IronPort Email Security Appliances (ESA), comprising the C160, C370, X1060, and X1070 appliance models, running IronPort AsyncOS software, version 7.1, and the C670 appliance model running IronPort AsyncOS version 7.3
CSV information ?
Status | archived |
---|---|
Valid from | 01.12.2010 |
Valid until | 01.11.2014 |
Scheme | 🇺🇸 US |
Manufacturer | Cisco Systems, Inc. |
Category | Detection Devices and Systems |
Security level | EAL2+, ALC_FLR.2 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Hash functions
MD5Protocols
SSHLibraries
OpenSSLVendor
CiscoSecurity level
EAL 2, EAL2, EAL 2 augmented, EAL2 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.2Certificates
CCEVS-VR-VID10438-2010Standards
FIPS 140-2, RFC 2821File metadata
Title | Validation Report for VID10438 |
---|---|
Author | Tammy Compton |
Creation date | D:20110110111756 |
Modification date | D:20110110111756 |
Pages | 19 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
Frontpage
Certificate ID | CCEVS-VR-VID10438-2010 |
---|---|
Certified item | Cisco IronPort Systems LLC, 950 Elm Avenue, San Bruno, CA 94066 IronPort Email Security Appliances |
Certification lab | US NIAP |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDESHash functions
SHA1, SHA-1, MD5Protocols
SSH, TLSRandomness
PRNGLibraries
OpenSSLVendor
CiscoSecurity level
EAL 2, EAL2, EAL 2 augmentedClaims
O.PROTCT, O.IDSENS, O.IDANLZ, O.RESPON, O.EADMIN, O.ACCESS, O.IDAUTH, O.OFLOWS, O.AUDITS, O.INTEGR, O.AUDIT_PROTECTION, O.AUDIT_SORT, O.TIME, O.IDSCAN, T.COMINT, T.COMDIS, T.LOSSOF, T.NOHALT, T.PRIVIL, T.IMPCON, T.INFLUX, T.FACCNT, T.FALACT, T.FALREC, T.FALASC, T.MISUSE, T.INADVE, T.MISACT, T.SCNCFG, T.SCNMLC, A.ACCESS, A.DYNMIC, A.ASCOPE, A.PROTCT, A.LOCATE, A.MANAGE, A.NOEVIL, A.NOTRST, OE.INSTAL, OE.PHYCAL, OE.CREDEN, OE.PERSON, OE.INTROP, OE.CERTIFICATES, OE.AUDIT_PROTECTION, OE.AUDIT_SORTSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_TDS, ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_FLR, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV, ATE_FUN, ATE_IND, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN, AVA_VAN.2Security Functional Requirements (SFR)
FAU_GEN, FAU_SAR, FAU_SEL, FAU_STG, FAU_GEN.1, FAU_GEN.1.1, FAU_SAR.1, FAU_SAR.2, FAU_SEL.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.2, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FAU_STG.4, FAU_STG.4.1, FCS_CKM, FCS_COP.1, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1.1, FCS_CKM.2, FDP_ACC, FDP_ACC.1, FDP_ITC.1, FDP_ITC.2, FIA_ATD, FIA_UAU, FIA_UID, FIA_UAU.1, FIA_UAU.5, FIA_UID.1, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.1.1, FIA_UID.1.2, FIA_AFL.1, FMT_MOF, FMT_MTD.1, FMT_SMF, FMT_SMR, FMT_MOF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MTD.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MITD.1, FPT_ITI, FPT_STM, FPT_ITI.1, FPT_ITI.1.1, FPT_ITI.1.2, FPT_STM.1, FPT_STM.1.1, FPT_ITA.1, FPT_ITC.1, FPT_ITT.1Side-channel analysis
malfunctionStandards
FIPS 140-2, FIPS PUB 197, FIPS 180-2, FIPS PUB 46-3, FIPS PUB 186-3, FIPS PUB 180-3, RFC 2821File metadata
Title | IronPort Email Security Appliances Security Target |
---|---|
Subject | Security Target |
Author | SAIC CCTL |
Creation date | D:20110110111851 |
Modification date | D:20110110111851 |
Pages | 46 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
Heuristics ?
Extracted SARs
ATE_FUN.1, ADV_ARC.1, AVA_VAN.2, ATE_COV.1, ALC_CMC.2, AGD_OPE.1, AGD_PRE.1, ADV_TDS.1, ALC_FLR.2, ALC_CMS.2, ALC_DEL.1, ADV_FSP.2, ATE_IND.2CPE matches
- cpe:2.3:a:cisco:email_security_appliance:7.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:email_security_appliance:7.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:email_security_appliance:7.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:email_security_appliance:7.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:email_security_appliance:7.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:email_security_appliance:7.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:email_security_appliance:7.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:email_security_appliance:7.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:email_security_appliance:7.3.2:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asyncos:7.1.1:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asyncos:7.1.2:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asyncos:7.1.3:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asyncos:7.1.4:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asyncos:7.1.5-102:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:asyncos:7.1.5:-:*:*:*:*:*:*
- cpe:2.3:o:cisco:asyncos:7.1.5:hot_patch4:*:*:*:*:*:*
- cpe:2.3:o:cisco:asyncos:7.1.5:hot_patch5:*:*:*:*:*:*
- cpe:2.3:o:cisco:asyncos:7.1.5:hot_patch6:*:*:*:*:*:*
- cpe:2.3:o:cisco:asyncos:7.1.5:hot_patch:*:*:*:*:*:*
- cpe:2.3:o:cisco:asyncos:7.3.1:build101:*:*:*:*:*:*
- cpe:2.3:o:cisco:asyncos:7.3.1:build47:*:*:*:*:*:*
- cpe:2.3:o:cisco:asyncos:7.3.1:hot_patch2:*:*:*:*:*:*
- cpe:2.3:o:cisco:asyncos:7.3.2:-:*:*:*:*:*:*
- cpe:2.3:o:cisco:asyncos:7.3.2:hot_patch2:*:*:*:*:*:*
- cpe:2.3:o:cisco:asyncos:7.3.2:hot_patch:*:*:*:*:*:*
- cpe:2.3:o:cisco:email_security_appliance_firmware:7.1.1:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:email_security_appliance_firmware:7.1.3:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:email_security_appliance_firmware:7.3.1:*:*:*:*:*:*:*
Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-2014-3381 | MEDIUM | 5.0 | 2.9 | 19.10.2014 01:55 | ||
CVE-2016-6356 | HIGH | 7.5 | 3.6 | 28.10.2016 10:59 | ||
CVE-2019-12706 | HIGH | 7.5 | 3.6 | 02.10.2019 19:15 | ||
CVE-2019-15971 | MEDIUM | 4.3 | 1.4 | 26.11.2019 04:15 | ||
CVE-2019-15988 | MEDIUM | 5.3 | 1.4 | 26.11.2019 04:15 | ||
CVE-2019-1983 | MEDIUM | 5.3 | 1.4 | 23.09.2020 01:15 | ||
CVE-2020-3132 | MEDIUM | 5.9 | 3.6 | 19.02.2020 20:15 | ||
CVE-2020-3133 | HIGH | 7.5 | 3.6 | 23.09.2020 01:15 | ||
CVE-2020-3134 | MEDIUM | 6.5 | 2.5 | 26.01.2020 05:15 | ||
CVE-2020-3137 | MEDIUM | 6.1 | 2.7 | 23.09.2020 01:15 | ||
CVE-2020-3164 | MEDIUM | 5.3 | 1.4 | 04.03.2020 19:15 | ||
CVE-2020-3181 | MEDIUM | 6.5 | 2.5 | 04.03.2020 19:15 | ||
CVE-2020-3367 | HIGH | 7.8 | 5.9 | 18.11.2020 18:15 | ||
CVE-2020-3370 | MEDIUM | 5.8 | 1.4 | 16.07.2020 18:15 | ||
CVE-2020-3447 | MEDIUM | 6.5 | 3.6 | 17.08.2020 18:15 | ||
CVE-2020-3568 | MEDIUM | 5.8 | 1.4 | 08.10.2020 05:15 | ||
CVE-2021-1566 | HIGH | 7.4 | 5.2 | 16.06.2021 18:15 | ||
CVE-2022-20653 | HIGH | 7.5 | 3.6 | 17.02.2022 15:15 | ||
CVE-2022-20664 | HIGH | 7.7 | 4.0 | 15.06.2022 18:15 | ||
CVE-2022-20798 | CRITICAL | 9.8 | 5.9 | 15.06.2022 18:15 | ||
CVE-2022-20960 | HIGH | 7.5 | 3.6 | 04.11.2022 18:15 | ||
CVE-2023-20009 | HIGH | 7.2 | 5.9 | 01.03.2023 08:15 |
Scheme data ?
Product | IronPort Email Security Appliances (ESA), comprising the C160, C370, X1060, and X1070 appliance models, running IronPort AsyncOS software, version 7.1, and the C670 appliance model running IronPort AsyncOS version 7.3 | |
---|---|---|
Id | CCEVS-VR-VID10438 | |
Url | https://www.niap-ccevs.org/product/10438 | |
Certification Date | 01.12.2010 | |
Expiration Date | 01.11.2014 | |
Category | Wireless Monitoring | |
Vendor | Cisco Systems, Inc. | |
Evaluation Facility | Leidos Common Criteria Testing Laboratory | |
Scheme | US |
References ?
No references are available for this certificate.
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2010-12-01', 'expiration_date': '2014-11-01'}
data.
- The scheme_data property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2019-15988', 'CVE-2020-3134', 'CVE-2019-12706', 'CVE-2019-15971']}
values added.
- The related_cves property was updated, with the
-
30.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2019-15988', 'CVE-2020-3134', 'CVE-2019-12706', 'CVE-2019-15971']}
values discarded.
- The related_cves property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '0b2e7dc58886898efb1581205297d0416d72d141de8bc7f25c7f67b1eb8ee993', 'txt_hash': 'f21066b581ed2d33224a5186c39df022966057c4b333fb665bea3d378543f7b3'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '96e3d56633409afdad546ed33ff5677acf85c8bd4738cccedd6f86f209435474', 'txt_hash': 'acd723426798b156895721b6c3edd40a59db87ae265731740c7b470cb3002ff1'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 629161, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 19, '/Title': 'Validation Report for VID10438', '/Author': 'Tammy Compton', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20110110111756', '/ModDate': 'D:20110110111756', '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1095078, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 46, '/Title': 'IronPort Email Security Appliances Security Target', '/Author': 'SAIC CCTL', '/Subject': 'Security Target', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20110110111851', '/ModDate': 'D:20110110111851', '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'US': {'cert_id': 'CCEVS-VR-VID10438-2010', 'cert_item': 'Cisco IronPort Systems LLC, 950 Elm Avenue, San Bruno, CA 94066 IronPort Email Security Appliances', 'cert_lab': 'US NIAP'}}
. - The report_keywords property was set to
{'cc_cert_id': {'US': {'CCEVS-VR-VID10438-2010': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 9, 'EAL2': 2, 'EAL 2 augmented': 2, 'EAL2 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 5}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Cisco': {'Cisco': 17}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 4}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 5}, 'RFC': {'RFC 2821': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 6, 'EAL2': 2, 'EAL 2 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_TDS': 1, 'ADV_ARC.1': 10, 'ADV_FSP.2': 11, 'ADV_TDS.1': 11}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 10, 'AGD_PRE.1': 6}, 'ALC': {'ALC_FLR.2': 18, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_FLR': 1, 'ALC_CMC.2': 8, 'ALC_CMS.2': 6, 'ALC_DEL.1': 5}, 'ATE': {'ATE_COV': 1, 'ATE_FUN': 1, 'ATE_IND': 1, 'ATE_COV.1': 4, 'ATE_FUN.1': 8, 'ATE_IND.2': 7}, 'AVA': {'AVA_VAN': 1, 'AVA_VAN.2': 7}}, 'cc_sfr': {'FAU': {'FAU_GEN': 2, 'FAU_SAR': 6, 'FAU_SEL': 2, 'FAU_STG': 4, 'FAU_GEN.1': 6, 'FAU_GEN.1.1': 1, 'FAU_SAR.1': 3, 'FAU_SAR.2': 3, 'FAU_SEL.1': 3, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3': 2, 'FAU_SAR.3.1': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.2': 2, 'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1, 'FAU_STG.4': 2, 'FAU_STG.4.1': 1}, 'FCS': {'FCS_CKM': 7, 'FCS_COP.1': 27, 'FCS_CKM.1': 13, 'FCS_CKM.1.1': 1, 'FCS_CKM.4': 10, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 3, 'FCS_CKM.2': 1}, 'FDP': {'FDP_ACC': 2, 'FDP_ACC.1': 1, 'FDP_ITC.1': 6, 'FDP_ITC.2': 6}, 'FIA': {'FIA_ATD': 2, 'FIA_UAU': 5, 'FIA_UID': 2, 'FIA_UAU.1': 4, 'FIA_UAU.5': 7, 'FIA_UID.1': 3, 'FIA_ATD.1': 2, 'FIA_ATD.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_AFL.1': 1}, 'FMT': {'FMT_MOF': 2, 'FMT_MTD.1': 14, 'FMT_SMF': 3, 'FMT_SMR': 2, 'FMT_MOF.1': 4, 'FMT_SMR.1': 4, 'FMT_MOF.1.1': 1, 'FMT_MTD.1.1': 2, 'FMT_SMF.1': 7, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 2, 'FMT_SMR.1.2': 1, 'FMT_MITD.1': 1}, 'FPT': {'FPT_ITI': 3, 'FPT_STM': 2, 'FPT_ITI.1': 7, 'FPT_ITI.1.1': 1, 'FPT_ITI.1.2': 1, 'FPT_STM.1': 2, 'FPT_STM.1.1': 1, 'FPT_ITA.1': 1, 'FPT_ITC.1': 1, 'FPT_ITT.1': 1}}, 'cc_claims': {'O': {'O.PROTCT': 2, 'O.IDSENS': 3, 'O.IDANLZ': 11, 'O.RESPON': 1, 'O.EADMIN': 3, 'O.ACCESS': 2, 'O.IDAUTH': 4, 'O.OFLOWS': 1, 'O.AUDITS': 1, 'O.INTEGR': 1, 'O.AUDIT_PROTECTION': 1, 'O.AUDIT_SORT': 1, 'O.TIME': 1, 'O.IDSCAN': 1}, 'T': {'T.COMINT': 1, 'T.COMDIS': 1, 'T.LOSSOF': 1, 'T.NOHALT': 5, 'T.PRIVIL': 1, 'T.IMPCON': 1, 'T.INFLUX': 1, 'T.FACCNT': 1, 'T.FALACT': 1, 'T.FALREC': 3, 'T.FALASC': 4, 'T.MISUSE': 1, 'T.INADVE': 1, 'T.MISACT': 1, 'T.SCNCFG': 1, 'T.SCNMLC': 1}, 'A': {'A.ACCESS': 1, 'A.DYNMIC': 1, 'A.ASCOPE': 1, 'A.PROTCT': 1, 'A.LOCATE': 1, 'A.MANAGE': 1, 'A.NOEVIL': 1, 'A.NOTRST': 1}, 'OE': {'OE.INSTAL': 1, 'OE.PHYCAL': 1, 'OE.CREDEN': 1, 'OE.PERSON': 1, 'OE.INTROP': 1, 'OE.CERTIFICATES': 6, 'OE.AUDIT_PROTECTION': 1, 'OE.AUDIT_SORT': 1}}, 'vendor': {'Cisco': {'Cisco': 14}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 10}}, 'DES': {'DES': {'DES': 5}, '3DES': {'TDES': 4}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 2, 'SHA-1': 4}}, 'MD': {'MD5': {'MD5': 5}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 13}, 'TLS': {'TLS': {'TLS': 10}}}, 'randomness': {'PRNG': {'PRNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 2}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 6, 'FIPS PUB 197': 2, 'FIPS 180-2': 1, 'FIPS PUB 46-3': 2, 'FIPS PUB 186-3': 1, 'FIPS PUB 180-3': 1}, 'RFC': {'RFC 2821': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
st_vid10438-vr.pdf
. - The st_filename property was set to
st_vid10438-st.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['US']
. - The cert_id property was set to
CCEVS-VR-VID-10438-2010
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10438-vr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10438-st.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name IronPort Email Security Appliances (ESA), comprising the C160, C370, X1060, and X1070 appliance models, running IronPort AsyncOS software, version 7.1, and the C670 appliance model running IronPort AsyncOS version 7.3 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Detection Devices and Systems",
"cert_link": null,
"dgst": "8000ecd5144388da",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CCEVS-VR-VID-10438-2010",
"cert_lab": [
"US"
],
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:cisco:asyncos:7.3.2:-:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asyncos:7.1.5:hot_patch:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asyncos:7.1.5:hot_patch6:*:*:*:*:*:*",
"cpe:2.3:o:cisco:email_security_appliance_firmware:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asyncos:7.3.2:hot_patch2:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asyncos:7.1.5-102:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:7.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:7.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asyncos:7.3.1:hot_patch2:*:*:*:*:*:*",
"cpe:2.3:o:cisco:email_security_appliance_firmware:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asyncos:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asyncos:7.3.1:build101:*:*:*:*:*:*",
"cpe:2.3:o:cisco:email_security_appliance_firmware:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asyncos:7.3.2:hot_patch:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asyncos:7.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:7.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asyncos:7.1.5:hot_patch5:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asyncos:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asyncos:7.1.5:hot_patch4:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asyncos:7.3.1:build47:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:7.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asyncos:7.1.5:-:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asyncos:7.1.3:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"7.3",
"7.1"
]
},
"indirect_transitive_cves": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2016-6356",
"CVE-2019-15988",
"CVE-2020-3370",
"CVE-2014-3381",
"CVE-2019-1983",
"CVE-2022-20653",
"CVE-2020-3181",
"CVE-2020-3137",
"CVE-2021-1566",
"CVE-2022-20798",
"CVE-2020-3134",
"CVE-2019-12706",
"CVE-2020-3164",
"CVE-2019-15971",
"CVE-2020-3367",
"CVE-2022-20960",
"CVE-2022-20664",
"CVE-2020-3568",
"CVE-2020-3133",
"CVE-2020-3447",
"CVE-2023-20009",
"CVE-2020-3132"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "Wireless Monitoring",
"certification_date": "2010-12-01",
"evaluation_facility": "Leidos Common Criteria Testing Laboratory",
"expiration_date": "2014-11-01",
"id": "CCEVS-VR-VID10438",
"product": "IronPort Email Security Appliances (ESA), comprising the C160, C370, X1060, and X1070 appliance models, running IronPort AsyncOS software, version 7.1, and the C670 appliance model running IronPort AsyncOS version 7.3",
"scheme": "US",
"url": "https://www.niap-ccevs.org/product/10438",
"vendor": "Cisco Systems, Inc."
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Cisco Systems, Inc.",
"manufacturer_web": "https://www.cisco.com",
"name": "IronPort Email Security Appliances (ESA), comprising the C160, C370, X1060, and X1070 appliance models, running IronPort AsyncOS software, version 7.1, and the C670 appliance model running IronPort AsyncOS version 7.3",
"not_valid_after": "2014-11-01",
"not_valid_before": "2010-12-01",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "st_vid10438-vr.pdf",
"report_frontpage": {
"US": {
"cert_id": "CCEVS-VR-VID10438-2010",
"cert_item": "Cisco IronPort Systems LLC, 950 Elm Avenue, San Bruno, CA 94066 IronPort Email Security Appliances",
"cert_lab": "US NIAP"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"US": {
"CCEVS-VR-VID10438-2010": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 9,
"EAL 2 augmented": 2,
"EAL2": 2,
"EAL2 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 1
}
},
"crypto_protocol": {
"SSH": {
"SSH": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 5
},
"RFC": {
"RFC 2821": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 17
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Tammy Compton",
"/CreationDate": "D:20110110111756",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20110110111756",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Title": "Validation Report for VID10438",
"pdf_file_size_bytes": 629161,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 19
},
"st_filename": "st_vid10438-st.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ACCESS": 1,
"A.ASCOPE": 1,
"A.DYNMIC": 1,
"A.LOCATE": 1,
"A.MANAGE": 1,
"A.NOEVIL": 1,
"A.NOTRST": 1,
"A.PROTCT": 1
},
"O": {
"O.ACCESS": 2,
"O.AUDITS": 1,
"O.AUDIT_PROTECTION": 1,
"O.AUDIT_SORT": 1,
"O.EADMIN": 3,
"O.IDANLZ": 11,
"O.IDAUTH": 4,
"O.IDSCAN": 1,
"O.IDSENS": 3,
"O.INTEGR": 1,
"O.OFLOWS": 1,
"O.PROTCT": 2,
"O.RESPON": 1,
"O.TIME": 1
},
"OE": {
"OE.AUDIT_PROTECTION": 1,
"OE.AUDIT_SORT": 1,
"OE.CERTIFICATES": 6,
"OE.CREDEN": 1,
"OE.INSTAL": 1,
"OE.INTROP": 1,
"OE.PERSON": 1,
"OE.PHYCAL": 1
},
"T": {
"T.COMDIS": 1,
"T.COMINT": 1,
"T.FACCNT": 1,
"T.FALACT": 1,
"T.FALASC": 4,
"T.FALREC": 3,
"T.IMPCON": 1,
"T.INADVE": 1,
"T.INFLUX": 1,
"T.LOSSOF": 1,
"T.MISACT": 1,
"T.MISUSE": 1,
"T.NOHALT": 5,
"T.PRIVIL": 1,
"T.SCNCFG": 1,
"T.SCNMLC": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 10,
"ADV_FSP": 1,
"ADV_FSP.2": 11,
"ADV_TDS": 1,
"ADV_TDS.1": 11
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 10,
"AGD_PRE": 1,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.2": 8,
"ALC_CMS": 1,
"ALC_CMS.2": 6,
"ALC_DEL": 1,
"ALC_DEL.1": 5,
"ALC_FLR": 1,
"ALC_FLR.2": 18
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 4,
"ATE_FUN": 1,
"ATE_FUN.1": 8,
"ATE_IND": 1,
"ATE_IND.2": 7
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.2": 7
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 6,
"EAL 2 augmented": 3,
"EAL2": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2,
"FAU_GEN.1": 6,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAR": 6,
"FAU_SAR.1": 3,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 3,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 2,
"FAU_SAR.3.1": 1,
"FAU_SEL": 2,
"FAU_SEL.1": 3,
"FAU_SEL.1.1": 1,
"FAU_STG": 4,
"FAU_STG.2": 2,
"FAU_STG.2.1": 1,
"FAU_STG.2.2": 1,
"FAU_STG.2.3": 1,
"FAU_STG.4": 2,
"FAU_STG.4.1": 1
},
"FCS": {
"FCS_CKM": 7,
"FCS_CKM.1": 13,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 1,
"FCS_CKM.4": 10,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 27,
"FCS_COP.1.1": 3
},
"FDP": {
"FDP_ACC": 2,
"FDP_ACC.1": 1,
"FDP_ITC.1": 6,
"FDP_ITC.2": 6
},
"FIA": {
"FIA_AFL.1": 1,
"FIA_ATD": 2,
"FIA_ATD.1": 2,
"FIA_ATD.1.1": 1,
"FIA_UAU": 5,
"FIA_UAU.1": 4,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.5": 7,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UID": 2,
"FIA_UID.1": 3,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MITD.1": 1,
"FMT_MOF": 2,
"FMT_MOF.1": 4,
"FMT_MOF.1.1": 1,
"FMT_MTD.1": 14,
"FMT_MTD.1.1": 2,
"FMT_SMF": 3,
"FMT_SMF.1": 7,
"FMT_SMF.1.1": 1,
"FMT_SMR": 2,
"FMT_SMR.1": 4,
"FMT_SMR.1.1": 2,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_ITA.1": 1,
"FPT_ITC.1": 1,
"FPT_ITI": 3,
"FPT_ITI.1": 7,
"FPT_ITI.1.1": 1,
"FPT_ITI.1.2": 1,
"FPT_ITT.1": 1,
"FPT_STM": 2,
"FPT_STM.1": 2,
"FPT_STM.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 2
}
},
"crypto_protocol": {
"SSH": {
"SSH": 13
},
"TLS": {
"TLS": {
"TLS": 10
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 5
}
},
"SHA": {
"SHA1": {
"SHA-1": 4,
"SHA1": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"malfunction": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 6,
"FIPS 180-2": 1,
"FIPS PUB 180-3": 1,
"FIPS PUB 186-3": 1,
"FIPS PUB 197": 2,
"FIPS PUB 46-3": 2
},
"RFC": {
"RFC 2821": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 10
}
},
"DES": {
"3DES": {
"TDES": 4
},
"DES": {
"DES": 5
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 14
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "SAIC CCTL",
"/CreationDate": "D:20110110111851",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20110110111851",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Subject": "Security Target",
"/Title": "IronPort Email Security Appliances Security Target",
"pdf_file_size_bytes": 1095078,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 46
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10438-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL2+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10438-st.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "0b2e7dc58886898efb1581205297d0416d72d141de8bc7f25c7f67b1eb8ee993",
"txt_hash": "f21066b581ed2d33224a5186c39df022966057c4b333fb665bea3d378543f7b3"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "96e3d56633409afdad546ed33ff5677acf85c8bd4738cccedd6f86f209435474",
"txt_hash": "acd723426798b156895721b6c3edd40a59db87ae265731740c7b470cb3002ff1"
}
},
"status": "archived"
}