This page was not yet optimized for use on mobile
devices.
Amazon Linux 2023 GnuTLS Cryptographic Module
Known vulnerabilities detected
Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.Certificate #5015
Webpage information
Security policy
Symmetric Algorithms
AES, AES-256, Twofish, Serpent, CAST, RC2, RC4, DES, Triple-DES, Salsa20, Poly1305, Blowfish, Camellia, SEED, HMAC, CMACAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DH, DSAHash functions
SHA-1, SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHA-3, MD4, MD5, PBKDF, PBKDF2Schemes
MAC, Key Agreement, Key agreement, AEADProtocols
TLS, TLS v1.2, TLS 1.0, TLS v1.3, TLSv1.0, TLSv1.1, TLSv1.2, TLSv1.3Randomness
DRBG, RNG, RBGLibraries
GnuTLSElliptic Curves
P-256, P-384, P-521Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTSTLS cipher suites
TLS_DH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DH_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_PSK_WITH_AES_128_CBC_SHA, TLS_PSK_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DH_RSA_WITH_AES_128_GCM_SHA256, TLS_DH_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_128_CCM, TLS_DHE_RSA_WITH_AES_256_CCM, TLS_DHE_RSA_WITH_AES_128_CCM_8, TLS_DHE_RSA_WITH_AES_256_CCM_8Trusted Execution Environments
PSP, SSCSecurity level
Level 1Standards
FIPS 140-3, FIPS PUB 140-3, FIPS186-4, FIPS 186-4, FIPS 198-1, FIPS 180-4, FIPS 202, FIPS 186-5, FIPS140-3, FIPS180-4, FIPS186-5, FIPS197, FIPS198-1, FIPS202, SP 800-38A, SP 800-38C, SP 800-38B, SP 800-38D, SP 800-38E, SP 800-90A, SP 800-56A, SP 800-56C, SP 800-135, SP 800-132, PKCS 1, PKCS#1, RFC7627, RFC5288, RFC8446, RFC3268, RFC5246, RFC4279, RFC4492, RFC5289, RFC6655File metadata
| Author | Pittinger, Zachary E. (Ctr) |
|---|---|
| Creation date | D:20250501070530-04'00' |
| Modification date | D:20250501070530-04'00' |
| Pages | 69 |
| Creator | Microsoft® Word for Microsoft 365 |
| Producer | Microsoft® Word for Microsoft 365 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.CPE matches
- cpe:2.3:o:amazon:amazon_linux:2023.0:*:*:*:*:*:*:*
- cpe:2.3:o:amazon:amazon_linux:2023.1:*:*:*:*:*:*:*
- cpe:2.3:o:amazon:amazon_linux:2023.2:*:*:*:*:*:*:*
- cpe:2.3:o:amazon:amazon_linux:2023.3:*:*:*:*:*:*:*
- cpe:2.3:o:amazon:amazon_linux:2023.4:*:*:*:*:*:*:*
- cpe:2.3:o:amazon:amazon_linux:2023.5:*:*:*:*:*:*:*
- cpe:2.3:o:amazon:amazon_linux:2023.6:*:*:*:*:*:*:*
- cpe:2.3:o:amazon:amazon_linux:2023.7:*:*:*:*:*:*:*
- cpe:2.3:o:amazon:amazon_linux:2023.8:*:*:*:*:*:*:*
Related CVEs
| ID | Links | Severity | CVSS Score | Published on | ||
|---|---|---|---|---|---|---|
| Base | Exploitability | Impact | ||||
| CVE-2024-6387 | HIGH | 8.1 | 5.9 | 01.07.2024 | ||
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 5015,
"dgst": "58c73a965e924d59",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": []
},
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:amazon:amazon_linux:2023.0:*:*:*:*:*:*:*",
"cpe:2.3:o:amazon:amazon_linux:2023.5:*:*:*:*:*:*:*",
"cpe:2.3:o:amazon:amazon_linux:2023.4:*:*:*:*:*:*:*",
"cpe:2.3:o:amazon:amazon_linux:2023.3:*:*:*:*:*:*:*",
"cpe:2.3:o:amazon:amazon_linux:2023.6:*:*:*:*:*:*:*",
"cpe:2.3:o:amazon:amazon_linux:2023.1:*:*:*:*:*:*:*",
"cpe:2.3:o:amazon:amazon_linux:2023.7:*:*:*:*:*:*:*",
"cpe:2.3:o:amazon:amazon_linux:2023.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amazon:amazon_linux:2023.2:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"2023"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2024-6387"
]
},
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDH": {
"ECDH": 3
},
"ECDSA": {
"ECDSA": 84
}
},
"FF": {
"DH": {
"DH": 6,
"Diffie-Hellman": 60
},
"DSA": {
"DSA": 6
}
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"CCM": {
"CCM": 2
},
"CFB": {
"CFB": 1
},
"CTR": {
"CTR": 1
},
"ECB": {
"ECB": 1
},
"GCM": {
"GCM": 6
},
"OFB": {
"OFB": 1
},
"XTS": {
"XTS": 5
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"GnuTLS": {
"GnuTLS": 76
}
},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 73,
"TLS 1.0": 1,
"TLS v1.2": 3,
"TLS v1.3": 1,
"TLSv1.0": 1,
"TLSv1.1": 1,
"TLSv1.2": 1,
"TLSv1.3": 1
}
}
},
"crypto_scheme": {
"AEAD": {
"AEAD": 2
},
"KA": {
"Key Agreement": 6,
"Key agreement": 1
},
"MAC": {
"MAC": 31
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 42,
"P-384": 42,
"P-521": 30
}
},
"eval_facility": {
"atsec": {
"atsec": 3
}
},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"- PKCS 1": 2,
"AES-256": 2,
"DRBG 256": 2,
"Diffie- Hellman 2048": 1,
"HMAC-SHA-1": 42,
"PKCS 1": 2,
"PKCS#1": 2,
"SHA-1": 6,
"SHA-3": 1,
"SHA2-224": 7,
"SHA2-256": 27,
"SHA2-384": 9,
"SHA2-512": 8,
"SHA3-224": 11,
"SHA3-256": 12,
"SHA3-384": 11,
"SHA3-512": 11
}
},
"fips_security_level": {
"Level": {
"Level 1": 3
}
},
"hash_function": {
"MD": {
"MD4": {
"MD4": 2
},
"MD5": {
"MD5": 3
}
},
"PBKDF": {
"PBKDF": 29,
"PBKDF2": 1
},
"SHA": {
"SHA1": {
"SHA-1": 6
},
"SHA3": {
"SHA-3": 1,
"SHA3-224": 11,
"SHA3-256": 12,
"SHA3-384": 11,
"SHA3-512": 11
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 50
},
"RNG": {
"RBG": 2,
"RNG": 2
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-3": 73,
"FIPS 180-4": 15,
"FIPS 186-4": 9,
"FIPS 186-5": 1,
"FIPS 198-1": 15,
"FIPS 202": 8,
"FIPS PUB 140-3": 2,
"FIPS140-3": 1,
"FIPS180-4": 1,
"FIPS186-4": 21,
"FIPS186-5": 1,
"FIPS197": 1,
"FIPS198-1": 1,
"FIPS202": 1
},
"NIST": {
"SP 800-132": 1,
"SP 800-135": 2,
"SP 800-38A": 9,
"SP 800-38B": 3,
"SP 800-38C": 2,
"SP 800-38D": 7,
"SP 800-38E": 1,
"SP 800-56A": 3,
"SP 800-56C": 1,
"SP 800-90A": 1
},
"PKCS": {
"PKCS 1": 2,
"PKCS#1": 1
},
"RFC": {
"RFC3268": 4,
"RFC4279": 2,
"RFC4492": 8,
"RFC5246": 4,
"RFC5288": 5,
"RFC5289": 16,
"RFC6655": 4,
"RFC7627": 2,
"RFC8446": 5
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 82,
"AES-256": 2
},
"CAST": {
"CAST": 131
},
"RC": {
"RC2": 3,
"RC4": 3
},
"Serpent": {
"Serpent": 3
},
"Twofish": {
"Twofish": 3
}
},
"DES": {
"3DES": {
"Triple-DES": 5
},
"DES": {
"DES": 4
}
},
"constructions": {
"MAC": {
"CMAC": 5,
"HMAC": 45
}
},
"djb": {
"Poly": {
"Poly1305": 3
},
"Salsa": {
"Salsa20": 3
}
},
"miscellaneous": {
"Blowfish": {
"Blowfish": 3
},
"Camellia": {
"Camellia": 3
},
"SEED": {
"SEED": 3
}
}
},
"tee_name": {
"AMD": {
"PSP": 8
},
"IBM": {
"SSC": 11
}
},
"tls_cipher_suite": {
"TLS": {
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 1,
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA256": 1,
"TLS_DHE_RSA_WITH_AES_128_CCM": 1,
"TLS_DHE_RSA_WITH_AES_128_CCM_8": 1,
"TLS_DHE_RSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 1,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA256": 1,
"TLS_DHE_RSA_WITH_AES_256_CCM": 1,
"TLS_DHE_RSA_WITH_AES_256_CCM_8": 1,
"TLS_DHE_RSA_WITH_AES_256_GCM_SHA384": 1,
"TLS_DH_RSA_WITH_AES_128_CBC_SHA": 1,
"TLS_DH_RSA_WITH_AES_128_CBC_SHA256": 1,
"TLS_DH_RSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_DH_RSA_WITH_AES_256_CBC_SHA": 1,
"TLS_DH_RSA_WITH_AES_256_CBC_SHA256": 1,
"TLS_DH_RSA_WITH_AES_256_GCM_SHA384": 1,
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA": 1,
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256": 1,
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA": 1,
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384": 1,
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 1,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": 1,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256": 1,
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": 1,
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384": 1,
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 1,
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA": 1,
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256": 1,
"TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA": 1,
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384": 1,
"TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384": 1,
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA": 1,
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256": 1,
"TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA": 1,
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384": 1,
"TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384": 1,
"TLS_PSK_WITH_AES_128_CBC_SHA": 1,
"TLS_PSK_WITH_AES_256_CBC_SHA": 1
}
},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Pittinger, Zachary E. (Ctr)",
"/CreationDate": "D:20250501070530-04\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20250501070530-04\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"pdf_file_size_bytes": 834493,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.140-3.pdf",
"http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-135r1.pdf",
"https://doi.org/10.6028/NIST.SP.800-56Ar3",
"http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38c.pdf",
"http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf",
"http://dx.doi.org/10.6028/NIST.SP.800-90Ar1",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf",
"http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf",
"http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38d.pdf",
"http://csrc.nist.gov/publications/nistpubs/800-132/nist-sp800-132.pdf",
"http://www.ietf.org/rfc/rfc3447.txt",
"https://doi.org/10.6028/NIST.SP.800-56Cr2",
"http://www.atsec.com/",
"https://doi.org/10.6028/NIST.SP.800-133r2",
"https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-5.pdf",
"https://csrc.nist.gov/csrc/media/Projects/cryptographic-module-validation-program/documents/fips%20140-3/FIPS%20140-3%20IG.pdf",
"http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf",
"https://doi.org/10.6028/NIST.SP.800-90B",
"http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf",
"http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r2.pdf",
"http://csrc.nist.gov/publications/nistpubs/800-38E/nist-sp-800-38E.pdf",
"http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf",
"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf",
"http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 69
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "8be763065ba1888b20d3f29f16bfe7a9123099650474ac91e8f7c6dd9a3ffbf7",
"policy_txt_hash": "2d6761ee6fc9e716166260ef7dd73cd4661e803e078d41db5b4e215505afa401"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in approved mode and installed, initialized and configured as specified in Section 11 of the Security Policy.",
"certificate_pdf_url": null,
"date_sunset": "2030-05-04",
"description": "GnuTLS is a secure communications library implementing the TLS protocol. It provides a simple C language application programming interface to access the secure communications protocols as well as APIs to parse and write X.509, PKCS#12, and other required structures.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical security: N/A",
"Non-invasive security: N/A",
"Mitigation of other attacks: N/A"
],
"fw_versions": null,
"historical_reason": null,
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "Amazon Linux 2023 GnuTLS Cryptographic Module",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-3",
"status": "active",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2025-05-05",
"lab": "atsec information security corporation",
"validation_type": "Initial"
}
],
"vendor": "Amazon Web Services, Inc.",
"vendor_url": "https://aws.amazon.com/linux/amazon-linux-2023/"
}
}