This page was not yet optimized for use on mobile
devices.
Windows Server 2008 R2 Enhanced Cryptographic Provider (RSAENH)
Known vulnerabilities detected
Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.Certificate #1337
Webpage information
Security policy
Symmetric Algorithms
AES, AES-256, RC4, RC2, DES, Triple-DES, TDEA, HMACHash functions
SHA-1, SHA-256, SHA-384, SHA-512, MD4, MD5Schemes
MAC, Key ExchangeProtocols
SSL 2.0, SSL 3.0, TLS 1.0, TLSRandomness
PRNG, DRBGBlock cipher modes
ECBVendor
Microsoft Corporation, MicrosoftSecurity level
Level 1Standards
FIPS PUB 140-2, FIPS 140-2, SP 800-90File metadata
| Title | Microsoft Word - Windows Server 2008 R2 RSAENH security policy.doc |
|---|---|
| Author | noltinge |
| Creation date | D:20110609152049-04'00' |
| Modification date | D:20110609152049-04'00' |
| Pages | 21 |
| Creator | PScript5.dll Version 5.2 |
| Producer | Acrobat Distiller 8.1.0 (Windows) |
References
Outgoing IncomingHeuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Related CVEs
| ID | Links | Severity | CVSS Score | Published on | ||
|---|---|---|---|---|---|---|
| Base | Exploitability | Impact | ||||
| CVE-2007-6753 | MEDIUM | 6.2 | 10.0 | 28.03.2012 | ||
| CVE-2008-1084 | HIGH | 7.2 | 10.0 | 08.04.2008 | ||
| CVE-2008-1441 | MEDIUM | 5.4 | 6.9 | 12.06.2008 | ||
| CVE-2008-2250 | HIGH | 7.2 | 10.0 | 15.10.2008 | ||
| CVE-2008-2251 | HIGH | 7.2 | 10.0 | 15.10.2008 | ||
| CVE-2008-2252 | HIGH | 7.2 | 10.0 | 15.10.2008 | ||
| CVE-2008-3013 | HIGH | 9.3 | 10.0 | 11.09.2008 | ||
| CVE-2008-4036 | HIGH | 7.2 | 10.0 | 15.10.2008 | ||
| CVE-2008-4038 | HIGH | 10.0 | 10.0 | 15.10.2008 | ||
| CVE-2008-4268 | HIGH | 8.5 | 10.0 | 10.12.2008 | ||
| CVE-2008-4269 | HIGH | 8.5 | 10.0 | 10.12.2008 | ||
| CVE-2009-0078 | HIGH | 7.2 | 10.0 | 15.04.2009 | ||
| CVE-2009-0080 | MEDIUM | 6.9 | 10.0 | 15.04.2009 | ||
| CVE-2009-0081 | HIGH | 9.3 | 10.0 | 10.03.2009 | ||
| CVE-2009-0082 | HIGH | 7.2 | 10.0 | 10.03.2009 | ||
| CVE-2009-0083 | HIGH | 7.2 | 10.0 | 10.03.2009 | ||
| CVE-2009-0085 | HIGH | 7.1 | 6.9 | 10.03.2009 | ||
| CVE-2009-0086 | HIGH | 10.0 | 10.0 | 15.04.2009 | ||
| CVE-2009-0093 | LOW | 3.5 | 2.9 | 11.03.2009 | ||
| CVE-2009-0094 | MEDIUM | 5.5 | 4.9 | 11.03.2009 | ||
| CVE-2009-0230 | HIGH | 9.0 | 10.0 | 10.06.2009 | ||
| CVE-2009-0231 | HIGH | 8.8 | 5.9 | 15.07.2009 | ||
| CVE-2009-0233 | MEDIUM | 5.8 | 4.9 | 11.03.2009 | ||
| CVE-2009-0234 | MEDIUM | 6.4 | 4.9 | 11.03.2009 | ||
| CVE-2009-0320 | MEDIUM | 4.0 | 6.9 | 28.01.2009 | ||
| CVE-2009-0568 | HIGH | 10.0 | 10.0 | 10.06.2009 | ||
| CVE-2009-1216 | HIGH | 10.0 | 10.0 | 01.04.2009 | ||
| CVE-2009-1536 | LOW | 2.6 | 2.9 | 12.08.2009 | ||
| CVE-2009-2493 | HIGH | 9.3 | 10.0 | 29.07.2009 | ||
| CVE-2009-2526 | HIGH | 7.8 | 6.9 | 14.10.2009 | ||
| CVE-2009-2532 | HIGH | 10.0 | 10.0 | 14.10.2009 | ||
| CVE-2009-3103 | HIGH | 10.0 | 10.0 | 08.09.2009 | ||
| CVE-2010-0024 | MEDIUM | 5.0 | 2.9 | 14.04.2010 | ||
| CVE-2010-0025 | MEDIUM | 5.0 | 2.9 | 14.04.2010 | ||
| CVE-2010-0719 | MEDIUM | 4.7 | 6.9 | 26.02.2010 | ||
| CVE-2010-3227 | HIGH | 9.3 | 10.0 | 26.10.2010 | ||
| CVE-2010-4398 | HIGH | 7.8 | 5.9 | 06.12.2010 | ||
| CVE-2010-4562 | MEDIUM | 4.3 | 2.9 | 02.02.2012 | ||
| CVE-2010-4669 | HIGH | 7.8 | 6.9 | 07.01.2011 | ||
| CVE-2011-1229 | HIGH | 7.2 | 10.0 | 13.04.2011 | ||
| CVE-2012-1194 | MEDIUM | 6.4 | 4.9 | 17.02.2012 | ||
| CVE-2017-0175 | MEDIUM | 4.7 | 3.6 | 12.05.2017 | ||
| CVE-2017-11831 | MEDIUM | 4.7 | 3.6 | 15.11.2017 | ||
| CVE-2017-11852 | MEDIUM | 4.7 | 3.6 | 15.11.2017 | ||
| CVE-2018-0887 | MEDIUM | 5.5 | 3.6 | 12.04.2018 | ||
| CVE-2018-0960 | MEDIUM | 5.5 | 3.6 | 12.04.2018 | ||
| CVE-2018-0968 | MEDIUM | 5.5 | 3.6 | 12.04.2018 | ||
| CVE-2018-0969 | MEDIUM | 5.5 | 3.6 | 12.04.2018 | ||
| CVE-2018-0970 | MEDIUM | 5.5 | 3.6 | 12.04.2018 | ||
| CVE-2018-0971 | MEDIUM | 5.5 | 3.6 | 12.04.2018 | ||
| CVE-2018-0972 | MEDIUM | 5.5 | 3.6 | 12.04.2018 | ||
| CVE-2018-0973 | MEDIUM | 5.5 | 3.6 | 12.04.2018 | ||
| CVE-2018-0974 | MEDIUM | 5.5 | 3.6 | 12.04.2018 | ||
| CVE-2018-0975 | MEDIUM | 5.5 | 3.6 | 12.04.2018 | ||
| CVE-2018-8641 | HIGH | 7.8 | 5.9 | 12.12.2018 | ||
| CVE-2024-29056 | MEDIUM | 4.3 | 1.4 | 09.04.2024 | ||
Showing 5 out of 56.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 1337,
"dgst": "5db1fee4b5703808",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"RSA#559",
"DRBG#23",
"RSA#568",
"AES#1168",
"HMAC#687",
"SHS#1081",
"Triple-DES#846"
]
},
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:microsoft:windows_server_2008:-:r2:*:*:*:*:x64:*"
]
},
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"2008"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"2162",
"1683",
"2220",
"1699",
"1087",
"1732",
"1595"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"1334",
"1335"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"2162",
"1683",
"2220",
"1699",
"1087",
"1732",
"1086",
"1595"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"1335",
"1321",
"1333",
"1334"
]
}
},
"module_prunned_references": {
"_type": "Set",
"elements": [
"1334",
"1335"
]
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"2009",
"1683",
"2220",
"1087"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"1334",
"1335"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"2009",
"1683",
"2220",
"1087"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"1335",
"1321",
"1333",
"1334"
]
}
},
"policy_prunned_references": {
"_type": "Set",
"elements": [
"1334",
"1335"
]
},
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2010-4398",
"CVE-2009-1536",
"CVE-2017-0175",
"CVE-2009-0230",
"CVE-2009-0320",
"CVE-2018-0975",
"CVE-2009-0078",
"CVE-2009-0082",
"CVE-2009-0080",
"CVE-2009-0085",
"CVE-2008-2251",
"CVE-2009-2526",
"CVE-2009-3103",
"CVE-2008-4268",
"CVE-2008-4269",
"CVE-2018-0973",
"CVE-2011-1229",
"CVE-2009-0233",
"CVE-2017-11831",
"CVE-2018-0974",
"CVE-2010-3227",
"CVE-2008-4038",
"CVE-2012-1194",
"CVE-2018-0960",
"CVE-2018-0969",
"CVE-2010-4562",
"CVE-2009-0234",
"CVE-2009-0086",
"CVE-2018-0971",
"CVE-2009-2532",
"CVE-2009-0231",
"CVE-2018-0972",
"CVE-2008-3013",
"CVE-2010-0025",
"CVE-2010-4669",
"CVE-2008-1084",
"CVE-2008-2252",
"CVE-2008-4036",
"CVE-2009-0083",
"CVE-2009-2493",
"CVE-2017-11852",
"CVE-2018-8641",
"CVE-2009-0081",
"CVE-2010-0024",
"CVE-2008-2250",
"CVE-2018-0970",
"CVE-2009-0093",
"CVE-2009-0094",
"CVE-2007-6753",
"CVE-2008-1441",
"CVE-2018-0887",
"CVE-2018-0968",
"CVE-2024-29056",
"CVE-2009-1216",
"CVE-2009-0568",
"CVE-2010-0719"
]
},
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {},
"certification_process": {},
"cipher_mode": {
"ECB": {
"ECB": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL 2.0": 3,
"SSL 3.0": 3
},
"TLS": {
"TLS": 4,
"TLS 1.0": 1
}
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 1
},
"MAC": {
"MAC": 3
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#1081": 1,
"#1168": 1,
"#1334": 1,
"#1335": 1,
"#23": 1,
"#559": 1,
"#568": 1,
"#687": 1,
"#846": 1
}
},
"fips_certlike": {
"Certlike": {
"AES (Cert. #1168": 1,
"AES 128": 1,
"AES-256": 3,
"DRBG (Cert. #23": 1,
"HMAC Cert. #687": 2,
"HMAC SHA-1": 1,
"HMAC SHA-256": 1,
"HMAC SHA-384": 1,
"HMAC SHA-512": 1,
"HMAC-SHA1": 2,
"HMAC-SHA256": 2,
"HMAC-SHA384": 2,
"HMAC-SHA512": 2,
"SHA-1": 5,
"SHA-256": 3,
"SHA-384": 3,
"SHA-512": 3,
"SHS Cert. #1081": 1
}
},
"fips_security_level": {
"Level": {
"Level 1": 1
}
},
"hash_function": {
"MD": {
"MD4": {
"MD4": 1
},
"MD5": {
"MD5": 1
}
},
"SHA": {
"SHA1": {
"SHA-1": 5
},
"SHA2": {
"SHA-256": 3,
"SHA-384": 3,
"SHA-512": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 1,
"PRNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 6,
"FIPS PUB 140-2": 3
},
"NIST": {
"SP 800-90": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 9,
"AES-256": 3
},
"RC": {
"RC2": 4,
"RC4": 4
}
},
"DES": {
"3DES": {
"TDEA": 1,
"Triple-DES": 8
},
"DES": {
"DES": 4
}
},
"constructions": {
"MAC": {
"HMAC": 17
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 23,
"Microsoft Corporation": 3
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "noltinge",
"/CreationDate": "D:20110609152049-04\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2",
"/ModDate": "D:20110609152049-04\u002700\u0027",
"/Producer": "Acrobat Distiller 8.1.0 (Windows)",
"/Title": "Microsoft Word - Windows Server 2008 R2 RSAENH security policy.doc",
"pdf_file_size_bytes": 163117,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 21
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "ed4095c8fffc132c056f0dc2187d851e9e7bfb15369943e243c30b015fa0e05d",
"policy_txt_hash": "53ae2a55478718a5e240fdd401f7dd3a83acf82581e374d49e40a00df9d44303"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode with Windows Server 2008 R2 Code Integrity (ci.dll) validated to FIPS 140-2 under Cert. #1334 operating in FIPS mode and Microsoft Windows Server 2008 R2 Kernel Mode Cryptographic Primitives Library (cng.sys) validated to FIPS 140-2 under Cert. #1335 operating in FIPS mode.",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt1337.pdf",
"date_sunset": null,
"description": "RSAENH encapsulates several different cryptographic algorithms in an easy-to-use cryptographic module accessible via the Microsoft CryptoAPI. Developers dynamically link the Microsoft RSAENH module into their applications to provide FIPS 140-2 compliant cryptographic support.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": null,
"fw_versions": null,
"historical_reason": "Moved to historical list due to sunsetting",
"hw_versions": null,
"level": 1,
"mentioned_certs": {
"1334": 1,
"1335": 1
},
"module_name": "Windows Server 2008 R2 Enhanced Cryptographic Provider (RSAENH)",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": "6.1.7600.16385",
"tested_conf": [
"Microsoft Windows Server 2008 R2 (IA64 version)",
"Microsoft Windows Server 2008 R2 (x64 Version)",
"Microsoft Windows Server 2008 R2 SP1 (IA64 version) (single-user mode)",
"Microsoft Windows Server 2008 R2 SP1 (x64 version)"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2010-08-19",
"lab": "SAIC-VA",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2011-06-01",
"lab": "SAIC-VA",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2011-06-21",
"lab": "SAIC-VA",
"validation_type": "Update"
}
],
"vendor": "Microsoft Corporation",
"vendor_url": "http://www.microsoft.com"
}
}