Rapid7™ Nexpose™ Vulnerability Management and Penetration Testing System V5.1

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status archived
Valid from 22.05.2012
Valid until 15.05.2017
Scheme 🇨🇦 CA
Manufacturer Rapid7 LLC
Category Other Devices and Systems
Security level ALC_FLR.2, EAL3+

Heuristics summary ?

Certificate ID: 383-4-148

Certificate ?

Certification report ?

Extracted keywords

Protocols
SSL

Security level
EAL 3+, EAL 3, EAL 3 augmented
Security Assurance Requirements (SAR)
ALC_FLR.2
Certificates
383-4-148-CR
Evaluation facilities
EWA-Canada

Standards
ISO/IEC 17025:2005

File metadata

Title Microsoft Word - 383-4-148_CR_english_v1 0.doc
Author dewhite
Creation date D:20120608081731-04'00'
Modification date D:20120608081731-04'00'
Pages 13
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 6.0 (Windows)

Frontpage

Certificate ID 383-4-148-CR
Certification lab CANADA

Security target ?

Extracted keywords

Protocols
SSL

Security level
EAL3, EAL3+, EAL3 augmented
Claims
O.ACCESS, O.ADMIN, O.AUDITS, O.IDAUTH, O.PROTECT, T.ACCESS, T.BRUTE, T.DELETE, T.ELEVATE, T.INTERCPT, T.MODIFY, A.ATTACK, A.CLIENT, A.CONNECT, A.ENV, A.INSTALL, A.INTROP, A.NOEVIL, A.PHYSICAL, A.PRIVIL, A.REMOTE, A.TRUSTED, A.INTEROP, OE.ATTACK, OE.CONNECT, OE.CREDENT, OE.ENV, OE.INSTALL, OE.INTROP, OE.NOEVIL, OE.PERSON, OE.PHYSICAL, OE.PRIVIL, OE.REMOTE, OE.SSL, OE.TIME, OE.TRAIN, OE.TRUSTED, OE.PROTECT
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_STG.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN, FAU_STG.1.1, FAU_STG.1.2, FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FIA_AFL.1, FIA_ATD.1, FIA_UAU.2, FIA_UID.2, FIA_UAU, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.2.1, FIA_UID.2.1, FIA_UID.1, FIA_UAU.1, FMT_MOF.1, FMT_MTD, FMT_SMF.1, FMT_SMR, FMT_MTD.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FTA_SSL.3, FTA_SSL.3.1

File metadata

Title Microsoft Word - Rapid7_CommonCriteria_STv1.7 - Copy.docx
Author cbridges
Creation date D:20120511160512-04'00'
Modification date D:20120511160512-04'00'
Pages 25
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 10.1.0 (Windows)

Heuristics ?

Certificate ID: 383-4-148

Extracted SARs

ASE_CCL.1, ALC_DEL.1, ATE_DPT.1, ALC_CMS.3, ATE_FUN.1, ATE_IND.2, ASE_TSS.1, ADV_ARC.1, ALC_CMC.3, ASE_SPD.1, ASE_REQ.2, ATE_COV.2, AGD_OPE.1, ALC_DVS.1, ALC_FLR.2, ADV_TDS.2, ASE_ECD.1, AVA_VAN.2, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ASE_OBJ.2, ADV_FSP.3

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2012-6493
C M N
MEDIUM 6.8 6.4 04.02.2014 22:55
CVE-2012-6494
C M N
MEDIUM 6.1 2.7 25.01.2020 19:15
CVE-2017-5230
C M N
HIGH 7.2 5.9 02.03.2017 20:59
CVE-2017-5232
C M N
HIGH 7.8 5.9 02.03.2017 20:59
CVE-2017-5243
C M N
HIGH 8.5 6.0 06.06.2017 16:29
CVE-2017-5264
C M N
HIGH 8.8 5.9 14.12.2017 21:29
CVE-2019-5638
C M N
MEDIUM 6.8 6.4 21.08.2019 20:15
CVE-2019-5640
C M N
MEDIUM 5.3 1.4 22.11.2021 17:15
CVE-2020-7381
C M N
HIGH 7.8 5.9 03.09.2020 14:15
CVE-2020-7382
C M N
MEDIUM 6.5 5.9 03.09.2020 14:15
CVE-2020-7383
C M N
HIGH 8.1 5.2 14.10.2020 20:15
CVE-2021-31868
C M N
MEDIUM 5.4 2.5 19.08.2021 16:15
CVE-2021-3535
C M N
MEDIUM 6.1 2.7 16.06.2021 02:15
CVE-2022-0757
C M N
HIGH 8.8 5.9 17.03.2022 23:15
CVE-2022-0758
C M N
MEDIUM 6.1 2.7 17.03.2022 23:15
CVE-2022-4261
C M N
MEDIUM 6.5 3.6 08.12.2022 00:15
CVE-2023-1699
C M N
CRITICAL 9.8 5.9 30.03.2023 10:15

References ?

No references are available for this certificate.

Updates ?

  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2019-5638', 'CVE-2012-6494']} values added.
  • 30.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2019-5638', 'CVE-2012-6494']} values discarded.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '02a10a3aeb8c9db384f81f5fcf75b2ddbca7851fbcd38468f6f1807197a7e7d9', 'txt_hash': '463061e019e06f4fa87d936db6c6696b414dfab85f124b1c256cbe0fa06aee36'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '469c4362d8e60ce56ae8d8485917a535064895b1bde94639ad56ce5c0730091d', 'txt_hash': '8a0d3496d418419732ef4b293b604ba40f65bc4ae9c7e2f182c140d4546a9f77'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 53933, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 13, '/ModDate': "D:20120608081731-04'00'", '/CreationDate': "D:20120608081731-04'00'", '/Title': 'Microsoft Word - 383-4-148_CR_english_v1 0.doc', '/Creator': 'PScript5.dll Version 5.2.2', '/Producer': 'Acrobat Distiller 6.0 (Windows)', '/Author': 'dewhite', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 178559, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 25, '/Author': 'cbridges', '/CreationDate': "D:20120511160512-04'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20120511160512-04'00'", '/Producer': 'Acrobat Distiller 10.1.0 (Windows)', '/Title': 'Microsoft Word - Rapid7_CommonCriteria_STv1.7 - Copy.docx', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'CA': {'cert_id': '383-4-148-CR', 'cert_lab': 'CANADA'}}.
    • The report_keywords property was set to {'cc_cert_id': {'CA': {'383-4-148-CR': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3+': 3, 'EAL 3': 4, 'EAL 3 augmented': 2}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 2}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'EWA': {'EWA-Canada': 4}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 2}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 17025:2005': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 1, 'EAL3+': 1, 'EAL3 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 3, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 9, 'FAU_STG.1': 9, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FDP': {'FDP_ACC.1': 5, 'FDP_ACF.1': 4, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1}, 'FIA': {'FIA_AFL.1': 7, 'FIA_ATD.1': 7, 'FIA_UAU.2': 9, 'FIA_UID.2': 8, 'FIA_UAU': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.2.1': 1, 'FIA_UID.1': 3, 'FIA_UAU.1': 2}, 'FMT': {'FMT_MOF.1': 10, 'FMT_MTD': 2, 'FMT_SMF.1': 9, 'FMT_SMR': 2, 'FMT_MTD.1': 8, 'FMT_SMR.1': 7, 'FMT_MOF.1.1': 1, 'FMT_MTD.1.1': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 2}, 'FTA': {'FTA_SSL.3': 7, 'FTA_SSL.3.1': 1}}, 'cc_claims': {'O': {'O.ACCESS': 8, 'O.ADMIN': 5, 'O.AUDITS': 6, 'O.IDAUTH': 10, 'O.PROTECT': 8}, 'T': {'T.ACCESS': 3, 'T.BRUTE': 3, 'T.DELETE': 3, 'T.ELEVATE': 3, 'T.INTERCPT': 3, 'T.MODIFY': 3}, 'A': {'A.ATTACK': 3, 'A.CLIENT': 3, 'A.CONNECT': 3, 'A.ENV': 3, 'A.INSTALL': 3, 'A.INTROP': 2, 'A.NOEVIL': 3, 'A.PHYSICAL': 3, 'A.PRIVIL': 3, 'A.REMOTE': 3, 'A.TRUSTED': 3, 'A.INTEROP': 1}, 'OE': {'OE.ATTACK': 3, 'OE.CONNECT': 2, 'OE.CREDENT': 3, 'OE.ENV': 3, 'OE.INSTALL': 3, 'OE.INTROP': 3, 'OE.NOEVIL': 4, 'OE.PERSON': 2, 'OE.PHYSICAL': 3, 'OE.PRIVIL': 2, 'OE.REMOTE': 3, 'OE.SSL': 3, 'OE.TIME': 4, 'OE.TRAIN': 3, 'OE.TRUSTED': 4, 'OE.PROTECT': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 7}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 383-4-148_CR_english_v1 0.pdf.
    • The st_filename property was set to Rapid7_CommonCriteria_STv1.7.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['CANADA'].
    • The cert_id property was set to 383-4-148.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-148_CR_english_v1%200.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Rapid7_CommonCriteria_STv1.7.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Rapid7™ Nexpose™ Vulnerability Management and Penetration Testing System V5.1 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": null,
  "dgst": "7b44aee232c7dae0",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "383-4-148",
    "cert_lab": [
      "CANADA"
    ],
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:a:rapid7:nexpose:-:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.1"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2012-6493",
        "CVE-2021-3535",
        "CVE-2020-7382",
        "CVE-2022-0757",
        "CVE-2023-1699",
        "CVE-2017-5264",
        "CVE-2017-5232",
        "CVE-2022-0758",
        "CVE-2022-4261",
        "CVE-2020-7381",
        "CVE-2012-6494",
        "CVE-2020-7383",
        "CVE-2017-5230",
        "CVE-2021-31868",
        "CVE-2019-5640",
        "CVE-2017-5243",
        "CVE-2019-5638"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Rapid7 LLC",
  "manufacturer_web": "https://www.rapid7.com/",
  "name": "Rapid7\u2122 Nexpose\u2122 Vulnerability Management and Penetration Testing System V5.1",
  "not_valid_after": "2017-05-15",
  "not_valid_before": "2012-05-22",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "383-4-148_CR_english_v1 0.pdf",
    "report_frontpage": {
      "CA": {
        "cert_id": "383-4-148-CR",
        "cert_lab": "CANADA"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "CA": {
          "383-4-148-CR": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 3": 4,
          "EAL 3 augmented": 2,
          "EAL 3+": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 2
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "EWA": {
          "EWA-Canada": 4
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 17025:2005": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "dewhite",
      "/CreationDate": "D:20120608081731-04\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20120608081731-04\u002700\u0027",
      "/Producer": "Acrobat Distiller 6.0 (Windows)",
      "/Title": "Microsoft Word - 383-4-148_CR_english_v1 0.doc",
      "pdf_file_size_bytes": 53933,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 13
    },
    "st_filename": "Rapid7_CommonCriteria_STv1.7.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ATTACK": 3,
          "A.CLIENT": 3,
          "A.CONNECT": 3,
          "A.ENV": 3,
          "A.INSTALL": 3,
          "A.INTEROP": 1,
          "A.INTROP": 2,
          "A.NOEVIL": 3,
          "A.PHYSICAL": 3,
          "A.PRIVIL": 3,
          "A.REMOTE": 3,
          "A.TRUSTED": 3
        },
        "O": {
          "O.ACCESS": 8,
          "O.ADMIN": 5,
          "O.AUDITS": 6,
          "O.IDAUTH": 10,
          "O.PROTECT": 8
        },
        "OE": {
          "OE.ATTACK": 3,
          "OE.CONNECT": 2,
          "OE.CREDENT": 3,
          "OE.ENV": 3,
          "OE.INSTALL": 3,
          "OE.INTROP": 3,
          "OE.NOEVIL": 4,
          "OE.PERSON": 2,
          "OE.PHYSICAL": 3,
          "OE.PRIVIL": 2,
          "OE.PROTECT": 1,
          "OE.REMOTE": 3,
          "OE.SSL": 3,
          "OE.TIME": 4,
          "OE.TRAIN": 3,
          "OE.TRUSTED": 4
        },
        "T": {
          "T.ACCESS": 3,
          "T.BRUTE": 3,
          "T.DELETE": 3,
          "T.ELEVATE": 3,
          "T.INTERCPT": 3,
          "T.MODIFY": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.3": 1,
          "ADV_TDS.2": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.3": 1,
          "ALC_CMS.3": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR.2": 3,
          "ALC_LCD.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 1,
          "EAL3 augmented": 1,
          "EAL3+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_GEN.1": 9,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_STG.1": 9,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1
        },
        "FDP": {
          "FDP_ACC.1": 5,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 4,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1
        },
        "FIA": {
          "FIA_AFL.1": 7,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 7,
          "FIA_ATD.1.1": 1,
          "FIA_UAU": 1,
          "FIA_UAU.1": 2,
          "FIA_UAU.2": 9,
          "FIA_UAU.2.1": 1,
          "FIA_UID.1": 3,
          "FIA_UID.2": 8,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF.1": 10,
          "FMT_MOF.1.1": 1,
          "FMT_MTD": 2,
          "FMT_MTD.1": 8,
          "FMT_MTD.1.1": 2,
          "FMT_SMF.1": 9,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 2,
          "FMT_SMR.1": 7,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_STM.1": 2
        },
        "FTA": {
          "FTA_SSL.3": 7,
          "FTA_SSL.3.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 7
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "cbridges",
      "/CreationDate": "D:20120511160512-04\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20120511160512-04\u002700\u0027",
      "/Producer": "Acrobat Distiller 10.1.0 (Windows)",
      "/Title": "Microsoft Word - Rapid7_CommonCriteria_STv1.7 - Copy.docx",
      "pdf_file_size_bytes": 178559,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 25
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-148_CR_english_v1%200.pdf",
  "scheme": "CA",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3+",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Rapid7_CommonCriteria_STv1.7.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "02a10a3aeb8c9db384f81f5fcf75b2ddbca7851fbcd38468f6f1807197a7e7d9",
      "txt_hash": "463061e019e06f4fa87d936db6c6696b414dfab85f124b1c256cbe0fa06aee36"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "469c4362d8e60ce56ae8d8485917a535064895b1bde94639ad56ce5c0730091d",
      "txt_hash": "8a0d3496d418419732ef4b293b604ba40f65bc4ae9c7e2f182c140d4546a9f77"
    }
  },
  "status": "archived"
}