This page was not yet optimized for use on mobile
devices.
Microsoft Windows Cryptographic Primitives Library (bcrypt.dll)
Known vulnerabilities detected
Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.Certificate #892
Webpage information
Security policy
Symmetric Algorithms
AES-128, AES-192, AES-256, AES, RC2, RC4, DES, Triple-DES, TDES, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512Asymmetric Algorithms
ECDH, ECDSA, Diffie-Hellman, DH, DSAHash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA384, MD4, bcryptProtocols
TLS, TLS v1.0, IKEv1, IKE, IPsecRandomness
RNGElliptic Curves
P-256, P-384, P-521Block cipher modes
ECB, CBC, CFBVendor
Microsoft, Microsoft CorporationSecurity level
Level 1Standards
FIPS 140-2, FIPS PUB 140-2, FIPS 186-2, FIPS PUB 186-2File metadata
| Title | Microsoft Word - Windows Vista BCrypt FIPS Security Policy.doc |
|---|---|
| Author | jhsiung |
| Creation date | D:20080115132428Z |
| Modification date | D:20080115142053-05'00' |
| Pages | 22 |
| Creator | PScript5.dll Version 5.2.2 |
| Producer | GPL Ghostscript 8.15 |
References
Outgoing- 890 - historical - Code Integrity (ci.dll)
- 947 - historical - BitLockerâ„¢ Drive Encryption
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.CPE matches
Related CVEs
| ID | Links | Severity | CVSS Score | Published on |
|---|---|---|---|---|
| Base score | ||||
| CVE-2012-5362 | HIGH | 7.5 | 20.02.2020 | |
| CVE-2012-5364 | HIGH | 7.5 | 20.02.2020 | |
| CVE-2018-0887 | MEDIUM | 5.5 | 12.04.2018 | |
| CVE-2018-0960 | MEDIUM | 5.5 | 12.04.2018 | |
| CVE-2018-0968 | MEDIUM | 5.5 | 12.04.2018 | |
| CVE-2018-0969 | MEDIUM | 5.5 | 12.04.2018 | |
| CVE-2018-0970 | MEDIUM | 5.5 | 12.04.2018 | |
| CVE-2018-0971 | MEDIUM | 5.5 | 12.04.2018 | |
| CVE-2018-0972 | MEDIUM | 5.5 | 12.04.2018 | |
| CVE-2018-0973 | MEDIUM | 5.5 | 12.04.2018 | |
| CVE-2018-0974 | MEDIUM | 5.5 | 12.04.2018 | |
| CVE-2018-0975 | MEDIUM | 5.5 | 12.04.2018 | |
| CVE-2018-6947 | HIGH | 7.8 | 28.02.2018 | |
| CVE-2018-7249 | HIGH | 7.0 | 26.02.2018 | |
| CVE-2018-7250 | MEDIUM | 5.5 | 26.02.2018 | |
| CVE-2018-8563 | MEDIUM | 5.5 | 14.11.2018 | |
| CVE-2019-1465 | MEDIUM | 6.5 | 10.12.2019 | |
| CVE-2019-1466 | MEDIUM | 6.5 | 10.12.2019 | |
| CVE-2019-1467 | MEDIUM | 6.5 | 10.12.2019 | |
| CVE-2019-1474 | MEDIUM | 5.5 | 10.12.2019 | |
| CVE-2019-5921 | HIGH | 7.8 | 12.03.2019 | |
| CVE-2022-21893 | HIGH | 8.5 | 11.01.2022 | |
| CVE-2022-21897 | HIGH | 7.2 | 11.01.2022 | |
| CVE-2023-34367 | MEDIUM | 6.5 | 14.06.2023 |
Showing 5 out of 24.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 892,
"dgst": "46db1ca7f3598c26",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"DSA#227",
"RSA#258",
"SHS#618",
"Triple-DES#549",
"HMAC#298",
"ECDSA#60",
"RSA#257",
"AES#553",
"RNG#321"
]
},
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"947"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"890"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"947"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"888",
"889",
"890"
]
}
},
"module_prunned_references": {
"_type": "Set",
"elements": [
"890"
]
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"947"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"890"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"947"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"889",
"890",
"888"
]
}
},
"policy_prunned_references": {
"_type": "Set",
"elements": [
"890"
]
},
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2019-1466",
"CVE-2018-7249",
"CVE-2019-5921",
"CVE-2018-0970",
"CVE-2022-21897",
"CVE-2018-0887",
"CVE-2018-0972",
"CVE-2023-34367",
"CVE-2018-0974",
"CVE-2019-1467",
"CVE-2018-0969",
"CVE-2018-0971",
"CVE-2019-1474",
"CVE-2022-21893",
"CVE-2018-0973",
"CVE-2012-5364",
"CVE-2018-0975",
"CVE-2018-0968",
"CVE-2012-5362",
"CVE-2018-6947",
"CVE-2018-8563",
"CVE-2018-0960",
"CVE-2019-1465",
"CVE-2018-7250"
]
},
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 10
},
"ECDSA": {
"ECDSA": 11
}
},
"FF": {
"DH": {
"DH": 9,
"Diffie-Hellman": 7
},
"DSA": {
"DSA": 12
}
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 5
},
"CFB": {
"CFB": 4
},
"ECB": {
"ECB": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 1,
"IKEv1": 1
},
"IPsec": {
"IPsec": 1
},
"TLS": {
"TLS": {
"TLS": 1,
"TLS v1.0": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 4,
"P-384": 4,
"P-521": 4
}
},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#227": 1,
"#257": 1,
"#258": 1,
"#298": 1,
"#321": 1,
"#549": 1,
"#553": 1,
"#60": 1,
"#618": 1,
"#890": 1
}
},
"fips_certlike": {
"Certlike": {
"AES-128": 4,
"AES-192": 4,
"AES-256": 4,
"DSA (Cert. #227": 1,
"HMAC (Cert. #298": 1,
"HMAC 5": 2,
"HMAC- SHA384": 1,
"HMAC-SHA-1": 2,
"HMAC-SHA-256": 2,
"HMAC-SHA-384": 2,
"HMAC-SHA-512": 2,
"HMAC-SHA1": 2,
"HMAC-SHA256": 2,
"HMAC-SHA512": 2,
"RSASSA-PKCS1-v1_5": 1,
"SHA-1": 5,
"SHA-256": 2,
"SHA-384": 2,
"SHA-512": 2,
"SHA384": 1
}
},
"fips_security_level": {
"Level": {
"Level 1": 1
}
},
"hash_function": {
"MD": {
"MD4": {
"MD4": 1
}
},
"SHA": {
"SHA1": {
"SHA-1": 5
},
"SHA2": {
"SHA-256": 2,
"SHA-384": 2,
"SHA-512": 2,
"SHA384": 1
}
},
"bcrypt": {
"bcrypt": 2
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 9,
"FIPS 186-2": 6,
"FIPS PUB 140-2": 1,
"FIPS PUB 186-2": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3,
"AES-128": 4,
"AES-192": 4,
"AES-256": 4
},
"RC": {
"RC2": 2,
"RC4": 2
}
},
"DES": {
"3DES": {
"TDES": 1,
"Triple-DES": 5
},
"DES": {
"DES": 3
}
},
"constructions": {
"MAC": {
"HMAC": 9,
"HMAC-SHA-256": 1,
"HMAC-SHA-384": 1,
"HMAC-SHA-512": 1
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 17,
"Microsoft Corporation": 3
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "jhsiung",
"/CreationDate": "D:20080115132428Z",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20080115142053-05\u002700\u0027",
"/Producer": "GPL Ghostscript 8.15",
"/Title": "Microsoft Word - Windows Vista BCrypt FIPS Security Policy.doc",
"pdf_file_size_bytes": 242287,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 22
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "2e216567fbf69c72ad481a53a4faee4506cc49579de01ed8bf22705183413159",
"policy_txt_hash": "f1d22469e964f22d6a9d7d8f3e9d54ce2c1dd1e56b016967a570b4fe2f564507"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode with Code Integrity (ci.dll) validated to FIPS 140-2 under Cert. #890 operating in FIPS mode",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt892.pdf",
"date_sunset": null,
"description": "BCRYPT.DLL provides cryptographic services, through its documented interfaces, to Windows Vista components and applications running on Windows Vista. The cryptographic module, BCRYPT.DLL, encapsulates several different cryptographic algorithms in an easy-to-use cryptographic module accessible via the Microsoft CNG (Cryptography, Next Generation) API. It can be dynamically linked into applications by software developers to permit the use of general-purpose FIPS 140-2 compliant cryptography.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": null,
"fw_versions": null,
"historical_reason": "RNG SP800-131A Revision 1 Transition",
"hw_versions": null,
"level": 1,
"mentioned_certs": {
"890": 1
},
"module_name": "Microsoft Windows Cryptographic Primitives Library (bcrypt.dll)",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": "6.0.6000.16386",
"tested_conf": [
"Microsoft Windows Vista Ultimate Edition (x64 version) (single-user mode)",
"Microsoft Windows Vista Ultimate Edition (x86 Version)"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2008-01-10",
"lab": "SAIC-VA",
"validation_type": "Initial"
}
],
"vendor": "Microsoft Corporation",
"vendor_url": "http://www.microsoft.com"
}
}