This page was not yet optimized for use on mobile
devices.
Amazon Linux 2023 NSS Cryptographic Module
Known vulnerabilities detected
Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.Certificate #5014
Webpage information
Security policy
Symmetric Algorithms
AES, AES-, CAST, RC2, RC4, DES, ChaCha20, Poly1305, Camellia, SEED, HMAC, HMAC-SHA-512, CBC-MAC, CMACAsymmetric Algorithms
ECDH, ECDSA, ECC, DH, DSAHash functions
SHA-1, SHA-256, SHA-512, SHA2, SHA3-256, MD5, PBKDF2, PBKDFSchemes
MACProtocols
SSL, TLS, TLS v1.2, TLS 1.2, TLS 1.3, IKEv2, IKEv1, IKERandomness
DRBG, RNG, RBGLibraries
NSSElliptic Curves
P-256, P-192, P-521Block cipher modes
ECB, CBC, CTR, GCMTrusted Execution Environments
PSP, SSCSecurity level
Level 1Side-channel analysis
Timing attacks, Timing attack, timing attacksStandards
FIPS 140, FIPS 140-3, FIPS PUB 140, FIPS186, FIPS 186, FIPS 198, FIPS 180, FIPS186-4, FIPS140, FIPS180, FIPS197, FIPS198, PKCS#5, PKCS#7, PKCS#11, PKCS#12, PKCS 1, PKCS#1, RFC7627, RFC 5288, RFC8446, RFC 5996, RFC 3526, RFC 7919, X.509File metadata
| Creation date | D:20260128135511-05'00' |
|---|---|
| Modification date | D:20260128135742-05'00' |
| Pages | 49 |
| Creator | Acrobat PDFMaker 25 for Word |
| Producer | Adobe PDF Library 25.1.5 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.CPE matches
- cpe:2.3:o:amazon:amazon_linux:2023.0:*:*:*:*:*:*:*
- cpe:2.3:o:amazon:amazon_linux:2023.1:*:*:*:*:*:*:*
- cpe:2.3:o:amazon:amazon_linux:2023.2:*:*:*:*:*:*:*
- cpe:2.3:o:amazon:amazon_linux:2023.3:*:*:*:*:*:*:*
- cpe:2.3:o:amazon:amazon_linux:2023.4:*:*:*:*:*:*:*
- cpe:2.3:o:amazon:amazon_linux:2023.5:*:*:*:*:*:*:*
- cpe:2.3:o:amazon:amazon_linux:2023.6:*:*:*:*:*:*:*
- cpe:2.3:o:amazon:amazon_linux:2023.7:*:*:*:*:*:*:*
- cpe:2.3:o:amazon:amazon_linux:2023.8:*:*:*:*:*:*:*
Related CVEs
| ID | Links | Severity | CVSS Score | Published on |
|---|---|---|---|---|
| Base score | ||||
| CVE-2024-6387 | HIGH | 8.1 | 01.07.2024 |
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 5014,
"dgst": "556da99bfbcef832",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": []
},
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:amazon:amazon_linux:2023.0:*:*:*:*:*:*:*",
"cpe:2.3:o:amazon:amazon_linux:2023.5:*:*:*:*:*:*:*",
"cpe:2.3:o:amazon:amazon_linux:2023.4:*:*:*:*:*:*:*",
"cpe:2.3:o:amazon:amazon_linux:2023.3:*:*:*:*:*:*:*",
"cpe:2.3:o:amazon:amazon_linux:2023.6:*:*:*:*:*:*:*",
"cpe:2.3:o:amazon:amazon_linux:2023.1:*:*:*:*:*:*:*",
"cpe:2.3:o:amazon:amazon_linux:2023.7:*:*:*:*:*:*:*",
"cpe:2.3:o:amazon:amazon_linux:2023.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amazon:amazon_linux:2023.2:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"2023"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2024-6387"
]
},
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDH": {
"ECDH": 5
},
"ECDSA": {
"ECDSA": 50
}
},
"FF": {
"DH": {
"DH": 24
},
"DSA": {
"DSA": 37
}
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 6
},
"CTR": {
"CTR": 6
},
"ECB": {
"ECB": 6
},
"GCM": {
"GCM": 24
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"NSS": {
"NSS": 55
}
},
"crypto_protocol": {
"IKE": {
"IKE": 1,
"IKEv1": 2,
"IKEv2": 22
},
"TLS": {
"SSL": {
"SSL": 2
},
"TLS": {
"TLS": 30,
"TLS 1.2": 10,
"TLS 1.3": 4,
"TLS v1.2": 3
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 14
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-192": 2,
"P-256": 14,
"P-521": 2
}
},
"eval_facility": {
"atsec": {
"atsec": 3
}
},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"- PKCS 1": 3,
"DRBG 440": 1,
"Diffie - Hellman 2048": 2,
"Diffie - Hellman 256": 1,
"HMAC SHA-256 576": 1,
"HMAC-SHA-1": 4,
"HMAC-SHA-512": 2,
"PKCS 1": 3,
"PKCS#1": 16,
"PKCS#11": 4,
"PKCS#12": 6,
"PKCS#5": 6,
"PKCS#7": 2,
"SHA - 1": 3,
"SHA - 256": 1,
"SHA - 384": 1,
"SHA -1": 12,
"SHA -224": 6,
"SHA -256": 9,
"SHA -384": 8,
"SHA -512": 6,
"SHA-1": 6,
"SHA-256": 14,
"SHA-512": 1,
"SHA-512, 2048": 2,
"SHA2 -224": 2,
"SHA2 -256": 5,
"SHA2 -384": 5,
"SHA2 -512": 6,
"SHA2-224": 6,
"SHA2-256": 6,
"SHA2-384": 5,
"SHA2-512": 3,
"SHA3-256": 1
}
},
"fips_security_level": {
"Level": {
"Level 1": 3
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 19
}
},
"PBKDF": {
"PBKDF": 10,
"PBKDF2": 11
},
"SHA": {
"SHA1": {
"SHA-1": 6
},
"SHA2": {
"SHA-256": 14,
"SHA-512": 3,
"SHA2": 18
},
"SHA3": {
"SHA3-256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 36
},
"RNG": {
"RBG": 2,
"RNG": 2
}
},
"side_channel_analysis": {
"SCA": {
"Timing attack": 1,
"Timing attacks": 1,
"timing attacks": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140": 10,
"FIPS 140-3": 49,
"FIPS 180": 4,
"FIPS 186": 15,
"FIPS 198": 4,
"FIPS PUB 140": 3,
"FIPS140": 2,
"FIPS180": 1,
"FIPS186": 36,
"FIPS186-4": 1,
"FIPS197": 1,
"FIPS198": 1
},
"PKCS": {
"PKCS 1": 3,
"PKCS#1": 8,
"PKCS#11": 2,
"PKCS#12": 3,
"PKCS#5": 3,
"PKCS#7": 1
},
"RFC": {
"RFC 3526": 1,
"RFC 5288": 2,
"RFC 5996": 1,
"RFC 7919": 1,
"RFC7627": 4,
"RFC8446": 2
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 71,
"AES-": 6
},
"CAST": {
"CAST": 73
},
"RC": {
"RC2": 3,
"RC4": 3
}
},
"DES": {
"DES": {
"DES": 6
}
},
"constructions": {
"MAC": {
"CBC-MAC": 2,
"CMAC": 6,
"HMAC": 18,
"HMAC-SHA-512": 1
}
},
"djb": {
"ChaCha": {
"ChaCha20": 3
},
"Poly": {
"Poly1305": 2
}
},
"miscellaneous": {
"Camellia": {
"Camellia": 5
},
"SEED": {
"SEED": 5
}
}
},
"tee_name": {
"AMD": {
"PSP": 5
},
"IBM": {
"SSC": 1
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "",
"/Company": "",
"/CreationDate": "D:20260128135511-05\u002700\u0027",
"/Creator": "Acrobat PDFMaker 25 for Word",
"/KSOProductBuildVer": "1033-11.1.0.11704",
"/ModDate": "D:20260128135742-05\u002700\u0027",
"/Producer": "Adobe PDF Library 25.1.5",
"/SourceModified": "",
"pdf_file_size_bytes": 554047,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-135r1.pdf",
"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90Ar1.pdf",
"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38F.pdf",
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-133r2.pdf",
"http://www.ietf.org/rfc/rfc3447.txt",
"http://www.atsec.com/",
"https://docs.aws.amazon.com/linux/al2023/ug/fips-mode.html",
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-5.pdf",
"http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf",
"http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf",
"http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-108r1.pdf",
"https://csrc.nist.gov/Projects/cryptographic-module-validation-program/fips-140-3-ig-announcements",
"http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr2.pdf",
"http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar3.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90B.pdf",
"http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf",
"https://doi.org/10.6028/NIST.FIPS.140-3",
"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar1.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 49
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "f936b0608ac63283be16f7b3e1355ea61119539bddc0408576a457376c7a0150",
"policy_txt_hash": "4a7befa6ab480513c6c2939a17f24e86dee2f935521bca8c64f1bd0ddc05293d"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in approved mode and installed, initialized and configured as specified in Section 11 of the Security Policy.",
"certificate_pdf_url": null,
"date_sunset": "2030-05-01",
"description": "The Amazon Linux 2023 NSS Cryptographic Module provides a C language application program interface designed to support cross-platform development of security-enabled client and server applications. Applications built with NSS can support SSLv3, TLS, IKEv2, PKCS#5, PKCS#7, PKCS#11, PKCS#12, S/MIME, X.509 v3 certificates, and other security standards supporting FIPS 140-3 validated cryptographic algorithms.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical security: N/A",
"Non-invasive security: N/A"
],
"fw_versions": null,
"historical_reason": null,
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "Amazon Linux 2023 NSS Cryptographic Module",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-3",
"status": "active",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2025-05-02",
"lab": "atsec information security corporation",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2026-02-11",
"lab": "atsec information security corporation",
"validation_type": "Update"
}
],
"vendor": "Amazon Web Services, Inc.",
"vendor_url": "http://www.amazon.com"
}
}