Cisco 5940 Series Embedded Services Router
CSV information
Status | archived |
---|---|
Valid from | 05.07.2011 |
Valid until | 07.04.2015 |
Scheme | 🇺🇸 US |
Manufacturer | Cisco Systems, Inc. |
Category | Boundary Protection Devices and Systems |
Security level | EAL2+, ALC_FLR.2 |
Maintenance updates | Cisco ESR 5940 running IOS version 15.2(3)GC (05.04.2013) Certification report Security target |
Heuristics summary
Certificate
Certification report
Extracted keywords
Symmetric Algorithms
AESAsymmetric Algorithms
DSAHash functions
SHA256Schemes
Key ExchangeProtocols
SSH, IKE, IPsec, VPNRandomness
PRNGVendor
Cisco Systems, Inc, Cisco, Cisco SystemsSecurity level
EAL 2, EAL2, EAL 2 augmented, EAL2 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.2Certificates
CCEVS-VR-VID10429-2011Side-channel analysis
SPAStandards
FIPS 140-2File metadata
Title | Validation Report for N7K |
---|---|
Author | Tammy Compton |
Creation date | D:20111215111514 |
Modification date | D:20111215111514 |
Pages | 18 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
Frontpage
Certificate ID | CCEVS-VR-VID10429-2011 |
---|---|
Certified item | Cisco Systems, Inc, 170 West Tasman Dr., San Jose, CA 95134 Cisco 5940 Series Embedded Services Router |
Certification lab | US NIAP |
Security target
Extracted keywords
Symmetric Algorithms
AES, TDES, Triple-DESAsymmetric Algorithms
Diffie-Hellman, DH, DSAHash functions
SHA-1, SHA256, SHA-256, SHA-384, MD5Schemes
MAC, Key ExchangeProtocols
SSH, SSHv2, TLS, IKE, IKEv1, IPsec, VPNRandomness
PRNG, RNGVendor
Cisco, Cisco Systems, IncSecurity level
EAL2Claims
O.XXXXX, O.CRYPTOGRAPHIC_, O.PEER_AUTHENTICATION, O.INTEGRITY, O.VPNMEDIAT, O.VLAN, O.IDSENS, O.IDANLZ, O.RESPON, O.IDAUTH, O.SINUSE, O.MEDIAT, O.SECSTA, O.ENCRYP, O.SELPRO, O.AUDREC, O.ACCOUN, O.SECFUN, O.LIMEXT, O.PEER_AUTHENTICA, O.CRYPTOGRA, O.PEER_AUTH, T.UNAUTHORIZED_PEER, T.EAVESDROP, T.VPNMEDIAT, T.VLAN, T.NOHALT, T.FALACT, T.FALREC, T.FALASC, T.MISUSE, T.INADVE, T.MISACT, T.INTEGRITY, T.NOAUTH, T.REPEAT, T.REPLAY, T.ASPOOF, T.MEDIAT, T.OLDINF, T.PROCOM, T.AUDACC, T.SELPRO, T.AUDFUL, T.TUSAGE, T.USAGE, A.PHYSEC, A.LOWEXP, A.GENPUR, A.PUBLIC, A.NOEVIL, A.SINGEN, A.DIRECT, A.NOREMO, A.REMACC, A.DIREC, OE.XXXXX, OE.GUIDAN, OE.ADMTRA, OE.NTP, OE.SYSLOG, OE.PHYSEC, OE.LOWEXP, OE.GENPUR, OE.PUBLIC, OE.NOEVIL, OE.SINGEN, OE.DIRECT, OE.NOREMO, OE.REMACCSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_DVS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_SAR.3, FAU_STG.1, FAU_STG.4, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.3.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.4.1, FCS_CKM.4, FCS_COP.1, FCS_COP.1.1, FCS_CKM.4.1, FCS_CKM.1, FDP_IFC.1, FDP_IFF.1, FDP_RIP.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FDP_RIP.1.1, FDP_ITC.1, FDP_ITC.2, FIA_ATD.1, FIA_UID.2, FIA_UAU.1, FIA_AFL.1, FIA_UAU.4, FIA_ATD.1.1, FIA_UID.2.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.4.1, FMT_SMR.1, FMT_MSA.3, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MOF.1.1, FMT_SMF.1.1, FMT_MSA.1, FMT_MSA.2, FPT_STM.1, FPT_STM.1.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Side-channel analysis
SPAStandards
FIPS 140-2, FIPS 197, FIPS PUB 140-2, SP 800-67, PKCS#1, RFC 3457, RFC 2409, RFC 2406, RFC 2865, RFC 3547, RFC2409, X.509, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
Creation date | D:20111116144121 |
---|---|
Modification date | D:20111116144121 |
Pages | 63 |
Producer | ESP Ghostscript 815.02 |
Heuristics
Extracted SARs
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2Similar certificates
References
No references are available for this certificate.
Updates
-
12.05.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
03.04.2025 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The st_keywords property was updated, with the
{'crypto_protocol': {'__update__': {'SSH': {'__insert__': {'SSHv2': 1}}}}}
data.
- The st_keywords property was updated, with the
-
10.02.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Cisco 5940 Series Embedded Services Router', 'id': 'CCEVS-VR-VID10429', 'url': 'https://www.niap-ccevs.org/product/10429', 'certification_date': '2011-07-05', 'expiration_date': '2015-04-05', 'category': 'Router', 'vendor': 'Cisco Systems, Inc.', 'evaluation_facility': 'Leidos Common Criteria Testing Laboratory', 'scheme': 'US'}
.
- The scheme_data property was set to
-
05.02.2025 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The st property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The cert property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data.
The computed heuristics were updated.
- The following values were inserted:
{'protection_profiles': None, 'eal': 'EAL2+'}
. - The prev_certificates property was set to
None
. - The next_certificates property was set to
None
. - The scheme_data property was set to
None
.
- The report property was updated, with the
-
06.01.2025 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Cisco 5940 Series Embedded Services Router', 'id': 'CCEVS-VR-VID10429', 'url': 'https://www.niap-ccevs.org/product/10429', 'certification_date': '2011-07-05', 'expiration_date': '2015-04-05', 'category': 'Router', 'vendor': 'Cisco Systems, Inc.', 'evaluation_facility': 'Leidos Common Criteria Testing Laboratory', 'scheme': 'US'}
.
- The scheme_data property was set to
-
30.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
16.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Cisco 5940 Series Embedded Services Router', 'id': 'CCEVS-VR-VID10429', 'url': 'https://www.niap-ccevs.org/product/10429', 'certification_date': '2011-07-05', 'expiration_date': '2015-04-05', 'category': 'Router', 'vendor': 'Cisco Systems, Inc.', 'evaluation_facility': 'Leidos Common Criteria Testing Laboratory', 'scheme': 'US'}
.
- The scheme_data property was set to
-
09.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2011-07-05', 'expiration_date': '2015-04-05'}
data.
- The scheme_data property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '78e2bb6e3117000f6e9e3800953ea6aee8b7c1cafaa592f5dcbb558c68275608', 'txt_hash': '725da1c7f518c76ade63be6f1eda970c5012ba4c6cf8c7d5a4a1aa886aa4d2bf'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3f8ad483f45fdc8a9b051fe355c79bfcfc74e29aba3fc19c771d0720c9931c8e', 'txt_hash': '60665b51567b9a2616fe255e8423b206d6188765072fde84b18be60252165919'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 256714, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/Title': 'Validation Report for N7K', '/Author': 'Tammy Compton', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20111215111514', '/ModDate': 'D:20111215111514', '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 542335, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 63, '/Producer': 'ESP Ghostscript 815.02', '/CreationDate': 'D:20111116144121', '/ModDate': 'D:20111116144121', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'US': {'cert_id': 'CCEVS-VR-VID10429-2011', 'cert_item': 'Cisco Systems, Inc, 170 West Tasman Dr., San Jose, CA 95134 Cisco 5940 Series Embedded Services Router', 'cert_lab': 'US NIAP'}}
. - The report_keywords property was set to
{'cc_cert_id': {'US': {'CCEVS-VR-VID10429-2011': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 9, 'EAL2': 2, 'EAL 2 augmented': 2, 'EAL2 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 5}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Cisco': {'Cisco Systems, Inc': 2, 'Cisco': 57, 'Cisco Systems': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}}, 'asymmetric_crypto': {'FF': {'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 1}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 1}}, 'crypto_protocol': {'SSH': {'SSH': 5}, 'IKE': {'IKE': 2}, 'IPsec': {'IPsec': 1}, 'VPN': {'VPN': 20}}, 'randomness': {'PRNG': {'PRNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 4, 'ADV_FSP.2': 2, 'ADV_TDS.1': 2}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_FLR.2': 5, 'ALC_CMC.2': 2, 'ALC_CMS.2': 2, 'ALC_DEL.1': 2, 'ALC_DVS.1': 2}, 'ATE': {'ATE_COV.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_VAN.2': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 10, 'FAU_SAR.1': 7, 'FAU_SAR.3': 5, 'FAU_STG.1': 5, 'FAU_STG.4': 5, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.3.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.4.1': 1}, 'FCS': {'FCS_CKM.4': 9, 'FCS_COP.1': 9, 'FCS_COP.1.1': 2, 'FCS_CKM.4.1': 1, 'FCS_CKM.1': 2}, 'FDP': {'FDP_IFC.1': 25, 'FDP_IFF.1': 27, 'FDP_RIP.1': 5, 'FDP_IFC.1.1': 3, 'FDP_IFF.1.1': 3, 'FDP_IFF.1.2': 3, 'FDP_IFF.1.3': 3, 'FDP_IFF.1.4': 3, 'FDP_IFF.1.5': 3, 'FDP_IFF.1.6': 1, 'FDP_RIP.1.1': 1, 'FDP_ITC.1': 1, 'FDP_ITC.2': 1}, 'FIA': {'FIA_ATD.1': 8, 'FIA_UID.2': 7, 'FIA_UAU.1': 6, 'FIA_AFL.1': 6, 'FIA_UAU.4': 6, 'FIA_ATD.1.1': 1, 'FIA_UID.2.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.4.1': 1}, 'FMT': {'FMT_SMR.1': 13, 'FMT_MSA.3': 26, 'FMT_MOF.1': 14, 'FMT_SMF.1': 8, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.3.1': 3, 'FMT_MSA.3.2': 3, 'FMT_MOF.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_MSA.1': 6, 'FMT_MSA.2': 1}, 'FPT': {'FPT_STM.1': 6, 'FPT_STM.1.1': 1}, 'FTP': {'FTP_ITC.1': 8, 'FTP_TRP.1': 8, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.XXXXX': 1, 'O.CRYPTOGRAPHIC_': 9, 'O.PEER_AUTHENTICATION': 7, 'O.INTEGRITY': 7, 'O.VPNMEDIAT': 10, 'O.VLAN': 8, 'O.IDSENS': 8, 'O.IDANLZ': 6, 'O.RESPON': 8, 'O.IDAUTH': 10, 'O.SINUSE': 6, 'O.MEDIAT': 9, 'O.SECSTA': 8, 'O.ENCRYP': 7, 'O.SELPRO': 9, 'O.AUDREC': 9, 'O.ACCOUN': 7, 'O.SECFUN': 14, 'O.LIMEXT': 7, 'O.PEER_AUTHENTICA': 1, 'O.CRYPTOGRA': 1, 'O.PEER_AUTH': 1}, 'T': {'T.UNAUTHORIZED_PEER': 5, 'T.EAVESDROP': 4, 'T.VPNMEDIAT': 5, 'T.VLAN': 4, 'T.NOHALT': 6, 'T.FALACT': 4, 'T.FALREC': 5, 'T.FALASC': 4, 'T.MISUSE': 5, 'T.INADVE': 4, 'T.MISACT': 4, 'T.INTEGRITY': 5, 'T.NOAUTH': 7, 'T.REPEAT': 2, 'T.REPLAY': 4, 'T.ASPOOF': 2, 'T.MEDIAT': 3, 'T.OLDINF': 2, 'T.PROCOM': 3, 'T.AUDACC': 3, 'T.SELPRO': 4, 'T.AUDFUL': 3, 'T.TUSAGE': 4, 'T.USAGE': 2}, 'A': {'A.PHYSEC': 3, 'A.LOWEXP': 3, 'A.GENPUR': 3, 'A.PUBLIC': 3, 'A.NOEVIL': 3, 'A.SINGEN': 3, 'A.DIRECT': 2, 'A.NOREMO': 3, 'A.REMACC': 3, 'A.DIREC': 1}, 'OE': {'OE.XXXXX': 1, 'OE.GUIDAN': 3, 'OE.ADMTRA': 3, 'OE.NTP': 3, 'OE.SYSLOG': 3, 'OE.PHYSEC': 1, 'OE.LOWEXP': 1, 'OE.GENPUR': 1, 'OE.PUBLIC': 1, 'OE.NOEVIL': 1, 'OE.SINGEN': 1, 'OE.DIRECT': 1, 'OE.NOREMO': 1, 'OE.REMACC': 1}}, 'vendor': {'Cisco': {'Cisco': 43, 'Cisco Systems, Inc': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 8}}, 'DES': {'3DES': {'TDES': 2, 'Triple-DES': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 1, 'DH': 2}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}, 'SHA2': {'SHA256': 1, 'SHA-256': 2, 'SHA-384': 2}}, 'MD': {'MD5': {'MD5': 3}}}, 'crypto_scheme': {'MAC': {'MAC': 3}, 'KEX': {'Key Exchange': 8}}, 'crypto_protocol': {'SSH': {'SSH': 17}, 'TLS': {'TLS': {'TLS': 2}}, 'IKE': {'IKE': 14, 'IKEv1': 2}, 'IPsec': {'IPsec': 5}, 'VPN': {'VPN': 71}}, 'randomness': {'PRNG': {'PRNG': 3}, 'RNG': {'RNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 8, 'FIPS 197': 1, 'FIPS PUB 140-2': 5}, 'NIST': {'SP 800-67': 1}, 'PKCS': {'PKCS#1': 2}, 'RFC': {'RFC 3457': 4, 'RFC 2409': 7, 'RFC 2406': 4, 'RFC 2865': 1, 'RFC 3547': 3, 'RFC2409': 2}, 'X509': {'X.509': 3}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
Cisco ESR Validation Report v1-FINAL.pdf
. - The st_filename property was set to
VID10429_ST_FINAL.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['US']
. - The cert_id property was set to
CCEVS-VR-VID-10429-2011
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cisco%20ESR%20Validation%20Report%20v1-FINAL.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/VID10429_ST_FINAL.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Cisco 5940 Series Embedded Services Router was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Boundary Protection Devices and Systems",
"cert_link": null,
"dgst": "79042f2c61942631",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CCEVS-VR-VID-10429-2011",
"cert_lab": [
"US"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL2+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"5940"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2013-04-05",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10429-add1.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10429-st.pdf",
"maintenance_title": "Cisco ESR 5940 running IOS version 15.2(3)GC"
}
]
},
"manufacturer": "Cisco Systems, Inc.",
"manufacturer_web": "https://www.cisco.com",
"name": "Cisco 5940 Series Embedded Services Router",
"not_valid_after": "2015-04-07",
"not_valid_before": "2011-07-05",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "Cisco ESR Validation Report v1-FINAL.pdf",
"report_frontpage": {
"US": {
"cert_id": "CCEVS-VR-VID10429-2011",
"cert_item": "Cisco Systems, Inc, 170 West Tasman Dr., San Jose, CA 95134 Cisco 5940 Series Embedded Services Router",
"cert_lab": "US NIAP"
}
},
"report_keywords": {
"asymmetric_crypto": {
"FF": {
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {
"US": {
"CCEVS-VR-VID10429-2011": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 9,
"EAL 2 augmented": 2,
"EAL2": 2,
"EAL2 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 2
},
"IPsec": {
"IPsec": 1
},
"SSH": {
"SSH": 5
},
"VPN": {
"VPN": 20
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 1
}
},
"side_channel_analysis": {
"SCA": {
"SPA": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 57,
"Cisco Systems": 2,
"Cisco Systems, Inc": 2
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Tammy Compton",
"/CreationDate": "D:20111215111514",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20111215111514",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Title": "Validation Report for N7K",
"pdf_file_size_bytes": 256714,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 18
},
"st_filename": "VID10429_ST_FINAL.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"DH": 2,
"Diffie-Hellman": 1
},
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.DIREC": 1,
"A.DIRECT": 2,
"A.GENPUR": 3,
"A.LOWEXP": 3,
"A.NOEVIL": 3,
"A.NOREMO": 3,
"A.PHYSEC": 3,
"A.PUBLIC": 3,
"A.REMACC": 3,
"A.SINGEN": 3
},
"O": {
"O.ACCOUN": 7,
"O.AUDREC": 9,
"O.CRYPTOGRA": 1,
"O.CRYPTOGRAPHIC_": 9,
"O.ENCRYP": 7,
"O.IDANLZ": 6,
"O.IDAUTH": 10,
"O.IDSENS": 8,
"O.INTEGRITY": 7,
"O.LIMEXT": 7,
"O.MEDIAT": 9,
"O.PEER_AUTH": 1,
"O.PEER_AUTHENTICA": 1,
"O.PEER_AUTHENTICATION": 7,
"O.RESPON": 8,
"O.SECFUN": 14,
"O.SECSTA": 8,
"O.SELPRO": 9,
"O.SINUSE": 6,
"O.VLAN": 8,
"O.VPNMEDIAT": 10,
"O.XXXXX": 1
},
"OE": {
"OE.ADMTRA": 3,
"OE.DIRECT": 1,
"OE.GENPUR": 1,
"OE.GUIDAN": 3,
"OE.LOWEXP": 1,
"OE.NOEVIL": 1,
"OE.NOREMO": 1,
"OE.NTP": 3,
"OE.PHYSEC": 1,
"OE.PUBLIC": 1,
"OE.REMACC": 1,
"OE.SINGEN": 1,
"OE.SYSLOG": 3,
"OE.XXXXX": 1
},
"T": {
"T.ASPOOF": 2,
"T.AUDACC": 3,
"T.AUDFUL": 3,
"T.EAVESDROP": 4,
"T.FALACT": 4,
"T.FALASC": 4,
"T.FALREC": 5,
"T.INADVE": 4,
"T.INTEGRITY": 5,
"T.MEDIAT": 3,
"T.MISACT": 4,
"T.MISUSE": 5,
"T.NOAUTH": 7,
"T.NOHALT": 6,
"T.OLDINF": 2,
"T.PROCOM": 3,
"T.REPEAT": 2,
"T.REPLAY": 4,
"T.SELPRO": 4,
"T.TUSAGE": 4,
"T.UNAUTHORIZED_PEER": 5,
"T.USAGE": 2,
"T.VLAN": 4,
"T.VPNMEDIAT": 5
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 4,
"ADV_FSP.2": 2,
"ADV_TDS.1": 2
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.2": 2,
"ALC_CMS.2": 2,
"ALC_DEL.1": 2,
"ALC_DVS.1": 2,
"ALC_FLR.2": 5
},
"ATE": {
"ATE_COV.1": 2,
"ATE_FUN.1": 2,
"ATE_IND.2": 2
},
"AVA": {
"AVA_VAN.2": 2
}
},
"cc_security_level": {
"EAL": {
"EAL2": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 10,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAR.1": 7,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.3": 5,
"FAU_SAR.3.1": 1,
"FAU_STG.1": 5,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.4": 5,
"FAU_STG.4.1": 1
},
"FCS": {
"FCS_CKM.1": 2,
"FCS_CKM.4": 9,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 9,
"FCS_COP.1.1": 2
},
"FDP": {
"FDP_IFC.1": 25,
"FDP_IFC.1.1": 3,
"FDP_IFF.1": 27,
"FDP_IFF.1.1": 3,
"FDP_IFF.1.2": 3,
"FDP_IFF.1.3": 3,
"FDP_IFF.1.4": 3,
"FDP_IFF.1.5": 3,
"FDP_IFF.1.6": 1,
"FDP_ITC.1": 1,
"FDP_ITC.2": 1,
"FDP_RIP.1": 5,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_AFL.1": 6,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 8,
"FIA_ATD.1.1": 1,
"FIA_UAU.1": 6,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 6,
"FIA_UAU.4.1": 1,
"FIA_UID.2": 7,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF.1": 14,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 6,
"FMT_MSA.2": 1,
"FMT_MSA.3": 26,
"FMT_MSA.3.1": 3,
"FMT_MSA.3.2": 3,
"FMT_SMF.1": 8,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 13,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM.1": 6,
"FPT_STM.1.1": 1
},
"FTP": {
"FTP_ITC.1": 8,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 8,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 14,
"IKEv1": 2
},
"IPsec": {
"IPsec": 5
},
"SSH": {
"SSH": 17,
"SSHv2": 1
},
"TLS": {
"TLS": {
"TLS": 2
}
},
"VPN": {
"VPN": 71
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 8
},
"MAC": {
"MAC": 3
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 3
}
},
"SHA": {
"SHA1": {
"SHA-1": 3
},
"SHA2": {
"SHA-256": 2,
"SHA-384": 2,
"SHA256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 3
},
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"SCA": {
"SPA": 1
}
},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1,
"CCMB-2009-07-004": 1
},
"FIPS": {
"FIPS 140-2": 8,
"FIPS 197": 1,
"FIPS PUB 140-2": 5
},
"NIST": {
"SP 800-67": 1
},
"PKCS": {
"PKCS#1": 2
},
"RFC": {
"RFC 2406": 4,
"RFC 2409": 7,
"RFC 2865": 1,
"RFC 3457": 4,
"RFC 3547": 3,
"RFC2409": 2
},
"X509": {
"X.509": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 8
}
},
"DES": {
"3DES": {
"TDES": 2,
"Triple-DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 43,
"Cisco Systems, Inc": 2
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20111116144121",
"/ModDate": "D:20111116144121",
"/Producer": "ESP Ghostscript 815.02",
"pdf_file_size_bytes": 542335,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 63
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cisco%20ESR%20Validation%20Report%20v1-FINAL.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.2",
"EAL2+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/VID10429_ST_FINAL.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "78e2bb6e3117000f6e9e3800953ea6aee8b7c1cafaa592f5dcbb558c68275608",
"txt_hash": "725da1c7f518c76ade63be6f1eda970c5012ba4c6cf8c7d5a4a1aa886aa4d2bf"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "3f8ad483f45fdc8a9b051fe355c79bfcfc74e29aba3fc19c771d0720c9931c8e",
"txt_hash": "60665b51567b9a2616fe255e8423b206d6188765072fde84b18be60252165919"
}
},
"status": "archived"
}