This page was not yet optimized for use on mobile
devices.
Red Hat Enterprise Linux 9 NSS Cryptographic Module
Known vulnerabilities detected
Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.Certificate #5022
Webpage information
Security policy
Symmetric Algorithms
AES, AES-, CAST, RC2, RC4, DES, Triple-DES, ChaCha20, Poly1305, Camellia, SEED, HMAC, HMAC-SHA-256, CBC-MAC, CMACAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DH, DSAHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, MD5, PBKDF2, PBKDFSchemes
MAC, Key AgreementProtocols
SSL, TLS, TLS v1.2, TLS 1.2, TLS 1.3, IKEv2, IKEv1, IKERandomness
DRBG, RNG, RBGLibraries
NSSElliptic Curves
P-256, P-384, P-521, Ed25519Block cipher modes
GCMJavaCard API constants
X25519Trusted Execution Environments
PSP, SSCSecurity level
Level 1Side-channel analysis
Timing attacks, timing attack, timing attacksStandards
FIPS 140-3, FIPS PUB 140-3, FIPS186-5, FIPS 186-5, FIPS 198-1, FIPS186-2, FIPS 186-4, FIPS186-4, FIPS 180-4, SP 800-132, SP 800-38A, SP 800-38B, SP 800-38D, SP 800-38F, SP 800-90A, SP 800-56A, SP 800-56C, SP 800-135, SP 800-108, PKCS#5, PKCS#7, PKCS#11, PKCS#12, PKCS 1, PKCS#1, RFC7627, RFC 5288, RFC8446, RFC 3526, RFC 7919, RFC 7627, X.509File metadata
| Author | Pittinger, Zachary E. (Ctr) |
|---|---|
| Creation date | D:20250527115112-04'00' |
| Modification date | D:20250527115112-04'00' |
| Pages | 62 |
| Creator | Microsoft® Word for Microsoft 365 |
| Producer | Microsoft® Word for Microsoft 365 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.CPE matches
Related CVEs
| ID | Links | Severity | CVSS Score | Published on | ||
|---|---|---|---|---|---|---|
| Base | Exploitability | Impact | ||||
| CVE-2016-7091 | MEDIUM | 4.4 | 3.6 | 22.12.2016 | ||
| CVE-2020-14394 | LOW | 3.2 | 1.4 | 17.08.2022 | ||
| CVE-2021-35937 | MEDIUM | 6.4 | 5.9 | 25.08.2022 | ||
| CVE-2021-35938 | MEDIUM | 6.7 | 5.9 | 25.08.2022 | ||
| CVE-2021-3695 | MEDIUM | 4.5 | 3.4 | 06.07.2022 | ||
| CVE-2021-3696 | MEDIUM | 4.5 | 3.4 | 06.07.2022 | ||
| CVE-2021-3697 | HIGH | 7.0 | 5.9 | 06.07.2022 | ||
| CVE-2021-3839 | HIGH | 7.5 | 3.6 | 23.08.2022 | ||
| CVE-2021-3864 | HIGH | 7.0 | 5.9 | 26.08.2022 | ||
| CVE-2021-3997 | MEDIUM | 5.5 | 3.6 | 23.08.2022 | ||
| CVE-2021-4158 | MEDIUM | 6.0 | 4.0 | 24.08.2022 | ||
| CVE-2021-4204 | HIGH | 7.1 | 5.2 | 24.08.2022 | ||
| CVE-2021-4217 | LOW | 3.3 | 1.4 | 24.08.2022 | ||
| CVE-2022-0168 | MEDIUM | 4.4 | 3.6 | 26.08.2022 | ||
| CVE-2022-0171 | MEDIUM | 5.5 | 3.6 | 26.08.2022 | ||
| CVE-2022-0480 | MEDIUM | 5.5 | 3.6 | 29.08.2022 | ||
| CVE-2022-0934 | HIGH | 7.5 | 3.6 | 29.08.2022 | ||
| CVE-2022-0987 | LOW | 3.3 | 1.4 | 28.06.2022 | ||
| CVE-2022-1016 | MEDIUM | 5.5 | 3.6 | 29.08.2022 | ||
| CVE-2022-1158 | HIGH | 7.8 | 5.9 | 05.08.2022 | ||
| CVE-2022-1184 | MEDIUM | 5.5 | 3.6 | 29.08.2022 | ||
| CVE-2022-1198 | MEDIUM | 5.5 | 3.6 | 29.08.2022 | ||
| CVE-2022-1247 | HIGH | 7.0 | 5.9 | 31.08.2022 | ||
| CVE-2022-1263 | MEDIUM | 5.5 | 3.6 | 31.08.2022 | ||
| CVE-2022-1354 | MEDIUM | 5.5 | 3.6 | 31.08.2022 | ||
| CVE-2022-1355 | MEDIUM | 6.1 | 4.2 | 31.08.2022 | ||
| CVE-2022-1462 | MEDIUM | 6.3 | 5.2 | 02.06.2022 | ||
| CVE-2022-1586 | CRITICAL | 9.1 | 5.2 | 16.05.2022 | ||
| CVE-2022-1587 | CRITICAL | 9.1 | 5.2 | 16.05.2022 | ||
| CVE-2022-1652 | HIGH | 7.8 | 5.9 | 02.06.2022 | ||
| CVE-2022-1706 | MEDIUM | 6.5 | 3.6 | 17.05.2022 | ||
| CVE-2022-1708 | HIGH | 7.5 | 3.6 | 07.06.2022 | ||
| CVE-2022-1789 | MEDIUM | 6.8 | 5.9 | 02.06.2022 | ||
| CVE-2022-1852 | MEDIUM | 5.5 | 3.6 | 30.06.2022 | ||
| CVE-2022-1949 | HIGH | 7.5 | 3.6 | 02.06.2022 | ||
| CVE-2022-1998 | HIGH | 7.8 | 5.9 | 09.06.2022 | ||
| CVE-2022-2078 | MEDIUM | 5.5 | 3.6 | 30.06.2022 | ||
| CVE-2022-2127 | MEDIUM | 5.9 | 3.6 | 20.07.2023 | ||
| CVE-2022-2132 | HIGH | 8.6 | 4.0 | 31.08.2022 | ||
| CVE-2022-2153 | MEDIUM | 5.5 | 3.6 | 31.08.2022 | ||
| CVE-2022-2211 | MEDIUM | 6.5 | 3.6 | 12.07.2022 | ||
| CVE-2022-2393 | MEDIUM | 5.7 | 3.6 | 14.07.2022 | ||
| CVE-2022-24805 | HIGH | 8.8 | 5.9 | 16.04.2024 | ||
| CVE-2022-24806 | MEDIUM | 5.3 | 3.6 | 16.04.2024 | ||
| CVE-2022-24807 | MEDIUM | 6.5 | 3.6 | 16.04.2024 | ||
| CVE-2022-24808 | MEDIUM | 6.5 | 3.6 | 16.04.2024 | ||
| CVE-2022-24809 | MEDIUM | 6.5 | 3.6 | 16.04.2024 | ||
| CVE-2022-2509 | HIGH | 7.5 | 3.6 | 01.08.2022 | ||
| CVE-2022-25308 | HIGH | 7.8 | 5.9 | 06.09.2022 | ||
| CVE-2022-25309 | MEDIUM | 5.5 | 3.6 | 06.09.2022 | ||
| CVE-2022-25310 | MEDIUM | 5.5 | 3.6 | 06.09.2022 | ||
| CVE-2022-2625 | HIGH | 8.0 | 5.9 | 18.08.2022 | ||
| CVE-2022-2639 | HIGH | 7.8 | 5.9 | 01.09.2022 | ||
| CVE-2022-2850 | MEDIUM | 6.5 | 3.6 | 14.10.2022 | ||
| CVE-2022-2873 | MEDIUM | 5.5 | 3.6 | 22.08.2022 | ||
| CVE-2022-2963 | HIGH | 7.5 | 3.6 | 14.10.2022 | ||
| CVE-2022-2964 | HIGH | 7.8 | 5.9 | 09.09.2022 | ||
| CVE-2022-2989 | HIGH | 7.1 | 5.2 | 13.09.2022 | ||
| CVE-2022-2990 | HIGH | 7.1 | 5.2 | 13.09.2022 | ||
| CVE-2022-3424 | HIGH | 7.8 | 5.9 | 06.03.2023 | ||
| CVE-2022-34301 | MEDIUM | 6.7 | 5.9 | 26.08.2022 | ||
| CVE-2022-34302 | MEDIUM | 6.7 | 5.9 | 26.08.2022 | ||
| CVE-2022-34303 | MEDIUM | 6.7 | 5.9 | 26.08.2022 | ||
| CVE-2022-3500 | MEDIUM | 5.1 | 3.6 | 22.11.2022 | ||
| CVE-2022-3560 | MEDIUM | 5.5 | 3.6 | 02.02.2023 | ||
| CVE-2022-3707 | MEDIUM | 5.5 | 3.6 | 06.03.2023 | ||
| CVE-2022-3715 | HIGH | 7.8 | 5.9 | 05.01.2023 | ||
| CVE-2022-3787 | HIGH | 7.8 | 5.9 | 29.03.2023 | ||
| CVE-2022-3821 | MEDIUM | 5.5 | 3.6 | 08.11.2022 | ||
| CVE-2022-40982 | MEDIUM | 6.5 | 4.0 | 11.08.2023 | ||
| CVE-2022-4132 | MEDIUM | 5.9 | 3.6 | 04.10.2023 | ||
| CVE-2022-4283 | HIGH | 7.8 | 5.9 | 14.12.2022 | ||
| CVE-2022-4285 | MEDIUM | 5.5 | 3.6 | 27.01.2023 | ||
| CVE-2022-4743 | HIGH | 7.5 | 3.6 | 12.01.2023 | ||
| CVE-2022-4900 | MEDIUM | 5.5 | 3.6 | 02.11.2023 | ||
| CVE-2022-4904 | HIGH | 8.6 | 4.7 | 06.03.2023 | ||
| CVE-2023-0179 | HIGH | 7.8 | 5.9 | 27.03.2023 | ||
| CVE-2023-0361 | HIGH | 7.4 | 5.2 | 15.02.2023 | ||
| CVE-2023-0494 | HIGH | 7.8 | 5.9 | 27.03.2023 | ||
| CVE-2023-0664 | HIGH | 7.8 | 5.9 | 29.03.2023 | ||
| CVE-2023-0778 | MEDIUM | 6.8 | 5.2 | 27.03.2023 | ||
| CVE-2023-1073 | MEDIUM | 6.6 | 5.9 | 27.03.2023 | ||
| CVE-2023-1095 | MEDIUM | 5.5 | 3.6 | 28.02.2023 | ||
| CVE-2023-1183 | MEDIUM | 5.5 | 3.6 | 10.07.2023 | ||
| CVE-2023-1192 | MEDIUM | 6.5 | 3.6 | 01.11.2023 | ||
| CVE-2023-1206 | MEDIUM | 5.7 | 3.6 | 30.06.2023 | ||
| CVE-2023-1289 | MEDIUM | 5.5 | 3.6 | 23.03.2023 | ||
| CVE-2023-1380 | HIGH | 7.1 | 5.2 | 27.03.2023 | ||
| CVE-2023-1513 | LOW | 3.3 | 1.4 | 23.03.2023 | ||
| CVE-2023-1652 | HIGH | 7.1 | 5.2 | 29.03.2023 | ||
| CVE-2023-1667 | MEDIUM | 6.5 | 3.6 | 26.05.2023 | ||
| CVE-2023-1672 | MEDIUM | 5.3 | 3.6 | 11.07.2023 | ||
| CVE-2023-1729 | MEDIUM | 6.5 | 3.6 | 15.05.2023 | ||
| CVE-2023-1981 | MEDIUM | 5.5 | 3.6 | 26.05.2023 | ||
| CVE-2023-2019 | MEDIUM | 4.4 | 3.6 | 24.04.2023 | ||
| CVE-2023-2156 | HIGH | 7.5 | 3.6 | 09.05.2023 | ||
| CVE-2023-2194 | MEDIUM | 6.7 | 5.9 | 20.04.2023 | ||
| CVE-2023-2203 | HIGH | 8.8 | 5.9 | 17.05.2023 | ||
| CVE-2023-2283 | MEDIUM | 6.5 | 2.5 | 26.05.2023 | ||
| CVE-2023-2295 | HIGH | 7.5 | 3.6 | 17.05.2023 | ||
| CVE-2023-2454 | HIGH | 7.2 | 5.9 | 09.06.2023 | ||
| CVE-2023-2455 | MEDIUM | 5.4 | 2.5 | 09.06.2023 | ||
| CVE-2023-2491 | HIGH | 7.8 | 5.9 | 17.05.2023 | ||
| CVE-2023-2513 | MEDIUM | 6.7 | 5.9 | 08.05.2023 | ||
| CVE-2023-2602 | LOW | 3.3 | 1.4 | 06.06.2023 | ||
| CVE-2023-2603 | HIGH | 7.8 | 5.9 | 06.06.2023 | ||
| CVE-2023-2680 | HIGH | 8.2 | 6.0 | 13.09.2023 | ||
| CVE-2023-2700 | MEDIUM | 5.5 | 3.6 | 15.05.2023 | ||
| CVE-2023-2731 | MEDIUM | 5.5 | 3.6 | 17.05.2023 | ||
| CVE-2023-27561 | HIGH | 7.0 | 5.9 | 03.03.2023 | ||
| CVE-2023-28327 | MEDIUM | 5.5 | 3.6 | 19.04.2023 | ||
| CVE-2023-2953 | HIGH | 7.5 | 3.6 | 30.05.2023 | ||
| CVE-2023-2977 | HIGH | 7.1 | 5.2 | 01.06.2023 | ||
| CVE-2023-3019 | MEDIUM | 6.5 | 4.0 | 24.07.2023 | ||
| CVE-2023-3138 | HIGH | 7.5 | 3.6 | 28.06.2023 | ||
| CVE-2023-3161 | MEDIUM | 5.5 | 3.6 | 12.06.2023 | ||
| CVE-2023-3164 | MEDIUM | 5.5 | 3.6 | 02.11.2023 | ||
| CVE-2023-3212 | MEDIUM | 4.4 | 3.6 | 23.06.2023 | ||
| CVE-2023-32233 | HIGH | 7.8 | 5.9 | 08.05.2023 | ||
| CVE-2023-32373 | HIGH | 8.8 | 5.9 | 23.06.2023 | ||
| CVE-2023-3255 | MEDIUM | 6.5 | 3.6 | 13.09.2023 | ||
| CVE-2023-32573 | MEDIUM | 6.5 | 3.6 | 10.05.2023 | ||
| CVE-2023-3269 | HIGH | 7.8 | 5.9 | 11.07.2023 | ||
| CVE-2023-3301 | MEDIUM | 5.6 | 4.0 | 13.09.2023 | ||
| CVE-2023-33203 | MEDIUM | 6.4 | 5.9 | 18.05.2023 | ||
| CVE-2023-3347 | MEDIUM | 5.9 | 3.6 | 20.07.2023 | ||
| CVE-2023-3354 | HIGH | 7.5 | 3.6 | 11.07.2023 | ||
| CVE-2023-33951 | MEDIUM | 5.3 | 4.0 | 24.07.2023 | ||
| CVE-2023-33952 | MEDIUM | 6.7 | 5.9 | 24.07.2023 | ||
| CVE-2023-34966 | HIGH | 7.5 | 3.6 | 20.07.2023 | ||
| CVE-2023-34967 | MEDIUM | 5.3 | 1.4 | 20.07.2023 | ||
| CVE-2023-34968 | MEDIUM | 5.3 | 1.4 | 20.07.2023 | ||
| CVE-2023-3567 | HIGH | 7.1 | 5.2 | 24.07.2023 | ||
| CVE-2023-3576 | MEDIUM | 5.5 | 3.6 | 04.10.2023 | ||
| CVE-2023-3618 | MEDIUM | 6.5 | 3.6 | 12.07.2023 | ||
| CVE-2023-3640 | HIGH | 7.8 | 5.9 | 24.07.2023 | ||
| CVE-2023-3750 | MEDIUM | 5.3 | 3.6 | 24.07.2023 | ||
| CVE-2023-3772 | MEDIUM | 4.4 | 3.6 | 25.07.2023 | ||
| CVE-2023-3773 | MEDIUM | 4.4 | 3.6 | 25.07.2023 | ||
| CVE-2023-3812 | HIGH | 7.8 | 5.9 | 24.07.2023 | ||
| CVE-2023-38200 | HIGH | 7.5 | 3.6 | 24.07.2023 | ||
| CVE-2023-38201 | MEDIUM | 6.5 | 3.6 | 25.08.2023 | ||
| CVE-2023-38469 | MEDIUM | 5.5 | 3.6 | 02.11.2023 | ||
| CVE-2023-38470 | MEDIUM | 5.5 | 3.6 | 02.11.2023 | ||
| CVE-2023-38471 | MEDIUM | 5.5 | 3.6 | 02.11.2023 | ||
| CVE-2023-38472 | MEDIUM | 5.5 | 3.6 | 02.11.2023 | ||
| CVE-2023-38473 | MEDIUM | 5.5 | 3.6 | 02.11.2023 | ||
| CVE-2023-38559 | MEDIUM | 5.5 | 3.6 | 01.08.2023 | ||
| CVE-2023-3899 | HIGH | 7.8 | 5.9 | 23.08.2023 | ||
| CVE-2023-39189 | MEDIUM | 6.0 | 5.2 | 09.10.2023 | ||
| CVE-2023-39191 | HIGH | 8.2 | 6.0 | 04.10.2023 | ||
| CVE-2023-39193 | MEDIUM | 6.0 | 5.2 | 09.10.2023 | ||
| CVE-2023-39194 | MEDIUM | 4.4 | 3.6 | 09.10.2023 | ||
| CVE-2023-39198 | MEDIUM | 6.4 | 5.9 | 09.11.2023 | ||
| CVE-2023-39417 | HIGH | 8.8 | 5.9 | 11.08.2023 | ||
| CVE-2023-39418 | MEDIUM | 4.3 | 1.4 | 11.08.2023 | ||
| CVE-2023-3972 | HIGH | 7.8 | 5.9 | 01.11.2023 | ||
| CVE-2023-4001 | MEDIUM | 6.8 | 5.9 | 15.01.2024 | ||
| CVE-2023-4004 | HIGH | 7.8 | 5.9 | 31.07.2023 | ||
| CVE-2023-4010 | MEDIUM | 4.6 | 3.6 | 31.07.2023 | ||
| CVE-2023-40546 | MEDIUM | 5.5 | 3.6 | 29.01.2024 | ||
| CVE-2023-40547 | HIGH | 8.3 | 6.0 | 25.01.2024 | ||
| CVE-2023-40549 | MEDIUM | 5.5 | 3.6 | 29.01.2024 | ||
| CVE-2023-40550 | MEDIUM | 5.5 | 3.6 | 29.01.2024 | ||
| CVE-2023-40551 | MEDIUM | 5.1 | 4.2 | 29.01.2024 | ||
| CVE-2023-40660 | MEDIUM | 6.6 | 5.9 | 06.11.2023 | ||
| CVE-2023-40661 | MEDIUM | 6.4 | 5.9 | 06.11.2023 | ||
| CVE-2023-40745 | MEDIUM | 6.5 | 3.6 | 05.10.2023 | ||
| CVE-2023-41175 | MEDIUM | 6.5 | 3.6 | 05.10.2023 | ||
| CVE-2023-4133 | MEDIUM | 5.5 | 3.6 | 03.08.2023 | ||
| CVE-2023-4147 | HIGH | 7.8 | 5.9 | 07.08.2023 | ||
| CVE-2023-4155 | MEDIUM | 5.6 | 4.0 | 13.09.2023 | ||
| CVE-2023-4194 | MEDIUM | 5.5 | 3.6 | 07.08.2023 | ||
| CVE-2023-42669 | MEDIUM | 6.5 | 3.6 | 06.11.2023 | ||
| CVE-2023-4273 | MEDIUM | 6.7 | 5.9 | 09.08.2023 | ||
| CVE-2023-42753 | HIGH | 7.8 | 5.9 | 25.09.2023 | ||
| CVE-2023-42754 | MEDIUM | 5.5 | 3.6 | 05.10.2023 | ||
| CVE-2023-42756 | MEDIUM | 4.7 | 3.6 | 28.09.2023 | ||
| CVE-2023-43785 | MEDIUM | 5.5 | 3.6 | 10.10.2023 | ||
| CVE-2023-43786 | MEDIUM | 5.5 | 3.6 | 10.10.2023 | ||
| CVE-2023-43787 | HIGH | 7.8 | 5.9 | 10.10.2023 | ||
| CVE-2023-43788 | MEDIUM | 5.5 | 3.6 | 10.10.2023 | ||
| CVE-2023-43789 | MEDIUM | 5.5 | 3.6 | 12.10.2023 | ||
| CVE-2023-4387 | HIGH | 7.1 | 5.2 | 16.08.2023 | ||
| CVE-2023-44487 | HIGH | 7.5 | 3.6 | 10.10.2023 | ||
| CVE-2023-44488 | HIGH | 7.5 | 3.6 | 30.09.2023 | ||
| CVE-2023-4459 | MEDIUM | 5.5 | 3.6 | 21.08.2023 | ||
| CVE-2023-4527 | MEDIUM | 6.5 | 4.2 | 18.09.2023 | ||
| CVE-2023-4535 | LOW | 3.8 | 3.4 | 06.11.2023 | ||
| CVE-2023-4569 | MEDIUM | 5.5 | 3.6 | 28.08.2023 | ||
| CVE-2023-4641 | MEDIUM | 5.5 | 3.6 | 27.12.2023 | ||
| CVE-2023-46846 | MEDIUM | 5.3 | 1.4 | 03.11.2023 | ||
| CVE-2023-46847 | HIGH | 7.5 | 3.6 | 03.11.2023 | ||
| CVE-2023-46848 | HIGH | 7.5 | 3.6 | 03.11.2023 | ||
| CVE-2023-4692 | HIGH | 7.8 | 5.9 | 25.10.2023 | ||
| CVE-2023-4693 | MEDIUM | 4.6 | 3.6 | 25.10.2023 | ||
| CVE-2023-47038 | HIGH | 7.8 | 5.9 | 18.12.2023 | ||
| CVE-2023-4806 | MEDIUM | 5.9 | 3.6 | 18.09.2023 | ||
| CVE-2023-4813 | MEDIUM | 5.9 | 3.6 | 12.09.2023 | ||
| CVE-2023-48795 | MEDIUM | 5.9 | 3.6 | 18.12.2023 | ||
| CVE-2023-4911 | HIGH | 7.8 | 5.9 | 03.10.2023 | ||
| CVE-2023-50387 | HIGH | 7.5 | 3.6 | 14.02.2024 | ||
| CVE-2023-50781 | HIGH | 7.5 | 3.6 | 05.02.2024 | ||
| CVE-2023-50782 | HIGH | 7.5 | 3.6 | 05.02.2024 | ||
| CVE-2023-5088 | HIGH | 7.0 | 5.9 | 03.11.2023 | ||
| CVE-2023-5090 | MEDIUM | 5.5 | 3.6 | 06.11.2023 | ||
| CVE-2023-5156 | HIGH | 7.5 | 3.6 | 25.09.2023 | ||
| CVE-2023-5157 | HIGH | 7.5 | 3.6 | 27.09.2023 | ||
| CVE-2023-51764 | MEDIUM | 5.3 | 1.4 | 24.12.2023 | ||
| CVE-2023-51765 | MEDIUM | 5.3 | 1.4 | 24.12.2023 | ||
| CVE-2023-51767 | HIGH | 7.0 | 5.9 | 24.12.2023 | ||
| CVE-2023-5178 | HIGH | 8.8 | 5.9 | 01.11.2023 | ||
| CVE-2023-5215 | MEDIUM | 6.5 | 3.6 | 28.09.2023 | ||
| CVE-2023-52160 | MEDIUM | 6.5 | 3.6 | 22.02.2024 | ||
| CVE-2023-5217 | HIGH | 8.8 | 5.9 | 28.09.2023 | ||
| CVE-2023-52355 | HIGH | 7.5 | 3.6 | 25.01.2024 | ||
| CVE-2023-52356 | HIGH | 7.5 | 3.6 | 25.01.2024 | ||
| CVE-2023-5367 | HIGH | 7.8 | 5.9 | 25.10.2023 | ||
| CVE-2023-5380 | MEDIUM | 4.7 | 3.6 | 25.10.2023 | ||
| CVE-2023-5455 | MEDIUM | 6.5 | 3.6 | 10.01.2024 | ||
| CVE-2023-5557 | HIGH | 7.7 | 6.0 | 13.10.2023 | ||
| CVE-2023-5633 | HIGH | 7.8 | 5.9 | 23.10.2023 | ||
| CVE-2023-5824 | HIGH | 7.5 | 3.6 | 03.11.2023 | ||
| CVE-2023-5868 | MEDIUM | 4.3 | 1.4 | 10.12.2023 | ||
| CVE-2023-5869 | HIGH | 8.8 | 5.9 | 10.12.2023 | ||
| CVE-2023-5870 | MEDIUM | 4.4 | 3.6 | 10.12.2023 | ||
| CVE-2023-5871 | MEDIUM | 5.3 | 1.4 | 27.11.2023 | ||
| CVE-2023-5992 | MEDIUM | 5.9 | 3.6 | 31.01.2024 | ||
| CVE-2023-6004 | MEDIUM | 4.8 | 3.4 | 03.01.2024 | ||
| CVE-2023-6121 | MEDIUM | 4.3 | 1.4 | 16.11.2023 | ||
| CVE-2023-6176 | MEDIUM | 4.7 | 3.6 | 16.11.2023 | ||
| CVE-2023-6240 | MEDIUM | 6.5 | 4.2 | 04.02.2024 | ||
| CVE-2023-6356 | HIGH | 7.5 | 3.6 | 07.02.2024 | ||
| CVE-2023-6531 | HIGH | 7.0 | 5.9 | 21.01.2024 | ||
| CVE-2023-6535 | HIGH | 7.5 | 3.6 | 07.02.2024 | ||
| CVE-2023-6536 | HIGH | 7.5 | 3.6 | 07.02.2024 | ||
| CVE-2023-6546 | HIGH | 7.0 | 5.9 | 21.12.2023 | ||
| CVE-2023-6606 | HIGH | 7.1 | 5.2 | 08.12.2023 | ||
| CVE-2023-6610 | HIGH | 7.1 | 5.2 | 08.12.2023 | ||
| CVE-2023-6622 | MEDIUM | 5.5 | 3.6 | 08.12.2023 | ||
| CVE-2023-6679 | MEDIUM | 5.5 | 3.6 | 11.12.2023 | ||
| CVE-2023-6681 | MEDIUM | 5.3 | 1.4 | 12.02.2024 | ||
| CVE-2023-6683 | MEDIUM | 6.5 | 3.6 | 12.01.2024 | ||
| CVE-2023-6693 | MEDIUM | 5.3 | 3.4 | 02.01.2024 | ||
| CVE-2023-6710 | MEDIUM | 5.4 | 2.7 | 12.12.2023 | ||
| CVE-2023-6915 | MEDIUM | 5.5 | 3.6 | 15.01.2024 | ||
| CVE-2023-6917 | MEDIUM | 6.7 | 5.9 | 28.02.2024 | ||
| CVE-2023-6918 | MEDIUM | 5.3 | 1.4 | 19.12.2023 | ||
| CVE-2023-7192 | MEDIUM | 4.4 | 3.6 | 02.01.2024 | ||
| CVE-2023-7216 | MEDIUM | 5.3 | 3.4 | 05.02.2024 | ||
| CVE-2023-7250 | MEDIUM | 5.3 | 1.4 | 18.03.2024 | ||
| CVE-2024-0193 | MEDIUM | 6.7 | 5.9 | 02.01.2024 | ||
| CVE-2024-0217 | LOW | 3.3 | 1.4 | 03.01.2024 | ||
| CVE-2024-0229 | HIGH | 7.8 | 5.9 | 09.02.2024 | ||
| CVE-2024-0232 | MEDIUM | 5.5 | 3.6 | 16.01.2024 | ||
| CVE-2024-0408 | MEDIUM | 5.5 | 3.6 | 18.01.2024 | ||
| CVE-2024-0409 | HIGH | 7.8 | 5.9 | 18.01.2024 | ||
| CVE-2024-0443 | MEDIUM | 5.5 | 3.6 | 12.01.2024 | ||
| CVE-2024-0553 | HIGH | 7.5 | 3.6 | 16.01.2024 | ||
| CVE-2024-0562 | HIGH | 7.8 | 5.9 | 15.01.2024 | ||
| CVE-2024-0564 | MEDIUM | 6.5 | 3.6 | 30.01.2024 | ||
| CVE-2024-0607 | MEDIUM | 6.6 | 4.7 | 18.01.2024 | ||
| CVE-2024-0639 | MEDIUM | 5.5 | 3.6 | 17.01.2024 | ||
| CVE-2024-0641 | MEDIUM | 5.5 | 3.6 | 17.01.2024 | ||
| CVE-2024-0646 | HIGH | 7.8 | 5.9 | 17.01.2024 | ||
| CVE-2024-0690 | MEDIUM | 5.5 | 3.6 | 06.02.2024 | ||
| CVE-2024-0775 | HIGH | 7.1 | 5.2 | 22.01.2024 | ||
| CVE-2024-0841 | HIGH | 7.8 | 5.9 | 28.01.2024 | ||
| CVE-2024-0914 | MEDIUM | 5.9 | 3.6 | 31.01.2024 | ||
| CVE-2024-1048 | LOW | 3.3 | 1.4 | 06.02.2024 | ||
| CVE-2024-1151 | MEDIUM | 5.5 | 3.6 | 11.02.2024 | ||
| CVE-2024-12085 | HIGH | 7.5 | 3.6 | 14.01.2025 | ||
| CVE-2024-12086 | MEDIUM | 6.8 | 4.0 | 14.01.2025 | ||
| CVE-2024-12087 | HIGH | 7.5 | 3.6 | 14.01.2025 | ||
| CVE-2024-12088 | HIGH | 7.5 | 3.6 | 14.01.2025 | ||
| CVE-2024-1454 | LOW | 3.4 | 2.7 | 12.02.2024 | ||
| CVE-2024-1488 | HIGH | 7.3 | 5.5 | 15.02.2024 | ||
| CVE-2024-23301 | MEDIUM | 5.5 | 3.6 | 12.01.2024 | ||
| CVE-2024-2496 | MEDIUM | 5.5 | 3.6 | 18.03.2024 | ||
| CVE-2024-3049 | MEDIUM | 5.9 | 3.6 | 06.06.2024 | ||
| CVE-2024-3056 | MEDIUM | 4.8 | 3.6 | 02.08.2024 | ||
| CVE-2024-3567 | MEDIUM | 5.5 | 3.6 | 10.04.2024 | ||
| CVE-2024-44070 | HIGH | 7.5 | 3.6 | 19.08.2024 | ||
| CVE-2024-45615 | LOW | 3.9 | 3.4 | 03.09.2024 | ||
| CVE-2024-45616 | LOW | 3.9 | 3.4 | 03.09.2024 | ||
| CVE-2024-45617 | LOW | 3.9 | 3.4 | 03.09.2024 | ||
| CVE-2024-45618 | LOW | 3.9 | 3.4 | 03.09.2024 | ||
| CVE-2024-45619 | MEDIUM | 4.3 | 3.4 | 03.09.2024 | ||
| CVE-2024-45620 | LOW | 3.9 | 3.4 | 03.09.2024 | ||
| CVE-2024-45777 | MEDIUM | 6.7 | 5.9 | 19.02.2025 | ||
| CVE-2024-45778 | MEDIUM | 5.5 | 3.6 | 03.03.2025 | ||
| CVE-2024-45782 | HIGH | 7.8 | 5.9 | 03.03.2025 | ||
| CVE-2024-49393 | MEDIUM | 5.9 | 3.6 | 12.11.2024 | ||
| CVE-2024-49394 | MEDIUM | 5.3 | 1.4 | 12.11.2024 | ||
| CVE-2024-49395 | MEDIUM | 5.3 | 1.4 | 12.11.2024 | ||
| CVE-2024-50074 | HIGH | 7.8 | 5.9 | 29.10.2024 | ||
| CVE-2024-5742 | MEDIUM | 6.7 | 5.9 | 12.06.2024 | ||
| CVE-2024-6237 | MEDIUM | 6.5 | 3.6 | 09.07.2024 | ||
| CVE-2024-6239 | HIGH | 7.5 | 3.6 | 21.06.2024 | ||
| CVE-2024-6387 | HIGH | 8.1 | 5.9 | 01.07.2024 | ||
| CVE-2024-6505 | MEDIUM | 6.8 | 4.0 | 05.07.2024 | ||
| CVE-2024-7006 | HIGH | 7.5 | 3.6 | 12.08.2024 | ||
| CVE-2024-8354 | MEDIUM | 5.5 | 3.6 | 19.09.2024 | ||
| CVE-2024-8443 | LOW | 2.9 | 2.5 | 10.09.2024 | ||
| CVE-2024-9341 | HIGH | 8.2 | 4.7 | 01.10.2024 | ||
| CVE-2024-9675 | MEDIUM | 4.4 | 2.5 | 09.10.2024 | ||
| CVE-2024-9676 | MEDIUM | 6.5 | 3.6 | 15.10.2024 | ||
| CVE-2025-0678 | HIGH | 7.8 | 5.9 | 03.03.2025 | ||
| CVE-2025-26465 | MEDIUM | 6.8 | 5.2 | 18.02.2025 | ||
| CVE-2025-26594 | HIGH | 7.8 | 5.9 | 25.02.2025 | ||
| CVE-2025-26595 | HIGH | 7.8 | 5.9 | 25.02.2025 | ||
| CVE-2025-26596 | HIGH | 7.8 | 5.9 | 25.02.2025 | ||
| CVE-2025-26597 | HIGH | 7.8 | 5.9 | 25.02.2025 | ||
| CVE-2025-26598 | HIGH | 7.8 | 5.9 | 25.02.2025 | ||
| CVE-2025-26599 | HIGH | 7.8 | 5.9 | 25.02.2025 | ||
| CVE-2025-26600 | HIGH | 7.8 | 5.9 | 25.02.2025 | ||
| CVE-2025-26601 | HIGH | 7.8 | 5.9 | 25.02.2025 | ||
| CVE-2025-2784 | MEDIUM | 6.5 | 2.5 | 03.04.2025 | ||
| CVE-2025-3155 | HIGH | 7.4 | 4.0 | 03.04.2025 | ||
| CVE-2025-32988 | HIGH | 8.2 | 4.2 | 10.07.2025 | ||
| CVE-2025-32989 | MEDIUM | 5.3 | 1.4 | 10.07.2025 | ||
| CVE-2025-32990 | HIGH | 8.2 | 4.2 | 10.07.2025 | ||
| CVE-2025-3891 | HIGH | 7.5 | 3.6 | 29.04.2025 | ||
| CVE-2025-4598 | MEDIUM | 4.7 | 3.6 | 30.05.2025 | ||
| CVE-2025-46397 | HIGH | 7.8 | 5.9 | 23.04.2025 | ||
| CVE-2025-46399 | MEDIUM | 5.5 | 3.6 | 23.04.2025 | ||
| CVE-2025-46400 | MEDIUM | 5.5 | 3.6 | 23.04.2025 | ||
| CVE-2025-47711 | MEDIUM | 6.5 | 3.6 | 09.06.2025 | ||
| CVE-2025-5318 | HIGH | 8.1 | 5.2 | 24.06.2025 | ||
| CVE-2025-5351 | MEDIUM | 6.5 | 3.6 | 04.07.2025 | ||
| CVE-2025-5372 | HIGH | 8.8 | 5.9 | 04.07.2025 | ||
| CVE-2025-5914 | CRITICAL | 9.8 | 5.9 | 09.06.2025 | ||
| CVE-2025-5915 | MEDIUM | 6.6 | 5.2 | 09.06.2025 | ||
| CVE-2025-5916 | MEDIUM | 5.6 | 4.2 | 09.06.2025 | ||
| CVE-2025-5917 | MEDIUM | 5.0 | 3.6 | 09.06.2025 | ||
| CVE-2025-5918 | MEDIUM | 6.6 | 5.2 | 09.06.2025 | ||
| CVE-2025-6021 | HIGH | 7.5 | 3.6 | 12.06.2025 | ||
| CVE-2025-6170 | LOW | 2.5 | 1.4 | 16.06.2025 | ||
| CVE-2025-7424 | HIGH | 7.5 | 3.6 | 10.07.2025 | ||
| CVE-2025-7519 | MEDIUM | 6.7 | 5.9 | 14.07.2025 | ||
| CVE-2025-8283 | LOW | 3.7 | 1.4 | 28.07.2025 | ||
| CVE-2025-9784 | HIGH | 7.5 | 3.6 | 02.09.2025 | ||
Showing 5 out of 342.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 5022,
"dgst": "6eef362598bc0d76",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": []
},
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:9.1:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"9"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2025-5351",
"CVE-2024-12085",
"CVE-2023-2731",
"CVE-2023-2455",
"CVE-2023-43788",
"CVE-2024-5742",
"CVE-2021-3697",
"CVE-2022-1586",
"CVE-2023-48795",
"CVE-2023-5380",
"CVE-2023-4133",
"CVE-2023-52160",
"CVE-2023-42754",
"CVE-2022-3821",
"CVE-2025-3891",
"CVE-2022-1949",
"CVE-2023-43789",
"CVE-2023-6121",
"CVE-2023-4806",
"CVE-2024-6237",
"CVE-2023-2454",
"CVE-2024-8354",
"CVE-2021-35937",
"CVE-2024-0229",
"CVE-2023-0664",
"CVE-2023-2156",
"CVE-2025-5916",
"CVE-2021-3695",
"CVE-2023-6917",
"CVE-2022-1355",
"CVE-2023-2700",
"CVE-2024-45620",
"CVE-2024-0562",
"CVE-2023-32233",
"CVE-2023-0778",
"CVE-2023-6679",
"CVE-2023-6546",
"CVE-2025-5372",
"CVE-2023-51764",
"CVE-2023-42669",
"CVE-2023-2194",
"CVE-2022-1263",
"CVE-2022-2078",
"CVE-2023-3812",
"CVE-2023-2491",
"CVE-2023-4004",
"CVE-2023-2680",
"CVE-2023-3301",
"CVE-2022-1852",
"CVE-2022-3787",
"CVE-2022-25309",
"CVE-2024-9341",
"CVE-2025-5914",
"CVE-2023-40660",
"CVE-2024-0443",
"CVE-2022-1198",
"CVE-2021-3864",
"CVE-2021-3696",
"CVE-2025-46399",
"CVE-2024-0690",
"CVE-2023-43785",
"CVE-2023-6004",
"CVE-2022-3715",
"CVE-2025-26599",
"CVE-2023-52355",
"CVE-2023-51765",
"CVE-2023-1073",
"CVE-2022-4743",
"CVE-2022-3500",
"CVE-2023-4001",
"CVE-2023-43786",
"CVE-2025-32988",
"CVE-2023-41175",
"CVE-2023-6710",
"CVE-2021-35938",
"CVE-2023-39194",
"CVE-2024-0193",
"CVE-2024-45777",
"CVE-2022-1462",
"CVE-2022-1998",
"CVE-2022-4900",
"CVE-2023-2283",
"CVE-2023-6536",
"CVE-2023-2977",
"CVE-2022-24805",
"CVE-2022-1708",
"CVE-2023-5869",
"CVE-2023-6531",
"CVE-2023-7216",
"CVE-2025-26594",
"CVE-2023-5088",
"CVE-2023-6535",
"CVE-2023-44487",
"CVE-2023-50387",
"CVE-2023-38473",
"CVE-2022-1652",
"CVE-2023-4147",
"CVE-2023-6606",
"CVE-2022-0987",
"CVE-2023-34966",
"CVE-2024-45619",
"CVE-2023-1652",
"CVE-2025-5915",
"CVE-2024-1488",
"CVE-2025-4598",
"CVE-2023-3138",
"CVE-2023-1729",
"CVE-2023-3567",
"CVE-2021-3839",
"CVE-2023-39198",
"CVE-2023-39193",
"CVE-2024-8443",
"CVE-2023-1183",
"CVE-2025-47711",
"CVE-2023-4010",
"CVE-2022-0934",
"CVE-2023-4273",
"CVE-2023-6610",
"CVE-2023-3750",
"CVE-2023-39418",
"CVE-2023-1672",
"CVE-2023-40546",
"CVE-2023-2295",
"CVE-2023-5633",
"CVE-2023-1667",
"CVE-2025-26596",
"CVE-2022-1247",
"CVE-2023-5178",
"CVE-2024-0232",
"CVE-2025-26600",
"CVE-2023-34967",
"CVE-2023-3255",
"CVE-2023-40551",
"CVE-2023-3640",
"CVE-2024-6239",
"CVE-2023-6915",
"CVE-2023-39191",
"CVE-2025-7424",
"CVE-2023-2603",
"CVE-2023-5217",
"CVE-2024-0607",
"CVE-2022-3560",
"CVE-2025-26601",
"CVE-2023-4641",
"CVE-2023-46847",
"CVE-2023-5367",
"CVE-2025-7519",
"CVE-2023-6683",
"CVE-2024-45615",
"CVE-2024-12087",
"CVE-2024-1151",
"CVE-2022-25308",
"CVE-2023-3019",
"CVE-2023-47038",
"CVE-2023-43787",
"CVE-2024-9676",
"CVE-2023-50781",
"CVE-2022-24809",
"CVE-2024-49395",
"CVE-2022-3707",
"CVE-2025-0678",
"CVE-2023-3773",
"CVE-2023-5868",
"CVE-2023-5824",
"CVE-2023-40549",
"CVE-2023-3618",
"CVE-2023-52356",
"CVE-2024-12086",
"CVE-2025-5918",
"CVE-2022-2850",
"CVE-2025-46400",
"CVE-2025-2784",
"CVE-2024-23301",
"CVE-2022-4285",
"CVE-2025-6170",
"CVE-2024-0217",
"CVE-2023-5157",
"CVE-2025-32990",
"CVE-2023-6681",
"CVE-2024-49394",
"CVE-2022-2963",
"CVE-2022-25310",
"CVE-2022-2990",
"CVE-2023-33952",
"CVE-2023-28327",
"CVE-2025-26465",
"CVE-2024-0841",
"CVE-2022-40982",
"CVE-2023-4387",
"CVE-2022-3424",
"CVE-2022-1587",
"CVE-2016-7091",
"CVE-2024-49393",
"CVE-2022-1184",
"CVE-2025-26598",
"CVE-2023-38470",
"CVE-2022-34301",
"CVE-2022-24808",
"CVE-2023-4693",
"CVE-2024-0775",
"CVE-2023-4459",
"CVE-2024-45778",
"CVE-2023-3576",
"CVE-2023-2953",
"CVE-2023-6693",
"CVE-2025-32989",
"CVE-2022-1158",
"CVE-2024-9675",
"CVE-2023-4569",
"CVE-2024-3056",
"CVE-2023-50782",
"CVE-2022-2873",
"CVE-2022-0171",
"CVE-2024-0646",
"CVE-2023-5871",
"CVE-2022-4132",
"CVE-2023-38469",
"CVE-2025-6021",
"CVE-2023-40547",
"CVE-2024-6387",
"CVE-2022-1016",
"CVE-2021-4204",
"CVE-2021-4217",
"CVE-2023-4692",
"CVE-2024-1048",
"CVE-2023-38471",
"CVE-2025-3155",
"CVE-2023-5455",
"CVE-2023-4194",
"CVE-2023-7192",
"CVE-2024-45618",
"CVE-2023-1513",
"CVE-2024-44070",
"CVE-2024-45782",
"CVE-2021-4158",
"CVE-2024-6505",
"CVE-2022-0168",
"CVE-2023-7250",
"CVE-2023-4911",
"CVE-2022-2964",
"CVE-2025-26595",
"CVE-2023-2513",
"CVE-2024-0639",
"CVE-2023-6240",
"CVE-2025-8283",
"CVE-2023-2203",
"CVE-2023-4813",
"CVE-2025-26597",
"CVE-2024-50074",
"CVE-2023-38201",
"CVE-2025-5318",
"CVE-2023-4527",
"CVE-2023-3354",
"CVE-2023-42756",
"CVE-2024-0409",
"CVE-2023-40745",
"CVE-2023-46848",
"CVE-2023-6622",
"CVE-2023-27561",
"CVE-2023-6176",
"CVE-2022-2393",
"CVE-2023-3347",
"CVE-2023-44488",
"CVE-2025-46397",
"CVE-2023-0179",
"CVE-2023-51767",
"CVE-2022-2211",
"CVE-2023-1289",
"CVE-2023-5870",
"CVE-2023-0361",
"CVE-2023-6356",
"CVE-2023-5156",
"CVE-2023-5215",
"CVE-2024-3567",
"CVE-2023-3899",
"CVE-2023-34968",
"CVE-2020-14394",
"CVE-2023-3161",
"CVE-2023-32373",
"CVE-2023-1380",
"CVE-2023-32573",
"CVE-2023-40550",
"CVE-2023-42753",
"CVE-2023-3212",
"CVE-2023-1095",
"CVE-2023-5090",
"CVE-2023-1192",
"CVE-2024-1454",
"CVE-2023-1206",
"CVE-2022-34302",
"CVE-2023-3164",
"CVE-2023-1981",
"CVE-2023-39189",
"CVE-2023-3972",
"CVE-2022-2509",
"CVE-2023-0494",
"CVE-2024-12088",
"CVE-2024-0553",
"CVE-2024-0914",
"CVE-2023-40661",
"CVE-2022-4283",
"CVE-2024-45617",
"CVE-2023-5992",
"CVE-2022-2639",
"CVE-2022-0480",
"CVE-2023-4155",
"CVE-2024-0641",
"CVE-2023-5557",
"CVE-2024-2496",
"CVE-2024-45616",
"CVE-2022-1789",
"CVE-2022-2989",
"CVE-2024-3049",
"CVE-2022-4904",
"CVE-2022-2132",
"CVE-2024-7006",
"CVE-2022-24807",
"CVE-2023-6918",
"CVE-2023-39417",
"CVE-2022-34303",
"CVE-2023-33203",
"CVE-2024-0408",
"CVE-2023-38200",
"CVE-2023-2019",
"CVE-2023-38559",
"CVE-2023-4535",
"CVE-2021-3997",
"CVE-2025-9784",
"CVE-2022-1354",
"CVE-2022-1706",
"CVE-2023-46846",
"CVE-2023-3772",
"CVE-2023-33951",
"CVE-2022-2625",
"CVE-2023-38472",
"CVE-2024-0564",
"CVE-2022-2153",
"CVE-2022-24806",
"CVE-2023-3269",
"CVE-2025-5917",
"CVE-2023-2602",
"CVE-2022-2127"
]
},
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
},
"ECDH": {
"ECDH": 4
},
"ECDSA": {
"ECDSA": 36
}
},
"FF": {
"DH": {
"DH": 27,
"Diffie-Hellman": 6
},
"DSA": {
"DSA": 7
}
}
},
"certification_process": {},
"cipher_mode": {
"GCM": {
"GCM": 14
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"NSS": {
"NSS": 6
}
},
"crypto_protocol": {
"IKE": {
"IKE": 7,
"IKEv1": 2,
"IKEv2": 19
},
"TLS": {
"SSL": {
"SSL": 2
},
"TLS": {
"TLS": 14,
"TLS 1.2": 14,
"TLS 1.3": 4,
"TLS v1.2": 4
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"MAC": {
"MAC": 13
}
},
"device_model": {},
"ecc_curve": {
"Edwards": {
"Ed25519": 2
},
"NIST": {
"P-256": 18,
"P-384": 8,
"P-521": 20
}
},
"eval_facility": {
"atsec": {
"atsec": 2
}
},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"- PKCS 1": 2,
"HMAC- SHA-1": 1,
"HMAC-SHA-1": 6,
"HMAC-SHA-256": 6,
"PKCS 1": 2,
"PKCS#1": 10,
"PKCS#11": 2,
"PKCS#12": 6,
"PKCS#5": 6,
"PKCS#7": 2,
"SHA- 256": 1,
"SHA-1": 14,
"SHA-224": 2,
"SHA-256": 7,
"SHA-384": 3,
"SHA-512": 3,
"SHA2- 256": 2,
"SHA2- 512": 3,
"SHA2-224": 7,
"SHA2-256": 17,
"SHA2-384": 11,
"SHA2-512": 10
}
},
"fips_security_level": {
"Level": {
"Level 1": 3
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 12
}
},
"PBKDF": {
"PBKDF": 9,
"PBKDF2": 6
},
"SHA": {
"SHA1": {
"SHA-1": 14
},
"SHA2": {
"SHA-224": 2,
"SHA-256": 7,
"SHA-384": 3,
"SHA-512": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"curves": {
"X25519": 4
}
},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 24
},
"RNG": {
"RBG": 2,
"RNG": 1
}
},
"side_channel_analysis": {
"SCA": {
"Timing attacks": 1,
"timing attack": 1,
"timing attacks": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140-3": 11,
"FIPS 180-4": 4,
"FIPS 186-4": 2,
"FIPS 186-5": 10,
"FIPS 198-1": 5,
"FIPS PUB 140-3": 1,
"FIPS186-2": 2,
"FIPS186-4": 2,
"FIPS186-5": 26
},
"NIST": {
"SP 800-108": 1,
"SP 800-132": 7,
"SP 800-135": 2,
"SP 800-38A": 7,
"SP 800-38B": 1,
"SP 800-38D": 3,
"SP 800-38F": 4,
"SP 800-56A": 3,
"SP 800-56C": 1,
"SP 800-90A": 1
},
"PKCS": {
"PKCS 1": 2,
"PKCS#1": 5,
"PKCS#11": 1,
"PKCS#12": 3,
"PKCS#5": 3,
"PKCS#7": 1
},
"RFC": {
"RFC 3526": 3,
"RFC 5288": 1,
"RFC 7627": 2,
"RFC 7919": 3,
"RFC7627": 4,
"RFC8446": 2
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 68,
"AES-": 1
},
"CAST": {
"CAST": 78
},
"RC": {
"RC2": 3,
"RC4": 3
}
},
"DES": {
"3DES": {
"Triple-DES": 4
},
"DES": {
"DES": 6
}
},
"constructions": {
"MAC": {
"CBC-MAC": 2,
"CMAC": 4,
"HMAC": 15,
"HMAC-SHA-256": 3
}
},
"djb": {
"ChaCha": {
"ChaCha20": 3
},
"Poly": {
"Poly1305": 1
}
},
"miscellaneous": {
"Camellia": {
"Camellia": 5
},
"SEED": {
"SEED": 5
}
}
},
"tee_name": {
"AMD": {
"PSP": 3
},
"IBM": {
"SSC": 2
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Pittinger, Zachary E. (Ctr)",
"/CreationDate": "D:20250527115112-04\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20250527115112-04\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"pdf_file_size_bytes": 628887,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.atsec.com/",
"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/using-the-system-wide-cryptographic-policies_security-hardening#switching-the-system-to-fips-mode_using-the-system-wide-cryptographic-policies",
"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/assembly_installing-the-system-in-fips-mode_security-hardening#proc_installing-the-system-with-fips-mode-enabled_assembly_installing-the-system-in-fips-mode"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 62
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_garbage": false,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_pdf_hash": "52dca28a463a572173be1abf584899581ed7748c36323751757ef25651d26fa1",
"policy_txt_hash": "4f84bf61d78fd506b72b99710d42bd98908a65912e8e8fe13815bfc67d6bce04"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in approved mode and installed, initialized and configured as specified in the Security Policy. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of minimum security of SSPs (e.g., keys, bit strings) that are externally loaded, or of SSPs established with externally loaded SSPs.",
"certificate_pdf_url": null,
"date_sunset": "2030-05-29",
"description": "Network Security Services (NSS) is a set of open source C libraries designed to support cross-platform development of security-enabled applications. NSS implements major Internet security standards. NSS is available free of charge under a variety of open source compatible licenses. See http://www.mozilla.org/projects/security/pki/nss/.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical security: N/A",
"Non-invasive security: N/A"
],
"fw_versions": null,
"historical_reason": null,
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "Red Hat Enterprise Linux 9 NSS Cryptographic Module",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-3",
"status": "active",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2025-05-30",
"lab": "atsec information security corporation",
"validation_type": "Initial"
}
],
"vendor": "Red Hat, Inc",
"vendor_url": "http://www.redhat.com"
}
}