Cisco Adaptive Security Appliance Virtual Cryptographic Module

Certificate #5114

Webpage information

Status active
Validation dates 19.12.2025
Sunset date 18-12-2030
Standard FIPS 140-3
Security level 1
Type Firmware-Hybrid
Embodiment Multi-Chip Stand Alone
Caveat When installed, initialized and configured as specified in Section Life-Cycle Assurance of the Security Policy
Exceptions
  • Non-invasive security: N/A
  • Mitigation of other attacks: N/A
Description Cisco Virtual Adaptive Security Appliances offers the combination of the industry's most deployed stateful firewall with a comprehensive range of next-generation network security services, intrusion prevention system (IPS), content security and secure unified communications. Delivering robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions.
Vendor Cisco Systems, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES-256, AES-128, AES-192, AES, AES-, CAST, HMAC
Asymmetric Algorithms
RSA 2048, ECDH, ECDSA, ECC, Diffie-Hellman, DH, DSA
Hash functions
SHA-1
Schemes
MAC, Key Agreement
Protocols
SSHv2, SSH, TLS v1.2, TLSv1.2, TLS, TLS 1.2, IKEv2, IKE, VPN
Randomness
DRBG, RBG
Elliptic Curves
P-256, P-384, P-521
Block cipher modes
GCM

Trusted Execution Environments
PSP
Vendor
Cisco Systems, Inc, Cisco

Security level
Level 1, level 1
Certification process
out of scope, from the approved mode of operation. Any firmware that is not shown on the module certificate, is out of scope of this validation and requires a separate FIPS 140-3 validation. The Crypto Officer must configure

Standards
FIPS 140-3, FIPS186-4, FIPS 186-4, FIPS 198-1, FIPS 180-4, SP 800-140, SP 800-38A, SP 800-38D, SP 800-90A, SP 800-56A, SP 800-135, SP 800-52, PKCS 1, RFC7627, RFC 5288, RFC 7296, RFC 4419, RFC 7919, RFC 3526, ISO/IEC 19790

File metadata

Creation date D:20251216160016-05'00'
Modification date D:20251216160233-05'00'
Pages 68
Creator Acrobat PDFMaker 25 for Word
Producer Adobe PDF Library 25.1.201

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

References

No references are available for this certificate.

Updates Feed

  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 5114,
  "dgst": "251d298116e31fdd",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": []
    },
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:h:cisco:adaptive_security_appliance_5550:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:cisco:adaptive_security_appliance_5510:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:cisco:adaptive_security_appliance_5540:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:cisco:adaptive_security_appliance_5505:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:cisco:adaptive_security_appliance_5520:-:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 4
          },
          "ECDH": {
            "ECDH": 79
          },
          "ECDSA": {
            "ECDSA": 76
          }
        },
        "FF": {
          "DH": {
            "DH": 76,
            "Diffie-Hellman": 1
          },
          "DSA": {
            "DSA": 3
          }
        },
        "RSA": {
          "RSA 2048": 3
        }
      },
      "certification_process": {
        "OutOfScope": {
          "from the approved mode of operation. Any firmware that is not shown on the module certificate, is out of scope of this validation and requires a separate FIPS 140-3 validation. The Crypto Officer must configure": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "GCM": {
          "GCM": 56
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 2,
          "IKEv2": 71
        },
        "SSH": {
          "SSH": 109,
          "SSHv2": 150
        },
        "TLS": {
          "TLS": {
            "TLS": 149,
            "TLS 1.2": 1,
            "TLS v1.2": 6,
            "TLSv1.2": 117
          }
        },
        "VPN": {
          "VPN": 4
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 6
        },
        "MAC": {
          "MAC": 4
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 54,
          "P-384": 56,
          "P-521": 56
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "- PKCS 1": 2,
          "AES-128": 2,
          "AES-192": 1,
          "AES-256": 3,
          "DRBG 384": 1,
          "HMAC- SHA-1": 1,
          "HMAC-SHA-1": 6,
          "PKCS 1": 2,
          "RSA 2048": 3,
          "SHA-1": 6,
          "SHA2- 224": 1,
          "SHA2- 256": 7,
          "SHA2- 384": 1,
          "SHA2- 512": 4,
          "SHA2-224": 1,
          "SHA2-256": 4,
          "SHA2-384": 4,
          "SHA2-512": 5,
          "SHA3- 256": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 4,
          "level 1": 2
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 6
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 80
        },
        "RNG": {
          "RBG": 2
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-3": 10,
          "FIPS 180-4": 5,
          "FIPS 186-4": 11,
          "FIPS 198-1": 5,
          "FIPS186-4": 23
        },
        "ISO": {
          "ISO/IEC 19790": 2
        },
        "NIST": {
          "SP 800-135": 4,
          "SP 800-140": 1,
          "SP 800-38A": 1,
          "SP 800-38D": 1,
          "SP 800-52": 1,
          "SP 800-56A": 3,
          "SP 800-90A": 1
        },
        "PKCS": {
          "PKCS 1": 2
        },
        "RFC": {
          "RFC 3526": 2,
          "RFC 4419": 2,
          "RFC 5288": 1,
          "RFC 7296": 1,
          "RFC 7919": 2,
          "RFC7627": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 56,
            "AES-": 16,
            "AES-128": 2,
            "AES-192": 1,
            "AES-256": 3
          },
          "CAST": {
            "CAST": 48
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 53
          }
        }
      },
      "tee_name": {
        "AMD": {
          "PSP": 18
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 7,
          "Cisco Systems, Inc": 71
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "",
      "/Comments": "",
      "/Company": "",
      "/CreationDate": "D:20251216160016-05\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 25 for Word",
      "/Keywords": "",
      "/ModDate": "D:20251216160233-05\u002700\u0027",
      "/Producer": "Adobe PDF Library 25.1.201",
      "/SourceModified": "",
      "/Subject": "",
      "/Title": "",
      "pdf_file_size_bytes": 678961,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 68
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "699460b5e7fa913e60b49dbd751f3151a105de835f43645b38f4d2650fde5540",
    "policy_txt_hash": "54f884a9634a8538cb509293a1766eb4744639660b72e0e24bf0d49ce3f6b1d3"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When installed, initialized and configured as specified in Section Life-Cycle Assurance of the Security Policy",
    "certificate_pdf_url": null,
    "date_sunset": "2030-12-18",
    "description": "Cisco Virtual Adaptive Security Appliances offers the combination of the industry\u0027s most deployed stateful firewall with a comprehensive range of next-generation network security services, intrusion prevention system (IPS), content security and secure unified communications. Delivering robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Non-invasive security: N/A",
      "Mitigation of other attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": null,
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "Cisco Adaptive Security Appliance Virtual Cryptographic Module",
    "module_type": "Firmware-Hybrid",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-3",
    "status": "active",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2025-12-19",
        "lab": "Gossamer Security Solutions",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Cisco Systems, Inc.",
    "vendor_url": "http://www.cisco.com"
  }
}