Durio Unified Threat Management (UTM) v3.2.5
CSV information ?
Status | active |
---|---|
Valid from | 14.07.2020 |
Valid until | 14.07.2025 |
Scheme | 🇲🇾 MY |
Manufacturer | Open Kod Sdn. Bhd. |
Category | Network and Network-Related Devices and Systems |
Security level | EAL2 |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL2File metadata
Title | SISCB Print20080513340 |
---|---|
Creation date | D:20200805133537+08'00' |
Modification date | D:20200924041229Z00'00' |
Pages | 1 |
Creator | ISCB Printer |
Producer | macOS Version 10.15.5 (Build 19F101) Quartz PDFContext, AppendMode 1.1 |
Certification report ?
Extracted keywords
Protocols
SSLSecurity level
EAL2, EAL 2Claims
A.PLATFORM, A.ADMIN, A.USERSecurity Functional Requirements (SFR)
FAU_GEN.1, FDP_ACC.1, FIA_ATD.1, FIA_UAU.2, FMT_MSA.1, FMT_MTD.1, FMT_SMF.1, FTP_TRP.1Certificates
ISCB-5-RPT-C105-CR-v1Certification process
out of scope, 73 It is strongly recommended that: a) Even though the identified vulnerabilities are out of scope of the evaluation, the developer should address all residual vulnerabilities by: I. Preventing XSSStandards
ISO/IEC15408, ISO/IEC 18045File metadata
Title | Microsoft Word - ISCB-5-RPT-C105-CR-v1.docx |
---|---|
Creation date | D:20200729055815Z00'00' |
Modification date | D:20200729055815Z00'00' |
Pages | 31 |
Creator | Word |
Producer | macOS Version 10.15.5 (Build 19F101) Quartz PDFContext |
Security target ?
Extracted keywords
Protocols
SSH, SSL, VPNVendor
STM, MicrosoftSecurity level
EAL2Claims
O.ACCESS, O.CONFIG, O.MANAGE, O.USER, O.NOAUTH, O.TOECOM, T.MANAGEMENT, T.WEB_ATTACK, T.UNAUTHORISED_AC, T.CONFIG, T.TOECOM, T.UNAUTHORISED_ACCESS, A.PLATFORM, A.ADMIN, A.USER, A.TIMESTAMP, A.PHYSICAL, OE.PLATFORM, OE.ADMIN, OE.USER, OE.TIMESTAMP, OE.PHYSICALSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ALC_CMC.2, ALC_DEL.1, ATE_IND.2, ATE_FUN.1, ATE_COV.1, AVA_VAN.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, ASE_TSS.1, ASE_ECD.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_GEN.1.1, FAU_SAR.1.1, FAU_SAR.1.2, FDP_ACC.1, FDP_ACF.1, FDP_IFF, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FIA_ATD.1, FIA_UAU.2, FIA_UID.2, FIA_ATD.1.1, FIA_UAU.1, FIA_UAU.2.1, FIA_UID.1, FIA_UID.2.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_MOF.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3File metadata
Title | Microsoft Word - Open Kod Durio Security Target v1.0.docx |
---|---|
Creation date | D:20200501080117Z00'00' |
Modification date | D:20200501080117Z00'00' |
Pages | 33 |
Creator | Word |
Producer | macOS Version 10.15.4 (Build 19E287) Quartz PDFContext |
Heuristics ?
Extracted SARs
ASE_CCL.1, ALC_DEL.1, ATE_FUN.1, ATE_IND.2, ADV_ARC.1, ASE_TSS.1, ADV_TDS.1, ATE_COV.1, ASE_SPD.1, ASE_REQ.2, AGD_OPE.1, ASE_ECD.1, ALC_CMS.2, AVA_VAN.2, ASE_INT.1, ALC_CMC.2, AGD_PRE.1, ADV_FSP.2, ASE_OBJ.2Scheme data ?
Cert No | 2020-004-C105 | |
---|---|---|
Developer | Open Kod Sdn. Bhd. | |
Level | EAL2 | |
Product | Durio Unified Threat Management (UTM) v3.2.5 | |
Certification Date | 14.07.2020 | |
Expiration Date | 14.07.2025 | |
Recognition | CCRA | |
Url | https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/101 | |
Enhanced | ||
Cert Id | C105 | |
Product | Durio Unified Threat Management (UTM) v3.2.5 | |
Developer | Open Kod Sdn. Bhd.Suite 3-3A 4805,CBD Perdana 2Jalan Perdana Cyber 12Cyberjaya 63000Selangor Tel: +6038318 6736Email: [email protected]: www.openkod.com | |
Category | Network and Network-Related Devices and Systems | |
Type | Data Protection | |
Scope | The TOE is a hardware appliance that includes several features such as firewall. antivirus software, content filtering and a spam filter in a single integrated package. The TOE is designed to provide firewall services ensuring network protection for Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) networks. The TOE is capable of robust filtering based on information contained in IPv4, IPv6, ICMPv4, ICMPv6, TCP and UDP headers as specified by their respective RFC’s. Additionally, the TOE is capable of content inspection of FTP and H.323 protocols to work with the dynamic nature of these protocols. The TOE has extensive logging capabilities. These audit logs are capable of being exported to an external syslog server over a protected channel for further analysis and inspection. | |
Assurance Level | EAL2 | |
Certification Date | 14.07.2020 | |
Expiration Date | 14.07.2025 | |
Mutual Recognition | CCRA | |
Target Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C105/Open_Kod_Durio_Security_Target_v10.pdf | |
Report Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C105/ISCB-5-RPT-C105-CR-v1.pdf | |
Status | Valid |
References ?
No references are available for this certificate.
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2020-07-14', 'expiration_date': '2025-07-14', 'enhanced': {'__update__': {'developer': 'Open Kod Sdn. Bhd.Suite 3-3A 4805,CBD Perdana 2Jalan Perdana Cyber 12Cyberjaya 63000Selangor Tel: +6038318 6736Email: [email protected]: www.openkod.com', 'certification_date': '2020-07-14', 'expiration_date': '2025-07-14'}}}
data.
- The scheme_data property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'd6ae6689124fcd048638f12f9b12dce51e4e69712d0da2a18820da2a36738b24', 'txt_hash': '13c2c700345864e324be973a2c8ee48fa63cbf2cd6aa9866d30c81a04729d12e'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '8c608fb5ba3a8e19d3ccff631b928564e7c1ce8a6c0357a0cf565a0c197aae55', 'txt_hash': '7c1b18c3f4226ec03427a59a7fab8872959c6fefd1761e66ecb7e150f16261b2'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 2686904, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 33, '/Title': 'Microsoft Word - Open Kod Durio Security Target v1.0.docx', '/Producer': 'macOS Version 10.15.4 (Build 19E287) Quartz PDFContext', '/Creator': 'Word', '/CreationDate': "D:20200501080117Z00'00'", '/ModDate': "D:20200501080117Z00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 88095, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Producer': 'macOS Version 10.15.5 (Build 19F101) Quartz PDFContext, AppendMode 1.1', '/CreationDate': "D:20200805133537+08'00'", '/ModDate': "D:20200924041229Z00'00'", '/Title': 'SISCB Print20080513340', '/Creator': 'ISCB Printer', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 8}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMS.2': 1, 'ALC_CMC.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_IND.2': 1, 'ATE_FUN.1': 1, 'ATE_COV.1': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_INT.1': 2, 'ASE_CCL.1': 2, 'ASE_SPD.1': 2, 'ASE_OBJ.2': 2, 'ASE_REQ.2': 2, 'ASE_TSS.1': 2, 'ASE_ECD.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 7, 'FAU_SAR.1': 5, 'FAU_GEN.1.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1}, 'FDP': {'FDP_ACC.1': 14, 'FDP_ACF.1': 7, 'FDP_IFF': 2, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 2}, 'FIA': {'FIA_ATD.1': 6, 'FIA_UAU.2': 7, 'FIA_UID.2': 8, 'FIA_ATD.1.1': 1, 'FIA_UAU.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.1': 4, 'FIA_UID.2.1': 1}, 'FMT': {'FMT_MSA.1': 8, 'FMT_MSA.3': 9, 'FMT_MTD.1': 7, 'FMT_MOF.1': 6, 'FMT_SMF.1': 12, 'FMT_SMR.1': 17, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_MOF.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 1}, 'FTP': {'FTP_TRP.1': 6, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.ACCESS': 5, 'O.CONFIG': 4, 'O.MANAGE': 4, 'O.USER': 5, 'O.NOAUTH': 5, 'O.TOECOM': 4}, 'T': {'T.MANAGEMENT': 3, 'T.WEB_ATTACK': 2, 'T.UNAUTHORISED_AC': 1, 'T.CONFIG': 2, 'T.TOECOM': 3, 'T.UNAUTHORISED_ACCESS': 2}, 'A': {'A.PLATFORM': 3, 'A.ADMIN': 2, 'A.USER': 3, 'A.TIMESTAMP': 3, 'A.PHYSICAL': 3}, 'OE': {'OE.PLATFORM': 3, 'OE.ADMIN': 3, 'OE.USER': 3, 'OE.TIMESTAMP': 2, 'OE.PHYSICAL': 2}}, 'vendor': {'STMicroelectronics': {'STM': 2}, 'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'SSL': {'SSL': 4}}, 'VPN': {'VPN': 6}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The cert_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
Open Kod Durio Security Target v1.0.pdf
. - The cert_filename property was set to
ISCB-5-CERT-C105-CERTIFICATE-v1 signed.pdf
.
The computed heuristics were updated.
- The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
.
- The st property was updated, with the
-
19.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2a2cac89cecc387075dc1a07f64a52b3ca5551e9a8c53396c1e56670742cc0bc', 'txt_hash': 'd4b7fc46e06d7ccfceaa43af708c5440b561b026b04e403df74c81e2226dacf2'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 1108056, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 31, '/Title': 'Microsoft Word - ISCB-5-RPT-C105-CR-v1.docx', '/Producer': 'macOS Version 10.15.5 (Build 19F101) Quartz PDFContext', '/Creator': 'Word', '/CreationDate': "D:20200729055815Z00'00'", '/ModDate': "D:20200729055815Z00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'MY': {'ISCB-5-RPT-C105-CR-v1': 31}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 2, 'EAL 2': 4}}, 'cc_sar': {}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 1}, 'FDP': {'FDP_ACC.1': 1}, 'FIA': {'FIA_ATD.1': 1, 'FIA_UAU.2': 1}, 'FMT': {'FMT_MSA.1': 1, 'FMT_MTD.1': 1, 'FMT_SMF.1': 1}, 'FTP': {'FTP_TRP.1': 1}}, 'cc_claims': {'A': {'A.PLATFORM': 1, 'A.ADMIN': 1, 'A.USER': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 2}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, '73 It is strongly recommended that: a) Even though the identified vulnerabilities are out of scope of the evaluation, the developer should address all residual vulnerabilities by: I. Preventing XSS': 1}}}
. - The report_filename property was set to
ISCB-5-RPT-C105-CR-v1.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
ISCB-5-RPT-C105-CR-v1
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C105-CR-v1.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Open%20Kod%20Durio%20Security%20Target%20v1.0.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The report_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Durio Unified Threat Management (UTM) v3.2.5 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C105-CERTIFICATE-v1%20signed.pdf",
"dgst": "18e677bb36b93aee",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ISCB-5-RPT-C105-CR-v1",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3.2.5"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_no": "2020-004-C105",
"certification_date": "2020-07-14",
"developer": "Open Kod Sdn. Bhd.",
"enhanced": {
"assurance_level": "EAL2",
"category": "Network and Network-Related Devices and Systems",
"cert_id": "C105",
"certification_date": "2020-07-14",
"developer": "Open Kod Sdn. Bhd.Suite 3-3A 4805,CBD Perdana 2Jalan Perdana Cyber 12Cyberjaya 63000Selangor Tel: +6038318 6736Email: [email protected]: www.openkod.com",
"expiration_date": "2025-07-14",
"mutual_recognition": "CCRA",
"product": "Durio Unified Threat Management (UTM) v3.2.5",
"report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C105/ISCB-5-RPT-C105-CR-v1.pdf",
"scope": "The TOE is a hardware appliance that includes several features such as firewall. antivirus software, content filtering and a spam filter in a single integrated package. The TOE is designed to provide firewall services ensuring network protection for Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) networks. The TOE is capable of robust filtering based on information contained in IPv4, IPv6, ICMPv4, ICMPv6, TCP and UDP headers as specified by their respective RFC\u2019s. Additionally, the TOE is capable of content inspection of FTP and H.323 protocols to work with the dynamic nature of these protocols. The TOE has extensive logging capabilities. These audit logs are capable of being exported to an external syslog server over a protected channel for further analysis and inspection.",
"status": "Valid",
"target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C105/Open_Kod_Durio_Security_Target_v10.pdf",
"type": "Data Protection"
},
"expiration_date": "2025-07-14",
"level": "EAL2",
"product": "Durio Unified Threat Management (UTM) v3.2.5",
"recognition": "CCRA",
"url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/101"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Open Kod Sdn. Bhd.",
"manufacturer_web": "https://www.openkod.com/",
"name": "Durio Unified Threat Management (UTM) v3.2.5",
"not_valid_after": "2025-07-14",
"not_valid_before": "2020-07-14",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "ISCB-5-CERT-C105-CERTIFICATE-v1 signed.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL2": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20200805133537+08\u002700\u0027",
"/Creator": "ISCB Printer",
"/ModDate": "D:20200924041229Z00\u002700\u0027",
"/Producer": "macOS Version 10.15.5 (Build 19F101) Quartz PDFContext, AppendMode 1.1",
"/Title": "SISCB Print20080513340",
"pdf_file_size_bytes": 88095,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "ISCB-5-RPT-C105-CR-v1.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"MY": {
"ISCB-5-RPT-C105-CR-v1": 31
}
},
"cc_claims": {
"A": {
"A.ADMIN": 1,
"A.PLATFORM": 1,
"A.USER": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL 2": 4,
"EAL2": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 1
},
"FDP": {
"FDP_ACC.1": 1
},
"FIA": {
"FIA_ATD.1": 1,
"FIA_UAU.2": 1
},
"FMT": {
"FMT_MSA.1": 1,
"FMT_MTD.1": 1,
"FMT_SMF.1": 1
},
"FTP": {
"FTP_TRP.1": 1
}
},
"certification_process": {
"OutOfScope": {
"73 It is strongly recommended that: a) Even though the identified vulnerabilities are out of scope of the evaluation, the developer should address all residual vulnerabilities by: I. Preventing XSS": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 18045": 2,
"ISO/IEC15408": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20200729055815Z00\u002700\u0027",
"/Creator": "Word",
"/ModDate": "D:20200729055815Z00\u002700\u0027",
"/Producer": "macOS Version 10.15.5 (Build 19F101) Quartz PDFContext",
"/Title": "Microsoft Word - ISCB-5-RPT-C105-CR-v1.docx",
"pdf_file_size_bytes": 1108056,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 31
},
"st_filename": "Open Kod Durio Security Target v1.0.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN": 2,
"A.PHYSICAL": 3,
"A.PLATFORM": 3,
"A.TIMESTAMP": 3,
"A.USER": 3
},
"O": {
"O.ACCESS": 5,
"O.CONFIG": 4,
"O.MANAGE": 4,
"O.NOAUTH": 5,
"O.TOECOM": 4,
"O.USER": 5
},
"OE": {
"OE.ADMIN": 3,
"OE.PHYSICAL": 2,
"OE.PLATFORM": 3,
"OE.TIMESTAMP": 2,
"OE.USER": 3
},
"T": {
"T.CONFIG": 2,
"T.MANAGEMENT": 3,
"T.TOECOM": 3,
"T.UNAUTHORISED_AC": 1,
"T.UNAUTHORISED_ACCESS": 2,
"T.WEB_ATTACK": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1
},
"ASE": {
"ASE_CCL.1": 2,
"ASE_ECD.1": 1,
"ASE_INT.1": 2,
"ASE_OBJ.2": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 8
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 7,
"FAU_GEN.1.1": 1,
"FAU_SAR.1": 5,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1
},
"FDP": {
"FDP_ACC.1": 14,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 7,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 2,
"FDP_IFF": 2
},
"FIA": {
"FIA_ATD.1": 6,
"FIA_ATD.1.1": 1,
"FIA_UAU.1": 1,
"FIA_UAU.2": 7,
"FIA_UAU.2.1": 1,
"FIA_UID.1": 4,
"FIA_UID.2": 8,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF.1": 6,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 8,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 9,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 7,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 12,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 17,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM.1": 1
},
"FTP": {
"FTP_TRP.1": 6,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 2
},
"TLS": {
"SSL": {
"SSL": 4
}
},
"VPN": {
"VPN": 6
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1
},
"STMicroelectronics": {
"STM": 2
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20200501080117Z00\u002700\u0027",
"/Creator": "Word",
"/ModDate": "D:20200501080117Z00\u002700\u0027",
"/Producer": "macOS Version 10.15.4 (Build 19E287) Quartz PDFContext",
"/Title": "Microsoft Word - Open Kod Durio Security Target v1.0.docx",
"pdf_file_size_bytes": 2686904,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 33
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C105-CR-v1.pdf",
"scheme": "MY",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Open%20Kod%20Durio%20Security%20Target%20v1.0.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "8c608fb5ba3a8e19d3ccff631b928564e7c1ce8a6c0357a0cf565a0c197aae55",
"txt_hash": "7c1b18c3f4226ec03427a59a7fab8872959c6fefd1761e66ecb7e150f16261b2"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2a2cac89cecc387075dc1a07f64a52b3ca5551e9a8c53396c1e56670742cc0bc",
"txt_hash": "d4b7fc46e06d7ccfceaa43af708c5440b561b026b04e403df74c81e2226dacf2"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "d6ae6689124fcd048638f12f9b12dce51e4e69712d0da2a18820da2a36738b24",
"txt_hash": "13c2c700345864e324be973a2c8ee48fa63cbf2cd6aa9866d30c81a04729d12e"
}
},
"status": "active"
}