Windows Vista Code Integrity (ci.dll)

Known vulnerabilities detected

Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.

Certificate #980

Webpage information

Status historical
Historical reason Moved to historical list due to sunsetting
Validation dates 21.07.2008 , 29.07.2009
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode with Winload OS Loader (winload.exe) validated to FIPS 140-2 under Cert. #979 operating in FIPS mode
Description This is a dynamically linked library that runs as ntoskrnl.exe. It verifies the integrity of executable files, including kernel mode drivers, critical system components and user mode crypto modules, before these files are loaded from disk into memory by the memory manager.
Tested configurations
  • Microsoft Windows Vista Ultimate Edition SP1 (x64 version) (single-user mode)
  • Microsoft Windows Vista Ultimate Edition SP1 (x86 Version)
Vendor Microsoft Corporation
References

This certificate's webpage directly references 1 certificates, transitively this expands into 2 certificates.

Security policy

Hash functions
SHA-1, bcrypt

Vendor
Microsoft

Standards
FIPS 140-2, PKCS#1

File metadata

Title Windows Vista Code Integrity FIPS Security Policy_SP2
Author jmaresca
Creation date D:20090724090857-04'00'
Modification date D:20090724090857-04'00'
Pages 6
Creator PDFCreator Version 0.9.7
Producer GPL Ghostscript 8.63

References

Outgoing
  • 979 - historical - Windows Vista Winload OS Loader (winload.exe)
Incoming
  • 1053 - historical - BitLockerâ„¢ Drive Encryption
  • 1002 - historical - Windows Vista Enhanced Cryptographic Provider (RSAENH)
  • 1001 - historical - Microsoft Windows Vista Cryptographic Primitives Library (bcrypt.dll)
  • 1003 - historical - Windows Vista Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

CPE matches

Related CVEs

ID Links Severity CVSS Score Published on
Base score
CVE-2012-5362
C N
HIGH 7.5 20.02.2020
CVE-2012-5364
C N
HIGH 7.5 20.02.2020
CVE-2018-0598
C N
HIGH 7.8 26.06.2018
CVE-2018-0599
C N
HIGH 7.8 26.06.2018
CVE-2018-7249
C N
HIGH 7.0 26.02.2018
CVE-2018-7250
C N
MEDIUM 5.5 26.02.2018
CVE-2021-36958
C N
HIGH 9.3 12.08.2021
Showing 5 out of 7.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 980,
  "dgst": "38879b6376fbabdc",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "SHS#753",
        "RSA#354"
      ]
    },
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:ultimate:*:x64:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_basic_n:*:x86:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:ultimate:*:x64:*",
        "cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_basic:*:x86:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:business:*:x86:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:business_n:*:x64:*",
        "cpe:2.3:o:microsoft:windows_vista:-:-:*:*:business_n:*:x64:*",
        "cpe:2.3:o:microsoft:windows_vista:-:-:*:*:ultimate:*:x64:*",
        "cpe:2.3:o:microsoft:windows_vista:-:-:*:*:business:*:x64:*",
        "cpe:2.3:o:microsoft:windows_vista:-:beta1:*:*:*:*:*:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:-:*:x64:*",
        "cpe:2.3:o:microsoft:windows_vista:-:*:x86:*:*:*:*:*",
        "cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_basic_n:*:x86:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:business_n:*:x86:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:x64:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_basic:*:x86:*",
        "cpe:2.3:o:microsoft:windows_vista:-:beta2:*:*:*:*:*:*",
        "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:arm64:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:-:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:ultimate:*:x86:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:enterprise:*:x86:*",
        "cpe:2.3:o:microsoft:windows_vista:-:*:x64:*:*:*:*:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_basic:*:x64:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_basic_n:*:x64:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_basic:*:x86:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:business:*:x64:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:starter:*:x86:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:enterprise:*:x64:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:business_n:*:x64:*",
        "cpe:2.3:o:microsoft:windows_vista:-:gold:*:*:*:*:x64:*",
        "cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_premium:*:x86:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_premium:*:x64:*",
        "cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_basic:*:x64:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_premium:*:x86:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:business_n:*:x86:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:business:*:x64:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:business:*:x86:*",
        "cpe:2.3:o:microsoft:windows_vista:-:-:*:*:enterprise:*:x64:*",
        "cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_basic_n:*:x64:*",
        "cpe:2.3:o:microsoft:windows_vista:-:-:*:*:starter:*:x86:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_basic_n:*:x64:*",
        "cpe:2.3:o:microsoft:windows_vista:-:-:*:*:enterprise:*:x86:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_basic:*:x64:*",
        "cpe:2.3:o:microsoft:windows_vista:-:-:*:*:business_n:*:x86:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:enterprise:*:x86:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_premium:*:x86:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:enterprise:*:x64:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:starter:*:x86:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_basic_n:*:x86:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:ultimate:*:x86:*",
        "cpe:2.3:o:microsoft:windows_vista:-:-:*:*:business:*:x86:*",
        "cpe:2.3:o:microsoft:windows_vista:-:-:*:*:ultimate:*:x86:*",
        "cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_premium:*:x64:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_premium:*:x64:*",
        "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:-:*:x64:*"
      ]
    },
    "direct_transitive_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2019-1466",
        "CVE-2021-36958",
        "CVE-2018-7249",
        "CVE-2019-5921",
        "CVE-2018-0970",
        "CVE-2022-21897",
        "CVE-2018-0887",
        "CVE-2018-0972",
        "CVE-2023-34367",
        "CVE-2018-0974",
        "CVE-2019-1467",
        "CVE-2018-0969",
        "CVE-2018-0971",
        "CVE-2019-1474",
        "CVE-2022-21893",
        "CVE-2018-0973",
        "CVE-2012-5364",
        "CVE-2018-0975",
        "CVE-2018-0599",
        "CVE-2018-0968",
        "CVE-2012-5362",
        "CVE-2018-6947",
        "CVE-2018-8563",
        "CVE-2018-0598",
        "CVE-2018-0960",
        "CVE-2019-1465",
        "CVE-2018-7250"
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2019-1466",
        "CVE-2021-36958",
        "CVE-2018-7249",
        "CVE-2019-5921",
        "CVE-2018-0970",
        "CVE-2022-21897",
        "CVE-2018-0887",
        "CVE-2018-0972",
        "CVE-2023-34367",
        "CVE-2018-0974",
        "CVE-2019-1467",
        "CVE-2018-0969",
        "CVE-2018-0971",
        "CVE-2019-1474",
        "CVE-2022-21893",
        "CVE-2018-0973",
        "CVE-2012-5364",
        "CVE-2018-0975",
        "CVE-2018-0599",
        "CVE-2018-0968",
        "CVE-2012-5362",
        "CVE-2018-6947",
        "CVE-2018-8563",
        "CVE-2018-0598",
        "CVE-2018-0960",
        "CVE-2019-1465",
        "CVE-2018-7250"
      ]
    },
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "1002",
          "1003",
          "1001"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "979"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "1002",
          "2162",
          "1500",
          "1003",
          "1001",
          "1053"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "979",
          "978"
        ]
      }
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": [
        "979"
      ]
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "1002",
          "1053",
          "1003",
          "1001"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "979"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "1002",
          "1003",
          "1001",
          "1053",
          "2009"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "979",
          "978"
        ]
      }
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": [
        "979"
      ]
    },
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2012-5364",
        "CVE-2018-0599",
        "CVE-2012-5362",
        "CVE-2021-36958",
        "CVE-2018-7249",
        "CVE-2018-0598",
        "CVE-2018-7250"
      ]
    },
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#354": 1,
          "#753": 1,
          "#979": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "PKCS#1": 9,
          "RSA PKCS#1": 3,
          "SHA-1": 8
        }
      },
      "fips_security_level": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 8
          }
        },
        "bcrypt": {
          "bcrypt": 2
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 4
        },
        "PKCS": {
          "PKCS#1": 6
        }
      },
      "symmetric_crypto": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 6
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "jmaresca",
      "/CreationDate": "D:20090724090857-04\u002700\u0027",
      "/Creator": "PDFCreator Version 0.9.7",
      "/Keywords": "",
      "/ModDate": "D:20090724090857-04\u002700\u0027",
      "/Producer": "GPL Ghostscript 8.63",
      "/Subject": "",
      "/Title": "Windows Vista Code Integrity FIPS Security Policy_SP2",
      "pdf_file_size_bytes": 97035,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 6
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "7df3bb5472ee6b287a74d4917a41f424b7a7c491e31fc7697c407c3ecb337b4f",
    "policy_txt_hash": "5ed2385e822b9531fa1d3b951779454bc21ac0252b8d2dee6e6ae478fe14ca0d"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode with Winload OS Loader (winload.exe) validated to FIPS 140-2 under Cert. #979 operating in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt980.pdf",
    "date_sunset": null,
    "description": "This is a dynamically linked library that runs as ntoskrnl.exe. It verifies the integrity of executable files, including kernel mode drivers, critical system components and user mode crypto modules, before these files are loaded from disk into memory by the memory manager.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": null,
    "fw_versions": null,
    "historical_reason": "Moved to historical list due to sunsetting",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {
      "979": 1
    },
    "module_name": "Windows Vista Code Integrity (ci.dll)",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "6.0.6001.18000, 6.0.6001.18023, 6.0.6001.22120 and 6.0.6002.18005",
    "tested_conf": [
      "Microsoft Windows Vista Ultimate Edition SP1 (x64 version) (single-user mode)",
      "Microsoft Windows Vista Ultimate Edition SP1 (x86 Version)"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2008-07-21",
        "lab": "SAIC-VA",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2009-07-29",
        "lab": "",
        "validation_type": "Update"
      }
    ],
    "vendor": "Microsoft Corporation",
    "vendor_url": "http://www.microsoft.com"
  }
}