Citrix XenDesktop Version 5.6 Platinum Edition

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status archived
Valid from 30.11.2012
Valid until 05.01.2016
Scheme 🇬🇧 UK
Manufacturer Citrix Systems, Inc.
Category Access Control Devices and Systems
Security level ALC_FLR.2, EAL2+

Heuristics summary ?

Certificate ID: CRP271

Certificate ?

Certification report ?

Extracted keywords

Hash functions
MD5
Protocols
SSL

Vendor
Microsoft

Security level
EAL2, EAL2 augmented
Security Assurance Requirements (SAR)
ALC_FLR.2
Certificates
CRP271, CRP256

Standards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Title CRP271
Author CESG Certification Body
Creation date D:20121205171319+00'00'
Modification date D:20121205171319+00'00'
Pages 22
Creator Microsoft® Word 2010
Producer Microsoft® Word 2010

References

Outgoing
  • CRP256 - archived - Citrix XenDesktop 4 Platinum Edition
Incoming
  • CRP281 - archived - Citrix XenDesktop 7.6 Platinum Edition

Security target ?

Extracted keywords

Symmetric Algorithms
AES
Protocols
TLS
TLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA

Vendor
Microsoft

Security level
EAL2, EAL2 augmented
Claims
OE.TLS
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1
Security Functional Requirements (SFR)
FCO_SCO, FCO_SCO.1, FCO_SCO.1.3, FCO_SCO.1.1, FCO_SCO.1.2, FCO_SCO.1.4, FCS_ECA, FCS_ECA.1, FCS_ECA.1.1, FDP_ACC, FDP_ACF, FDP_RIP, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_IFC.1, FIA_ATD, FIA_UID, FIA_UAU, FIA_ATD.1, FIA_UID.2, FIA_UAU.2, FIA_UID.1, FMT_SMR, FMT_SMF, FMT_MSA, FMT_MOF, FMT_SMR.1, FMT_SMF.1, FMT_MSA.1, FMT_MSA.3, FMT_MOF.1

Certification process
out of scope, 18 1.4.3 Summary of items out of scope of the TOE , Ver 1-1 SPB 16 November 2012 Page 19 of 54 Figure 4: Logical boundaries 1.4.3 Summary of items out of scope of the TOE The items out of scope of the TOE include the Microsoft components with which Citrix, integrates, as detailed in section 1.2.3. Also out of scope of the TOE are the following Citrix components which are included in XenDesktop Platinum Edition:

Standards
FIPS140-2, FIPS PUB 140-2, FIPS 140-2, FIPS 140, RFC 3602, RFC 2246, RFC 5246, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Author Peter Buck
Creation date D:20121120101708+00'00'
Modification date D:20121120101708+00'00'
Pages 54
Creator Microsoft® Word 2010
Producer Microsoft® Word 2010

Heuristics ?

Certificate ID: CRP271

Extracted SARs

ASE_CCL.1, ALC_DEL.1, ATE_FUN.1, ATE_IND.2, ADV_ARC.1, ASE_TSS.1, ADV_TDS.1, ATE_COV.1, ASE_SPD.1, ASE_REQ.2, AGD_OPE.1, ALC_FLR.2, ASE_ECD.1, ALC_CMS.2, AVA_VAN.2, ASE_INT.1, ALC_CMC.2, AGD_PRE.1, ADV_FSP.2, ASE_OBJ.2

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2012-6314
C M N
MEDIUM 5.0 2.9 26.12.2012 22:55
CVE-2014-4700
C M N
MEDIUM 4.9 6.4 11.07.2014 14:55
CVE-2016-6493
C M N
CRITICAL 9.8 5.9 19.08.2016 21:59

References ?

Updates ?

  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The direct_transitive_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2016-4810']} values added.
    • The indirect_transitive_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2016-4810']} values added.
  • 30.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The direct_transitive_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2016-4810']} values discarded.
    • The indirect_transitive_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2016-4810']} values discarded.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b64fbba524b60cd85ec235069f0b2ae196e824b5342d17524f387bf88e69d0a7', 'txt_hash': 'a99a2d0dca5bdb17329dfc8cf19c9831aed9e8d0c6cde50894051f0f222edaff'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '9813f860b92f3d696dd4cf0f44a229968d68db1b9caa986286dfe4b6983edb57', 'txt_hash': '94ec4fa4512dbaf95af664f6d628f1d6aca68e6ffaee8894b900a673f2d166da'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 1092499, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 22, '/Title': 'CRP271', '/Author': 'CESG Certification Body', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20121205171319+00'00'", '/ModDate': "D:20121205171319+00'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.citrix.com/mycitrix', 'http://www.citrix.com/support/security-compliance']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1375510, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 54, '/Author': 'Peter Buck', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20121120101708+00'00'", '/ModDate': "D:20121120101708+00'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commoncriteriaportal.org/']}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'UK': {'CRP271': 1, 'CRP256': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 3, 'EAL2 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 3}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Microsoft': {'Microsoft': 34}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 3}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 2}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 5, 'EAL2 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 5, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FCO': {'FCO_SCO': 38, 'FCO_SCO.1': 21, 'FCO_SCO.1.3': 2, 'FCO_SCO.1.1': 1, 'FCO_SCO.1.2': 1, 'FCO_SCO.1.4': 1}, 'FCS': {'FCS_ECA': 18, 'FCS_ECA.1': 7, 'FCS_ECA.1.1': 1}, 'FDP': {'FDP_ACC': 24, 'FDP_ACF': 23, 'FDP_RIP': 7, 'FDP_ACC.1': 5, 'FDP_ACF.1': 10, 'FDP_RIP.1': 1, 'FDP_IFC.1': 1}, 'FIA': {'FIA_ATD': 8, 'FIA_UID': 10, 'FIA_UAU': 8, 'FIA_ATD.1': 1, 'FIA_UID.2': 1, 'FIA_UAU.2': 1, 'FIA_UID.1': 2}, 'FMT': {'FMT_SMR': 18, 'FMT_SMF': 17, 'FMT_MSA': 35, 'FMT_MOF': 10, 'FMT_SMR.1': 6, 'FMT_SMF.1': 4, 'FMT_MSA.1': 3, 'FMT_MSA.3': 6, 'FMT_MOF.1': 1}}, 'cc_claims': {'OE': {'OE.TLS': 6}}, 'vendor': {'Microsoft': {'Microsoft': 35}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 14}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_RSA_WITH_AES_128_CBC_SHA': 3}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS140-2': 10, 'FIPS PUB 140-2': 1, 'FIPS 140-2': 9, 'FIPS 140': 2}, 'RFC': {'RFC 3602': 1, 'RFC 2246': 2, 'RFC 5246': 1}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 4, ' 18 1.4.3 Summary of items out of scope of the TOE ': 2, 'Ver 1-1 SPB 16 November 2012 Page 19 of 54 Figure 4: Logical boundaries 1.4.3 Summary of items out of scope of the TOE The items out of scope of the TOE include the Microsoft components with which Citrix': 1, 'integrates, as detailed in section 1.2.3. Also out of scope of the TOE are the following Citrix components which are included in XenDesktop Platinum Edition: ': 1}}}.
    • The report_filename property was set to CRP271 v1.0 for Citrix XenDesktop 5.6.pdf.
    • The st_filename property was set to ST271 v1-1 for Citrix XenDesktop 5.6.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to CRP271.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['CRP281']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['CRP281', 'CRP282']}, 'directly_referencing': {'_type': 'Set', 'elements': ['CRP256']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['CRP256']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values added.
    • The direct_transitive_cves property was set to {'_type': 'Set', 'elements': ['CVE-2014-4700', 'CVE-2016-4810', 'CVE-2016-6493']}.
    • The indirect_transitive_cves property was set to {'_type': 'Set', 'elements': ['CVE-2014-4700', 'CVE-2016-4810', 'CVE-2016-6493']}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP271%20v1.0%20for%20Citrix%20XenDesktop%205.6.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST271%20v1-1%20for%20Citrix%20XenDesktop%205.6.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The direct_transitive_cves property was set to None.
    • The indirect_transitive_cves property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Citrix XenDesktop Version 5.6 Platinum Edition was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Access Control Devices and Systems",
  "cert_link": null,
  "dgst": "b2f82e211fa2ac3f",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CRP271",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:a:citrix:xendesktop:5.6:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2014-4700",
        "CVE-2016-4810",
        "CVE-2016-6493"
      ]
    },
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.6"
      ]
    },
    "indirect_transitive_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2014-4700",
        "CVE-2016-6493",
        "CVE-2016-4810"
      ]
    },
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2014-4700",
        "CVE-2016-6493",
        "CVE-2012-6314"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "CRP281"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "CRP256"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "CRP281",
          "CRP282"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "CRP256"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Citrix Systems, Inc.",
  "manufacturer_web": "https://www.citrix.com",
  "name": "Citrix XenDesktop Version 5.6 Platinum Edition",
  "not_valid_after": "2016-01-05",
  "not_valid_before": "2012-11-30",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "CRP271 v1.0 for Citrix XenDesktop 5.6.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "UK": {
          "CRP256": 2,
          "CRP271": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 3,
          "EAL2 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 2
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2009-07-001": 1,
          "CCMB-2009-07-002": 1,
          "CCMB-2009-07-003": 1,
          "CCMB-2009-07-004": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 34
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "CESG Certification Body",
      "/CreationDate": "D:20121205171319+00\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20121205171319+00\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "/Title": "CRP271",
      "pdf_file_size_bytes": 1092499,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.citrix.com/mycitrix",
          "http://www.citrix.com/support/security-compliance"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 22
    },
    "st_filename": "ST271 v1-1 for Citrix XenDesktop 5.6.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "OE": {
          "OE.TLS": 6
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR.2": 5
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 5,
          "EAL2 augmented": 2
        }
      },
      "cc_sfr": {
        "FCO": {
          "FCO_SCO": 38,
          "FCO_SCO.1": 21,
          "FCO_SCO.1.1": 1,
          "FCO_SCO.1.2": 1,
          "FCO_SCO.1.3": 2,
          "FCO_SCO.1.4": 1
        },
        "FCS": {
          "FCS_ECA": 18,
          "FCS_ECA.1": 7,
          "FCS_ECA.1.1": 1
        },
        "FDP": {
          "FDP_ACC": 24,
          "FDP_ACC.1": 5,
          "FDP_ACF": 23,
          "FDP_ACF.1": 10,
          "FDP_IFC.1": 1,
          "FDP_RIP": 7,
          "FDP_RIP.1": 1
        },
        "FIA": {
          "FIA_ATD": 8,
          "FIA_ATD.1": 1,
          "FIA_UAU": 8,
          "FIA_UAU.2": 1,
          "FIA_UID": 10,
          "FIA_UID.1": 2,
          "FIA_UID.2": 1
        },
        "FMT": {
          "FMT_MOF": 10,
          "FMT_MOF.1": 1,
          "FMT_MSA": 35,
          "FMT_MSA.1": 3,
          "FMT_MSA.3": 6,
          "FMT_SMF": 17,
          "FMT_SMF.1": 4,
          "FMT_SMR": 18,
          "FMT_SMR.1": 6
        }
      },
      "certification_process": {
        "OutOfScope": {
          " 18 1.4.3 Summary of items out of scope of the TOE ": 2,
          "Ver 1-1 SPB 16 November 2012 Page 19 of 54 Figure 4: Logical boundaries 1.4.3 Summary of items out of scope of the TOE The items out of scope of the TOE include the Microsoft components with which Citrix": 1,
          "integrates, as detailed in section 1.2.3. Also out of scope of the TOE are the following Citrix components which are included in XenDesktop Platinum Edition: ": 1,
          "out of scope": 4
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 14
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2009-07-001": 1,
          "CCMB-2009-07-002": 1,
          "CCMB-2009-07-003": 1,
          "CCMB-2009-07-004": 1
        },
        "FIPS": {
          "FIPS 140": 2,
          "FIPS 140-2": 9,
          "FIPS PUB 140-2": 1,
          "FIPS140-2": 10
        },
        "RFC": {
          "RFC 2246": 2,
          "RFC 3602": 1,
          "RFC 5246": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {
        "TLS": {
          "TLS_RSA_WITH_AES_128_CBC_SHA": 3
        }
      },
      "vendor": {
        "Microsoft": {
          "Microsoft": 35
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Peter Buck",
      "/CreationDate": "D:20121120101708+00\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20121120101708+00\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "pdf_file_size_bytes": 1375510,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 54
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP271%20v1.0%20for%20Citrix%20XenDesktop%205.6.pdf",
  "scheme": "UK",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2+",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST271%20v1-1%20for%20Citrix%20XenDesktop%205.6.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "b64fbba524b60cd85ec235069f0b2ae196e824b5342d17524f387bf88e69d0a7",
      "txt_hash": "a99a2d0dca5bdb17329dfc8cf19c9831aed9e8d0c6cde50894051f0f222edaff"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "9813f860b92f3d696dd4cf0f44a229968d68db1b9caa986286dfe4b6983edb57",
      "txt_hash": "94ec4fa4512dbaf95af664f6d628f1d6aca68e6ffaee8894b900a673f2d166da"
    }
  },
  "status": "archived"
}