE-2019-12685 | HIGH | 8.8 | 5.9 | 02.10.2019 19:15 | ||
CVE-2019-12686 | HIGH | 8.8 | 5.9 | 02.10.2019 19:15 | ||
CVE-2019-12687 | HIGH | 8.8 | 5.9 | 02.10.2019 19:15 | ||
CVE-2019-12688 | HIGH | 8.8 | 5.9 | 02.10.2019 19:15 | ||
CVE-2019-12689 | HIGH | 8.8 | 5.9 | 02.10.2019 19:15 | ||
CVE-2019-12690 | HIGH | 7.2 | 5.9 | 02.10.2019 19:15 | ||
CVE-2019-12691 | MEDIUM | 4.9 | 3.6 | 02.10.2019 19:15 | ||
CVE-2019-12700 | MEDIUM | 6.5 | 3.6 | 02.10.2019 19:15 | ||
CVE-2019-15280 | MEDIUM | 4.8 | 2.7 | 16.10.2019 19:15 | ||
CVE-2019-15992 | HIGH | 7.2 | 5.9 | 23.09.2020 01:15 | ||
CVE-2019-16028 | CRITICAL | 9.8 | 5.9 | 23.09.2020 01:15 | ||
CVE-2019-1642 | MEDIUM | 6.1 | 2.7 | 23.01.2019 23:29 | ||
CVE-2019-1671 | MEDIUM | 6.1 | 2.7 | 07.02.2019 22:29 | ||
CVE-2019-1699 | HIGH | 7.8 | 5.9 | 03.05.2019 16:29 | ||
CVE-2019-1832 | HIGH | 7.5 | 3.6 | 16.05.2019 02:29 | ||
CVE-2019-1833 | MEDIUM | 5.8 | 1.4 | 16.05.2019 02:29 | ||
CVE-2019-1949 | MEDIUM | 4.8 | 2.7 | 08.08.2019 08:15 | ||
CVE-2020-3320 | MEDIUM | 5.4 | 2.7 | 08.10.2020 05:15 | ||
CVE-2020-3499 | HIGH | 8.6 | 4.0 | 21.10.2020 19:15 | ||
CVE-2020-3514 | MEDIUM | 6.7 | 5.9 | 21.10.2020 19:15 | ||
CVE-2020-3515 | MEDIUM | 6.1 | 2.7 | 21.10.2020 19:15 | ||
CVE-2020-3549 | HIGH | 8.1 | 5.9 | 21.10.2020 19:15 | ||
CVE-2020-3550 | HIGH | 8.1 | 5.2 | 21.10.2020 19:15 | ||
CVE-2020-3553 | MEDIUM | 6.1 | 2.7 | 21.10.2020 19:15 | ||
CVE-2020-3557 | MEDIUM | 5.3 | 1.4 | 21.10.2020 19:15 | ||
CVE-2020-3558 | MEDIUM | 6.1 | 2.7 | 21.10.2020 19:15 | ||
CVE-2021-1126 | MEDIUM | 5.5 | 3.6 | 13.01.2021 22:15 | ||
CVE-2021-1238 | MEDIUM | 4.8 | 2.7 | 13.01.2021 22:15 | ||
CVE-2021-1239 | MEDIUM | 4.8 | 2.7 | 13.01.2021 22:15 | ||
CVE-2021-1267 | MEDIUM | 4.3 | 1.4 | 13.01.2021 22:15 | ||
CVE-2021-1455 | MEDIUM | 4.8 | 2.7 | 29.04.2021 18:15 | ||
CVE-2021-1456 | MEDIUM | 4.8 | 2.7 | 29.04.2021 18:15 | ||
CVE-2021-1457 | MEDIUM | 4.8 | 2.7 | 29.04.2021 18:15 | ||
CVE-2021-1458 | MEDIUM | 4.8 | 2.7 | 29.04.2021 18:15 | ||
CVE-2021-1477 | MEDIUM | 4.3 | 1.4 | 29.04.2021 18:15 | ||
CVE-2022-20627 | MEDIUM | 5.4 | 2.7 | 03.05.2022 04:15 | ||
CVE-2022-20628 | MEDIUM | 5.4 | 2.7 | 03.05.2022 04:15 | ||
CVE-2022-20629 | MEDIUM | 5.4 | 2.7 | 03.05.2022 04:15 | ||
CVE-2022-20740 | MEDIUM | 6.1 | 2.7 | 03.05.2022 04:15 | ||
CVE-2022-20743 | HIGH | 8.8 | 5.9 | 03.05.2022 04:15 | ||
CVE-2022-20744 | MEDIUM | 6.5 | 3.6 | 03.05.2022 04:15 | ||
CVE-2022-20831 | MEDIUM | 4.8 | 2.7 | 15.11.2022 21:15 | ||
CVE-2022-20832 | MEDIUM | 4.8 | 2.7 | 15.11.2022 21:15 | ||
CVE-2022-20833 | MEDIUM | 4.8 | 2.7 | 15.11.2022 21:15 | ||
CVE-2022-20834 | MEDIUM | 4.8 | 2.7 | 15.11.2022 21:15 | ||
CVE-2022-20835 | MEDIUM | 4.8 | 2.7 | 15.11.2022 21:15 | ||
CVE-2022-20836 | MEDIUM | 4.8 | 2.7 | 15.11.2022 21:15 | ||
CVE-2022-20838 | MEDIUM | 4.8 | 2.7 | 15.11.2022 21:15 | ||
CVE-2022-20839 | MEDIUM | 4.8 | 2.7 | 15.11.2022 21:15 | ||
CVE-2022-20840 | MEDIUM | 4.8 | 2.7 | 15.11.2022 21:15 | ||
CVE-2022-20843 | MEDIUM | 4.8 | 2.7 | 15.11.2022 21:15 | ||
CVE-2022-20854 | HIGH | 7.5 | 3.6 | 15.11.2022 21:15 | ||
CVE-2022-20872 | MEDIUM | 4.8 | 2.7 | 15.11.2022 21:15 | ||
CVE-2022-20905 | MEDIUM | 4.8 | 2.7 | 15.11.2022 21:15 | ||
CVE-2022-20932 | MEDIUM | 4.8 | 2.7 | 15.11.2022 21:15 | ||
CVE-2022-20935 | MEDIUM | 4.8 | 2.7 | 15.11.2022 21:15 | ||
CVE-2022-20936 | MEDIUM | 4.8 | 2.7 | 15.11.2022 21:15 | ||
CVE-2022-20938 | MEDIUM | 4.3 | 1.4 | 15.11.2022 21:15 | ||
CVE-2022-20941 | MEDIUM | 5.3 | 1.4 | 15.11.2022 21:15 | ||
CVE-2023-20005 | MEDIUM | 6.1 | 2.7 | 01.11.2023 17:15 | ||
CVE-2023-20048 | CRITICAL | 9.9 | 6.0 | 01.11.2023 18:15 | ||
CVE-2023-20063 | HIGH | 8.2 | 6.0 | 01.11.2023 18:15 | ||
CVE-2023-20074 | MEDIUM | 6.1 | 2.7 | 01.11.2023 17:15 | ||
CVE-2023-20114 | MEDIUM | 6.5 | 3.6 | 01.11.2023 17:15 | ||
CVE-2023-20155 | MEDIUM | 6.5 | 3.6 | 01.11.2023 17:15 | ||
CVE-2023-20219 | HIGH | 8.8 | 5.9 | 01.11.2023 18:15 | ||
CVE-2023-20220 | HIGH | 8.8 | 5.9 | 01.11.2023 18:15 | ||
CVE-2024-20269 | MEDIUM | 5.4 | 2.7 | 23.10.2024 17:15 | ||
CVE-2024-20273 | MEDIUM | 6.1 | 2.7 | 23.10.2024 17:15 | ||
CVE-2024-20300 | MEDIUM | 5.4 | 2.7 | 23.10.2024 17:15 | ||
CVE-2024-20372 | MEDIUM | 6.1 | 2.7 | 23.10.2024 18:15 | ||
CVE-2024-20386 | MEDIUM | 6.1 | 2.7 | 23.10.2024 18:15 | ||
CVE-2024-20387 | MEDIUM | 5.4 | 2.7 | 23.10.2024 18:15 | ||
CVE-2024-20388 | MEDIUM | 5.3 | 1.4 | 23.10.2024 18:15 | ||
CVE-2024-20403 | MEDIUM | 5.4 | 2.7 | 23.10.2024 18:15 | ||
CVE-2024-20409 | MEDIUM | 6.1 | 2.7 | 23.10.2024 18:15 | ||
CVE-2024-20410 | MEDIUM | 6.1 | 2.7 | 23.10.2024 18:15 | ||
CVE-2024-20415 | MEDIUM | 6.1 | 2.7 | 23.10.2024 18:15 | ||
CVE-2024-20424 | CRITICAL | 9.9 | 6.0 | 23.10.2024 18:15 | ||
CVE-2024-20471 | MEDIUM | 6.5 | 5.2 | 23.10.2024 18:15 |
References ?
No references are available for this certificate.
Updates ?
-
05.02.2025 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The st property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The cert property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data.
The computed heuristics were updated.
- The following values were inserted:
{'protection_profiles': None, 'eal': 'EAL4'}
. - The prev_certificates property was set to
None
. - The next_certificates property was set to
None
.
- The report property was updated, with the
-
02.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was set to
{'_type': 'Set', 'elements': ['cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.4:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.1:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.3:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.6:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.4:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.1:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.5:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.2:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.8:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.3:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*']}
. - The related_cves property was set to
{'_type': 'Set', 'elements': ['CVE-2024-20269', 'CVE-2022-20628', 'CVE-2019-16028', 'CVE-2017-3847', 'CVE-2020-3515', 'CVE-2020-3549', 'CVE-2019-12687', 'CVE-2022-20838', 'CVE-2019-12691', 'CVE-2018-15458', 'CVE-2022-20833', 'CVE-2021-1457', 'CVE-2019-1642', 'CVE-2024-20273', 'CVE-2024-20415', 'CVE-2020-3550', 'CVE-2018-0281', 'CVE-2024-20471', 'CVE-2023-20063', 'CVE-2018-0233', 'CVE-2022-20854', 'CVE-2024-20424', 'CVE-2019-12682', 'CVE-2017-12244', 'CVE-2024-20372', 'CVE-2017-6673', 'CVE-2018-0383', 'CVE-2023-20220', 'CVE-2021-1455', 'CVE-2023-20048', 'CVE-2024-20386', 'CVE-2018-0278', 'CVE-2022-20938', 'CVE-2019-12689', 'CVE-2019-1671', 'CVE-2021-1456', 'CVE-2019-12679', 'CVE-2022-20839', 'CVE-2018-15397', 'CVE-2018-0384', 'CVE-2022-20941', 'CVE-2019-1832', 'CVE-2018-0370', 'CVE-2022-20932', 'CVE-2024-20388', 'CVE-2019-12700', 'CVE-2022-20629', 'CVE-2023-20155', 'CVE-2023-20074', 'CVE-2019-15992', 'CVE-2023-20005', 'CVE-2019-12681', 'CVE-2019-1699', 'CVE-2019-12683', 'CVE-2022-20872', 'CVE-2019-12690', 'CVE-2022-20843', 'CVE-2022-20840', 'CVE-2021-1458', 'CVE-2020-3557', 'CVE-2017-6717', 'CVE-2019-1949', 'CVE-2022-20836', 'CVE-2021-1267', 'CVE-2021-1477', 'CVE-2019-12686', 'CVE-2020-3499', 'CVE-2022-20936', 'CVE-2019-12685', 'CVE-2024-20300', 'CVE-2022-20744', 'CVE-2024-20409', 'CVE-2022-20905', 'CVE-2017-12245', 'CVE-2024-20403', 'CVE-2022-20935', 'CVE-2019-12684', 'CVE-2021-1238', 'CVE-2023-20114', 'CVE-2022-20835', 'CVE-2018-0365', 'CVE-2022-20834', 'CVE-2023-20219', 'CVE-2019-1833', 'CVE-2019-12688', 'CVE-2020-3558', 'CVE-2021-1126', 'CVE-2022-20740', 'CVE-2018-0385', 'CVE-2022-20832', 'CVE-2020-3553', 'CVE-2022-20831', 'CVE-2022-20627', 'CVE-2021-1239', 'CVE-2018-0333', 'CVE-2024-20410', 'CVE-2024-20387', 'CVE-2020-3514', 'CVE-2020-3320', 'CVE-2019-12680', 'CVE-2019-15280', 'CVE-2022-20743', 'CVE-2018-0283']}
.
- The cpe_matches property was set to
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '99d33cd5f907cd4174db433f2ee7bff491a6c5da11901549b2d44cfca303d8db', 'txt_hash': 'fad452f0ea1a82d3bcba3d48c68b5da4d6ab3379b3e70018d4cd3c3506291f21'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3fee2160f5151de7ad47dbaa17458bc444b60dc207b5bdbc42aef108d62dfe3a', 'txt_hash': '790edd5ed6cddb3d48493d67275b05501bcfa9616598b9b07ad39c04843af3be'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 164944, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 38, '/Author': 'djgreg1', '/CreationDate': 'D:20030106101657Z', '/Creator': 'Microsoft Word - CRP180.doc', '/ModDate': 'D:20131204151142Z', '/Producer': 'Acrobat PDFWriter 4.0 for Windows NT', '/Title': 'CRP180.PDF', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 122661, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 55, '/Creator': 'Microsoft Word - ST v2.4public.doc', '/CreationDate': 'D:20030106103621', '/Title': 'ST v2.4public.doc', '/Author': 'djgreg1', '/Producer': 'Acrobat PDFWriter 4.0 for Windows NT', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'UK': {'CERTIFICATION REPORT No. P180': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 24, 'EAL1': 1, 'EAL7': 1, 'EAL0': 1, 'EAL4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 45, 'ALC_FLR': 2}}, 'cc_sfr': {'FAU': {'FAU_AUD.1': 5, 'FAU_GEN.1': 3}}, 'cc_claims': {}, 'vendor': {'Microsoft': {'Microsoft': 2, 'Microsoft Corporation': 1}, 'Cisco': {'Cisco': 70, 'Cisco Systems': 10}}, 'eval_facility': {}, 'symmetric_crypto': {'miscellaneous': {'Skinny': {'Skinny': 3}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 4}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCIMB-99-031': 1, 'CCIMB-99-032': 1, 'CCIMB-99-033': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 10, 'EAL 4': 2, 'EAL4 augmented': 1}, 'ITSEC': {'ITSEC E3 or': 1, 'ITSEC E3 equivalent': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 3, 'ACM_CAP.4': 3, 'ACM_SCP.2': 3}, 'ADO': {'ADO_DEL.2': 4, 'ADO_IGS.1': 3}, 'ADV': {'ADV_FSP.2': 3, 'ADV_HLD.2': 3, 'ADV_IMP.1': 3, 'ADV_LLD.1': 3, 'ADV_RCR.1': 3, 'ADV_SPM.1': 3}, 'AGD': {'AGD_ADM.1': 3, 'AGD_USR.1': 3}, 'ALC': {'ALC_FLR.1': 10, 'ALC_DVS.1': 3, 'ALC_LCD.1': 3, 'ALC_TAT.1': 3}, 'ATE': {'ATE_COV.2': 3, 'ATE_DPT.1': 3, 'ATE_FUN.1': 3, 'ATE_IND.2': 3}, 'AVA': {'AVA_MSU.2': 3, 'AVA_SOF.1': 3, 'AVA_VLA.2': 4}}, 'cc_sfr': {'FAU': {'FAU_AUD.1': 21, 'FAU_GEN.1': 13, 'FAU_AUD.1.1': 1, 'FAU_AUD.1.2': 1, 'FAU_STG.1': 9, 'FAU_SAR.1': 6, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_AUD': 1}, 'FDP': {'FDP_ACC.1': 15, 'FDP_ACF.1': 12, 'FDP_IFC.1': 14, 'FDP_IFF.1': 12, 'FDP_RIP.1': 7, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 2, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_IFF.1.6': 1, 'FDP_RIP.1.1': 1, 'FDP_ACC': 1}, 'FMT': {'FMT_MSA.1': 12, 'FMT_MSA.3': 17, 'FMT_MTD.1': 12, 'FMT_MTD.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMR.1': 6, 'FMT_MSA': 1}, 'FPT': {'FPT_RVM.1': 9, 'FPT_SEP.1': 7, 'FPT_STM.1': 11, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_STM.1.1': 1}}, 'cc_claims': {'O': {'O.VALID': 5, 'O.HOSTILE': 5, 'O.PRIVATE': 5, 'O.ATTEMPT': 4, 'O.SECPROC': 4}, 'T': {'T.INTERN': 4, 'T.EXTERN': 3, 'T.SPOOF': 4}, 'A': {'A.PHYSICAL': 4, 'A.HOSTILE': 3, 'A.AUDIT': 4, 'A.AUDFUL': 3, 'A.REMOTE': 4}, 'OE': {'OE.AUDIT': 4}}, 'vendor': {'Microsoft': {'Microsoft': 1}, 'Cisco': {'Cisco': 137, 'Cisco Systems': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'miscellaneous': {'Skinny': {'Skinny': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 3}}}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'SSH': {'SSH': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
CRP180.pdf
. - The st_filename property was set to
stciscofw_v2.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
CRP180
. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP180.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/stciscofw_v2.pdf
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was set to
None
.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Cisco Secure PIX Firewall V6.2(2) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Boundary Protection Devices and Systems",
"cert_link": null,
"dgst": "f1c95290c6a8ec32",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CRP180",
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"eal": "EAL4",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"6.2"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2020-3549",
"CVE-2018-15458",
"CVE-2019-12688",
"CVE-2019-12680",
"CVE-2023-20155",
"CVE-2023-20074",
"CVE-2019-1642",
"CVE-2022-20833",
"CVE-2021-1267",
"CVE-2024-20471",
"CVE-2022-20627",
"CVE-2020-3557",
"CVE-2019-1949",
"CVE-2022-20839",
"CVE-2022-20836",
"CVE-2020-3553",
"CVE-2024-20415",
"CVE-2022-20843",
"CVE-2022-20854",
"CVE-2018-0233",
"CVE-2022-20932",
"CVE-2019-12683",
"CVE-2023-20114",
"CVE-2018-0281",
"CVE-2018-0384",
"CVE-2019-12682",
"CVE-2024-20372",
"CVE-2024-20403",
"CVE-2023-20063",
"CVE-2024-20387",
"CVE-2019-12685",
"CVE-2019-12691",
"CVE-2022-20831",
"CVE-2019-15280",
"CVE-2019-12679",
"CVE-2019-12681",
"CVE-2022-20938",
"CVE-2019-1671",
"CVE-2024-20273",
"CVE-2022-20835",
"CVE-2017-12245",
"CVE-2022-20629",
"CVE-2019-12686",
"CVE-2018-0278",
"CVE-2024-20424",
"CVE-2023-20005",
"CVE-2018-0365",
"CVE-2019-1833",
"CVE-2019-16028",
"CVE-2020-3558",
"CVE-2022-20744",
"CVE-2022-20628",
"CVE-2024-20388",
"CVE-2021-1477",
"CVE-2023-20219",
"CVE-2021-1457",
"CVE-2021-1455",
"CVE-2024-20409",
"CVE-2024-20386",
"CVE-2022-20834",
"CVE-2022-20941",
"CVE-2019-1699",
"CVE-2017-6673",
"CVE-2019-1832",
"CVE-2023-20220",
"CVE-2022-20740",
"CVE-2021-1126",
"CVE-2019-15992",
"CVE-2021-1456",
"CVE-2020-3320",
"CVE-2022-20905",
"CVE-2020-3550",
"CVE-2022-20832",
"CVE-2022-20840",
"CVE-2024-20410",
"CVE-2018-0370",
"CVE-2018-0333",
"CVE-2018-15397",
"CVE-2020-3515",
"CVE-2024-20269",
"CVE-2018-0283",
"CVE-2022-20838",
"CVE-2020-3499",
"CVE-2019-12689",
"CVE-2017-6717",
"CVE-2021-1239",
"CVE-2017-12244",
"CVE-2020-3514",
"CVE-2024-20300",
"CVE-2022-20936",
"CVE-2022-20935",
"CVE-2019-12684",
"CVE-2021-1238",
"CVE-2023-20048",
"CVE-2018-0383",
"CVE-2021-1458",
"CVE-2019-12687",
"CVE-2018-0385",
"CVE-2022-20743",
"CVE-2017-3847",
"CVE-2019-12700",
"CVE-2019-12690",
"CVE-2022-20872"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Cisco Systems, Inc.",
"manufacturer_web": "https://www.cisco.com",
"name": "Cisco Secure PIX Firewall V6.2(2)",
"not_valid_after": "2013-02-27",
"not_valid_before": "2002-12-01",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "CRP180.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"UK": {
"CERTIFICATION REPORT No. P180": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 2,
"ALC_FLR.1": 45
}
},
"cc_security_level": {
"EAL": {
"EAL0": 1,
"EAL1": 1,
"EAL4": 24,
"EAL4 augmented": 1,
"EAL7": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_AUD.1": 5,
"FAU_GEN.1": 3
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCIMB-99-031": 1,
"CCIMB-99-032": 1,
"CCIMB-99-033": 1
}
},
"symmetric_crypto": {
"miscellaneous": {
"Skinny": {
"Skinny": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 70,
"Cisco Systems": 10
},
"Microsoft": {
"Microsoft": 2,
"Microsoft Corporation": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "djgreg1",
"/CreationDate": "D:20030106101657Z",
"/Creator": "Microsoft Word - CRP180.doc",
"/ModDate": "D:20131204151142Z",
"/Producer": "Acrobat PDFWriter 4.0 for Windows NT",
"/Title": "CRP180.PDF",
"pdf_file_size_bytes": 164944,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 38
},
"st_filename": "stciscofw_v2.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.AUDFUL": 3,
"A.AUDIT": 4,
"A.HOSTILE": 3,
"A.PHYSICAL": 4,
"A.REMOTE": 4
},
"O": {
"O.ATTEMPT": 4,
"O.HOSTILE": 5,
"O.PRIVATE": 5,
"O.SECPROC": 4,
"O.VALID": 5
},
"OE": {
"OE.AUDIT": 4
},
"T": {
"T.EXTERN": 3,
"T.INTERN": 4,
"T.SPOOF": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_AUT.1": 3,
"ACM_CAP.4": 3,
"ACM_SCP.2": 3
},
"ADO": {
"ADO_DEL.2": 4,
"ADO_IGS.1": 3
},
"ADV": {
"ADV_FSP.2": 3,
"ADV_HLD.2": 3,
"ADV_IMP.1": 3,
"ADV_LLD.1": 3,
"ADV_RCR.1": 3,
"ADV_SPM.1": 3
},
"AGD": {
"AGD_ADM.1": 3,
"AGD_USR.1": 3
},
"ALC": {
"ALC_DVS.1": 3,
"ALC_FLR.1": 10,
"ALC_LCD.1": 3,
"ALC_TAT.1": 3
},
"ATE": {
"ATE_COV.2": 3,
"ATE_DPT.1": 3,
"ATE_FUN.1": 3,
"ATE_IND.2": 3
},
"AVA": {
"AVA_MSU.2": 3,
"AVA_SOF.1": 3,
"AVA_VLA.2": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 2,
"EAL4": 10,
"EAL4 augmented": 1
},
"ITSEC": {
"ITSEC E3 equivalent": 1,
"ITSEC E3 or": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_AUD": 1,
"FAU_AUD.1": 21,
"FAU_AUD.1.1": 1,
"FAU_AUD.1.2": 1,
"FAU_GEN.1": 13,
"FAU_SAR.1": 6,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_STG.1": 9,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1
},
"FDP": {
"FDP_ACC": 1,
"FDP_ACC.1": 15,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 12,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 14,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 12,
"FDP_IFF.1.1": 2,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1,
"FDP_IFF.1.6": 1,
"FDP_RIP.1": 7,
"FDP_RIP.1.1": 1
},
"FMT": {
"FMT_MSA": 1,
"FMT_MSA.1": 12,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 17,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 12,
"FMT_MTD.1.1": 1,
"FMT_SMR.1": 6
},
"FPT": {
"FPT_RVM.1": 9,
"FPT_RVM.1.1": 1,
"FPT_SEP.1": 7,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_STM.1": 11,
"FPT_STM.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 1
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {
"miscellaneous": {
"Skinny": {
"Skinny": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 137,
"Cisco Systems": 2
},
"Microsoft": {
"Microsoft": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "djgreg1",
"/CreationDate": "D:20030106103621",
"/Creator": "Microsoft Word - ST v2.4public.doc",
"/Producer": "Acrobat PDFWriter 4.0 for Windows NT",
"/Title": "ST v2.4public.doc",
"pdf_file_size_bytes": 122661,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 55
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP180.pdf",
"scheme": "UK",
"security_level": {
"_type": "Set",
"elements": [
"EAL4"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/stciscofw_v2.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "99d33cd5f907cd4174db433f2ee7bff491a6c5da11901549b2d44cfca303d8db",
"txt_hash": "fad452f0ea1a82d3bcba3d48c68b5da4d6ab3379b3e70018d4cd3c3506291f21"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "3fee2160f5151de7ad47dbaa17458bc444b60dc207b5bdbc42aef108d62dfe3a",
"txt_hash": "790edd5ed6cddb3d48493d67275b05501bcfa9616598b9b07ad39c04843af3be"
}
},
"status": "archived"
}