Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1Version iOS 16.4.1 (build 20E252) ( ANSSI-CC-2023/59)

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status active
Valid from 28.12.2023
Valid until 28.12.2028
Scheme 🇫🇷 FR
Manufacturer Apple Inc.
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ADV_FSP.3, EAL2+

Heuristics summary ?

Certificate ID: ANSSI-CC-2023/59

Certificate ?

Extracted keywords

Security level
EAL2
Security Assurance Requirements (SAR)
ADV_FSP.3
Certificates
ANSSI-CC-2023/59
Evaluation facilities
THALES/CNES

File metadata

Creation date D:20240222154612+01'00'
Modification date D:20240222155210+01'00'
Pages 2
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

Certification report ?

Extracted keywords

Security level
EAL2, EAL4, EAL2 augmented, ITSEC E3 Basic
Security Assurance Requirements (SAR)
ADV_FSP.3, ALC_FLR
Certificates
ANSSI-CC-2023/59
Evaluation facilities
THALES/CNES

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Creation date D:20240222154515+01'00'
Modification date D:20240222155210+01'00'
Pages 13
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

Security target ?

Extracted keywords

Symmetric Algorithms
AES
Asymmetric Algorithms
ECDH
Schemes
MAC
Protocols
TLS
Elliptic Curves
P-256

Trusted Execution Environments
SE

Security level
EAL 2, EAL2, EAL 2 augmented
Claims
D.OS, D.SEP_SE, T.CORRUPT, T.PHYSICAL, T.RECOVER, T.REPLAY, T.SILENT, T.SKIMMING, T.USURP, A.DE-, A.PERSO, A.CDCVM, A.WATCH_USER, A.DEVICE_AUTH, OE.CDCVM
Security Assurance Requirements (SAR)
ADV_FSP, ADV_ARC.1, ADV_FSP.3, ADV_TDS.1, ADV_FSP.2, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1
Security Functional Requirements (SFR)
FDP_DAU.1, FDP_DAU.1.1, FDP_DAU.1.2, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_ITT.1, FDP_ITT.1.1, FDP_ETC, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_UCT, FDP_UCT.1, FDP_UIT, FDP_UIT.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.1.1, FDP_ACC.1, FDP_IFC.1, FDP_ETC.2, FIA_UID.2, FIA_UID.2.1, FIA_UAU.2, FIA_UAU.2.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_AFL.1, FIA_AFL, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.6.1, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UAU.1, FIA_UID.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1.1, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.3, FMT_MTD.3.1, FPR_UNO.1, FPR_UNO.1.1, FPT_ITC.1, FPT_ITC.1.1, FPT_RPL, FPT_RPL.1, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1
Certification process
out of scope, Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by, pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RECOVER Card Re- covery An

Certification process
out of scope, Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by, pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RECOVER Card Re- covery An

Standards
FIPS 140-3, FIPS 140-2

File metadata

Title Microsoft Word - [ST] iPhone_A16Bionic_iOS16_SecurityTarget_v1.4.docx
Creation date D:20231109105238Z
Modification date D:20231109105301Z
Pages 56
Creator Word
Producer Adobe Mac PDF Plug-in

Heuristics ?

Certificate ID: ANSSI-CC-2023/59

Extracted SARs

ALC_CMC.2, ADV_FSP.3, ASE_CCL.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, AGD_OPE.1, ADV_TDS.1, ALC_CMS.2, ASE_OBJ.2, ATE_IND.2, ALC_DEL.1, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, AGD_PRE.1, ASE_ECD.1, ASE_SPD.1, AVA_VAN.2

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2022-3970
C M N
HIGH 8.8 5.9 13.11.2022 08:15
CVE-2023-27930
C M N
HIGH 7.8 5.9 23.06.2023 18:15
CVE-2023-28191
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-28202
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-28204
C M N
MEDIUM 6.5 3.6 23.06.2023 18:15
CVE-2023-32352
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32354
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32357
C M N
HIGH 7.1 5.2 23.06.2023 18:15
CVE-2023-32359
C M N
HIGH 7.5 3.6 25.10.2023 19:15
CVE-2023-32361
C M N
MEDIUM 5.5 3.6 27.09.2023 15:18
CVE-2023-32365
C M N
LOW 2.4 1.4 23.06.2023 18:15
CVE-2023-32367
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32368
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32371
C M N
MEDIUM 6.3 4.0 23.06.2023 18:15
CVE-2023-32372
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32373
C M N
HIGH 8.8 5.9 23.06.2023 18:15
CVE-2023-32376
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32381
C M N
HIGH 7.8 5.9 27.07.2023 00:15
CVE-2023-32384
C M N
HIGH 7.8 5.9 23.06.2023 18:15
CVE-2023-32385
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32388
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32389
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32390
C M N
LOW 2.4 1.4 23.06.2023 18:15
CVE-2023-32391
C M N
MEDIUM 4.6 3.6 23.06.2023 18:15
CVE-2023-32392
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32394
C M N
LOW 2.4 1.4 23.06.2023 18:15
CVE-2023-32396
C M N
HIGH 7.8 5.9 27.09.2023 15:18
CVE-2023-32398
C M N
HIGH 7.8 5.9 23.06.2023 18:15
CVE-2023-32399
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32400
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32402
C M N
MEDIUM 6.5 3.6 23.06.2023 18:15
CVE-2023-32403
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32404
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32407
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32408
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32409
C M N
HIGH 8.6 4.0 23.06.2023 18:15
CVE-2023-32411
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32412
C M N
CRITICAL 9.8 5.9 23.06.2023 18:15
CVE-2023-32413
C M N
HIGH 7.0 5.9 23.06.2023 18:15
CVE-2023-32415
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32416
C M N
MEDIUM 5.5 3.6 27.07.2023 01:15
CVE-2023-32419
C M N
CRITICAL 9.8 5.9 23.06.2023 18:15
CVE-2023-32420
C M N
HIGH 7.1 5.2 23.06.2023 18:15
CVE-2023-32422
C M N
MEDIUM 5.5 3.6 23.06.2023 18:15
CVE-2023-32423
C M N
MEDIUM 6.5 3.6 23.06.2023 18:15
CVE-2023-32425
C M N
HIGH 7.8 5.9 06.09.2023 02:15
CVE-2023-32428
C M N
HIGH 7.8 5.9 06.09.2023 02:15
CVE-2023-32432
C M N
MEDIUM 5.5 3.6 06.09.2023 02:15
CVE-2023-32433
C M N
HIGH 7.8 5.9 27.07.2023 00:15
CVE-2023-32434
C M N
HIGH 7.8 5.9 23.06.2023 18:15
CVE-2023-32437
C M N
HIGH 8.6 6.0 27.07.2023 00:15
CVE-2023-32439
C M N
HIGH 8.8 5.9 23.06.2023 18:15
CVE-2023-32441
C M N
HIGH 7.8 5.9 27.07.2023 01:15
CVE-2023-32445
C M N
MEDIUM 6.1 2.7 28.07.2023 05:15
CVE-2023-32734
C M N
HIGH 7.8 5.9 27.07.2023 01:15
CVE-2023-34352
C M N
MEDIUM 5.3 1.4 06.09.2023 02:15
CVE-2023-34425
C M N
CRITICAL 9.8 5.9 28.07.2023 05:15
CVE-2023-35074
C M N
HIGH 8.8 5.9 27.09.2023 15:18
CVE-2023-35984
C M N
MEDIUM 4.3 3.4 27.09.2023 15:18
CVE-2023-35990
C M N
LOW 3.3 1.4 27.09.2023 15:18
CVE-2023-35993
C M N
HIGH 7.8 5.9 27.07.2023 01:15
CVE-2023-36495
C M N
CRITICAL 9.8 5.9 28.07.2023 05:15
CVE-2023-37450
C M N
HIGH 8.8 5.9 27.07.2023 00:15
CVE-2023-38133
C M N
MEDIUM 6.5 3.6 27.07.2023 00:15
CVE-2023-38136
C M N
HIGH 7.8 5.9 27.07.2023 01:15
CVE-2023-38261
C M N
HIGH 7.8 5.9 27.07.2023 01:15
CVE-2023-38410
C M N
HIGH 7.8 5.9 27.07.2023 00:15
CVE-2023-38424
C M N
HIGH 7.8 5.9 27.07.2023 01:15
CVE-2023-38425
C M N
HIGH 7.2 5.9 27.07.2023 01:15
CVE-2023-38565
C M N
HIGH 7.8 5.9 27.07.2023 01:15
CVE-2023-38572
C M N
HIGH 7.5 3.6 27.07.2023 01:15
CVE-2023-38580
C M N
HIGH 7.8 5.9 27.07.2023 01:15
CVE-2023-38590
C M N
HIGH 8.8 5.9 28.07.2023 05:15
CVE-2023-38592
C M N
HIGH 8.8 5.9 28.07.2023 05:15
CVE-2023-38593
C M N
MEDIUM 5.5 3.6 27.07.2023 01:15
CVE-2023-38594
C M N
HIGH 8.8 5.9 27.07.2023 00:15
CVE-2023-38595
C M N
HIGH 8.8 5.9 27.07.2023 01:15
CVE-2023-38596
C M N
MEDIUM 5.5 3.6 27.09.2023 15:18
CVE-2023-38597
C M N
HIGH 8.8 5.9 27.07.2023 00:15
CVE-2023-38598
C M N
CRITICAL 9.8 5.9 28.07.2023 05:15
CVE-2023-38599
C M N
MEDIUM 6.5 3.6 28.07.2023 05:15
CVE-2023-38600
C M N
HIGH 8.8 5.9 27.07.2023 01:15
CVE-2023-38603
C M N
HIGH 7.5 3.6 27.07.2023 01:15
CVE-2023-38604
C M N
CRITICAL 9.8 5.9 28.07.2023 05:15
CVE-2023-38605
C M N
LOW 3.3 1.4 06.09.2023 21:15
CVE-2023-38606
C M N
MEDIUM 5.5 3.6 27.07.2023 00:15
CVE-2023-38610
C M N
HIGH 7.1 5.2 10.01.2024 22:15
CVE-2023-38611
C M N
HIGH 8.8 5.9 27.07.2023 01:15
CVE-2023-38612
C M N
LOW 3.3 1.4 10.01.2024 22:15
CVE-2023-39434
C M N
HIGH 8.8 5.9 27.09.2023 15:18
CVE-2023-40384
C M N
LOW 3.3 1.4 27.09.2023 15:19
CVE-2023-40385
C M N
MEDIUM 6.5 3.6 10.01.2024 22:15
CVE-2023-40391
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-40392
C M N
LOW 3.3 1.4 06.09.2023 21:15
CVE-2023-40394
C M N
LOW 3.3 1.4 10.01.2024 22:15
CVE-2023-40395
C M N
LOW 3.3 1.4 27.09.2023 15:19
CVE-2023-40399
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-40400
C M N
CRITICAL 9.8 5.9 27.09.2023 15:19
CVE-2023-40403
C M N
MEDIUM 6.5 3.6 27.09.2023 15:19
CVE-2023-40408
C M N
MEDIUM 5.3 1.4 25.10.2023 19:15
CVE-2023-40409
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-40410
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-40412
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-40413
C M N
MEDIUM 5.5 3.6 25.10.2023 19:15
CVE-2023-40414
C M N
CRITICAL 9.8 5.9 10.01.2024 22:15
CVE-2023-40416
C M N
MEDIUM 6.5 3.6 25.10.2023 19:15
CVE-2023-40417
C M N
MEDIUM 5.4 2.5 27.09.2023 15:19
CVE-2023-40419
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-40420
C M N
MEDIUM 6.5 3.6 27.09.2023 15:19
CVE-2023-40423
C M N
HIGH 7.8 5.9 25.10.2023 19:15
CVE-2023-40424
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-40427
C M N
LOW 3.3 1.4 27.09.2023 15:19
CVE-2023-40428
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-40429
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-40431
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-40432
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-40434
C M N
LOW 3.3 1.4 27.09.2023 15:19
CVE-2023-40437
C M N
MEDIUM 5.5 3.6 10.01.2024 22:15
CVE-2023-40438
C M N
MEDIUM 5.5 3.6 10.01.2024 22:15
CVE-2023-40439
C M N
LOW 3.3 1.4 10.01.2024 22:15
CVE-2023-40441
C M N
MEDIUM 6.5 3.6 27.09.2023 15:19
CVE-2023-40442
C M N
LOW 3.3 1.4 12.09.2023 00:15
CVE-2023-40443
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-40446
C M N
HIGH 7.8 5.9 12.12.2023 01:15
CVE-2023-40447
C M N
HIGH 8.8 5.9 25.10.2023 19:15
CVE-2023-40448
C M N
HIGH 8.6 4.0 27.09.2023 15:19
CVE-2023-40449
C M N
MEDIUM 5.5 3.6 25.10.2023 19:15
CVE-2023-40452
C M N
HIGH 7.1 5.2 27.09.2023 15:19
CVE-2023-40454
C M N
HIGH 7.1 5.2 27.09.2023 15:19
CVE-2023-40456
C M N
LOW 3.3 1.4 27.09.2023 15:19
CVE-2023-40520
C M N
LOW 3.3 1.4 27.09.2023 15:19
CVE-2023-40528
C M N
MEDIUM 5.5 3.6 23.01.2024 01:15
CVE-2023-40529
C M N
LOW 2.4 1.4 10.01.2024 22:15
CVE-2023-41060
C M N
HIGH 8.8 5.9 10.01.2024 22:15
CVE-2023-41061
C M N
HIGH 7.8 5.9 07.09.2023 18:15
CVE-2023-41063
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-41064
C M N
HIGH 7.8 5.9 07.09.2023 18:15
CVE-2023-41065
C M N
LOW 3.3 1.4 27.09.2023 15:19
CVE-2023-41068
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-41069
C M N
MEDIUM 5.5 3.6 10.01.2024 22:15
CVE-2023-41070
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-41071
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-41073
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-41074
C M N
HIGH 8.8 5.9 27.09.2023 15:19
CVE-2023-41174
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-41232
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-41254
C M N
MEDIUM 5.5 3.6 25.10.2023 19:15
CVE-2023-41968
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-41974
C M N
HIGH 7.8 5.9 10.01.2024 22:15
CVE-2023-41976
C M N
HIGH 8.8 5.9 25.10.2023 19:15
CVE-2023-41977
C M N
MEDIUM 4.3 1.4 25.10.2023 19:15
CVE-2023-41980
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-41981
C M N
MEDIUM 4.4 3.6 27.09.2023 15:19
CVE-2023-41982
C M N
MEDIUM 4.6 3.6 25.10.2023 19:15
CVE-2023-41983
C M N
MEDIUM 6.5 3.6 25.10.2023 19:15
CVE-2023-41984
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-41986
C M N
MEDIUM 5.5 3.6 27.09.2023 15:19
CVE-2023-41991
C M N
MEDIUM 5.5 3.6 21.09.2023 19:15
CVE-2023-41992
C M N
HIGH 7.8 5.9 21.09.2023 19:15
CVE-2023-41993
C M N
HIGH 8.8 5.9 21.09.2023 19:15
CVE-2023-41995
C M N
HIGH 7.8 5.9 27.09.2023 15:19
CVE-2023-41997
C M N
MEDIUM 4.6 3.6 25.10.2023 19:15
CVE-2023-42824
C M N
HIGH 7.8 5.9 04.10.2023 19:15
CVE-2023-42833
C M N
HIGH 8.8 5.9 10.01.2024 22:15
CVE-2023-42841
C M N
HIGH 7.8 5.9 25.10.2023 19:15
CVE-2023-42846
C M N
MEDIUM 5.3 1.4 25.10.2023 19:15
CVE-2023-42849
C M N
MEDIUM 6.5 3.6 25.10.2023 19:15
CVE-2023-42852
C M N
HIGH 8.8 5.9 25.10.2023 19:15
CVE-2023-42857
C M N
LOW 3.3 1.4 25.10.2023 19:15
CVE-2023-42866
C M N
HIGH 8.8 5.9 10.01.2024 22:15
CVE-2023-42869
C M N
HIGH 7.5 3.6 10.01.2024 22:15
CVE-2023-42870
C M N
HIGH 7.8 5.9 10.01.2024 22:15
CVE-2023-42871
C M N
HIGH 7.8 5.9 10.01.2024 22:15
CVE-2023-42872
C M N
MEDIUM 5.5 3.6 10.01.2024 22:15
CVE-2023-42883
C M N
MEDIUM 5.5 3.6 12.12.2023 01:15
CVE-2023-42884
C M N
MEDIUM 5.5 3.6 12.12.2023 01:15
CVE-2023-42888
C M N
MEDIUM 5.5 3.6 23.01.2024 01:15
CVE-2023-42890
C M N
HIGH 8.8 5.9 12.12.2023 01:15
CVE-2023-42893
C M N
MEDIUM 5.5 3.6 28.03.2024 16:15
CVE-2023-42896
C M N
MEDIUM 5.5 3.6 28.03.2024 16:15
CVE-2023-42899
C M N
HIGH 7.8 5.9 12.12.2023 01:15
CVE-2023-42914
C M N
MEDIUM 6.3 4.0 12.12.2023 01:15
CVE-2023-42916
C M N
MEDIUM 6.5 3.6 30.11.2023 23:15
CVE-2023-42917
C M N
HIGH 8.8 5.9 30.11.2023 23:15
CVE-2023-42919
C M N
MEDIUM 5.5 3.6 12.12.2023 01:15
CVE-2023-42922
C M N
MEDIUM 5.5 3.6 12.12.2023 01:15
CVE-2023-42923
C M N
MEDIUM 5.3 1.4 12.12.2023 01:15
CVE-2023-42925
C M N
LOW 3.3 1.4 29.07.2024 21:15
CVE-2023-42934
C M N
MEDIUM 4.2 3.6 10.01.2024 22:15
CVE-2023-42936
C M N
MEDIUM 5.5 3.6 28.03.2024 16:15
CVE-2023-42937
C M N
MEDIUM 5.5 3.6 23.01.2024 01:15
CVE-2023-42941
C M N
MEDIUM 4.8 3.6 10.01.2024 22:15
CVE-2023-42947
C M N
HIGH 8.6 6.0 28.03.2024 16:15
CVE-2023-42949
C M N
LOW 3.3 1.4 29.07.2024 21:15
CVE-2023-42950
C M N
HIGH 8.8 5.9 28.03.2024 16:15
CVE-2023-42956
C M N
MEDIUM 6.5 3.6 28.03.2024 16:15
CVE-2023-42957
C M N
LOW 3.3 1.4 29.07.2024 21:15
CVE-2023-42962
C M N
HIGH 7.5 3.6 28.03.2024 16:15
CVE-2023-45866
C M N
MEDIUM 6.3 3.4 08.12.2023 06:15
CVE-2024-23206
C M N
MEDIUM 6.5 3.6 23.01.2024 01:15
CVE-2024-23208
C M N
HIGH 7.8 5.9 23.01.2024 01:15
CVE-2024-23210
C M N
LOW 3.3 1.4 23.01.2024 01:15
CVE-2024-23211
C M N
LOW 3.3 1.4 23.01.2024 01:15
CVE-2024-23212
C M N
HIGH 7.8 5.9 23.01.2024 01:15
CVE-2024-23213
C M N
HIGH 8.8 5.9 23.01.2024 01:15
CVE-2024-23214
C M N
HIGH 8.8 5.9 23.01.2024 01:15
CVE-2024-23215
C M N
MEDIUM 5.5 3.6 23.01.2024 01:15
CVE-2024-23217
C M N
LOW 3.3 1.4 23.01.2024 01:15
CVE-2024-23218
C M N
MEDIUM 5.9 3.6 23.01.2024 01:15
CVE-2024-23219
C M N
MEDIUM 6.2 3.6 23.01.2024 01:15
CVE-2024-23222
C M N
HIGH 8.8 5.9 23.01.2024 01:15
CVE-2024-23223
C M N
MEDIUM 6.2 3.6 23.01.2024 01:15
CVE-2024-23225
C M N
HIGH 7.8 5.9 05.03.2024 20:16
CVE-2024-23251
C M N
MEDIUM 4.6 3.6 10.06.2024 21:15
CVE-2024-23270
C M N
HIGH 7.8 5.9 08.03.2024 02:15
CVE-2024-23273
C M N
MEDIUM 4.3 1.4 08.03.2024 02:15
CVE-2024-23282
C M N
MEDIUM 5.5 3.6 10.06.2024 21:15
CVE-2024-23296
C M N
HIGH 7.8 5.9 05.03.2024 20:16
CVE-2024-27799
C M N
LOW 3.3 1.4 10.06.2024 21:15
CVE-2024-27800
C M N
MEDIUM 6.5 3.6 10.06.2024 21:15
CVE-2024-27801
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27802
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27805
C M N
MEDIUM 5.5 3.6 10.06.2024 21:15
CVE-2024-27806
C M N
MEDIUM 5.5 3.6 10.06.2024 21:15
CVE-2024-27807
C M N
MEDIUM 4.3 1.4 10.06.2024 21:15
CVE-2024-27808
C M N
HIGH 8.8 5.9 10.06.2024 21:15
CVE-2024-27811
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27815
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27817
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27819
C M N
LOW 2.4 1.4 10.06.2024 21:15
CVE-2024-27820
C M N
HIGH 8.8 5.9 10.06.2024 21:15
CVE-2024-27823
C M N
MEDIUM 5.9 3.6 29.07.2024 23:15
CVE-2024-27828
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27830
C M N
MEDIUM 6.5 3.6 10.06.2024 21:15
CVE-2024-27831
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27832
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27833
C M N
HIGH 8.8 5.9 10.06.2024 21:15
CVE-2024-27836
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27838
C M N
MEDIUM 6.5 3.6 10.06.2024 21:15
CVE-2024-27840
C M N
MEDIUM 6.3 4.0 10.06.2024 21:15
CVE-2024-27845
C M N
LOW 3.3 1.4 10.06.2024 21:15
CVE-2024-27848
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27850
C M N
MEDIUM 6.5 3.6 10.06.2024 21:15
CVE-2024-27851
C M N
HIGH 8.8 5.9 10.06.2024 21:15
CVE-2024-27855
C M N
HIGH 8.8 5.9 10.06.2024 21:15
CVE-2024-27857
C M N
HIGH 7.8 5.9 10.06.2024 21:15
CVE-2024-27863
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-27871
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-27873
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-27880
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-27884
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40774
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40776
C M N
MEDIUM 4.3 1.4 29.07.2024 23:15
CVE-2024-40778
C M N
LOW 3.3 1.4 29.07.2024 23:15
CVE-2024-40779
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40780
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40785
C M N
MEDIUM 6.1 2.7 29.07.2024 23:15
CVE-2024-40786
C M N
HIGH 7.5 3.6 29.07.2024 23:15
CVE-2024-40787
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40788
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40789
C M N
MEDIUM 6.5 3.6 29.07.2024 23:15
CVE-2024-40791
C M N
LOW 3.3 1.4 17.09.2024 00:15
CVE-2024-40793
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40794
C M N
MEDIUM 5.3 1.4 29.07.2024 23:15
CVE-2024-40795
C M N
LOW 3.3 1.4 29.07.2024 23:15
CVE-2024-40796
C M N
MEDIUM 5.3 1.4 29.07.2024 23:15
CVE-2024-40798
C M N
LOW 3.3 1.4 29.07.2024 23:15
CVE-2024-40799
C M N
HIGH 7.1 5.2 29.07.2024 23:15
CVE-2024-40806
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40809
C M N
HIGH 7.8 5.9 29.07.2024 23:15
CVE-2024-40812
C M N
HIGH 7.8 5.9 29.07.2024 23:15
CVE-2024-40813
C M N
MEDIUM 4.6 3.6 29.07.2024 23:15
CVE-2024-40815
C M N
HIGH 7.5 5.9 29.07.2024 23:15
CVE-2024-40818
C M N
MEDIUM 4.6 3.6 29.07.2024 23:15
CVE-2024-40822
C M N
LOW 2.4 1.4 29.07.2024 23:15
CVE-2024-40826
C M N
MEDIUM 6.1 4.2 17.09.2024 00:15
CVE-2024-40830
C M N
LOW 3.3 1.4 17.09.2024 00:15
CVE-2024-40833
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40835
C M N
MEDIUM 5.5 3.6 29.07.2024 23:15
CVE-2024-40840
C M N
MEDIUM 4.6 3.6 17.09.2024 00:15
CVE-2024-40844
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40850
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-40856
C M N
HIGH 7.5 3.6 17.09.2024 00:15
CVE-2024-40857
C M N
MEDIUM 6.1 2.7 17.09.2024 00:15
CVE-2024-40863
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44124
C M N
MEDIUM 6.5 3.6 17.09.2024 00:15
CVE-2024-44131
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44139
C M N
LOW 2.4 1.4 17.09.2024 00:15
CVE-2024-44158
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44164
C M N
HIGH 7.1 5.2 17.09.2024 00:15
CVE-2024-44165
C M N
HIGH 7.5 3.6 17.09.2024 00:15
CVE-2024-44170
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44171
C M N
MEDIUM 4.6 3.6 17.09.2024 00:15
CVE-2024-44176
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44180
C M N
LOW 2.4 1.4 17.09.2024 00:15
CVE-2024-44183
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44184
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44187
C M N
MEDIUM 6.5 3.6 17.09.2024 00:15
CVE-2024-44191
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44198
C M N
MEDIUM 5.5 3.6 17.09.2024 00:15
CVE-2024-44204
C M N
MEDIUM 5.5 3.6 04.10.2024 00:15
CVE-2024-44207
C M N
MEDIUM 4.3 1.4 04.10.2024 00:15

Similar certificates

Name Certificate ID
Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1iOS 16.4.1 (build 20E252) (ANSSI-CC-2023/58) ANSSI-CC-2023/58 Compare
Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4(watchOS 9.4 (build 20T253)) ( ANSSI-CC-2023/60) ANSSI-CC-2023/60 Compare
Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1 Version 15.4.1 (build 19E258) ANSSI-CC-2023/18 Compare
Strong Customer Authentication pour Apple Pay sur iPhone SE (2nde génération) avec A13 Bionic exécutant iOS 15.4.1 (Version 15.4.1 (build 19E258)) ANSSI-CC-2023/15 Compare
Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1 , macOS Ventura 13.3.1 (build 22E261) ( ANSSI-CC-2023/61) ANSSI-CC-2023/61 Compare
Strong Customer Authentication pour Apple Pay sur iPhone (SoC A12 Bionic) exécutant iOS 14.5.1 Version 18E212 ANSSI-CC-2022/04 Compare
Strong Customer Authentication pour Apple Pay sur MacBook Air 2020 avec M1 exécutant macOS Monterey 12.3.1 (Version 12.3.1 (build 21E258)) ANSSI-CC-2023/16 Compare
Strong customer authentication pour Apple Pay sur Apple Watch série 4 exécutant watchOS 7.4.1 (Version 18T201) ANSSI-CC-2023/13 Compare
Strong Customer Authentication pour Apple Pay sur Apple Watch avec S7 exécutant watchOS 8.5.1 (Version 8.5.1 (build 19T252)) ANSSI-CC-2023/17 Compare
Strong Customer Authentication pour Apple Pay sur iPhone SE (de seconde génération) exécutant iOS 14.5.1 Version 18E212 ANSSI-CC-2022/05 Compare
Strong Customer Authentication pour Apple Pay sur Mac mini avec M1 et Magic keyboard avec Touch ID, exécutant macOS Monterey 12.3.1 (Version 12.3.1 (build 21E258)) ANSSI-CC-2023/19 Compare
IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-2023/57 ) ANSSI-CC-2023/57 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration Version 4.1.1.52 ( ANSSI-CC-2023/68) ANSSI-CC-2023/68 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in SSCD configuration Version 4.1.1.52 (ANSSI-CC-2023/69) ANSSI-CC-2023/69 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO BAC configuration Version 4.1.1.52 ( ANSSI-CC-2023/67) ANSSI-CC-2023/67 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration (Version 4.0.1.52) (ANSSI-CC-2023/11-R01) ANSSI-CC-2023/11-R01 Compare
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH(Version 4.1.0.2) ( ANSSI-CC-2023/30 ) ANSSI-CC-2023/30 Compare
ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01) ANSSI-CC-2023/12-R01 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO BAC configuration (Version 4.0.1.52) ( ANSSI-CC-2023/10-R01 ) ANSSI-CC-2023/10-R01 Compare
Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 ) ANSSI-CC-2023/42 Compare
eTravel 3.1 BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/34 ) ANSSI-CC-2023/34 Compare
eTravel 3.1 EAC on BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/35 ) ANSSI-CC-2023/35 Compare
eTravel 3.1 EAC on SAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/36 ) ANSSI-CC-2023/36 Compare
Strong Customer Authentication pour Apple Pay, sur MacBook Air 2020 avec M1 exécutant macOS Big Sur 11.3.1 ANSSI-CC-2022/44 Compare
Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1 2023-9-INF-4307 Compare
MultiApp V5.1 Java Card Virtual Machine Version 5.1 (ANSSI-CC-2023/45) ANSSI-CC-2023/45 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/54) ANSSI-CC-2023/54 Compare
eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated(version 2.3.0.1) ( ANSSI-CC-2023/55 ) ANSSI-CC-2023/55 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/56) ANSSI-CC-2023/56 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.2.2) (ANSSI-CC-2024/11) ANSSI-CC-2024/11 Compare
Showing 5 out of 30.

Scheme data ?

Product Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1 Version iOS 16.4.1 (build 20E252)
Url https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-iphone-14-pro-a16-bionic-running-ios
Description Le produit évalué est « Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1, iOS 16.4.1 (build 20E252) » développé par APPLE INC..
Sponsor APPLE INC.
Developer APPLE INC.
Cert Id ANSSI-CC-2023/59
Level EAL2+
Expiration Date 28 Décembre 2028
Enhanced
Cert Id ANSSI-CC-2023/59
Certification Date 28/12/2023
Expiration Date 28/12/2028
Category Divers
Cc Version Critères Communs version 3.1r5
Developer APPLE INC.
Sponsor APPLE INC.
Evaluation Facility THALES / CNES
Level EAL2+
Protection Profile
Mutual Recognition CCRA SOG-IS
Augmented ADV_FSP.3
Report Link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_59en.pdf
Target Link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_59en.pdf
Cert Link https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_59en.pdf

References ?

No references are available for this certificate.

Updates ?

  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:o:apple:iphone_os:16.4.1:*:*:*:*:*:*:*']}.
    • The related_cves property was set to {'_type': 'Set', 'elements': ['CVE-2023-40431', 'CVE-2023-32361', 'CVE-2023-40399', 'CVE-2024-27871', 'CVE-2023-41069', 'CVE-2024-27811', 'CVE-2024-27808', 'CVE-2023-34352', 'CVE-2024-27857', 'CVE-2023-35990', 'CVE-2024-27806', 'CVE-2024-23225', 'CVE-2024-40840', 'CVE-2024-40806', 'CVE-2024-40798', 'CVE-2023-35984', 'CVE-2023-40432', 'CVE-2023-32368', 'CVE-2024-44170', 'CVE-2023-42957', 'CVE-2023-42841', 'CVE-2023-42871', 'CVE-2023-40391', 'CVE-2023-40419', 'CVE-2023-32384', 'CVE-2024-44204', 'CVE-2023-38600', 'CVE-2023-41981', 'CVE-2023-42914', 'CVE-2023-32422', 'CVE-2023-40452', 'CVE-2023-38593', 'CVE-2023-32428', 'CVE-2024-27840', 'CVE-2023-42922', 'CVE-2024-27819', 'CVE-2023-38611', 'CVE-2023-40409', 'CVE-2024-44158', 'CVE-2024-44139', 'CVE-2023-41982', 'CVE-2023-32434', 'CVE-2024-27815', 'CVE-2023-41063', 'CVE-2024-27828', 'CVE-2024-40856', 'CVE-2024-27845', 'CVE-2023-41980', 'CVE-2024-23218', 'CVE-2024-40799', 'CVE-2024-44180', 'CVE-2023-42936', 'CVE-2023-40438', 'CVE-2023-32413', 'CVE-2023-40439', 'CVE-2024-44191', 'CVE-2023-32419', 'CVE-2023-32396', 'CVE-2024-27799', 'CVE-2024-23208', 'CVE-2023-41992', 'CVE-2024-40815', 'CVE-2024-44164', 'CVE-2024-23282', 'CVE-2023-32372', 'CVE-2024-23222', 'CVE-2023-32392', 'CVE-2024-40796', 'CVE-2023-42956', 'CVE-2023-42919', 'CVE-2023-32432', 'CVE-2023-38572', 'CVE-2024-44131', 'CVE-2023-40446', 'CVE-2023-40414', 'CVE-2023-28204', 'CVE-2023-38594', 'CVE-2023-38592', 'CVE-2024-44171', 'CVE-2024-27807', 'CVE-2023-38599', 'CVE-2023-40395', 'CVE-2023-32371', 'CVE-2023-28191', 'CVE-2024-40863', 'CVE-2023-40400', 'CVE-2023-42925', 'CVE-2023-42890', 'CVE-2023-40416', 'CVE-2024-40835', 'CVE-2024-23210', 'CVE-2023-32441', 'CVE-2023-40456', 'CVE-2023-41061', 'CVE-2023-32388', 'CVE-2023-42934', 'CVE-2023-40403', 'CVE-2023-42869', 'CVE-2024-40850', 'CVE-2023-40423', 'CVE-2023-37450', 'CVE-2024-44187', 'CVE-2024-27832', 'CVE-2023-32357', 'CVE-2024-27873', 'CVE-2023-38425', 'CVE-2024-27880', 'CVE-2023-42883', 'CVE-2024-40844', 'CVE-2024-27855', 'CVE-2023-40447', 'CVE-2023-38595', 'CVE-2023-32411', 'CVE-2023-32403', 'CVE-2023-42866', 'CVE-2023-41991', 'CVE-2023-32445', 'CVE-2024-40787', 'CVE-2024-23273', 'CVE-2023-32402', 'CVE-2024-27848', 'CVE-2024-44207', 'CVE-2024-44183', 'CVE-2023-38596', 'CVE-2023-32423', 'CVE-2024-27801', 'CVE-2023-42846', 'CVE-2024-23214', 'CVE-2023-32412', 'CVE-2024-40809', 'CVE-2023-32385', 'CVE-2023-41071', 'CVE-2023-40434', 'CVE-2023-41064', 'CVE-2023-40394', 'CVE-2023-41995', 'CVE-2024-40776', 'CVE-2023-40528', 'CVE-2023-41976', 'CVE-2023-42888', 'CVE-2023-32439', 'CVE-2023-38598', 'CVE-2023-32416', 'CVE-2022-3970', 'CVE-2023-41068', 'CVE-2023-40454', 'CVE-2024-44176', 'CVE-2023-32354', 'CVE-2023-32415', 'CVE-2023-40392', 'CVE-2023-42824', 'CVE-2023-42884', 'CVE-2023-45866', 'CVE-2023-41074', 'CVE-2023-32359', 'CVE-2023-42899', 'CVE-2023-42893', 'CVE-2023-38136', 'CVE-2023-40428', 'CVE-2023-40384', 'CVE-2024-23223', 'CVE-2024-23212', 'CVE-2023-38133', 'CVE-2023-38410', 'CVE-2024-23270', 'CVE-2024-27800', 'CVE-2024-40791', 'CVE-2024-27851', 'CVE-2024-27831', 'CVE-2023-40429', 'CVE-2024-40813', 'CVE-2023-42857', 'CVE-2024-27802', 'CVE-2023-34425', 'CVE-2023-41997', 'CVE-2023-42852', 'CVE-2023-32398', 'CVE-2023-41254', 'CVE-2023-32400', 'CVE-2024-40833', 'CVE-2023-40448', 'CVE-2024-23217', 'CVE-2023-32391', 'CVE-2024-40818', 'CVE-2023-42950', 'CVE-2024-40795', 'CVE-2024-23219', 'CVE-2024-44165', 'CVE-2023-32365', 'CVE-2024-23215', 'CVE-2024-40794', 'CVE-2023-42870', 'CVE-2024-27820', 'CVE-2023-32367', 'CVE-2023-42941', 'CVE-2023-38597', 'CVE-2023-41065', 'CVE-2023-32390', 'CVE-2023-41174', 'CVE-2024-44198', 'CVE-2024-23206', 'CVE-2024-40789', 'CVE-2024-40830', 'CVE-2023-38565', 'CVE-2024-27833', 'CVE-2023-40417', 'CVE-2023-32425', 'CVE-2024-40857', 'CVE-2023-32734', 'CVE-2023-38590', 'CVE-2023-42896', 'CVE-2024-27823', 'CVE-2024-40822', 'CVE-2024-40785', 'CVE-2023-40437', 'CVE-2023-38604', 'CVE-2024-40779', 'CVE-2024-40826', 'CVE-2023-42937', 'CVE-2024-27838', 'CVE-2023-38603', 'CVE-2023-41983', 'CVE-2023-40420', 'CVE-2023-42923', 'CVE-2024-40793', 'CVE-2023-28202', 'CVE-2024-40788', 'CVE-2023-41993', 'CVE-2023-32420', 'CVE-2024-27884', 'CVE-2023-41977', 'CVE-2024-27817', 'CVE-2023-41232', 'CVE-2024-40778', 'CVE-2023-27930', 'CVE-2023-41984', 'CVE-2023-32408', 'CVE-2023-40520', 'CVE-2023-38612', 'CVE-2023-41986', 'CVE-2024-44184', 'CVE-2023-32409', 'CVE-2024-40786', 'CVE-2023-32394', 'CVE-2024-27805', 'CVE-2023-32407', 'CVE-2023-40412', 'CVE-2023-40441', 'CVE-2024-40774', 'CVE-2023-41060', 'CVE-2023-38261', 'CVE-2023-32399', 'CVE-2023-42849', 'CVE-2023-39434', 'CVE-2023-42949', 'CVE-2024-27830', 'CVE-2023-40410', 'CVE-2023-32381', 'CVE-2024-27836', 'CVE-2023-42833', 'CVE-2023-32437', 'CVE-2023-40408', 'CVE-2023-32389', 'CVE-2023-32433', 'CVE-2023-41073', 'CVE-2023-42916', 'CVE-2023-38605', 'CVE-2024-23211', 'CVE-2023-32376', 'CVE-2023-38610', 'CVE-2023-42947', 'CVE-2023-42917', 'CVE-2024-23251', 'CVE-2023-40424', 'CVE-2024-40812', 'CVE-2023-40443', 'CVE-2023-40442', 'CVE-2023-41974', 'CVE-2023-41070', 'CVE-2024-23213', 'CVE-2023-36495', 'CVE-2023-40529', 'CVE-2023-42872', 'CVE-2024-27863', 'CVE-2023-32352', 'CVE-2023-35074', 'CVE-2023-40427', 'CVE-2023-42962', 'CVE-2024-44124', 'CVE-2023-38424', 'CVE-2023-40449', 'CVE-2023-32373', 'CVE-2023-38606', 'CVE-2024-27850', 'CVE-2023-40413', 'CVE-2024-40780', 'CVE-2023-38580', 'CVE-2023-35993', 'CVE-2024-23296', 'CVE-2023-32404', 'CVE-2023-40385', 'CVE-2023-41968']}.
    • The scheme_data property was set to {'product': 'Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1 Version iOS 16.4.1 (build 20E252)', 'url': 'https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-iphone-14-pro-a16-bionic-running-ios', 'description': 'Le produit évalué est « Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1, iOS 16.4.1 (build 20E252) » développé par APPLE INC..', 'sponsor': 'APPLE INC.', 'developer': 'APPLE INC.', 'cert_id': 'ANSSI-CC-2023/59', 'level': 'EAL2+', 'expiration_date': '28 Décembre 2028', 'enhanced': {'cert_id': 'ANSSI-CC-2023/59', 'certification_date': '28/12/2023', 'expiration_date': '28/12/2028', 'category': 'Divers', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'APPLE INC.', 'sponsor': 'APPLE INC.', 'evaluation_facility': 'THALES / CNES', 'level': 'EAL2+', 'protection_profile': '', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ADV_FSP.3', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_59en.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_59en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_59en.pdf'}}.
  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e5fdd311e271e1438728e8016f96e69565dedfd6000ba5e316945c5693eab587', 'txt_hash': '97bc32b32d57ede87b39fdc22d66d61f13b1bdbb893d26d97fd5600c44810c93'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ca798a8678c606e1a601ebb9e1da8ca09cbef656c1bfbb3f868d5046c0cec8e2', 'txt_hash': '3feff5c9858eae44a5dfd96fce55ab212e3848e962cd31c4aee4a3ff690d63cd'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 2520806, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 56, '/CreationDate': 'D:20231109105238Z', '/Creator': 'Word', '/ModDate': 'D:20231109105301Z', '/Producer': 'Adobe Mac PDF Plug-in', '/Title': 'Microsoft Word - [ST] iPhone_A16Bionic_iOS16_SecurityTarget_v1.4.docx', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 138174, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20240222154612+01'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20240222155210+01'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL2': 1, 'EAL 2 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_FSP': 1, 'ADV_ARC.1': 3, 'ADV_FSP.3': 2, 'ADV_TDS.1': 4, 'ADV_FSP.2': 4, 'ADV_FSP.1': 2}, 'AGD': {'AGD_OPE.1': 4, 'AGD_PRE.1': 4}, 'ALC': {'ALC_CMC.2': 2, 'ALC_CMS.2': 2, 'ALC_DEL.1': 2}, 'ATE': {'ATE_COV.1': 4, 'ATE_FUN.1': 3, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 2}, 'ASE': {'ASE_CCL.1': 2, 'ASE_ECD.1': 3, 'ASE_INT.1': 2, 'ASE_OBJ.2': 2, 'ASE_REQ.2': 2, 'ASE_SPD.1': 1, 'ASE_TSS.1': 2, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FDP': {'FDP_DAU.1': 4, 'FDP_DAU.1.1': 1, 'FDP_DAU.1.2': 1, 'FDP_ACC': 25, 'FDP_ACC.2': 4, 'FDP_ACF': 23, 'FDP_ACF.1': 12, 'FDP_ITT.1': 4, 'FDP_ITT.1.1': 1, 'FDP_ETC': 8, 'FDP_ETC.2.1': 2, 'FDP_ETC.2.2': 2, 'FDP_ETC.2.3': 2, 'FDP_ETC.2.4': 2, 'FDP_ACC.2.1': 1, 'FDP_ACC.2.2': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_ITC': 5, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_UCT': 10, 'FDP_UCT.1': 1, 'FDP_UIT': 10, 'FDP_UIT.1': 2, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_RIP.1': 15, 'FDP_RIP.1.1': 1, 'FDP_SDI.1': 10, 'FDP_SDI.1.1': 1, 'FDP_ACC.1': 11, 'FDP_IFC.1': 9, 'FDP_ETC.2': 2}, 'FIA': {'FIA_UID.2': 6, 'FIA_UID.2.1': 1, 'FIA_UAU.2': 11, 'FIA_UAU.2.1': 1, 'FIA_UAU.5': 5, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.6': 11, 'FIA_AFL.1': 3, 'FIA_AFL': 7, 'FIA_AFL.1.1': 3, 'FIA_AFL.1.2': 3, 'FIA_UAU.6.1': 2, 'FIA_ATD.1': 5, 'FIA_ATD.1.1': 2, 'FIA_SOS.2': 4, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_UAU.1': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_SMR.1': 10, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 6, 'FMT_SMF.1.1': 1, 'FMT_MSA.1': 6, 'FMT_MSA.3': 11, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.1.1': 2, 'FMT_MTD.1': 4, 'FMT_MTD.1.1': 1, 'FMT_MTD.3': 4, 'FMT_MTD.3.1': 1}, 'FPR': {'FPR_UNO.1': 14, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_ITC.1': 4, 'FPT_ITC.1.1': 1, 'FPT_RPL': 10, 'FPT_RPL.1': 4}, 'FTP': {'FTP_ITC': 14, 'FTP_ITC.1': 7, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 4}}, 'cc_claims': {'D': {'D.OS': 17, 'D.SEP_SE': 3}, 'T': {'T.CORRUPT': 2, 'T.PHYSICAL': 2, 'T.RECOVER': 2, 'T.REPLAY': 2, 'T.SILENT': 2, 'T.SKIMMING': 2, 'T.USURP': 2}, 'A': {'A.DE-': 2, 'A.PERSO': 3, 'A.CDCVM': 3, 'A.WATCH_USER': 3, 'A.DEVICE_AUTH': 1}, 'OE': {'OE.CDCVM': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 3}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {'NIST': {'P-256': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 6}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-3': 1, 'FIPS 140-2': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by': 1, 'pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RECOVER Card Re- covery An': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2023/59': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 2}}, 'cc_sar': {'ADV': {'ADV_FSP.3': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Thales': {'THALES/CNES': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to ANSSI-cible-CC-2023_59en.pdf.
    • The cert_filename property was set to certificat-CC-2023_59en.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_59en.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_59en.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'c69a76645d475619fb0cbcc158f980c919fac7230089331e95b51efdc7425d55', 'txt_hash': '18b914ee117db29eaca1475c6db21b5d4193cfd24f13bd710a53bede88726220'} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 427149, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 13, '/CreationDate': "D:20240222154515+01'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20240222155210+01'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.ssi.gouv.fr/', 'http://www.commoncriteriaportal.org/', 'http://www.sogis.eu/']}}.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to {'FR': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2023/59': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 3, 'EAL4': 1, 'EAL2 augmented': 1}, 'ITSEC': {'ITSEC E3 Basic': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.3': 1}, 'ALC': {'ALC_FLR': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Thales': {'THALES/CNES': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to None.
    • The report_filename property was set to ANSSI-CC-2023_59en.pdf.
    • The cert_filename property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}]} values discarded.
    • The scheme_data property was set to {'product': 'Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1 Version iOS 16.4.1 (build 20E252)', 'url': 'https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-iphone-14-pro-a16-bionic-running-ios', 'description': 'Le produit évalué est « Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1, iOS 16.4.1 (build 20E252) » développé par APPLE INC..', 'sponsor': 'APPLE INC.', 'developer': 'APPLE INC.', 'cert_id': 'ANSSI-CC-2023/59', 'level': 'EAL2+', 'expiration_date': '28 Décembre 2028', 'enhanced': {'cert_id': 'ANSSI-CC-2023/59', 'certification_date': '28/12/2023', 'expiration_date': '28/12/2028', 'category': 'Divers', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'APPLE INC.', 'sponsor': 'APPLE INC.', 'evaluation_facility': 'THALES / CNES', 'level': 'EAL2+', 'protection_profile': '', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ADV_FSP.3', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_59en.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_59en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_59en.pdf'}}.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1Version iOS 16.4.1 (build 20E252) ( ANSSI-CC-2023/59) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_59en.pdf",
  "dgst": "204cb8d5dbf8e997",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2023/59",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:o:apple:iphone_os:16.4.1:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "16.4.1"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2023-41065",
        "CVE-2023-32428",
        "CVE-2023-28204",
        "CVE-2023-42947",
        "CVE-2023-40446",
        "CVE-2023-32385",
        "CVE-2024-44184",
        "CVE-2024-27808",
        "CVE-2024-40795",
        "CVE-2023-34352",
        "CVE-2023-40528",
        "CVE-2023-32404",
        "CVE-2023-42917",
        "CVE-2023-38611",
        "CVE-2024-40850",
        "CVE-2023-41982",
        "CVE-2023-42957",
        "CVE-2023-32415",
        "CVE-2023-35074",
        "CVE-2024-40785",
        "CVE-2024-44207",
        "CVE-2023-32441",
        "CVE-2023-40429",
        "CVE-2023-42941",
        "CVE-2023-45866",
        "CVE-2024-27811",
        "CVE-2023-32400",
        "CVE-2023-32423",
        "CVE-2024-23211",
        "CVE-2023-41980",
        "CVE-2023-32371",
        "CVE-2023-41232",
        "CVE-2023-37450",
        "CVE-2023-38598",
        "CVE-2023-38605",
        "CVE-2023-42937",
        "CVE-2023-42950",
        "CVE-2024-44187",
        "CVE-2023-41977",
        "CVE-2024-27840",
        "CVE-2023-41974",
        "CVE-2024-23270",
        "CVE-2023-41993",
        "CVE-2024-44124",
        "CVE-2023-40420",
        "CVE-2024-27799",
        "CVE-2023-38565",
        "CVE-2023-38133",
        "CVE-2023-35990",
        "CVE-2023-42841",
        "CVE-2023-42956",
        "CVE-2024-27806",
        "CVE-2024-40798",
        "CVE-2024-44198",
        "CVE-2023-32419",
        "CVE-2023-40520",
        "CVE-2024-40835",
        "CVE-2023-32409",
        "CVE-2023-42919",
        "CVE-2024-40830",
        "CVE-2024-27863",
        "CVE-2023-38612",
        "CVE-2023-42846",
        "CVE-2023-40410",
        "CVE-2023-42824",
        "CVE-2023-40391",
        "CVE-2024-27807",
        "CVE-2023-42869",
        "CVE-2024-23214",
        "CVE-2024-27815",
        "CVE-2023-42922",
        "CVE-2024-44131",
        "CVE-2023-38424",
        "CVE-2024-40793",
        "CVE-2023-42870",
        "CVE-2024-40822",
        "CVE-2024-44139",
        "CVE-2024-40826",
        "CVE-2024-23222",
        "CVE-2024-27820",
        "CVE-2024-40815",
        "CVE-2024-23210",
        "CVE-2023-32420",
        "CVE-2023-40384",
        "CVE-2023-32396",
        "CVE-2024-23225",
        "CVE-2024-27884",
        "CVE-2023-32359",
        "CVE-2024-27817",
        "CVE-2024-27832",
        "CVE-2023-40456",
        "CVE-2023-41074",
        "CVE-2023-42916",
        "CVE-2023-32389",
        "CVE-2023-32434",
        "CVE-2024-44183",
        "CVE-2023-42833",
        "CVE-2023-32432",
        "CVE-2023-40431",
        "CVE-2023-32433",
        "CVE-2024-23217",
        "CVE-2023-32390",
        "CVE-2023-32399",
        "CVE-2024-23215",
        "CVE-2023-41063",
        "CVE-2023-38604",
        "CVE-2023-42923",
        "CVE-2023-40408",
        "CVE-2024-40840",
        "CVE-2024-40778",
        "CVE-2023-32372",
        "CVE-2023-38595",
        "CVE-2023-41073",
        "CVE-2023-32425",
        "CVE-2023-32407",
        "CVE-2023-32368",
        "CVE-2023-38597",
        "CVE-2023-28202",
        "CVE-2024-40780",
        "CVE-2023-40412",
        "CVE-2023-42884",
        "CVE-2023-34425",
        "CVE-2024-40806",
        "CVE-2024-40779",
        "CVE-2023-40454",
        "CVE-2023-38425",
        "CVE-2023-32388",
        "CVE-2023-32403",
        "CVE-2023-32376",
        "CVE-2023-42888",
        "CVE-2023-42936",
        "CVE-2023-27930",
        "CVE-2024-40863",
        "CVE-2023-42883",
        "CVE-2023-42866",
        "CVE-2023-40529",
        "CVE-2023-42896",
        "CVE-2023-40432",
        "CVE-2023-40442",
        "CVE-2023-32411",
        "CVE-2024-27880",
        "CVE-2023-40437",
        "CVE-2023-35984",
        "CVE-2023-40394",
        "CVE-2024-44170",
        "CVE-2024-40774",
        "CVE-2024-40796",
        "CVE-2023-40441",
        "CVE-2024-40791",
        "CVE-2024-23251",
        "CVE-2024-44191",
        "CVE-2024-40856",
        "CVE-2023-38410",
        "CVE-2023-32408",
        "CVE-2024-40799",
        "CVE-2024-27823",
        "CVE-2023-32365",
        "CVE-2024-40844",
        "CVE-2023-38136",
        "CVE-2023-38572",
        "CVE-2024-27873",
        "CVE-2023-41070",
        "CVE-2024-23206",
        "CVE-2024-44176",
        "CVE-2023-32391",
        "CVE-2024-44165",
        "CVE-2023-40452",
        "CVE-2023-41976",
        "CVE-2024-23208",
        "CVE-2023-40423",
        "CVE-2024-23223",
        "CVE-2023-41991",
        "CVE-2024-27871",
        "CVE-2023-32352",
        "CVE-2023-32361",
        "CVE-2024-40857",
        "CVE-2023-40449",
        "CVE-2023-40439",
        "CVE-2023-42849",
        "CVE-2023-32367",
        "CVE-2023-32439",
        "CVE-2023-40438",
        "CVE-2023-40448",
        "CVE-2024-23218",
        "CVE-2023-41174",
        "CVE-2023-41061",
        "CVE-2023-41984",
        "CVE-2024-23282",
        "CVE-2024-44171",
        "CVE-2023-32412",
        "CVE-2024-40789",
        "CVE-2024-40813",
        "CVE-2023-32413",
        "CVE-2023-40443",
        "CVE-2023-41986",
        "CVE-2023-38593",
        "CVE-2023-42890",
        "CVE-2024-27828",
        "CVE-2023-40416",
        "CVE-2023-42871",
        "CVE-2023-40427",
        "CVE-2023-32384",
        "CVE-2023-41983",
        "CVE-2023-40419",
        "CVE-2023-42872",
        "CVE-2023-32381",
        "CVE-2023-42857",
        "CVE-2023-32392",
        "CVE-2023-38592",
        "CVE-2023-42934",
        "CVE-2023-40424",
        "CVE-2023-41060",
        "CVE-2024-40818",
        "CVE-2023-40447",
        "CVE-2023-40428",
        "CVE-2024-40786",
        "CVE-2023-40414",
        "CVE-2023-32398",
        "CVE-2024-27851",
        "CVE-2023-32394",
        "CVE-2023-41997",
        "CVE-2024-27805",
        "CVE-2024-27857",
        "CVE-2024-44204",
        "CVE-2024-27836",
        "CVE-2023-40399",
        "CVE-2023-42962",
        "CVE-2024-23273",
        "CVE-2024-27838",
        "CVE-2023-41071",
        "CVE-2023-38600",
        "CVE-2023-38590",
        "CVE-2024-23212",
        "CVE-2024-23296",
        "CVE-2023-32416",
        "CVE-2023-40434",
        "CVE-2023-38596",
        "CVE-2024-27845",
        "CVE-2024-40788",
        "CVE-2023-41064",
        "CVE-2023-32354",
        "CVE-2023-41254",
        "CVE-2023-32734",
        "CVE-2023-40385",
        "CVE-2022-3970",
        "CVE-2024-27801",
        "CVE-2024-40833",
        "CVE-2023-41981",
        "CVE-2023-42949",
        "CVE-2023-40392",
        "CVE-2023-38599",
        "CVE-2023-41068",
        "CVE-2023-42852",
        "CVE-2023-38610",
        "CVE-2024-27848",
        "CVE-2024-40787",
        "CVE-2023-40400",
        "CVE-2023-40417",
        "CVE-2024-27819",
        "CVE-2024-40812",
        "CVE-2023-42914",
        "CVE-2023-40403",
        "CVE-2023-41995",
        "CVE-2024-27850",
        "CVE-2023-40409",
        "CVE-2023-38261",
        "CVE-2023-41968",
        "CVE-2024-44180",
        "CVE-2023-41069",
        "CVE-2024-40794",
        "CVE-2023-38603",
        "CVE-2023-40395",
        "CVE-2024-27833",
        "CVE-2024-40809",
        "CVE-2023-32422",
        "CVE-2024-23219",
        "CVE-2023-42899",
        "CVE-2024-27855",
        "CVE-2024-40776",
        "CVE-2023-42893",
        "CVE-2023-41992",
        "CVE-2023-35993",
        "CVE-2023-38594",
        "CVE-2023-38580",
        "CVE-2023-32437",
        "CVE-2023-39434",
        "CVE-2024-44164",
        "CVE-2023-32373",
        "CVE-2024-44158",
        "CVE-2023-42925",
        "CVE-2023-28191",
        "CVE-2023-38606",
        "CVE-2023-32402",
        "CVE-2023-32445",
        "CVE-2024-27802",
        "CVE-2024-27830",
        "CVE-2023-36495",
        "CVE-2024-27800",
        "CVE-2023-32357",
        "CVE-2024-23213",
        "CVE-2024-27831",
        "CVE-2023-40413"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "ANSSI-CC-2023/59",
      "description": "Le produit \u00e9valu\u00e9 est \u00ab Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1, iOS 16.4.1 (build 20E252) \u00bb d\u00e9velopp\u00e9 par APPLE INC..",
      "developer": "APPLE INC.",
      "enhanced": {
        "augmented": "ADV_FSP.3",
        "category": "Divers",
        "cc_version": "Crit\u00e8res Communs version 3.1r5",
        "cert_id": "ANSSI-CC-2023/59",
        "cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_59en.pdf",
        "certification_date": "28/12/2023",
        "developer": "APPLE INC.",
        "evaluation_facility": "THALES / CNES",
        "expiration_date": "28/12/2028",
        "level": "EAL2+",
        "mutual_recognition": "CCRA\n                          SOG-IS",
        "protection_profile": "",
        "report_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_59en.pdf",
        "sponsor": "APPLE INC.",
        "target_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_59en.pdf"
      },
      "expiration_date": "28 D\u00e9cembre 2028",
      "level": "EAL2+",
      "product": "Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1 Version iOS 16.4.1 (build 20E252)",
      "sponsor": "APPLE INC.",
      "url": "https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-iphone-14-pro-a16-bionic-running-ios"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Apple Inc.",
  "manufacturer_web": "https://www.apple.com/",
  "name": "Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1Version iOS 16.4.1 (build 20E252) ( ANSSI-CC-2023/59)",
  "not_valid_after": "2028-12-28",
  "not_valid_before": "2023-12-28",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "certificat-CC-2023_59en.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2023/59": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 2
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Thales": {
          "THALES/CNES": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20240222154612+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20240222155210+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 138174,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "ANSSI-CC-2023_59en.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2023/59": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.3": 1
        },
        "ALC": {
          "ALC_FLR": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 3,
          "EAL2 augmented": 1,
          "EAL4": 1
        },
        "ITSEC": {
          "ITSEC E3 Basic": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Thales": {
          "THALES/CNES": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20240222154515+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20240222155210+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 427149,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "http://www.ssi.gouv.fr/",
          "http://www.sogis.eu/",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 13
    },
    "st_filename": "ANSSI-cible-CC-2023_59en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CDCVM": 3,
          "A.DE-": 2,
          "A.DEVICE_AUTH": 1,
          "A.PERSO": 3,
          "A.WATCH_USER": 3
        },
        "D": {
          "D.OS": 17,
          "D.SEP_SE": 3
        },
        "OE": {
          "OE.CDCVM": 3
        },
        "T": {
          "T.CORRUPT": 2,
          "T.PHYSICAL": 2,
          "T.RECOVER": 2,
          "T.REPLAY": 2,
          "T.SILENT": 2,
          "T.SKIMMING": 2,
          "T.USURP": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 3,
          "ADV_FSP": 1,
          "ADV_FSP.1": 2,
          "ADV_FSP.2": 4,
          "ADV_FSP.3": 2,
          "ADV_TDS.1": 4
        },
        "AGD": {
          "AGD_OPE.1": 4,
          "AGD_PRE.1": 4
        },
        "ALC": {
          "ALC_CMC.2": 2,
          "ALC_CMS.2": 2,
          "ALC_DEL.1": 2
        },
        "ASE": {
          "ASE_CCL.1": 2,
          "ASE_ECD.1": 3,
          "ASE_INT.1": 2,
          "ASE_OBJ.2": 2,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 2
        },
        "ATE": {
          "ATE_COV.1": 4,
          "ATE_FUN.1": 3,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 2 augmented": 1,
          "EAL2": 1
        }
      },
      "cc_sfr": {
        "FDP": {
          "FDP_ACC": 25,
          "FDP_ACC.1": 11,
          "FDP_ACC.2": 4,
          "FDP_ACC.2.1": 1,
          "FDP_ACC.2.2": 1,
          "FDP_ACF": 23,
          "FDP_ACF.1": 12,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_DAU.1": 4,
          "FDP_DAU.1.1": 1,
          "FDP_DAU.1.2": 1,
          "FDP_ETC": 8,
          "FDP_ETC.2": 2,
          "FDP_ETC.2.1": 2,
          "FDP_ETC.2.2": 2,
          "FDP_ETC.2.3": 2,
          "FDP_ETC.2.4": 2,
          "FDP_IFC.1": 9,
          "FDP_ITC": 5,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_ITT.1": 4,
          "FDP_ITT.1.1": 1,
          "FDP_RIP.1": 15,
          "FDP_RIP.1.1": 1,
          "FDP_SDI.1": 10,
          "FDP_SDI.1.1": 1,
          "FDP_UCT": 10,
          "FDP_UCT.1": 1,
          "FDP_UCT.1.1": 1,
          "FDP_UIT": 10,
          "FDP_UIT.1": 2,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_AFL": 7,
          "FIA_AFL.1": 3,
          "FIA_AFL.1.1": 3,
          "FIA_AFL.1.2": 3,
          "FIA_ATD.1": 5,
          "FIA_ATD.1.1": 2,
          "FIA_SOS.2": 4,
          "FIA_SOS.2.1": 1,
          "FIA_SOS.2.2": 1,
          "FIA_UAU.1": 1,
          "FIA_UAU.2": 11,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.5": 5,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 11,
          "FIA_UAU.6.1": 2,
          "FIA_UID.1": 1,
          "FIA_UID.2": 6,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MSA.1": 6,
          "FMT_MSA.1.1": 2,
          "FMT_MSA.3": 11,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 4,
          "FMT_MTD.1.1": 1,
          "FMT_MTD.3": 4,
          "FMT_MTD.3.1": 1,
          "FMT_SMF.1": 6,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 10,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO.1": 14,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_ITC.1": 4,
          "FPT_ITC.1.1": 1,
          "FPT_RPL": 10,
          "FPT_RPL.1": 4
        },
        "FTP": {
          "FTP_ITC": 14,
          "FTP_ITC.1": 7,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {
        "OutOfScope": {
          "Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by": 1,
          "out of scope": 2,
          "pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RECOVER Card Re- covery An": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 3
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 2
        }
      },
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS 140-3": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 6
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20231109105238Z",
      "/Creator": "Word",
      "/ModDate": "D:20231109105301Z",
      "/Producer": "Adobe Mac PDF Plug-in",
      "/Title": "Microsoft Word - [ST] iPhone_A16Bionic_iOS16_SecurityTarget_v1.4.docx",
      "pdf_file_size_bytes": 2520806,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 56
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_59en.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ADV_FSP.3",
      "EAL2+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_59en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ca798a8678c606e1a601ebb9e1da8ca09cbef656c1bfbb3f868d5046c0cec8e2",
      "txt_hash": "3feff5c9858eae44a5dfd96fce55ab212e3848e962cd31c4aee4a3ff690d63cd"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "c69a76645d475619fb0cbcc158f980c919fac7230089331e95b51efdc7425d55",
      "txt_hash": "18b914ee117db29eaca1475c6db21b5d4193cfd24f13bd710a53bede88726220"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e5fdd311e271e1438728e8016f96e69565dedfd6000ba5e316945c5693eab587",
      "txt_hash": "97bc32b32d57ede87b39fdc22d66d61f13b1bdbb893d26d97fd5600c44810c93"
    }
  },
  "status": "active"
}