Cisco Secure PIX Firewall V6.2(2)

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status archived
Valid from 01.12.2002
Valid until 27.02.2013
Scheme 🇬🇧 UK
Manufacturer Cisco Systems, Inc.
Category Boundary Protection Devices and Systems
Security level EAL4

Heuristics summary ?

Certificate ID: CRP180

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
Skinny
Hash functions
MD5

Vendor
Microsoft, Microsoft Corporation, Cisco, Cisco Systems

Security level
EAL4, EAL1, EAL7, EAL0, EAL4 augmented
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR
Security Functional Requirements (SFR)
FAU_AUD.1, FAU_GEN.1
Certificates
CERTIFICATION REPORT No. P180

Standards
CCIMB-99-031, CCIMB-99-032, CCIMB-99-033

File metadata

Title CRP180.PDF
Author djgreg1
Creation date D:20030106101657Z
Modification date D:20131204151142Z
Pages 38
Creator Microsoft Word - CRP180.doc
Producer Acrobat PDFWriter 4.0 for Windows NT

Security target ?

Extracted keywords

Symmetric Algorithms
Skinny
Hash functions
MD5
Schemes
MAC
Protocols
SSH

Vendor
Microsoft, Cisco, Cisco Systems

Security level
EAL4, EAL 4, EAL4 augmented, ITSEC E3 or, ITSEC E3 equivalent
Claims
O.VALID, O.HOSTILE, O.PRIVATE, O.ATTEMPT, O.SECPROC, T.INTERN, T.EXTERN, T.SPOOF, A.PHYSICAL, A.HOSTILE, A.AUDIT, A.AUDFUL, A.REMOTE, OE.AUDIT
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL.2, ADO_IGS.1, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2
Security Functional Requirements (SFR)
FAU_AUD.1, FAU_GEN.1, FAU_AUD.1.1, FAU_AUD.1.2, FAU_STG.1, FAU_SAR.1, FAU_STG.1.1, FAU_STG.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_AUD, FDP_ACC.1, FDP_ACF.1, FDP_IFC.1, FDP_IFF.1, FDP_RIP.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FDP_RIP.1.1, FDP_ACC, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_MTD.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.1, FMT_MSA, FPT_RVM.1, FPT_SEP.1, FPT_STM.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_STM.1.1

File metadata

Title ST v2.4public.doc
Author djgreg1
Creation date D:20030106103621
Pages 55
Creator Microsoft Word - ST v2.4public.doc
Producer Acrobat PDFWriter 4.0 for Windows NT

Heuristics ?

Certificate ID: CRP180

Extracted SARs

ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_FLR.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2

CPE matches

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2017-12244
C M N
HIGH 8.6 4.0 05.10.2017 07:29
CVE-2017-12245
C M N
HIGH 8.6 4.0 05.10.2017 07:29
CVE-2017-3847
C M N
MEDIUM 5.4 2.7 22.02.2017 02:59
CVE-2017-6673
C M N
MEDIUM 6.5 3.6 13.06.2017 06:29
CVE-2017-6717
C M N
MEDIUM 5.4 2.7 04.07.2017 00:29
CVE-2018-0233
C M N
HIGH 8.6 4.0 19.04.2018 20:29
CVE-2018-0278
C M N
MEDIUM 6.5 3.6 02.05.2018 22:29
CVE-2018-0281
C M N
MEDIUM 5.8 1.4 02.05.2018 22:29
CVE-2018-0283
C M N
MEDIUM 5.8 1.4 02.05.2018 22:29
CVE-2018-0333
C M N
MEDIUM 5.8 1.4 07.06.2018 21:29
CVE-2018-0365
C M N
HIGH 8.8 5.9 21.06.2018 11:29
CVE-2018-0370
C M N
HIGH 7.5 3.6 16.07.2018 17:29
CVE-2018-0383
C M N
HIGH 8.6 4.0 16.07.2018 17:29
CVE-2018-0384
C M N
MEDIUM 5.8 1.4 16.07.2018 17:29
CVE-2018-0385
C M N
HIGH 7.5 3.6 16.07.2018 17:29
CVE-2018-15397
C M N
MEDIUM 6.8 4.0 05.10.2018 14:29
CVE-2018-15458
C M N
HIGH 7.5 3.6 10.01.2019 19:29
CVE-2019-12679
C M N
HIGH 8.8 5.9 02.10.2019 19:15
CVE-2019-12680
C M N
HIGH 8.8 5.9 02.10.2019 19:15
CVE-2019-12681
C M N
HIGH 8.8 5.9 02.10.2019 19:15
CVE-2019-12682
C M N
HIGH 8.8 5.9 02.10.2019 19:15
CVE-2019-12683
C M N
HIGH 8.8 5.9 02.10.2019 19:15
CVE-2019-12684
C M N
HIGH 8.8 5.9 02.10.2019 19:15
CVE-2019-12685
C M N
HIGH 8.8 5.9 02.10.2019 19:15
CVE-2019-12686
C M N
HIGH 8.8 5.9 02.10.2019 19:15
CVE-2019-12687
C M N
HIGH 8.8 5.9 02.10.2019 19:15
CVE-2019-12688
C M N
HIGH 8.8 5.9 02.10.2019 19:15
CVE-2019-12689
C M N
HIGH 8.8 5.9 02.10.2019 19:15
CVE-2019-12690
C M N
HIGH 7.2 5.9 02.10.2019 19:15
CVE-2019-12691
C M N
MEDIUM 4.9 3.6 02.10.2019 19:15
CVE-2019-12700
C M N
MEDIUM 6.5 3.6 02.10.2019 19:15
CVE-2019-15280
C M N
MEDIUM 4.8 2.7 16.10.2019 19:15
CVE-2019-15992
C M N
HIGH 7.2 5.9 23.09.2020 01:15
CVE-2019-16028
C M N
CRITICAL 9.8 5.9 23.09.2020 01:15
CVE-2019-1642
C M N
MEDIUM 6.1 2.7 23.01.2019 23:29
CVE-2019-1671
C M N
MEDIUM 6.1 2.7 07.02.2019 22:29
CVE-2019-1699
C M N
HIGH 7.8 5.9 03.05.2019 16:29
CVE-2019-1832
C M N
HIGH 7.5 3.6 16.05.2019 02:29
CVE-2019-1833
C M N
MEDIUM 5.8 1.4 16.05.2019 02:29
CVE-2019-1949
C M N
MEDIUM 4.8 2.7 08.08.2019 08:15
CVE-2020-3320
C M N
MEDIUM 5.4 2.7 08.10.2020 05:15
CVE-2020-3499
C M N
HIGH 8.6 4.0 21.10.2020 19:15
CVE-2020-3514
C M N
MEDIUM 6.7 5.9 21.10.2020 19:15
CVE-2020-3515
C M N
MEDIUM 6.1 2.7 21.10.2020 19:15
CVE-2020-3549
C M N
HIGH 8.1 5.9 21.10.2020 19:15
CVE-2020-3550
C M N
HIGH 8.1 5.2 21.10.2020 19:15
CVE-2020-3553
C M N
MEDIUM 6.1 2.7 21.10.2020 19:15
CVE-2020-3557
C M N
MEDIUM 5.3 1.4 21.10.2020 19:15
CVE-2020-3558
C M N
MEDIUM 6.1 2.7 21.10.2020 19:15
CVE-2021-1126
C M N
MEDIUM 5.5 3.6 13.01.2021 22:15
CVE-2021-1238
C M N
MEDIUM 4.8 2.7 13.01.2021 22:15
CVE-2021-1239
C M N
MEDIUM 4.8 2.7 13.01.2021 22:15
CVE-2021-1267
C M N
MEDIUM 4.3 1.4 13.01.2021 22:15
CVE-2021-1455
C M N
MEDIUM 4.8 2.7 29.04.2021 18:15
CVE-2021-1456
C M N
MEDIUM 4.8 2.7 29.04.2021 18:15
CVE-2021-1457
C M N
MEDIUM 4.8 2.7 29.04.2021 18:15
CVE-2021-1458
C M N
MEDIUM 4.8 2.7 29.04.2021 18:15
CVE-2021-1477
C M N
MEDIUM 4.3 1.4 29.04.2021 18:15
CVE-2022-20627
C M N
MEDIUM 5.4 2.7 03.05.2022 04:15
CVE-2022-20628
C M N
MEDIUM 5.4 2.7 03.05.2022 04:15
CVE-2022-20629
C M N
MEDIUM 5.4 2.7 03.05.2022 04:15
CVE-2022-20740
C M N
MEDIUM 6.1 2.7 03.05.2022 04:15
CVE-2022-20743
C M N
HIGH 8.8 5.9 03.05.2022 04:15
CVE-2022-20744
C M N
MEDIUM 6.5 3.6 03.05.2022 04:15
CVE-2022-20831
C M N
MEDIUM 4.8 2.7 15.11.2022 21:15
CVE-2022-20832
C M N
MEDIUM 4.8 2.7 15.11.2022 21:15
CVE-2022-20833
C M N
MEDIUM 4.8 2.7 15.11.2022 21:15
CVE-2022-20834
C M N
MEDIUM 4.8 2.7 15.11.2022 21:15
CVE-2022-20835
C M N
MEDIUM 4.8 2.7 15.11.2022 21:15
CVE-2022-20836
C M N
MEDIUM 4.8 2.7 15.11.2022 21:15
CVE-2022-20838
C M N
MEDIUM 4.8 2.7 15.11.2022 21:15
CVE-2022-20839
C M N
MEDIUM 4.8 2.7 15.11.2022 21:15
CVE-2022-20840
C M N
MEDIUM 4.8 2.7 15.11.2022 21:15
CVE-2022-20843
C M N
MEDIUM 4.8 2.7 15.11.2022 21:15
CVE-2022-20854
C M N
HIGH 7.5 3.6 15.11.2022 21:15
CVE-2022-20872
C M N
MEDIUM 4.8 2.7 15.11.2022 21:15
CVE-2022-20905
C M N
MEDIUM 4.8 2.7 15.11.2022 21:15
CVE-2022-20932
C M N
MEDIUM 4.8 2.7 15.11.2022 21:15
CVE-2022-20935
C M N
MEDIUM 4.8 2.7 15.11.2022 21:15
CVE-2022-20936
C M N
MEDIUM 4.8 2.7 15.11.2022 21:15
CVE-2022-20938
C M N
MEDIUM 4.3 1.4 15.11.2022 21:15
CVE-2022-20941
C M N
MEDIUM 5.3 1.4 15.11.2022 21:15
CVE-2023-20005
C M N
MEDIUM 6.1 2.7 01.11.2023 17:15
CVE-2023-20048
C M N
CRITICAL 9.9 6.0 01.11.2023 18:15
CVE-2023-20063
C M N
HIGH 8.2 6.0 01.11.2023 18:15
CVE-2023-20074
C M N
MEDIUM 6.1 2.7 01.11.2023 17:15
CVE-2023-20114
C M N
MEDIUM 6.5 3.6 01.11.2023 17:15
CVE-2023-20155
C M N
MEDIUM 6.5 3.6 01.11.2023 17:15
CVE-2023-20219
C M N
HIGH 8.8 5.9 01.11.2023 18:15
CVE-2023-20220
C M N
HIGH 8.8 5.9 01.11.2023 18:15
CVE-2024-20269
C M N
MEDIUM 5.4 2.7 23.10.2024 17:15
CVE-2024-20273
C M N
MEDIUM 6.1 2.7 23.10.2024 17:15
CVE-2024-20300
C M N
MEDIUM 5.4 2.7 23.10.2024 17:15
CVE-2024-20372
C M N
MEDIUM 6.1 2.7 23.10.2024 18:15
CVE-2024-20386
C M N
MEDIUM 6.1 2.7 23.10.2024 18:15
CVE-2024-20387
C M N
MEDIUM 5.4 2.7 23.10.2024 18:15
CVE-2024-20388
C M N
MEDIUM 5.3 1.4 23.10.2024 18:15
CVE-2024-20403
C M N
MEDIUM 5.4 2.7 23.10.2024 18:15
CVE-2024-20409
C M N
MEDIUM 6.1 2.7 23.10.2024 18:15
CVE-2024-20410
C M N
MEDIUM 6.1 2.7 23.10.2024 18:15
CVE-2024-20415
C M N
MEDIUM 6.1 2.7 23.10.2024 18:15
CVE-2024-20424
C M N
CRITICAL 9.9 6.0 23.10.2024 18:15
CVE-2024-20471
C M N
MEDIUM 6.5 5.2 23.10.2024 18:15
Showing 5 out of 103.

References ?

No references are available for this certificate.

Updates ?

  • 05.02.2025 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The st property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The cert property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.

    The computed heuristics were updated.

    • The following values were inserted: {'protection_profiles': None, 'eal': 'EAL4'}.
    • The prev_certificates property was set to None.
    • The next_certificates property was set to None.
  • 02.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.4:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.1:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.3:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.6:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.4:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.1:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.5:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.2:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.8:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.3:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*']}.
    • The related_cves property was set to {'_type': 'Set', 'elements': ['CVE-2024-20269', 'CVE-2022-20628', 'CVE-2019-16028', 'CVE-2017-3847', 'CVE-2020-3515', 'CVE-2020-3549', 'CVE-2019-12687', 'CVE-2022-20838', 'CVE-2019-12691', 'CVE-2018-15458', 'CVE-2022-20833', 'CVE-2021-1457', 'CVE-2019-1642', 'CVE-2024-20273', 'CVE-2024-20415', 'CVE-2020-3550', 'CVE-2018-0281', 'CVE-2024-20471', 'CVE-2023-20063', 'CVE-2018-0233', 'CVE-2022-20854', 'CVE-2024-20424', 'CVE-2019-12682', 'CVE-2017-12244', 'CVE-2024-20372', 'CVE-2017-6673', 'CVE-2018-0383', 'CVE-2023-20220', 'CVE-2021-1455', 'CVE-2023-20048', 'CVE-2024-20386', 'CVE-2018-0278', 'CVE-2022-20938', 'CVE-2019-12689', 'CVE-2019-1671', 'CVE-2021-1456', 'CVE-2019-12679', 'CVE-2022-20839', 'CVE-2018-15397', 'CVE-2018-0384', 'CVE-2022-20941', 'CVE-2019-1832', 'CVE-2018-0370', 'CVE-2022-20932', 'CVE-2024-20388', 'CVE-2019-12700', 'CVE-2022-20629', 'CVE-2023-20155', 'CVE-2023-20074', 'CVE-2019-15992', 'CVE-2023-20005', 'CVE-2019-12681', 'CVE-2019-1699', 'CVE-2019-12683', 'CVE-2022-20872', 'CVE-2019-12690', 'CVE-2022-20843', 'CVE-2022-20840', 'CVE-2021-1458', 'CVE-2020-3557', 'CVE-2017-6717', 'CVE-2019-1949', 'CVE-2022-20836', 'CVE-2021-1267', 'CVE-2021-1477', 'CVE-2019-12686', 'CVE-2020-3499', 'CVE-2022-20936', 'CVE-2019-12685', 'CVE-2024-20300', 'CVE-2022-20744', 'CVE-2024-20409', 'CVE-2022-20905', 'CVE-2017-12245', 'CVE-2024-20403', 'CVE-2022-20935', 'CVE-2019-12684', 'CVE-2021-1238', 'CVE-2023-20114', 'CVE-2022-20835', 'CVE-2018-0365', 'CVE-2022-20834', 'CVE-2023-20219', 'CVE-2019-1833', 'CVE-2019-12688', 'CVE-2020-3558', 'CVE-2021-1126', 'CVE-2022-20740', 'CVE-2018-0385', 'CVE-2022-20832', 'CVE-2020-3553', 'CVE-2022-20831', 'CVE-2022-20627', 'CVE-2021-1239', 'CVE-2018-0333', 'CVE-2024-20410', 'CVE-2024-20387', 'CVE-2020-3514', 'CVE-2020-3320', 'CVE-2019-12680', 'CVE-2019-15280', 'CVE-2022-20743', 'CVE-2018-0283']}.
  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '99d33cd5f907cd4174db433f2ee7bff491a6c5da11901549b2d44cfca303d8db', 'txt_hash': 'fad452f0ea1a82d3bcba3d48c68b5da4d6ab3379b3e70018d4cd3c3506291f21'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3fee2160f5151de7ad47dbaa17458bc444b60dc207b5bdbc42aef108d62dfe3a', 'txt_hash': '790edd5ed6cddb3d48493d67275b05501bcfa9616598b9b07ad39c04843af3be'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 164944, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 38, '/Author': 'djgreg1', '/CreationDate': 'D:20030106101657Z', '/Creator': 'Microsoft Word - CRP180.doc', '/ModDate': 'D:20131204151142Z', '/Producer': 'Acrobat PDFWriter 4.0 for Windows NT', '/Title': 'CRP180.PDF', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 122661, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 55, '/Creator': 'Microsoft Word - ST v2.4public.doc', '/CreationDate': 'D:20030106103621', '/Title': 'ST v2.4public.doc', '/Author': 'djgreg1', '/Producer': 'Acrobat PDFWriter 4.0 for Windows NT', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'UK': {'CERTIFICATION REPORT No. P180': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 24, 'EAL1': 1, 'EAL7': 1, 'EAL0': 1, 'EAL4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 45, 'ALC_FLR': 2}}, 'cc_sfr': {'FAU': {'FAU_AUD.1': 5, 'FAU_GEN.1': 3}}, 'cc_claims': {}, 'vendor': {'Microsoft': {'Microsoft': 2, 'Microsoft Corporation': 1}, 'Cisco': {'Cisco': 70, 'Cisco Systems': 10}}, 'eval_facility': {}, 'symmetric_crypto': {'miscellaneous': {'Skinny': {'Skinny': 3}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 4}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCIMB-99-031': 1, 'CCIMB-99-032': 1, 'CCIMB-99-033': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 10, 'EAL 4': 2, 'EAL4 augmented': 1}, 'ITSEC': {'ITSEC E3 or': 1, 'ITSEC E3 equivalent': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 3, 'ACM_CAP.4': 3, 'ACM_SCP.2': 3}, 'ADO': {'ADO_DEL.2': 4, 'ADO_IGS.1': 3}, 'ADV': {'ADV_FSP.2': 3, 'ADV_HLD.2': 3, 'ADV_IMP.1': 3, 'ADV_LLD.1': 3, 'ADV_RCR.1': 3, 'ADV_SPM.1': 3}, 'AGD': {'AGD_ADM.1': 3, 'AGD_USR.1': 3}, 'ALC': {'ALC_FLR.1': 10, 'ALC_DVS.1': 3, 'ALC_LCD.1': 3, 'ALC_TAT.1': 3}, 'ATE': {'ATE_COV.2': 3, 'ATE_DPT.1': 3, 'ATE_FUN.1': 3, 'ATE_IND.2': 3}, 'AVA': {'AVA_MSU.2': 3, 'AVA_SOF.1': 3, 'AVA_VLA.2': 4}}, 'cc_sfr': {'FAU': {'FAU_AUD.1': 21, 'FAU_GEN.1': 13, 'FAU_AUD.1.1': 1, 'FAU_AUD.1.2': 1, 'FAU_STG.1': 9, 'FAU_SAR.1': 6, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_AUD': 1}, 'FDP': {'FDP_ACC.1': 15, 'FDP_ACF.1': 12, 'FDP_IFC.1': 14, 'FDP_IFF.1': 12, 'FDP_RIP.1': 7, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 2, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_IFF.1.6': 1, 'FDP_RIP.1.1': 1, 'FDP_ACC': 1}, 'FMT': {'FMT_MSA.1': 12, 'FMT_MSA.3': 17, 'FMT_MTD.1': 12, 'FMT_MTD.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMR.1': 6, 'FMT_MSA': 1}, 'FPT': {'FPT_RVM.1': 9, 'FPT_SEP.1': 7, 'FPT_STM.1': 11, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_STM.1.1': 1}}, 'cc_claims': {'O': {'O.VALID': 5, 'O.HOSTILE': 5, 'O.PRIVATE': 5, 'O.ATTEMPT': 4, 'O.SECPROC': 4}, 'T': {'T.INTERN': 4, 'T.EXTERN': 3, 'T.SPOOF': 4}, 'A': {'A.PHYSICAL': 4, 'A.HOSTILE': 3, 'A.AUDIT': 4, 'A.AUDFUL': 3, 'A.REMOTE': 4}, 'OE': {'OE.AUDIT': 4}}, 'vendor': {'Microsoft': {'Microsoft': 1}, 'Cisco': {'Cisco': 137, 'Cisco Systems': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'miscellaneous': {'Skinny': {'Skinny': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 3}}}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'SSH': {'SSH': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to CRP180.pdf.
    • The st_filename property was set to stciscofw_v2.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to CRP180.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}]}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP180.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/stciscofw_v2.pdf.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Cisco Secure PIX Firewall V6.2(2) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Boundary Protection Devices and Systems",
  "cert_link": null,
  "dgst": "f1c95290c6a8ec32",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CRP180",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.3:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.8:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.4:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.2:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.1:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.4:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.1:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.5:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.6:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.3:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "eal": "EAL4",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "6.2"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2020-3549",
        "CVE-2018-15458",
        "CVE-2019-12688",
        "CVE-2019-12680",
        "CVE-2023-20155",
        "CVE-2023-20074",
        "CVE-2019-1642",
        "CVE-2022-20833",
        "CVE-2021-1267",
        "CVE-2024-20471",
        "CVE-2022-20627",
        "CVE-2020-3557",
        "CVE-2019-1949",
        "CVE-2022-20839",
        "CVE-2022-20836",
        "CVE-2020-3553",
        "CVE-2024-20415",
        "CVE-2022-20843",
        "CVE-2022-20854",
        "CVE-2018-0233",
        "CVE-2022-20932",
        "CVE-2019-12683",
        "CVE-2023-20114",
        "CVE-2018-0281",
        "CVE-2018-0384",
        "CVE-2019-12682",
        "CVE-2024-20372",
        "CVE-2024-20403",
        "CVE-2023-20063",
        "CVE-2024-20387",
        "CVE-2019-12685",
        "CVE-2019-12691",
        "CVE-2022-20831",
        "CVE-2019-15280",
        "CVE-2019-12679",
        "CVE-2019-12681",
        "CVE-2022-20938",
        "CVE-2019-1671",
        "CVE-2024-20273",
        "CVE-2022-20835",
        "CVE-2017-12245",
        "CVE-2022-20629",
        "CVE-2019-12686",
        "CVE-2018-0278",
        "CVE-2024-20424",
        "CVE-2023-20005",
        "CVE-2018-0365",
        "CVE-2019-1833",
        "CVE-2019-16028",
        "CVE-2020-3558",
        "CVE-2022-20744",
        "CVE-2022-20628",
        "CVE-2024-20388",
        "CVE-2021-1477",
        "CVE-2023-20219",
        "CVE-2021-1457",
        "CVE-2021-1455",
        "CVE-2024-20409",
        "CVE-2024-20386",
        "CVE-2022-20834",
        "CVE-2022-20941",
        "CVE-2019-1699",
        "CVE-2017-6673",
        "CVE-2019-1832",
        "CVE-2023-20220",
        "CVE-2022-20740",
        "CVE-2021-1126",
        "CVE-2019-15992",
        "CVE-2021-1456",
        "CVE-2020-3320",
        "CVE-2022-20905",
        "CVE-2020-3550",
        "CVE-2022-20832",
        "CVE-2022-20840",
        "CVE-2024-20410",
        "CVE-2018-0370",
        "CVE-2018-0333",
        "CVE-2018-15397",
        "CVE-2020-3515",
        "CVE-2024-20269",
        "CVE-2018-0283",
        "CVE-2022-20838",
        "CVE-2020-3499",
        "CVE-2019-12689",
        "CVE-2017-6717",
        "CVE-2021-1239",
        "CVE-2017-12244",
        "CVE-2020-3514",
        "CVE-2024-20300",
        "CVE-2022-20936",
        "CVE-2022-20935",
        "CVE-2019-12684",
        "CVE-2021-1238",
        "CVE-2023-20048",
        "CVE-2018-0383",
        "CVE-2021-1458",
        "CVE-2019-12687",
        "CVE-2018-0385",
        "CVE-2022-20743",
        "CVE-2017-3847",
        "CVE-2019-12700",
        "CVE-2019-12690",
        "CVE-2022-20872"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Cisco Systems, Inc.",
  "manufacturer_web": "https://www.cisco.com",
  "name": "Cisco Secure PIX Firewall V6.2(2)",
  "not_valid_after": "2013-02-27",
  "not_valid_before": "2002-12-01",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "CRP180.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "UK": {
          "CERTIFICATION REPORT No. P180": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 2,
          "ALC_FLR.1": 45
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL0": 1,
          "EAL1": 1,
          "EAL4": 24,
          "EAL4 augmented": 1,
          "EAL7": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_AUD.1": 5,
          "FAU_GEN.1": 3
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCIMB-99-031": 1,
          "CCIMB-99-032": 1,
          "CCIMB-99-033": 1
        }
      },
      "symmetric_crypto": {
        "miscellaneous": {
          "Skinny": {
            "Skinny": 3
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 70,
          "Cisco Systems": 10
        },
        "Microsoft": {
          "Microsoft": 2,
          "Microsoft Corporation": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "djgreg1",
      "/CreationDate": "D:20030106101657Z",
      "/Creator": "Microsoft Word - CRP180.doc",
      "/ModDate": "D:20131204151142Z",
      "/Producer": "Acrobat PDFWriter 4.0 for Windows NT",
      "/Title": "CRP180.PDF",
      "pdf_file_size_bytes": 164944,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 38
    },
    "st_filename": "stciscofw_v2.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.AUDFUL": 3,
          "A.AUDIT": 4,
          "A.HOSTILE": 3,
          "A.PHYSICAL": 4,
          "A.REMOTE": 4
        },
        "O": {
          "O.ATTEMPT": 4,
          "O.HOSTILE": 5,
          "O.PRIVATE": 5,
          "O.SECPROC": 4,
          "O.VALID": 5
        },
        "OE": {
          "OE.AUDIT": 4
        },
        "T": {
          "T.EXTERN": 3,
          "T.INTERN": 4,
          "T.SPOOF": 4
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 3,
          "ACM_CAP.4": 3,
          "ACM_SCP.2": 3
        },
        "ADO": {
          "ADO_DEL.2": 4,
          "ADO_IGS.1": 3
        },
        "ADV": {
          "ADV_FSP.2": 3,
          "ADV_HLD.2": 3,
          "ADV_IMP.1": 3,
          "ADV_LLD.1": 3,
          "ADV_RCR.1": 3,
          "ADV_SPM.1": 3
        },
        "AGD": {
          "AGD_ADM.1": 3,
          "AGD_USR.1": 3
        },
        "ALC": {
          "ALC_DVS.1": 3,
          "ALC_FLR.1": 10,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 3
        },
        "ATE": {
          "ATE_COV.2": 3,
          "ATE_DPT.1": 3,
          "ATE_FUN.1": 3,
          "ATE_IND.2": 3
        },
        "AVA": {
          "AVA_MSU.2": 3,
          "AVA_SOF.1": 3,
          "AVA_VLA.2": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 2,
          "EAL4": 10,
          "EAL4 augmented": 1
        },
        "ITSEC": {
          "ITSEC E3 equivalent": 1,
          "ITSEC E3 or": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_AUD": 1,
          "FAU_AUD.1": 21,
          "FAU_AUD.1.1": 1,
          "FAU_AUD.1.2": 1,
          "FAU_GEN.1": 13,
          "FAU_SAR.1": 6,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_STG.1": 9,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1
        },
        "FDP": {
          "FDP_ACC": 1,
          "FDP_ACC.1": 15,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 12,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 14,
          "FDP_IFC.1.1": 1,
          "FDP_IFF.1": 12,
          "FDP_IFF.1.1": 2,
          "FDP_IFF.1.2": 1,
          "FDP_IFF.1.3": 1,
          "FDP_IFF.1.4": 1,
          "FDP_IFF.1.5": 1,
          "FDP_IFF.1.6": 1,
          "FDP_RIP.1": 7,
          "FDP_RIP.1.1": 1
        },
        "FMT": {
          "FMT_MSA": 1,
          "FMT_MSA.1": 12,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 17,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 12,
          "FMT_MTD.1.1": 1,
          "FMT_SMR.1": 6
        },
        "FPT": {
          "FPT_RVM.1": 9,
          "FPT_RVM.1.1": 1,
          "FPT_SEP.1": 7,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1,
          "FPT_STM.1": 11,
          "FPT_STM.1.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 1
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {
        "miscellaneous": {
          "Skinny": {
            "Skinny": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 137,
          "Cisco Systems": 2
        },
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "djgreg1",
      "/CreationDate": "D:20030106103621",
      "/Creator": "Microsoft Word - ST v2.4public.doc",
      "/Producer": "Acrobat PDFWriter 4.0 for Windows NT",
      "/Title": "ST v2.4public.doc",
      "pdf_file_size_bytes": 122661,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 55
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP180.pdf",
  "scheme": "UK",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/stciscofw_v2.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "99d33cd5f907cd4174db433f2ee7bff491a6c5da11901549b2d44cfca303d8db",
      "txt_hash": "fad452f0ea1a82d3bcba3d48c68b5da4d6ab3379b3e70018d4cd3c3506291f21"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "3fee2160f5151de7ad47dbaa17458bc444b60dc207b5bdbc42aef108d62dfe3a",
      "txt_hash": "790edd5ed6cddb3d48493d67275b05501bcfa9616598b9b07ad39c04843af3be"
    }
  },
  "status": "archived"
}