Google Pixel Devices on Android 14

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status active
Valid from 27.03.2024
Valid until 27.03.2026
Scheme 🇺🇸 US
Manufacturer Google LLC
Category Mobility
Security level
Protection profiles

Heuristics summary ?

Certificate ID: CCEVS-VR-VID-11419-2024

Certificate ?

Extracted keywords

Protocols
TLS

Certificates
CCEVS-VR-VID11419-2024
Evaluation facilities
Gossamer Security

File metadata

Creation date D:20240329114002-04'00'
Modification date D:20240329114002-04'00'
Pages 1
Producer iText 2.1.0 (by lowagie.com)

Certification report ?

Extracted keywords

Symmetric Algorithms
AES
Protocols
TLS

Trusted Execution Environments
TEE
Vendor
Qualcomm

Security Functional Requirements (SFR)
FAU_GEN.1
Certificates
CCEVS-VR-VID11419-2024
Evaluation facilities
Gossamer Security

File metadata

Author comptont
Creation date D:20240328080104-04'00'
Modification date D:20240328080104-04'00'
Pages 17
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Frontpage

Certificate ID CCEVS-VR-VID11419-2024
Certified item Google Pixel Devices on Android 14
Certification lab US NIAP

Security target ?

Extracted keywords

Symmetric Algorithms
AES, AES-256, AES-128, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512
Asymmetric Algorithms
ECDH, ECDHE, ECDSA, ECC
Hash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA256, scrypt
Schemes
MAC, Key Exchange
Protocols
TLS, TLS 1.2, TLS 1.1, IPsec, VPN
Randomness
DRBG, RBG
Libraries
BoringSSL
Elliptic Curves
P-384, P-256, P-521, secp256r1, secp384r1
Block cipher modes
CBC, GCM, CCM, XTS
TLS cipher suites
TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_128_CBC_SHA

Trusted Execution Environments
TrustZone, Trusty, TEE
Vendor
Qualcomm

Claims
OE.CONFIG, OE.NOTIFY, OE.PRECAUTION, OE.DATA_PROPER_USER, OE.NO_TOE_BYPASS, OE.TRUSTED_ADMIN, OE.DATA_PROPER_ADMIN, OE.IT_ENTERPRISE, OE.MOBILE_DEVICE_PLATFORM, OE.WIRELESS_NETWORK
Security Assurance Requirements (SAR)
ADV_FSP, ADV_FSP.1, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_TSU_EXT.1, ALC_CMC, ALC_CMS, ALC_TSU_EXT, ALC_CMC.1, ALC_CMS.1, ATE_IND, ATE_IND.1, AVA_VAN, AVA_VAN.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_ALT_EXT.2, FAU_GEN, FAU_SAR.1, FAU_SEL.1, FAU_STG.4, FAU_STG.1, FAU_ALT_EXT.2.1, FAU_ALT_EXT.2.2, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SEL.1.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.4.1, FCS_STC_EXT.1.2, FCS_CKM_EXT.1, FCS_CKM_EXT.2, FCS_CKM_EXT.3, FCS_CKM_EXT.4, FCS_CKM_EXT.5, FCS_CKM_EXT.6, FCS_RBG_EXT.1, FCS_SRV_EXT.1, FCS_SRV_EXT.2, FCS_STG_EXT.1, FCS_STG_EXT.2, FCS_STG_EXT.3, FCS_CKM_EXT.8, FCS_TLSC_EXT, FCS_WPA_EXT.1, FCS_TLS_EXT.1, FCS_TLSC_EXT.1, FCS_TLSC_EXT.2, FCS_TLSC_EXT.4, FCS_TLSC_EXT.5, FCS_STG_EXT.4, FCS_CKM.1, FCS_CKM, FCS_COP, FCS_STG_EXT, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM_EXT.1.1, FCS_CKM_EXT.1.2, FCS_CKM_EXT.1.3, FCS_CKM_EXT.2.1, FCS_CKM_EXT.3.1, FCS_CKM_EXT.3.2, FCS_COP.1, FCS_CKM_EXT.4.1, FCS_CKM_EXT.4.2, FCS_CKM_EXT.5.1, FCS_CKM_EXT.5.2, FCS_CKM_EXT.6.1, FCS_CKM_EXT.8.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_RBG_EXT.1.3, FCS_SRV_EXT.1.1, FCS_SRV_EXT.2.1, FCS_STG_EXT.1.1, FCS_STG_EXT.1.2, FCS_STG_EXT.1.3, FCS_STG_EXT.1.4, FCS_STG_EXT.1.5, FCS_STG_EXT.2.1, FCS_STG_EXT.2.2, FCS_STG_EXT.3.1, FCS_STG_EXT.3.2, FCS_STG_EXT.4.1, FCS_TLS_EXT.1.1, FCS_TLSC_EXT.1.1, FCS_TLSC_EXT.1.2, FCS_TLSC_EXT.1.3, FCS_TLSC_EXT.2.1, FCS_TLSC_EXT.4.1, FCS_TLSC_EXT.5.1, FCS_WPA_EXT.1.1, FDP_ACC.1, FDP_ACF_EXT.1, FDP_ACF_EXT.2, FDP_DAR_EXT.1, FDP_DAR_EXT.2, FDP_IFC_EXT.1, FDP_STG_EXT.1, FDP_UPC_EXT, FDP_ACF_EXT.1.1, FDP_ACF_EXT.1.2, FDP_ACF_EXT.2.1, FDP_DAR_EXT.1.1, FDP_DAR_EXT.1.2, FDP_DAR_EXT.2.1, FDP_DAR_EXT.2.2, FDP_DAR_EXT.2.3, FDP_DAR_EXT.2.4, FDP_IFC_EXT.1.1, FDP_STG_EXT.1.1, FDP_UPC_EXT.1, FIA_AFL_EXT.1, FIA_PMG_EXT.1, FIA_TRT_EXT.1, FIA_UAU_EXT.1, FIA_UAU_EXT.2, FIA_BLT_EXT.1, FIA_BLT_EXT.2, FIA_BLT_EXT.3, FIA_BLT_EXT.4, FIA_BLT_EXT.6, FIA_BLT_EXT.7, FIA_PAE_EXT.1, FIA_MBE_EXT.1, FIA_MBE_EXT.2, FIA_MBV_EXT, FIA_MBV_EXT.2, FIA_ENR_EXT.2, FIA_UAU.5, FIA_UAU, FIA_UAU.7, FIA_AFL_EXT.1.1, FIA_AFL_EXT.1.2, FIA_AFL_EXT.1.3, FIA_AFL_EXT.1.4, FIA_AFL_EXT.1.5, FIA_AFL_EXT.1.6, FIA_BLT_EXT.1.1, FIA_BLT_EXT.2.1, FIA_BLT_EXT.3.1, FIA_BLT_EXT.4.1, FIA_BLT_EXT.4.2, FIA_BLT_EXT.6.1, FIA_BLT_EXT.7.1, FIA_ENR_EXT.2.1, FIA_MBE_EXT.1.1, FIA_MBE_EXT.2.1, FIA_MBV_EXT.1, FIA_MBV_EXT.2.1, FIA_PAE_EXT.1.1, FIA_PMG_EXT.1.1, FIA_TRT_EXT.1.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_UAU.7.1, FIA_UAU_EXT.1.1, FIA_UAU_EXT.2.1, FIA_UAU_EXT.2.2, FIA_BMG_EXT, FMT_MOF_EXT.1, FMT_SMF_EXT.2, FMT_SMF_EXT.3, FMT_SMF_EXT, FMT_POL_EXT.2, FMT_SMF_EXT.4, FMT_UNR_EXT.1, FMT_SMF.1, FMT_SMF, FMT_UNR_EXT.1.1, FMT_MOF_EXT.1.1, FMT_MOF_EXT.1.2, FMT_POL_EXT.2.1, FMT_POL_EXT.2.2, FMT_SMF.1.1, FMT_SMF_EXT.1, FMT_SMF_EXT.2.1, FMT_SMF_EXT.3.1, FMT_SMF_EXT.4.1, FMT_SMF_EXT.4.2, FPT_TUD_EXT.5, FPT_AEX_EXT.1, FPT_AEX_EXT.2, FPT_AEX_EXT.3, FPT_AEX_EXT.4, FPT_AEX_EXT.5, FPT_BBD_EXT.1, FPT_JTA_EXT.1, FPT_KST_EXT.1, FPT_KST_EXT.2, FPT_KST_EXT.3, FPT_NOT_EXT.1, FPT_TST_EXT.1, FPT_TST_EXT, FPT_TUD_EXT.1, FPT_TUD_EXT.2, FPT_TUD_EXT.3, FPT_TUD_EXT.6, FPT_BDP_EXT.1, FPT_PBT_EXT.1, FPT_STM.1, FPT_AEX_EXT.1.1, FPT_AEX_EXT.1.2, FPT_AEX_EXT.2.1, FPT_AEX_EXT.3.1, FPT_AEX_EXT.4.1, FPT_AEX_EXT.4.2, FPT_AEX_EXT.5.1, FPT_AEX_EXT.5.2, FPT_BBD_EXT.1.1, FPT_BDP_EXT.1.1, FPT_BDP_EXT.1.2, FPT_JTA_EXT.1.1, FPT_KST_EXT.1.1, FPT_KST_EXT.2.1, FPT_KST_EXT.3.1, FPT_NOT_EXT.1.1, FPT_PBT_EXT.1.1, FPT_STM.1.1, FPT_TST_EXT.1.1, FPT_TST_EXT.2, FPT_TST_EXT.3, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_TUD_EXT.2.1, FPT_TUD_EXT.2.2, FPT_TUD_EXT.2.3, FPT_TUD_EXT.3.1, FPT_TUD_EXT.6.1, FTA_SSL_EXT.1, FTA_WSE_EXT.1, FTA_TAB.1, FTA_SSL_EXT.1.1, FTA_SSL_EXT.1.2, FTA_SSL_EXT.1.3, FTA_TAB.1.1, FTA_WSE_EXT.1.1, FTP_ITC_EXT.1, FTP_BLT_EXT.1, FTP_BLT_EXT.2, FTP_BLT_EXT, FTP_ITC, FTP_TRP.1, FTP_ITC_EXT.1.1, FTP_BLT_EXT.1.1, FTP_BLT_EXT.1.2, FTP_BLT_EXT.2.1, FTP_BLT_EXT.3, FTP_ITC.1, FTP_ITC_EXT.1.2, FTP_ITC_EXT.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3

Standards
FIPS PUB 186-4, FIPS PUB 197, FIPS 186-4, FIPS 197, FIPS 180-4, FIPS 198-1, NIST SP 800-38A, NIST SP 800-38C, NIST SP 800-38F, NIST SP 800-38D, NIST SP 800-38E, NIST SP 800-57, SP 800-108, SP 800-56A, SP 800-90A, SP 800-38C, SP 800-38E, SP 800-38A, SP 800-38D, RFC 3394, RFC 2818, RFC 5246, RFC 5288, RFC 5289, RFC 6125, RFC 4346, RFC 5216, RFC 5746, RFC 5280, RFC 6960, X.509

File metadata

Title Google Pixel Devices on Android 14 Security Target
Keywords Common Criteria, MDF
Author Brian Wood
Creation date D:20240327114501-04'00'
Modification date D:20240327114501-04'00'
Pages 99
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Heuristics ?

Certificate ID: CCEVS-VR-VID-11419-2024

Extracted SARs

ADV_FSP.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1, ATE_IND.1, AVA_VAN.1, ALC_CMC.1, ALC_TSU_EXT.1

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2008-7298
C M N
MEDIUM 5.8 4.9 09.08.2011 19:55
CVE-2011-0419
C M N
MEDIUM 4.3 2.9 16.05.2011 17:55
CVE-2014-9411
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2014-9935
C M N
HIGH 7.8 5.9 16.05.2017 14:29
CVE-2014-9936
C M N
HIGH 7.0 5.9 16.05.2017 14:29
CVE-2014-9937
C M N
HIGH 7.8 5.9 16.05.2017 14:29
CVE-2014-9960
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2014-9961
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2014-9962
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2014-9963
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2014-9964
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2014-9965
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2014-9966
C M N
HIGH 7.0 5.9 13.06.2017 20:29
CVE-2014-9967
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2014-9968
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2014-9969
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2014-9971
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2014-9972
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2014-9973
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2014-9974
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2014-9975
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2014-9976
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2014-9977
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2014-9978
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2014-9979
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2014-9980
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2014-9981
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-0574
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-0575
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-0576
C M N
HIGH 7.0 5.9 18.08.2017 18:29
CVE-2015-1529
C M N
HIGH 7.5 3.6 23.05.2017 04:29
CVE-2015-8592
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-8593
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-8594
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-8595
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-8596
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-8995
C M N
HIGH 7.8 5.9 16.05.2017 14:29
CVE-2015-8996
C M N
HIGH 7.0 5.9 16.05.2017 14:29
CVE-2015-8997
C M N
HIGH 7.0 5.9 16.05.2017 14:29
CVE-2015-8998
C M N
HIGH 7.8 5.9 16.05.2017 14:29
CVE-2015-8999
C M N
HIGH 7.8 5.9 16.05.2017 14:29
CVE-2015-9000
C M N
HIGH 7.8 5.9 16.05.2017 14:29
CVE-2015-9001
C M N
MEDIUM 5.5 3.6 16.05.2017 14:29
CVE-2015-9002
C M N
HIGH 7.8 5.9 16.05.2017 14:29
CVE-2015-9003
C M N
HIGH 7.8 5.9 16.05.2017 14:29
CVE-2015-9020
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2015-9021
C M N
MEDIUM 5.5 3.6 13.06.2017 20:29
CVE-2015-9022
C M N
HIGH 7.0 5.9 13.06.2017 20:29
CVE-2015-9023
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2015-9024
C M N
MEDIUM 5.5 3.6 13.06.2017 20:29
CVE-2015-9025
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2015-9026
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2015-9027
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2015-9028
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2015-9029
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2015-9030
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2015-9031
C M N
LOW 3.3 1.4 13.06.2017 20:29
CVE-2015-9032
C M N
LOW 3.3 1.4 13.06.2017 20:29
CVE-2015-9033
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2015-9034
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9035
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9036
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9037
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9038
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9039
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9040
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9041
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9042
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9043
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9044
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9045
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9046
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9047
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9048
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9049
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9050
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9051
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9052
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9053
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9054
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9055
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9060
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9061
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9062
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9063
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9064
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9065
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9066
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9067
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9068
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9069
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9070
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9071
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9072
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2015-9073
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2016-10239
C M N
HIGH 7.8 5.9 16.05.2017 14:29
CVE-2016-10332
C M N
MEDIUM 5.5 3.6 13.06.2017 20:29
CVE-2016-10333
C M N
MEDIUM 5.5 3.6 13.06.2017 20:29
CVE-2016-10334
C M N
MEDIUM 5.5 3.6 13.06.2017 20:29
CVE-2016-10335
C M N
MEDIUM 5.5 3.6 13.06.2017 20:29
CVE-2016-10336
C M N
MEDIUM 5.5 3.6 13.06.2017 20:29
CVE-2016-10337
C M N
MEDIUM 5.5 3.6 13.06.2017 20:29
CVE-2016-10338
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2016-10339
C M N
HIGH 7.1 5.2 13.06.2017 20:29
CVE-2016-10340
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2016-10341
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2016-10342
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2016-10343
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2016-10344
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2016-10346
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2016-10347
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2016-10380
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2016-10381
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2016-10382
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2016-10383
C M N
HIGH 8.1 5.9 18.08.2017 18:29
CVE-2016-10384
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2016-10385
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2016-10386
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2016-10387
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2016-10388
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2016-10389
C M N
HIGH 7.8 5.9 18.08.2017 18:29
CVE-2016-10390
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2016-10391
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2016-10392
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2016-5347
C M N
MEDIUM 4.7 3.6 16.08.2017 15:29
CVE-2016-5853
C M N
HIGH 7.0 5.9 16.08.2017 15:29
CVE-2016-5854
C M N
MEDIUM 4.7 3.6 16.08.2017 15:29
CVE-2016-5855
C M N
MEDIUM 4.7 3.6 16.08.2017 15:29
CVE-2016-5858
C M N
MEDIUM 4.7 3.6 16.08.2017 15:29
CVE-2016-5859
C M N
HIGH 7.0 5.9 16.08.2017 15:29
CVE-2016-5860
C M N
HIGH 7.0 5.9 16.08.2017 15:29
CVE-2016-5861
C M N
HIGH 8.8 5.9 16.08.2017 15:29
CVE-2016-5862
C M N
HIGH 7.0 5.9 16.08.2017 15:29
CVE-2016-5863
C M N
HIGH 7.8 5.9 16.08.2017 15:29
CVE-2016-5864
C M N
HIGH 7.8 5.9 16.08.2017 15:29
CVE-2016-5867
C M N
HIGH 7.0 5.9 16.08.2017 15:29
CVE-2016-5871
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2016-5872
C M N
CRITICAL 9.8 5.9 18.08.2017 18:29
CVE-2017-0843
C M N
HIGH 7.8 5.9 16.11.2017 23:29
CVE-2017-0862
C M N
HIGH 7.8 5.9 16.11.2017 23:29
CVE-2017-0863
C M N
HIGH 7.8 5.9 16.11.2017 23:29
CVE-2017-0864
C M N
HIGH 7.8 5.9 16.11.2017 23:29
CVE-2017-0865
C M N
HIGH 7.8 5.9 16.11.2017 23:29
CVE-2017-6421
C M N
HIGH 8.8 5.9 16.08.2017 15:29
CVE-2017-7364
C M N
CRITICAL 9.8 5.9 18.08.2017 19:29
CVE-2017-7365
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2017-7366
C M N
MEDIUM 5.5 3.6 13.06.2017 20:29
CVE-2017-7367
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2017-7368
C M N
HIGH 7.0 5.9 13.06.2017 20:29
CVE-2017-7369
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2017-7370
C M N
HIGH 7.0 5.9 13.06.2017 20:29
CVE-2017-7371
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2017-7372
C M N
HIGH 7.0 5.9 13.06.2017 20:29
CVE-2017-7373
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2017-8233
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2017-8234
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2017-8235
C M N
MEDIUM 5.5 3.6 13.06.2017 20:29
CVE-2017-8236
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2017-8237
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2017-8238
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2017-8239
C M N
MEDIUM 5.5 3.6 13.06.2017 20:29
CVE-2017-8240
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2017-8241
C M N
HIGH 7.8 5.9 13.06.2017 20:29
CVE-2017-8242
C M N
MEDIUM 5.9 3.6 13.06.2017 20:29
CVE-2017-8243
C M N
HIGH 7.8 5.9 16.08.2017 15:29
CVE-2017-8253
C M N
HIGH 7.8 5.9 18.08.2017 18:29
CVE-2017-8254
C M N
MEDIUM 5.5 3.6 18.08.2017 18:29
CVE-2017-8255
C M N
HIGH 7.8 5.9 18.08.2017 18:29
CVE-2017-8256
C M N
HIGH 7.8 5.9 18.08.2017 18:29
CVE-2017-8257
C M N
HIGH 7.8 5.9 18.08.2017 18:29
CVE-2017-8260
C M N
HIGH 7.8 5.9 18.08.2017 18:29
CVE-2017-8261
C M N
HIGH 7.8 5.9 18.08.2017 18:29
CVE-2017-8262
C M N
HIGH 7.0 5.9 18.08.2017 18:29
CVE-2017-8263
C M N
HIGH 7.8 5.9 18.08.2017 18:29
CVE-2017-8265
C M N
HIGH 7.0 5.9 18.08.2017 18:29
CVE-2017-8266
C M N
HIGH 7.0 5.9 18.08.2017 18:29
CVE-2017-8267
C M N
HIGH 7.0 5.9 18.08.2017 18:29
CVE-2017-8268
C M N
HIGH 7.8 5.9 18.08.2017 18:29
CVE-2017-8270
C M N
HIGH 7.0 5.9 18.08.2017 18:29
CVE-2017-8272
C M N
HIGH 7.8 5.9 18.08.2017 18:29
CVE-2017-9678
C M N
HIGH 7.8 5.9 18.08.2017 19:29
CVE-2017-9679
C M N
HIGH 7.5 3.6 18.08.2017 19:29
CVE-2017-9680
C M N
HIGH 7.5 3.6 18.08.2017 19:29
CVE-2017-9682
C M N
MEDIUM 4.7 3.6 18.08.2017 19:29
CVE-2017-9684
C M N
HIGH 7.0 5.9 18.08.2017 19:29
CVE-2017-9685
C M N
HIGH 8.1 5.9 18.08.2017 19:29
CVE-2019-20606
C M N
CRITICAL 9.3 5.8 24.03.2020 20:15
CVE-2020-13843
C M N
MEDIUM 5.5 3.6 05.06.2020 00:15
CVE-2021-0920
C M N
MEDIUM 6.4 5.9 15.12.2021 19:15
CVE-2021-39810
C M N
HIGH 7.8 5.9 30.10.2023 17:15
CVE-2023-21350
C M N
MEDIUM 5.5 3.6 30.10.2023 17:15
CVE-2023-21351
C M N
HIGH 7.8 5.9 30.10.2023 17:15
CVE-2023-21352
C M N
MEDIUM 5.5 3.6 30.10.2023 17:15
CVE-2023-21353
C M N
HIGH 7.5 3.6 30.10.2023 17:15
CVE-2023-21354
C M N
MEDIUM 5.5 3.6 30.10.2023 17:15
CVE-2023-21355
C M N
HIGH 7.8 5.9 30.10.2023 17:15
CVE-2023-21356
C M N
HIGH 8.8 5.9 30.10.2023 17:15
CVE-2023-21357
C M N
MEDIUM 4.4 3.6 30.10.2023 17:15
CVE-2023-21358
C M N
HIGH 7.8 5.9 30.10.2023 17:15
CVE-2023-21359
C M N
MEDIUM 4.4 3.6 30.10.2023 17:15
CVE-2023-21360
C M N
MEDIUM 6.7 5.9 30.10.2023 17:15
CVE-2023-21361
C M N
HIGH 8.8 5.9 30.10.2023 17:15
CVE-2023-21364
C M N
MEDIUM 5.5 3.6 30.10.2023 17:15
CVE-2023-21366
C M N
MEDIUM 5.5 3.6 30.10.2023 17:15
CVE-2023-21373
C M N
HIGH 7.8 5.9 30.10.2023 18:15
CVE-2023-21374
C M N
HIGH 7.8 5.9 30.10.2023 18:15
CVE-2023-40073
C M N
MEDIUM 5.5 3.6 04.12.2023 23:15
CVE-2023-40075
C M N
MEDIUM 5.5 3.6 04.12.2023 23:15
CVE-2023-40076
C M N
MEDIUM 5.5 3.6 04.12.2023 23:15
CVE-2023-40077
C M N
HIGH 8.1 5.9 04.12.2023 23:15
CVE-2023-40078
C M N
CRITICAL 9.8 5.9 04.12.2023 23:15
CVE-2023-40079
C M N
HIGH 7.8 5.9 04.12.2023 23:15
CVE-2023-40080
C M N
HIGH 7.8 5.9 04.12.2023 23:15
CVE-2023-40081
C M N
MEDIUM 5.5 3.6 04.12.2023 23:15
CVE-2023-40082
C M N
CRITICAL 9.8 5.9 04.12.2023 23:15
CVE-2023-40083
C M N
MEDIUM 5.5 3.6 04.12.2023 23:15
CVE-2023-40084
C M N
HIGH 7.8 5.9 04.12.2023 23:15
CVE-2023-40087
C M N
HIGH 8.8 5.9 04.12.2023 23:15
CVE-2023-40088
C M N
HIGH 8.8 5.9 04.12.2023 23:15
CVE-2023-40089
C M N
HIGH 7.8 5.9 04.12.2023 23:15
CVE-2023-40090
C M N
MEDIUM 6.5 3.6 04.12.2023 23:15
CVE-2023-40091
C M N
HIGH 7.8 5.9 04.12.2023 23:15
CVE-2023-40092
C M N
MEDIUM 5.5 3.6 04.12.2023 23:15
CVE-2023-40094
C M N
HIGH 7.8 5.9 04.12.2023 23:15
CVE-2023-40095
C M N
HIGH 7.8 5.9 04.12.2023 23:15
CVE-2023-40096
C M N
HIGH 7.8 5.9 04.12.2023 23:15
CVE-2023-40098
C M N
MEDIUM 5.5 3.6 04.12.2023 23:15
CVE-2023-40103
C M N
HIGH 7.8 5.9 04.12.2023 23:15
CVE-2023-45773
C M N
HIGH 7.8 5.9 04.12.2023 23:15
CVE-2023-45774
C M N
HIGH 7.8 5.9 04.12.2023 23:15
CVE-2023-45775
C M N
HIGH 7.8 5.9 04.12.2023 23:15
CVE-2023-45776
C M N
HIGH 7.8 5.9 04.12.2023 23:15
CVE-2023-45777
C M N
HIGH 7.8 5.9 04.12.2023 23:15
CVE-2023-45781
C M N
MEDIUM 5.5 3.6 04.12.2023 23:15
CVE-2024-34727
C M N
HIGH 7.5 3.6 15.08.2024 22:15

Scheme data ?

Product Google Pixel Devices on Android 14
Id CCEVS-VR-VID11419-2024
Url https://www.niap-ccevs.org/product/11419
Certification Date 27.03.2024
Expiration Date 27.03.2026
Category Biometrics, Mobility, Network Encryption, Wireless LAN
Vendor Google LLC
Evaluation Facility Gossamer Security Solutions
Scheme US
Cert Link https://www.niap-ccevs.org/api/file/get_public_file/?file_id=29249
Target Link https://www.niap-ccevs.org/api/file/get_public_file/?file_id=29250
Report Link https://www.niap-ccevs.org/api/file/get_public_file/?file_id=29251

References ?

No references are available for this certificate.

Updates ?

  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '2024-03-27', 'expiration_date': '2026-03-27'} data.
  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The following values were removed: {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Functional Package for TLS Version 1.1', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf', 'pp_ids': None}]}.
    • The following values were added: {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Functional Package for TLS Version 1.1', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/PKG_TLS_V1.1.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PKG_TLS_V1.1']}}]}.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*']}.
    • The related_cves property was set to {'_type': 'Set', 'elements': ['CVE-2017-8256', 'CVE-2023-40078', 'CVE-2017-8233', 'CVE-2016-10346', 'CVE-2021-0920', 'CVE-2015-9045', 'CVE-2016-5864', 'CVE-2023-21366', 'CVE-2017-0865', 'CVE-2017-8270', 'CVE-2023-21364', 'CVE-2016-10342', 'CVE-2017-7369', 'CVE-2014-9960', 'CVE-2015-9037', 'CVE-2017-8268', 'CVE-2015-9035', 'CVE-2014-9975', 'CVE-2015-9068', 'CVE-2023-45775', 'CVE-2016-5860', 'CVE-2016-10336', 'CVE-2016-5854', 'CVE-2014-9981', 'CVE-2023-40083', 'CVE-2017-8265', 'CVE-2016-10380', 'CVE-2015-9061', 'CVE-2015-9060', 'CVE-2015-9032', 'CVE-2023-21357', 'CVE-2015-9042', 'CVE-2017-6421', 'CVE-2023-40084', 'CVE-2023-21352', 'CVE-2017-9682', 'CVE-2023-45774', 'CVE-2023-40090', 'CVE-2017-7370', 'CVE-2014-9965', 'CVE-2016-10341', 'CVE-2023-21353', 'CVE-2023-40098', 'CVE-2017-8240', 'CVE-2015-9064', 'CVE-2023-40088', 'CVE-2016-5347', 'CVE-2015-9073', 'CVE-2016-10392', 'CVE-2014-9969', 'CVE-2015-9027', 'CVE-2017-9679', 'CVE-2015-9036', 'CVE-2023-40092', 'CVE-2017-0863', 'CVE-2015-9067', 'CVE-2023-21355', 'CVE-2016-10391', 'CVE-2016-10340', 'CVE-2017-8262', 'CVE-2016-5859', 'CVE-2014-9966', 'CVE-2017-7372', 'CVE-2015-9055', 'CVE-2014-9972', 'CVE-2015-9020', 'CVE-2015-0574', 'CVE-2023-21350', 'CVE-2016-10381', 'CVE-2015-9038', 'CVE-2017-8272', 'CVE-2015-9000', 'CVE-2023-40079', 'CVE-2016-10239', 'CVE-2015-9031', 'CVE-2015-1529', 'CVE-2015-9066', 'CVE-2017-7367', 'CVE-2014-9962', 'CVE-2016-10334', 'CVE-2023-21358', 'CVE-2023-21361', 'CVE-2015-8996', 'CVE-2008-7298', 'CVE-2016-5855', 'CVE-2017-8257', 'CVE-2017-9684', 'CVE-2016-10385', 'CVE-2014-9971', 'CVE-2023-21373', 'CVE-2017-8253', 'CVE-2016-10384', 'CVE-2015-8596', 'CVE-2015-9030', 'CVE-2015-9028', 'CVE-2017-8238', 'CVE-2023-21351', 'CVE-2015-9023', 'CVE-2014-9963', 'CVE-2015-9025', 'CVE-2017-8237', 'CVE-2016-5872', 'CVE-2017-7366', 'CVE-2017-8235', 'CVE-2016-10333', 'CVE-2017-8234', 'CVE-2015-9051', 'CVE-2017-8260', 'CVE-2023-40080', 'CVE-2015-9062', 'CVE-2017-8242', 'CVE-2016-10343', 'CVE-2015-8594', 'CVE-2023-40094', 'CVE-2015-8595', 'CVE-2017-8261', 'CVE-2023-21354', 'CVE-2023-40103', 'CVE-2016-10390', 'CVE-2023-40095', 'CVE-2015-8997', 'CVE-2023-45777', 'CVE-2017-8254', 'CVE-2014-9978', 'CVE-2015-9043', 'CVE-2017-9678', 'CVE-2023-21356', 'CVE-2016-10344', 'CVE-2016-5861', 'CVE-2016-5871', 'CVE-2015-8592', 'CVE-2015-0575', 'CVE-2016-10389', 'CVE-2023-21359', 'CVE-2016-10388', 'CVE-2015-8998', 'CVE-2017-8263', 'CVE-2016-10347', 'CVE-2023-40075', 'CVE-2023-40076', 'CVE-2014-9979', 'CVE-2015-9021', 'CVE-2015-9024', 'CVE-2015-8999', 'CVE-2015-9052', 'CVE-2014-9937', 'CVE-2023-40077', 'CVE-2017-9685', 'CVE-2023-40073', 'CVE-2017-7368', 'CVE-2014-9974', 'CVE-2015-9072', 'CVE-2014-9976', 'CVE-2017-0862', 'CVE-2017-8236', 'CVE-2024-34727', 'CVE-2014-9936', 'CVE-2016-10332', 'CVE-2017-7371', 'CVE-2014-9977', 'CVE-2014-9411', 'CVE-2014-9961', 'CVE-2016-10335', 'CVE-2015-9039', 'CVE-2016-10387', 'CVE-2014-9980', 'CVE-2023-21374', 'CVE-2017-9680', 'CVE-2015-9070', 'CVE-2016-10386', 'CVE-2023-21360', 'CVE-2015-9048', 'CVE-2017-7365', 'CVE-2014-9935', 'CVE-2014-9964', 'CVE-2016-5867', 'CVE-2015-9049', 'CVE-2016-5853', 'CVE-2015-9033', 'CVE-2015-9044', 'CVE-2023-40081', 'CVE-2016-10338', 'CVE-2016-10382', 'CVE-2015-9034', 'CVE-2015-9003', 'CVE-2023-45773', 'CVE-2023-40087', 'CVE-2016-5858', 'CVE-2016-10339', 'CVE-2015-9054', 'CVE-2017-0843', 'CVE-2011-0419', 'CVE-2015-9053', 'CVE-2015-9063', 'CVE-2020-13843', 'CVE-2015-9046', 'CVE-2017-8267', 'CVE-2016-5862', 'CVE-2017-7364', 'CVE-2023-45781', 'CVE-2019-20606', 'CVE-2023-45776', 'CVE-2015-9022', 'CVE-2021-39810', 'CVE-2016-5863', 'CVE-2023-40096', 'CVE-2017-8266', 'CVE-2015-8995', 'CVE-2023-40089', 'CVE-2017-0864', 'CVE-2015-9026', 'CVE-2015-9029', 'CVE-2014-9967', 'CVE-2015-0576', 'CVE-2023-40091', 'CVE-2015-9071', 'CVE-2015-9047', 'CVE-2017-8255', 'CVE-2017-8241', 'CVE-2015-8593', 'CVE-2014-9968', 'CVE-2014-9973', 'CVE-2017-8239', 'CVE-2015-9001', 'CVE-2015-9069', 'CVE-2015-9041', 'CVE-2015-9050', 'CVE-2017-8243', 'CVE-2015-9065', 'CVE-2016-10383', 'CVE-2016-10337', 'CVE-2015-9002', 'CVE-2017-7373', 'CVE-2015-9040', 'CVE-2023-40082']}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '498ed21c856e497844b1473584a4106b7b8ed4e4da74088a505ec73d6082dcb6', 'txt_hash': 'f8e432cf93c0b3a7d31becbcb68997dd458344ee47de9a741bff9a20384a5b4f'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e06d1715e62f8326ae7d05054c3afd928058e49caad4f3ad0d6cae933919ce86', 'txt_hash': 'f3a5f3056af758e45b5186e87181afb18c209b34d84032f62d1c8c71b07834da'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1442337, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 99, '/Title': 'Google Pixel Devices on Android 14 Security Target', '/Author': 'Brian Wood', '/Keywords': 'Common Criteria, MDF', '/Creator': 'Microsoft® Word for Microsoft 365', '/CreationDate': "D:20240327114501-04'00'", '/ModDate': "D:20240327114501-04'00'", '/Producer': 'Microsoft® Word for Microsoft 365', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://developer.android.com/reference/javax/net/ssl/SSLSocket', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=10351', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=14486', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35538', 'http://www.wi-fi.org/certification', 'https://source.android.com/docs/security/features/biometric/measure#biometric-classes', 'https://source.android.com/devices/architecture/kernel/modular-kernels#core-kernel-requirements', 'https://developer.android.com/reference/packages', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=14487', 'https://source.android.com/docs/compatibility/14/android-14-cdd#7310_biometric_sensors', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=32875', 'http://developer.android.com/reference/android/bluetooth/package-summary.html', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=34777', 'https://developer.android.com/reference/android/app/admin/SecurityLog.SecurityEvent', 'https://developer.android.com/reference/android/app/admin/SecurityLog#constants_1', 'https://developer.android.com/reference/android/R.attr#protectionLevel', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=12209', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=11839', 'https://m.google.com/', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37317', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35547', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37254', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=12015', 'https://source.android.com/setup/contribute/report-bugs', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=8370', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=12016', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=12177', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35533', 'https://support.google.com/nexus/answer/4457705', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=14485', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37266', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35120', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35548', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=9904', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=21229', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35561', 'https://android-developers.googleblog.com/', 'http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ddi0487a.f/index.html', 'https://developer.android.com/reference/android/security/keystore/KeyGenParameterSpec.Builder#setUnlockedDeviceRequired(boolean)', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=13389', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35052', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=10317', 'https://developer.android.com/reference/javax/net/ssl/HttpsURLConnection', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=12149', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=11217', 'https://developer.android.com/reference/android/security/keystore/KeyGenParameterSpec.Builder#setUserAuthenticationRequired(boolean)', 'mailto:[email protected]', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37255', 'https://globalplatform.org/', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37012', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=17273', 'https://source.android.com/docs/security/bulletin']}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 189538, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/ModDate': "D:20240329114002-04'00'", '/CreationDate': "D:20240329114002-04'00'", '/Producer': 'iText 2.1.0 (by lowagie.com)', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'ADV': {'ADV_FSP': 1, 'ADV_FSP.1': 9}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 10, 'AGD_PRE.1': 6}, 'ALC': {'ALC_TSU_EXT.1': 8, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_TSU_EXT': 1, 'ALC_CMC.1': 4, 'ALC_CMS.1': 5}, 'ATE': {'ATE_IND': 1, 'ATE_IND.1': 5}, 'AVA': {'AVA_VAN': 1, 'AVA_VAN.1': 6}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 11, 'FAU_ALT_EXT.2': 3, 'FAU_GEN': 3, 'FAU_SAR.1': 1, 'FAU_SEL.1': 2, 'FAU_STG.4': 1, 'FAU_STG.1': 2, 'FAU_ALT_EXT.2.1': 1, 'FAU_ALT_EXT.2.2': 1, 'FAU_GEN.1.1': 3, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.4.1': 1}, 'FCS': {'FCS_STC_EXT.1.2': 1, 'FCS_CKM_EXT.1': 3, 'FCS_CKM_EXT.2': 11, 'FCS_CKM_EXT.3': 11, 'FCS_CKM_EXT.4': 5, 'FCS_CKM_EXT.5': 2, 'FCS_CKM_EXT.6': 3, 'FCS_RBG_EXT.1': 15, 'FCS_SRV_EXT.1': 3, 'FCS_SRV_EXT.2': 2, 'FCS_STG_EXT.1': 5, 'FCS_STG_EXT.2': 6, 'FCS_STG_EXT.3': 2, 'FCS_CKM_EXT.8': 4, 'FCS_TLSC_EXT': 7, 'FCS_WPA_EXT.1': 3, 'FCS_TLS_EXT.1': 2, 'FCS_TLSC_EXT.1': 9, 'FCS_TLSC_EXT.2': 3, 'FCS_TLSC_EXT.4': 2, 'FCS_TLSC_EXT.5': 2, 'FCS_STG_EXT.4': 2, 'FCS_CKM.1': 9, 'FCS_CKM': 9, 'FCS_COP': 66, 'FCS_STG_EXT': 1, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 4, 'FCS_CKM_EXT.1.1': 1, 'FCS_CKM_EXT.1.2': 1, 'FCS_CKM_EXT.1.3': 1, 'FCS_CKM_EXT.2.1': 1, 'FCS_CKM_EXT.3.1': 1, 'FCS_CKM_EXT.3.2': 1, 'FCS_COP.1': 7, 'FCS_CKM_EXT.4.1': 2, 'FCS_CKM_EXT.4.2': 1, 'FCS_CKM_EXT.5.1': 1, 'FCS_CKM_EXT.5.2': 1, 'FCS_CKM_EXT.6.1': 1, 'FCS_CKM_EXT.8.1': 1, 'FCS_RBG_EXT.1.1': 1, 'FCS_RBG_EXT.1.2': 1, 'FCS_RBG_EXT.1.3': 1, 'FCS_SRV_EXT.1.1': 1, 'FCS_SRV_EXT.2.1': 1, 'FCS_STG_EXT.1.1': 1, 'FCS_STG_EXT.1.2': 1, 'FCS_STG_EXT.1.3': 1, 'FCS_STG_EXT.1.4': 1, 'FCS_STG_EXT.1.5': 1, 'FCS_STG_EXT.2.1': 2, 'FCS_STG_EXT.2.2': 1, 'FCS_STG_EXT.3.1': 1, 'FCS_STG_EXT.3.2': 1, 'FCS_STG_EXT.4.1': 1, 'FCS_TLS_EXT.1.1': 1, 'FCS_TLSC_EXT.1.1': 1, 'FCS_TLSC_EXT.1.2': 1, 'FCS_TLSC_EXT.1.3': 1, 'FCS_TLSC_EXT.2.1': 1, 'FCS_TLSC_EXT.4.1': 1, 'FCS_TLSC_EXT.5.1': 1, 'FCS_WPA_EXT.1.1': 1}, 'FDP': {'FDP_ACC.1': 3, 'FDP_ACF_EXT.1': 3, 'FDP_ACF_EXT.2': 2, 'FDP_DAR_EXT.1': 3, 'FDP_DAR_EXT.2': 4, 'FDP_IFC_EXT.1': 3, 'FDP_STG_EXT.1': 2, 'FDP_UPC_EXT': 4, 'FDP_ACF_EXT.1.1': 1, 'FDP_ACF_EXT.1.2': 2, 'FDP_ACF_EXT.2.1': 1, 'FDP_DAR_EXT.1.1': 1, 'FDP_DAR_EXT.1.2': 1, 'FDP_DAR_EXT.2.1': 1, 'FDP_DAR_EXT.2.2': 1, 'FDP_DAR_EXT.2.3': 1, 'FDP_DAR_EXT.2.4': 1, 'FDP_IFC_EXT.1.1': 1, 'FDP_STG_EXT.1.1': 1, 'FDP_UPC_EXT.1': 5}, 'FIA': {'FIA_AFL_EXT.1': 2, 'FIA_PMG_EXT.1': 5, 'FIA_TRT_EXT.1': 3, 'FIA_UAU_EXT.1': 3, 'FIA_UAU_EXT.2': 3, 'FIA_BLT_EXT.1': 3, 'FIA_BLT_EXT.2': 3, 'FIA_BLT_EXT.3': 3, 'FIA_BLT_EXT.4': 3, 'FIA_BLT_EXT.6': 2, 'FIA_BLT_EXT.7': 3, 'FIA_PAE_EXT.1': 3, 'FIA_MBE_EXT.1': 2, 'FIA_MBE_EXT.2': 2, 'FIA_MBV_EXT': 4, 'FIA_MBV_EXT.2': 2, 'FIA_ENR_EXT.2': 3, 'FIA_UAU.5': 2, 'FIA_UAU': 2, 'FIA_UAU.7': 1, 'FIA_AFL_EXT.1.1': 1, 'FIA_AFL_EXT.1.2': 1, 'FIA_AFL_EXT.1.3': 1, 'FIA_AFL_EXT.1.4': 1, 'FIA_AFL_EXT.1.5': 1, 'FIA_AFL_EXT.1.6': 1, 'FIA_BLT_EXT.1.1': 1, 'FIA_BLT_EXT.2.1': 1, 'FIA_BLT_EXT.3.1': 1, 'FIA_BLT_EXT.4.1': 1, 'FIA_BLT_EXT.4.2': 1, 'FIA_BLT_EXT.6.1': 1, 'FIA_BLT_EXT.7.1': 1, 'FIA_ENR_EXT.2.1': 1, 'FIA_MBE_EXT.1.1': 1, 'FIA_MBE_EXT.2.1': 1, 'FIA_MBV_EXT.1': 7, 'FIA_MBV_EXT.2.1': 1, 'FIA_PAE_EXT.1.1': 1, 'FIA_PMG_EXT.1.1': 1, 'FIA_TRT_EXT.1.1': 1, 'FIA_UAU.5.1': 3, 'FIA_UAU.5.2': 1, 'FIA_UAU.6': 2, 'FIA_UAU.7.1': 1, 'FIA_UAU_EXT.1.1': 1, 'FIA_UAU_EXT.2.1': 3, 'FIA_UAU_EXT.2.2': 1, 'FIA_BMG_EXT': 1}, 'FMT': {'FMT_MOF_EXT.1': 4, 'FMT_SMF_EXT.2': 2, 'FMT_SMF_EXT.3': 2, 'FMT_SMF_EXT': 2, 'FMT_POL_EXT.2': 3, 'FMT_SMF_EXT.4': 3, 'FMT_UNR_EXT.1': 2, 'FMT_SMF.1': 3, 'FMT_SMF': 2, 'FMT_UNR_EXT.1.1': 2, 'FMT_MOF_EXT.1.1': 1, 'FMT_MOF_EXT.1.2': 1, 'FMT_POL_EXT.2.1': 1, 'FMT_POL_EXT.2.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMF_EXT.1': 2, 'FMT_SMF_EXT.2.1': 1, 'FMT_SMF_EXT.3.1': 1, 'FMT_SMF_EXT.4.1': 1, 'FMT_SMF_EXT.4.2': 1}, 'FPT': {'FPT_TUD_EXT.5': 1, 'FPT_AEX_EXT.1': 3, 'FPT_AEX_EXT.2': 2, 'FPT_AEX_EXT.3': 3, 'FPT_AEX_EXT.4': 2, 'FPT_AEX_EXT.5': 2, 'FPT_BBD_EXT.1': 2, 'FPT_JTA_EXT.1': 2, 'FPT_KST_EXT.1': 4, 'FPT_KST_EXT.2': 3, 'FPT_KST_EXT.3': 3, 'FPT_NOT_EXT.1': 2, 'FPT_TST_EXT.1': 3, 'FPT_TST_EXT': 8, 'FPT_TUD_EXT.1': 3, 'FPT_TUD_EXT.2': 2, 'FPT_TUD_EXT.3': 2, 'FPT_TUD_EXT.6': 2, 'FPT_BDP_EXT.1': 2, 'FPT_PBT_EXT.1': 2, 'FPT_STM.1': 2, 'FPT_AEX_EXT.1.1': 1, 'FPT_AEX_EXT.1.2': 1, 'FPT_AEX_EXT.2.1': 1, 'FPT_AEX_EXT.3.1': 1, 'FPT_AEX_EXT.4.1': 1, 'FPT_AEX_EXT.4.2': 1, 'FPT_AEX_EXT.5.1': 1, 'FPT_AEX_EXT.5.2': 1, 'FPT_BBD_EXT.1.1': 1, 'FPT_BDP_EXT.1.1': 1, 'FPT_BDP_EXT.1.2': 1, 'FPT_JTA_EXT.1.1': 1, 'FPT_KST_EXT.1.1': 1, 'FPT_KST_EXT.2.1': 1, 'FPT_KST_EXT.3.1': 1, 'FPT_NOT_EXT.1.1': 1, 'FPT_PBT_EXT.1.1': 1, 'FPT_STM.1.1': 1, 'FPT_TST_EXT.1.1': 1, 'FPT_TST_EXT.2': 2, 'FPT_TST_EXT.3': 2, 'FPT_TUD_EXT.1.1': 1, 'FPT_TUD_EXT.1.2': 1, 'FPT_TUD_EXT.1.3': 1, 'FPT_TUD_EXT.2.1': 1, 'FPT_TUD_EXT.2.2': 1, 'FPT_TUD_EXT.2.3': 1, 'FPT_TUD_EXT.3.1': 1, 'FPT_TUD_EXT.6.1': 1}, 'FTA': {'FTA_SSL_EXT.1': 3, 'FTA_WSE_EXT.1': 3, 'FTA_TAB.1': 1, 'FTA_SSL_EXT.1.1': 1, 'FTA_SSL_EXT.1.2': 1, 'FTA_SSL_EXT.1.3': 1, 'FTA_TAB.1.1': 1, 'FTA_WSE_EXT.1.1': 1}, 'FTP': {'FTP_ITC_EXT.1': 5, 'FTP_BLT_EXT.1': 3, 'FTP_BLT_EXT.2': 2, 'FTP_BLT_EXT': 6, 'FTP_ITC': 2, 'FTP_TRP.1': 1, 'FTP_ITC_EXT.1.1': 3, 'FTP_BLT_EXT.1.1': 1, 'FTP_BLT_EXT.1.2': 1, 'FTP_BLT_EXT.2.1': 1, 'FTP_BLT_EXT.3': 2, 'FTP_ITC.1': 3, 'FTP_ITC_EXT.1.2': 2, 'FTP_ITC_EXT.1.3': 2, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'OE': {'OE.CONFIG': 1, 'OE.NOTIFY': 1, 'OE.PRECAUTION': 1, 'OE.DATA_PROPER_USER': 2, 'OE.NO_TOE_BYPASS': 1, 'OE.TRUSTED_ADMIN': 1, 'OE.DATA_PROPER_ADMIN': 1, 'OE.IT_ENTERPRISE': 1, 'OE.MOBILE_DEVICE_PLATFORM': 1, 'OE.WIRELESS_NETWORK': 1}}, 'vendor': {'Qualcomm': {'Qualcomm': 7}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 34, 'AES-256': 17, 'AES-128': 1}}, 'constructions': {'MAC': {'HMAC': 7, 'HMAC-SHA-256': 4, 'HMAC-SHA-384': 2, 'HMAC-SHA-512': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 6, 'ECDHE': 1}, 'ECDSA': {'ECDSA': 22}, 'ECC': {'ECC': 6}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-256': 13, 'SHA-384': 4, 'SHA-512': 2, 'SHA256': 1}}, 'scrypt': {'scrypt': 3}}, 'crypto_scheme': {'MAC': {'MAC': 9}, 'KEX': {'Key Exchange': 3}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 74, 'TLS 1.2': 2, 'TLS 1.1': 1}}, 'IPsec': {'IPsec': 1}, 'VPN': {'VPN': 21}}, 'randomness': {'PRNG': {'DRBG': 19}, 'RNG': {'RBG': 10}}, 'cipher_mode': {'CBC': {'CBC': 8}, 'GCM': {'GCM': 11}, 'CCM': {'CCM': 3}, 'XTS': {'XTS': 7}}, 'ecc_curve': {'NIST': {'P-384': 8, 'P-256': 8, 'P-521': 4, 'secp256r1': 2, 'secp384r1': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_RSA_WITH_AES_128_GCM_SHA256': 1, 'TLS_RSA_WITH_AES_256_GCM_SHA384': 2, 'TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256': 2, 'TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384': 2, 'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256': 2, 'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384': 2, 'TLS_RSA_WITH_AES_128_CBC_SHA': 1}}, 'crypto_library': {'BoringSSL': {'BoringSSL': 24}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'ARM': {'TrustZone': 2}, 'other': {'Trusty': 3, 'TEE': 36}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-4': 4, 'FIPS PUB 197': 2, 'FIPS 186-4': 18, 'FIPS 197': 16, 'FIPS 180-4': 15, 'FIPS 198-1': 15}, 'NIST': {'NIST SP 800-38A': 1, 'NIST SP 800-38C': 1, 'NIST SP 800-38F': 1, 'NIST SP 800-38D': 1, 'NIST SP 800-38E': 1, 'NIST SP 800-57': 1, 'SP 800-108': 10, 'SP 800-56A': 1, 'SP 800-90A': 6, 'SP 800-38C': 1, 'SP 800-38E': 4, 'SP 800-38A': 4, 'SP 800-38D': 3}, 'RFC': {'RFC 3394': 2, 'RFC 2818': 2, 'RFC 5246': 3, 'RFC 5288': 3, 'RFC 5289': 8, 'RFC 6125': 1, 'RFC 4346': 1, 'RFC 5216': 1, 'RFC 5746': 1, 'RFC 5280': 4, 'RFC 6960': 1}, 'X509': {'X.509': 13}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {'US': {'CCEVS-VR-VID11419-2024': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Gossamer': {'Gossamer Security': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to st_vid11419-st.pdf.
    • The cert_filename property was set to st_vid11419-ci.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TSU_EXT', 'level': 1}]}.
  • 19.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7dea2fef4f2f330f89fa0758793132f10ea79546a762f6a664f9f3fb244c5d6a', 'txt_hash': 'fc3ff94aa861d4e4dc0f61588da85c666517a28e3bc4afb77d437b26c51d2aa6'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 332468, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 17, '/Author': 'comptont', '/Creator': 'Microsoft® Word for Microsoft 365', '/CreationDate': "D:20240328080104-04'00'", '/ModDate': "D:20240328080104-04'00'", '/Producer': 'Microsoft® Word for Microsoft 365', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://web.nvd.nist.gov/view/vuln/search', 'http://www.kb.cert.org/vuls/']}}.
    • The report_frontpage property was set to {'US': {'cert_id': 'CCEVS-VR-VID11419-2024', 'cert_item': 'Google Pixel Devices on Android 14', 'cert_lab': 'US NIAP'}}.
    • The report_keywords property was set to {'cc_cert_id': {'US': {'CCEVS-VR-VID11419-2024': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 1}}, 'cc_claims': {}, 'vendor': {'Qualcomm': {'Qualcomm': 3}}, 'eval_facility': {'Gossamer': {'Gossamer Security': 4}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 8}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'other': {'TEE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to st_vid11419-vr.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['US'].
    • The cert_id property was set to CCEVS-VR-VID-11419-2024.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11419-vr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11419-st.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Google Pixel Devices on Android 14 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Mobility",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11419-ci.pdf",
  "dgst": "d822fb20999bc557",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-VID-11419-2024",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TSU_EXT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "14"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2014-9973",
        "CVE-2017-9685",
        "CVE-2015-9053",
        "CVE-2017-7369",
        "CVE-2016-5864",
        "CVE-2014-9971",
        "CVE-2014-9981",
        "CVE-2015-0575",
        "CVE-2017-8265",
        "CVE-2023-21358",
        "CVE-2015-9024",
        "CVE-2017-0843",
        "CVE-2021-39810",
        "CVE-2015-9030",
        "CVE-2024-34727",
        "CVE-2017-8266",
        "CVE-2016-10384",
        "CVE-2023-21356",
        "CVE-2015-9067",
        "CVE-2016-10382",
        "CVE-2014-9969",
        "CVE-2014-9975",
        "CVE-2023-21361",
        "CVE-2015-9038",
        "CVE-2015-9048",
        "CVE-2016-10332",
        "CVE-2015-9041",
        "CVE-2016-10337",
        "CVE-2014-9961",
        "CVE-2016-10341",
        "CVE-2016-10389",
        "CVE-2017-8263",
        "CVE-2021-0920",
        "CVE-2015-9028",
        "CVE-2016-5863",
        "CVE-2016-10335",
        "CVE-2017-9682",
        "CVE-2017-0865",
        "CVE-2017-9679",
        "CVE-2023-21374",
        "CVE-2015-9031",
        "CVE-2015-9064",
        "CVE-2016-10383",
        "CVE-2017-8272",
        "CVE-2023-21355",
        "CVE-2023-21364",
        "CVE-2016-5867",
        "CVE-2016-10390",
        "CVE-2015-9066",
        "CVE-2017-8240",
        "CVE-2016-10336",
        "CVE-2017-8268",
        "CVE-2017-8260",
        "CVE-2017-6421",
        "CVE-2015-9032",
        "CVE-2015-9020",
        "CVE-2017-8243",
        "CVE-2023-21351",
        "CVE-2015-9046",
        "CVE-2016-10381",
        "CVE-2023-40082",
        "CVE-2015-9065",
        "CVE-2014-9963",
        "CVE-2014-9972",
        "CVE-2017-8241",
        "CVE-2015-8997",
        "CVE-2015-9045",
        "CVE-2023-40087",
        "CVE-2017-7373",
        "CVE-2014-9411",
        "CVE-2015-9003",
        "CVE-2015-9060",
        "CVE-2017-9684",
        "CVE-2015-9055",
        "CVE-2023-21360",
        "CVE-2017-8234",
        "CVE-2014-9968",
        "CVE-2016-10334",
        "CVE-2015-9036",
        "CVE-2017-0863",
        "CVE-2017-8233",
        "CVE-2015-9023",
        "CVE-2023-21357",
        "CVE-2015-0576",
        "CVE-2023-40081",
        "CVE-2023-45775",
        "CVE-2017-8257",
        "CVE-2023-40073",
        "CVE-2015-9037",
        "CVE-2017-8239",
        "CVE-2016-10386",
        "CVE-2023-21359",
        "CVE-2015-9035",
        "CVE-2016-10342",
        "CVE-2016-10333",
        "CVE-2017-8235",
        "CVE-2016-10338",
        "CVE-2023-40090",
        "CVE-2023-45773",
        "CVE-2014-9936",
        "CVE-2015-9026",
        "CVE-2014-9977",
        "CVE-2017-7365",
        "CVE-2017-7367",
        "CVE-2015-9049",
        "CVE-2023-40088",
        "CVE-2017-8255",
        "CVE-2023-40076",
        "CVE-2016-10339",
        "CVE-2015-9044",
        "CVE-2014-9965",
        "CVE-2015-8596",
        "CVE-2008-7298",
        "CVE-2014-9962",
        "CVE-2015-9071",
        "CVE-2015-9051",
        "CVE-2015-9042",
        "CVE-2023-40096",
        "CVE-2023-45774",
        "CVE-2014-9937",
        "CVE-2016-5862",
        "CVE-2016-10347",
        "CVE-2014-9935",
        "CVE-2016-5861",
        "CVE-2017-0862",
        "CVE-2017-8256",
        "CVE-2015-9068",
        "CVE-2015-9069",
        "CVE-2016-5859",
        "CVE-2016-5347",
        "CVE-2015-8595",
        "CVE-2023-40098",
        "CVE-2015-9027",
        "CVE-2016-10340",
        "CVE-2016-5854",
        "CVE-2017-7368",
        "CVE-2016-5858",
        "CVE-2015-9043",
        "CVE-2015-9022",
        "CVE-2015-8594",
        "CVE-2014-9980",
        "CVE-2023-40083",
        "CVE-2017-7371",
        "CVE-2015-9002",
        "CVE-2023-40077",
        "CVE-2016-10388",
        "CVE-2017-8262",
        "CVE-2015-9033",
        "CVE-2023-21354",
        "CVE-2014-9976",
        "CVE-2015-9072",
        "CVE-2017-8238",
        "CVE-2014-9966",
        "CVE-2015-9000",
        "CVE-2016-10343",
        "CVE-2014-9964",
        "CVE-2016-5860",
        "CVE-2015-9050",
        "CVE-2017-7370",
        "CVE-2016-10344",
        "CVE-2015-9054",
        "CVE-2023-40089",
        "CVE-2017-9678",
        "CVE-2015-8592",
        "CVE-2015-8995",
        "CVE-2015-0574",
        "CVE-2020-13843",
        "CVE-2019-20606",
        "CVE-2017-8236",
        "CVE-2014-9979",
        "CVE-2016-10391",
        "CVE-2017-8254",
        "CVE-2015-1529",
        "CVE-2016-5872",
        "CVE-2023-40092",
        "CVE-2016-10239",
        "CVE-2023-40075",
        "CVE-2014-9974",
        "CVE-2014-9978",
        "CVE-2015-9052",
        "CVE-2016-10392",
        "CVE-2015-9025",
        "CVE-2015-9047",
        "CVE-2023-45777",
        "CVE-2014-9960",
        "CVE-2023-21352",
        "CVE-2023-45781",
        "CVE-2017-8267",
        "CVE-2023-21350",
        "CVE-2023-40084",
        "CVE-2015-8998",
        "CVE-2015-9001",
        "CVE-2015-9029",
        "CVE-2016-10385",
        "CVE-2015-9040",
        "CVE-2017-8253",
        "CVE-2017-7372",
        "CVE-2016-10380",
        "CVE-2023-21373",
        "CVE-2017-8237",
        "CVE-2015-9061",
        "CVE-2017-8261",
        "CVE-2015-9034",
        "CVE-2014-9967",
        "CVE-2017-0864",
        "CVE-2023-40080",
        "CVE-2017-9680",
        "CVE-2015-8593",
        "CVE-2017-8270",
        "CVE-2016-10387",
        "CVE-2023-40094",
        "CVE-2015-9063",
        "CVE-2016-5853",
        "CVE-2015-9021",
        "CVE-2015-9062",
        "CVE-2016-5871",
        "CVE-2023-40078",
        "CVE-2023-21353",
        "CVE-2023-21366",
        "CVE-2023-40095",
        "CVE-2017-7364",
        "CVE-2015-8999",
        "CVE-2023-40079",
        "CVE-2023-40103",
        "CVE-2015-9070",
        "CVE-2017-8242",
        "CVE-2016-5855",
        "CVE-2023-40091",
        "CVE-2015-8996",
        "CVE-2017-7366",
        "CVE-2015-9039",
        "CVE-2015-9073",
        "CVE-2016-10346",
        "CVE-2011-0419",
        "CVE-2023-45776"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Biometrics, Mobility, Network Encryption, Wireless LAN",
      "cert_link": "https://www.niap-ccevs.org/api/file/get_public_file/?file_id=29249",
      "certification_date": "2024-03-27",
      "evaluation_facility": "Gossamer Security Solutions",
      "expiration_date": "2026-03-27",
      "id": "CCEVS-VR-VID11419-2024",
      "product": "Google Pixel Devices on Android 14",
      "report_link": "https://www.niap-ccevs.org/api/file/get_public_file/?file_id=29251",
      "scheme": "US",
      "target_link": "https://www.niap-ccevs.org/api/file/get_public_file/?file_id=29250",
      "url": "https://www.niap-ccevs.org/product/11419",
      "vendor": "Google LLC"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Google LLC",
  "manufacturer_web": "https://www.google.com",
  "name": "Google Pixel Devices on Android 14",
  "not_valid_after": "2026-03-27",
  "not_valid_before": "2024-03-27",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "st_vid11419-ci.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID11419-2024": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 1
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Gossamer": {
          "Gossamer Security": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20240329114002-04\u002700\u0027",
      "/ModDate": "D:20240329114002-04\u002700\u0027",
      "/Producer": "iText 2.1.0 (by lowagie.com)",
      "pdf_file_size_bytes": 189538,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "st_vid11419-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-VID11419-2024",
        "cert_item": "Google Pixel Devices on Android 14",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID11419-2024": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 8
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Gossamer": {
          "Gossamer Security": 4
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "other": {
          "TEE": 2
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Qualcomm": {
          "Qualcomm": 3
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "comptont",
      "/CreationDate": "D:20240328080104-04\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20240328080104-04\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 332468,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://web.nvd.nist.gov/view/vuln/search",
          "http://www.kb.cert.org/vuls/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 17
    },
    "st_filename": "st_vid11419-st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 6
          },
          "ECDH": {
            "ECDH": 6,
            "ECDHE": 1
          },
          "ECDSA": {
            "ECDSA": 22
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "OE": {
          "OE.CONFIG": 1,
          "OE.DATA_PROPER_ADMIN": 1,
          "OE.DATA_PROPER_USER": 2,
          "OE.IT_ENTERPRISE": 1,
          "OE.MOBILE_DEVICE_PLATFORM": 1,
          "OE.NOTIFY": 1,
          "OE.NO_TOE_BYPASS": 1,
          "OE.PRECAUTION": 1,
          "OE.TRUSTED_ADMIN": 1,
          "OE.WIRELESS_NETWORK": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP": 1,
          "ADV_FSP.1": 9
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 10,
          "AGD_PRE": 1,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.1": 4,
          "ALC_CMS": 1,
          "ALC_CMS.1": 5,
          "ALC_TSU_EXT": 1,
          "ALC_TSU_EXT.1": 8
        },
        "ATE": {
          "ATE_IND": 1,
          "ATE_IND.1": 5
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.1": 6
        }
      },
      "cc_security_level": {},
      "cc_sfr": {
        "FAU": {
          "FAU_ALT_EXT.2": 3,
          "FAU_ALT_EXT.2.1": 1,
          "FAU_ALT_EXT.2.2": 1,
          "FAU_GEN": 3,
          "FAU_GEN.1": 11,
          "FAU_GEN.1.1": 3,
          "FAU_GEN.1.2": 1,
          "FAU_SAR.1": 1,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SEL.1": 2,
          "FAU_SEL.1.1": 1,
          "FAU_STG.1": 2,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.4": 1,
          "FAU_STG.4.1": 1
        },
        "FCS": {
          "FCS_CKM": 9,
          "FCS_CKM.1": 9,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 4,
          "FCS_CKM_EXT.1": 3,
          "FCS_CKM_EXT.1.1": 1,
          "FCS_CKM_EXT.1.2": 1,
          "FCS_CKM_EXT.1.3": 1,
          "FCS_CKM_EXT.2": 11,
          "FCS_CKM_EXT.2.1": 1,
          "FCS_CKM_EXT.3": 11,
          "FCS_CKM_EXT.3.1": 1,
          "FCS_CKM_EXT.3.2": 1,
          "FCS_CKM_EXT.4": 5,
          "FCS_CKM_EXT.4.1": 2,
          "FCS_CKM_EXT.4.2": 1,
          "FCS_CKM_EXT.5": 2,
          "FCS_CKM_EXT.5.1": 1,
          "FCS_CKM_EXT.5.2": 1,
          "FCS_CKM_EXT.6": 3,
          "FCS_CKM_EXT.6.1": 1,
          "FCS_CKM_EXT.8": 4,
          "FCS_CKM_EXT.8.1": 1,
          "FCS_COP": 66,
          "FCS_COP.1": 7,
          "FCS_RBG_EXT.1": 15,
          "FCS_RBG_EXT.1.1": 1,
          "FCS_RBG_EXT.1.2": 1,
          "FCS_RBG_EXT.1.3": 1,
          "FCS_SRV_EXT.1": 3,
          "FCS_SRV_EXT.1.1": 1,
          "FCS_SRV_EXT.2": 2,
          "FCS_SRV_EXT.2.1": 1,
          "FCS_STC_EXT.1.2": 1,
          "FCS_STG_EXT": 1,
          "FCS_STG_EXT.1": 5,
          "FCS_STG_EXT.1.1": 1,
          "FCS_STG_EXT.1.2": 1,
          "FCS_STG_EXT.1.3": 1,
          "FCS_STG_EXT.1.4": 1,
          "FCS_STG_EXT.1.5": 1,
          "FCS_STG_EXT.2": 6,
          "FCS_STG_EXT.2.1": 2,
          "FCS_STG_EXT.2.2": 1,
          "FCS_STG_EXT.3": 2,
          "FCS_STG_EXT.3.1": 1,
          "FCS_STG_EXT.3.2": 1,
          "FCS_STG_EXT.4": 2,
          "FCS_STG_EXT.4.1": 1,
          "FCS_TLSC_EXT": 7,
          "FCS_TLSC_EXT.1": 9,
          "FCS_TLSC_EXT.1.1": 1,
          "FCS_TLSC_EXT.1.2": 1,
          "FCS_TLSC_EXT.1.3": 1,
          "FCS_TLSC_EXT.2": 3,
          "FCS_TLSC_EXT.2.1": 1,
          "FCS_TLSC_EXT.4": 2,
          "FCS_TLSC_EXT.4.1": 1,
          "FCS_TLSC_EXT.5": 2,
          "FCS_TLSC_EXT.5.1": 1,
          "FCS_TLS_EXT.1": 2,
          "FCS_TLS_EXT.1.1": 1,
          "FCS_WPA_EXT.1": 3,
          "FCS_WPA_EXT.1.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 3,
          "FDP_ACF_EXT.1": 3,
          "FDP_ACF_EXT.1.1": 1,
          "FDP_ACF_EXT.1.2": 2,
          "FDP_ACF_EXT.2": 2,
          "FDP_ACF_EXT.2.1": 1,
          "FDP_DAR_EXT.1": 3,
          "FDP_DAR_EXT.1.1": 1,
          "FDP_DAR_EXT.1.2": 1,
          "FDP_DAR_EXT.2": 4,
          "FDP_DAR_EXT.2.1": 1,
          "FDP_DAR_EXT.2.2": 1,
          "FDP_DAR_EXT.2.3": 1,
          "FDP_DAR_EXT.2.4": 1,
          "FDP_IFC_EXT.1": 3,
          "FDP_IFC_EXT.1.1": 1,
          "FDP_STG_EXT.1": 2,
          "FDP_STG_EXT.1.1": 1,
          "FDP_UPC_EXT": 4,
          "FDP_UPC_EXT.1": 5
        },
        "FIA": {
          "FIA_AFL_EXT.1": 2,
          "FIA_AFL_EXT.1.1": 1,
          "FIA_AFL_EXT.1.2": 1,
          "FIA_AFL_EXT.1.3": 1,
          "FIA_AFL_EXT.1.4": 1,
          "FIA_AFL_EXT.1.5": 1,
          "FIA_AFL_EXT.1.6": 1,
          "FIA_BLT_EXT.1": 3,
          "FIA_BLT_EXT.1.1": 1,
          "FIA_BLT_EXT.2": 3,
          "FIA_BLT_EXT.2.1": 1,
          "FIA_BLT_EXT.3": 3,
          "FIA_BLT_EXT.3.1": 1,
          "FIA_BLT_EXT.4": 3,
          "FIA_BLT_EXT.4.1": 1,
          "FIA_BLT_EXT.4.2": 1,
          "FIA_BLT_EXT.6": 2,
          "FIA_BLT_EXT.6.1": 1,
          "FIA_BLT_EXT.7": 3,
          "FIA_BLT_EXT.7.1": 1,
          "FIA_BMG_EXT": 1,
          "FIA_ENR_EXT.2": 3,
          "FIA_ENR_EXT.2.1": 1,
          "FIA_MBE_EXT.1": 2,
          "FIA_MBE_EXT.1.1": 1,
          "FIA_MBE_EXT.2": 2,
          "FIA_MBE_EXT.2.1": 1,
          "FIA_MBV_EXT": 4,
          "FIA_MBV_EXT.1": 7,
          "FIA_MBV_EXT.2": 2,
          "FIA_MBV_EXT.2.1": 1,
          "FIA_PAE_EXT.1": 3,
          "FIA_PAE_EXT.1.1": 1,
          "FIA_PMG_EXT.1": 5,
          "FIA_PMG_EXT.1.1": 1,
          "FIA_TRT_EXT.1": 3,
          "FIA_TRT_EXT.1.1": 1,
          "FIA_UAU": 2,
          "FIA_UAU.5": 2,
          "FIA_UAU.5.1": 3,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 2,
          "FIA_UAU.7": 1,
          "FIA_UAU.7.1": 1,
          "FIA_UAU_EXT.1": 3,
          "FIA_UAU_EXT.1.1": 1,
          "FIA_UAU_EXT.2": 3,
          "FIA_UAU_EXT.2.1": 3,
          "FIA_UAU_EXT.2.2": 1
        },
        "FMT": {
          "FMT_MOF_EXT.1": 4,
          "FMT_MOF_EXT.1.1": 1,
          "FMT_MOF_EXT.1.2": 1,
          "FMT_POL_EXT.2": 3,
          "FMT_POL_EXT.2.1": 1,
          "FMT_POL_EXT.2.2": 1,
          "FMT_SMF": 2,
          "FMT_SMF.1": 3,
          "FMT_SMF.1.1": 1,
          "FMT_SMF_EXT": 2,
          "FMT_SMF_EXT.1": 2,
          "FMT_SMF_EXT.2": 2,
          "FMT_SMF_EXT.2.1": 1,
          "FMT_SMF_EXT.3": 2,
          "FMT_SMF_EXT.3.1": 1,
          "FMT_SMF_EXT.4": 3,
          "FMT_SMF_EXT.4.1": 1,
          "FMT_SMF_EXT.4.2": 1,
          "FMT_UNR_EXT.1": 2,
          "FMT_UNR_EXT.1.1": 2
        },
        "FPT": {
          "FPT_AEX_EXT.1": 3,
          "FPT_AEX_EXT.1.1": 1,
          "FPT_AEX_EXT.1.2": 1,
          "FPT_AEX_EXT.2": 2,
          "FPT_AEX_EXT.2.1": 1,
          "FPT_AEX_EXT.3": 3,
          "FPT_AEX_EXT.3.1": 1,
          "FPT_AEX_EXT.4": 2,
          "FPT_AEX_EXT.4.1": 1,
          "FPT_AEX_EXT.4.2": 1,
          "FPT_AEX_EXT.5": 2,
          "FPT_AEX_EXT.5.1": 1,
          "FPT_AEX_EXT.5.2": 1,
          "FPT_BBD_EXT.1": 2,
          "FPT_BBD_EXT.1.1": 1,
          "FPT_BDP_EXT.1": 2,
          "FPT_BDP_EXT.1.1": 1,
          "FPT_BDP_EXT.1.2": 1,
          "FPT_JTA_EXT.1": 2,
          "FPT_JTA_EXT.1.1": 1,
          "FPT_KST_EXT.1": 4,
          "FPT_KST_EXT.1.1": 1,
          "FPT_KST_EXT.2": 3,
          "FPT_KST_EXT.2.1": 1,
          "FPT_KST_EXT.3": 3,
          "FPT_KST_EXT.3.1": 1,
          "FPT_NOT_EXT.1": 2,
          "FPT_NOT_EXT.1.1": 1,
          "FPT_PBT_EXT.1": 2,
          "FPT_PBT_EXT.1.1": 1,
          "FPT_STM.1": 2,
          "FPT_STM.1.1": 1,
          "FPT_TST_EXT": 8,
          "FPT_TST_EXT.1": 3,
          "FPT_TST_EXT.1.1": 1,
          "FPT_TST_EXT.2": 2,
          "FPT_TST_EXT.3": 2,
          "FPT_TUD_EXT.1": 3,
          "FPT_TUD_EXT.1.1": 1,
          "FPT_TUD_EXT.1.2": 1,
          "FPT_TUD_EXT.1.3": 1,
          "FPT_TUD_EXT.2": 2,
          "FPT_TUD_EXT.2.1": 1,
          "FPT_TUD_EXT.2.2": 1,
          "FPT_TUD_EXT.2.3": 1,
          "FPT_TUD_EXT.3": 2,
          "FPT_TUD_EXT.3.1": 1,
          "FPT_TUD_EXT.5": 1,
          "FPT_TUD_EXT.6": 2,
          "FPT_TUD_EXT.6.1": 1
        },
        "FTA": {
          "FTA_SSL_EXT.1": 3,
          "FTA_SSL_EXT.1.1": 1,
          "FTA_SSL_EXT.1.2": 1,
          "FTA_SSL_EXT.1.3": 1,
          "FTA_TAB.1": 1,
          "FTA_TAB.1.1": 1,
          "FTA_WSE_EXT.1": 3,
          "FTA_WSE_EXT.1.1": 1
        },
        "FTP": {
          "FTP_BLT_EXT": 6,
          "FTP_BLT_EXT.1": 3,
          "FTP_BLT_EXT.1.1": 1,
          "FTP_BLT_EXT.1.2": 1,
          "FTP_BLT_EXT.2": 2,
          "FTP_BLT_EXT.2.1": 1,
          "FTP_BLT_EXT.3": 2,
          "FTP_ITC": 2,
          "FTP_ITC.1": 3,
          "FTP_ITC_EXT.1": 5,
          "FTP_ITC_EXT.1.1": 3,
          "FTP_ITC_EXT.1.2": 2,
          "FTP_ITC_EXT.1.3": 2,
          "FTP_TRP.1": 1,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 8
        },
        "CCM": {
          "CCM": 3
        },
        "GCM": {
          "GCM": 11
        },
        "XTS": {
          "XTS": 7
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "BoringSSL": {
          "BoringSSL": 24
        }
      },
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 1
        },
        "TLS": {
          "TLS": {
            "TLS": 74,
            "TLS 1.1": 1,
            "TLS 1.2": 2
          }
        },
        "VPN": {
          "VPN": 21
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 3
        },
        "MAC": {
          "MAC": 9
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 8,
          "P-384": 8,
          "P-521": 4,
          "secp256r1": 2,
          "secp384r1": 2
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          },
          "SHA2": {
            "SHA-256": 13,
            "SHA-384": 4,
            "SHA-512": 2,
            "SHA256": 1
          }
        },
        "scrypt": {
          "scrypt": 3
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 19
        },
        "RNG": {
          "RBG": 10
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 180-4": 15,
          "FIPS 186-4": 18,
          "FIPS 197": 16,
          "FIPS 198-1": 15,
          "FIPS PUB 186-4": 4,
          "FIPS PUB 197": 2
        },
        "NIST": {
          "NIST SP 800-38A": 1,
          "NIST SP 800-38C": 1,
          "NIST SP 800-38D": 1,
          "NIST SP 800-38E": 1,
          "NIST SP 800-38F": 1,
          "NIST SP 800-57": 1,
          "SP 800-108": 10,
          "SP 800-38A": 4,
          "SP 800-38C": 1,
          "SP 800-38D": 3,
          "SP 800-38E": 4,
          "SP 800-56A": 1,
          "SP 800-90A": 6
        },
        "RFC": {
          "RFC 2818": 2,
          "RFC 3394": 2,
          "RFC 4346": 1,
          "RFC 5216": 1,
          "RFC 5246": 3,
          "RFC 5280": 4,
          "RFC 5288": 3,
          "RFC 5289": 8,
          "RFC 5746": 1,
          "RFC 6125": 1,
          "RFC 6960": 1
        },
        "X509": {
          "X.509": 13
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 34,
            "AES-128": 1,
            "AES-256": 17
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 7,
            "HMAC-SHA-256": 4,
            "HMAC-SHA-384": 2,
            "HMAC-SHA-512": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "ARM": {
          "TrustZone": 2
        },
        "other": {
          "TEE": 36,
          "Trusty": 3
        }
      },
      "tls_cipher_suite": {
        "TLS": {
          "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 2,
          "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 2,
          "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 2,
          "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 2,
          "TLS_RSA_WITH_AES_128_CBC_SHA": 1,
          "TLS_RSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_RSA_WITH_AES_256_GCM_SHA384": 2
        }
      },
      "vendor": {
        "Qualcomm": {
          "Qualcomm": 7
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Brian Wood",
      "/CreationDate": "D:20240327114501-04\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/Keywords": "Common Criteria, MDF",
      "/ModDate": "D:20240327114501-04\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "/Title": "Google Pixel Devices on Android 14 Security Target",
      "pdf_file_size_bytes": 1442337,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://developer.android.com/reference/android/bluetooth/package-summary.html",
          "https://developer.android.com/reference/android/security/keystore/KeyGenParameterSpec.Builder#setUserAuthenticationRequired(boolean)",
          "https://developer.android.com/reference/android/app/admin/SecurityLog#constants_1",
          "https://android-developers.googleblog.com/",
          "https://developer.android.com/reference/packages",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=12015",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=14485",
          "https://developer.android.com/reference/android/security/keystore/KeyGenParameterSpec.Builder#setUnlockedDeviceRequired(boolean)",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=13389",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37254",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=10317",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35533",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=8370",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=34777",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35052",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=12016",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=11217",
          "https://source.android.com/docs/security/bulletin",
          "https://developer.android.com/reference/android/R.attr#protectionLevel",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=12209",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37266",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37012",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=10351",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=12149",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=9904",
          "https://source.android.com/devices/architecture/kernel/modular-kernels#core-kernel-requirements",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35547",
          "https://source.android.com/setup/contribute/report-bugs",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37317",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=21229",
          "http://www.wi-fi.org/certification",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35120",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=37255",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=11839",
          "https://developer.android.com/reference/javax/net/ssl/HttpsURLConnection",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=32875",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35548",
          "http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ddi0487a.f/index.html",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=17273",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35561",
          "https://support.google.com/nexus/answer/4457705",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=12177",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35538",
          "https://developer.android.com/reference/javax/net/ssl/SSLSocket",
          "mailto:[email protected]",
          "https://m.google.com/",
          "https://source.android.com/docs/compatibility/14/android-14-cdd#7310_biometric_sensors",
          "https://globalplatform.org/",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=14487",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=14486",
          "https://source.android.com/docs/security/features/biometric/measure#biometric-classes",
          "https://developer.android.com/reference/android/app/admin/SecurityLog.SecurityEvent"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 99
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_WLANC_v1.0.pdf",
        "pp_name": "PP-Module for Wireless Local Area Network (WLAN) Client Version 1.0"
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD-BIO-v1.1.pdf",
        "pp_name": "collaborative PP-Module for Biometric enrolment and verification - for unlocking the device"
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MDF_V3.3.pdf",
        "pp_name": "Protection Profile for Mobile Device Fundamentals Version 3.3"
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_BT_V1.0.pdf",
        "pp_name": "PP-Module for Bluetooth Version 1.0"
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_mdm_agent_v1.0.pdf",
        "pp_name": "PP-Module for MDM Agent Version 1.0"
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "PKG_TLS_V1.1"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/PKG_TLS_V1.1.pdf",
        "pp_name": "Functional Package for TLS Version 1.1"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11419-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": []
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11419-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e06d1715e62f8326ae7d05054c3afd928058e49caad4f3ad0d6cae933919ce86",
      "txt_hash": "f3a5f3056af758e45b5186e87181afb18c209b34d84032f62d1c8c71b07834da"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "7dea2fef4f2f330f89fa0758793132f10ea79546a762f6a664f9f3fb244c5d6a",
      "txt_hash": "fc3ff94aa861d4e4dc0f61588da85c666517a28e3bc4afb77d437b26c51d2aa6"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "498ed21c856e497844b1473584a4106b7b8ed4e4da74088a505ec73d6082dcb6",
      "txt_hash": "f8e432cf93c0b3a7d31becbcb68997dd458344ee47de9a741bff9a20384a5b4f"
    }
  },
  "status": "active"
}