This page was not yet optimized for use on mobile
devices.
Windows Vista Code Integrity (ci.dll)
Known vulnerabilities detected
Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.Certificate #980
Webpage information
Security policy
Hash functions
SHA-1, bcryptVendor
MicrosoftStandards
FIPS 140-2, PKCS#1File metadata
| Title | Windows Vista Code Integrity FIPS Security Policy_SP2 |
|---|---|
| Author | jmaresca |
| Creation date | D:20090724090857-04'00' |
| Modification date | D:20090724090857-04'00' |
| Pages | 6 |
| Creator | PDFCreator Version 0.9.7 |
| Producer | GPL Ghostscript 8.63 |
References
Outgoing- 979 - historical - Windows Vista Winload OS Loader (winload.exe)
- 1053 - historical - BitLockerâ„¢ Drive Encryption
- 1002 - historical - Windows Vista Enhanced Cryptographic Provider (RSAENH)
- 1001 - historical - Microsoft Windows Vista Cryptographic Primitives Library (bcrypt.dll)
- 1003 - historical - Windows Vista Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.CPE matches
- cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:arm64:*
- cpe:2.3:o:microsoft:windows_vista:-:*:x64:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:-:*:x86:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:business:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:business:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:business_n:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:business_n:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:enterprise:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:enterprise:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_basic:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_basic:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_basic_n:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_basic_n:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_premium:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_premium:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:starter:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:ultimate:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:ultimate:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:beta1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:-:beta2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:-:gold:*:*:*:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:-:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:-:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:business:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:business:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:business_n:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:business_n:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:enterprise:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:enterprise:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_basic:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_basic:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_basic_n:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_basic_n:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_premium:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_premium:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:starter:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:ultimate:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:ultimate:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:-:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:business:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:business:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:business_n:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:business_n:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:enterprise:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:enterprise:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_basic:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_basic:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_basic_n:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_basic_n:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_premium:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_premium:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:starter:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:ultimate:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:ultimate:*:x86:*
Related CVEs
| ID | Links | Severity | CVSS Score | Published on |
|---|---|---|---|---|
| Base score | ||||
| CVE-2012-5362 | HIGH | 7.5 | 20.02.2020 | |
| CVE-2012-5364 | HIGH | 7.5 | 20.02.2020 | |
| CVE-2018-0598 | HIGH | 7.8 | 26.06.2018 | |
| CVE-2018-0599 | HIGH | 7.8 | 26.06.2018 | |
| CVE-2018-7249 | HIGH | 7.0 | 26.02.2018 | |
| CVE-2018-7250 | MEDIUM | 5.5 | 26.02.2018 | |
| CVE-2021-36958 | HIGH | 9.3 | 12.08.2021 |
Showing 5 out of 7.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 980,
"dgst": "38879b6376fbabdc",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"SHS#753",
"RSA#354"
]
},
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:ultimate:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_basic_n:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:ultimate:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_basic:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:business:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:business_n:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:business_n:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:ultimate:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:business:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:beta1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:-:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:*:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_basic_n:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:business_n:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_basic:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:beta2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:-:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:ultimate:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:enterprise:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_basic:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_basic_n:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_basic:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:business:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:starter:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:enterprise:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:business_n:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:gold:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_premium:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_premium:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_basic:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_premium:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:business_n:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:business:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:business:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:enterprise:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_basic_n:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:starter:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_basic_n:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:enterprise:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_basic:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:business_n:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:enterprise:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_premium:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:enterprise:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:starter:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_basic_n:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:ultimate:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:business:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:ultimate:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_premium:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_premium:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:-:*:x64:*"
]
},
"direct_transitive_cves": {
"_type": "Set",
"elements": [
"CVE-2019-1466",
"CVE-2021-36958",
"CVE-2018-7249",
"CVE-2019-5921",
"CVE-2018-0970",
"CVE-2022-21897",
"CVE-2018-0887",
"CVE-2018-0972",
"CVE-2023-34367",
"CVE-2018-0974",
"CVE-2019-1467",
"CVE-2018-0969",
"CVE-2018-0971",
"CVE-2019-1474",
"CVE-2022-21893",
"CVE-2018-0973",
"CVE-2012-5364",
"CVE-2018-0975",
"CVE-2018-0599",
"CVE-2018-0968",
"CVE-2012-5362",
"CVE-2018-6947",
"CVE-2018-8563",
"CVE-2018-0598",
"CVE-2018-0960",
"CVE-2019-1465",
"CVE-2018-7250"
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": {
"_type": "Set",
"elements": [
"CVE-2019-1466",
"CVE-2021-36958",
"CVE-2018-7249",
"CVE-2019-5921",
"CVE-2018-0970",
"CVE-2022-21897",
"CVE-2018-0887",
"CVE-2018-0972",
"CVE-2023-34367",
"CVE-2018-0974",
"CVE-2019-1467",
"CVE-2018-0969",
"CVE-2018-0971",
"CVE-2019-1474",
"CVE-2022-21893",
"CVE-2018-0973",
"CVE-2012-5364",
"CVE-2018-0975",
"CVE-2018-0599",
"CVE-2018-0968",
"CVE-2012-5362",
"CVE-2018-6947",
"CVE-2018-8563",
"CVE-2018-0598",
"CVE-2018-0960",
"CVE-2019-1465",
"CVE-2018-7250"
]
},
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"1002",
"1003",
"1001"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"979"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"1002",
"2162",
"1500",
"1003",
"1001",
"1053"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"979",
"978"
]
}
},
"module_prunned_references": {
"_type": "Set",
"elements": [
"979"
]
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"1002",
"1053",
"1003",
"1001"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"979"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"1002",
"1003",
"1001",
"1053",
"2009"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"979",
"978"
]
}
},
"policy_prunned_references": {
"_type": "Set",
"elements": [
"979"
]
},
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2012-5364",
"CVE-2018-0599",
"CVE-2012-5362",
"CVE-2021-36958",
"CVE-2018-7249",
"CVE-2018-0598",
"CVE-2018-7250"
]
},
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#354": 1,
"#753": 1,
"#979": 1
}
},
"fips_certlike": {
"Certlike": {
"PKCS#1": 9,
"RSA PKCS#1": 3,
"SHA-1": 8
}
},
"fips_security_level": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 8
}
},
"bcrypt": {
"bcrypt": 2
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 4
},
"PKCS": {
"PKCS#1": 6
}
},
"symmetric_crypto": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 6
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "jmaresca",
"/CreationDate": "D:20090724090857-04\u002700\u0027",
"/Creator": "PDFCreator Version 0.9.7",
"/Keywords": "",
"/ModDate": "D:20090724090857-04\u002700\u0027",
"/Producer": "GPL Ghostscript 8.63",
"/Subject": "",
"/Title": "Windows Vista Code Integrity FIPS Security Policy_SP2",
"pdf_file_size_bytes": 97035,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 6
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "7df3bb5472ee6b287a74d4917a41f424b7a7c491e31fc7697c407c3ecb337b4f",
"policy_txt_hash": "5ed2385e822b9531fa1d3b951779454bc21ac0252b8d2dee6e6ae478fe14ca0d"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode with Winload OS Loader (winload.exe) validated to FIPS 140-2 under Cert. #979 operating in FIPS mode",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt980.pdf",
"date_sunset": null,
"description": "This is a dynamically linked library that runs as ntoskrnl.exe. It verifies the integrity of executable files, including kernel mode drivers, critical system components and user mode crypto modules, before these files are loaded from disk into memory by the memory manager.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": null,
"fw_versions": null,
"historical_reason": "Moved to historical list due to sunsetting",
"hw_versions": null,
"level": 1,
"mentioned_certs": {
"979": 1
},
"module_name": "Windows Vista Code Integrity (ci.dll)",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": "6.0.6001.18000, 6.0.6001.18023, 6.0.6001.22120 and 6.0.6002.18005",
"tested_conf": [
"Microsoft Windows Vista Ultimate Edition SP1 (x64 version) (single-user mode)",
"Microsoft Windows Vista Ultimate Edition SP1 (x86 Version)"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2008-07-21",
"lab": "SAIC-VA",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2009-07-29",
"lab": "",
"validation_type": "Update"
}
],
"vendor": "Microsoft Corporation",
"vendor_url": "http://www.microsoft.com"
}
}