This page was not yet optimized for use on mobile
devices.
Windows Vista Boot Manager (bootmgr)
Known vulnerabilities detected
Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.Certificate #978
Webpage information
Security policy
Symmetric Algorithms
AES, HMAC-SHA-256Hash functions
SHA-1, SHA-256Vendor
MicrosoftStandards
FIPS 140-2, PKCS#1File metadata
| Title | Windows Vista Bootmgr FIPS Security Policy_SP2 |
|---|---|
| Author | jmaresca |
| Creation date | D:20090716140810-04'00' |
| Modification date | D:20090716140810-04'00' |
| Pages | 5 |
| Creator | PDFCreator Version 0.9.7 |
| Producer | GPL Ghostscript 8.63 |
References
IncomingHeuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.CPE matches
- cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:arm64:*
- cpe:2.3:o:microsoft:windows_vista:-:*:x64:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:-:*:x86:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:business:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:business:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:business_n:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:business_n:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:enterprise:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:enterprise:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_basic:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_basic:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_basic_n:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_basic_n:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_premium:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_premium:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:starter:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:ultimate:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:-:*:*:ultimate:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:beta1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:-:beta2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:-:gold:*:*:*:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:-:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:-:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:business:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:business:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:business_n:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:business_n:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:enterprise:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:enterprise:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_basic:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_basic:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_basic_n:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_basic_n:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_premium:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_premium:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:starter:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:ultimate:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:ultimate:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:-:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:business:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:business:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:business_n:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:business_n:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:enterprise:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:enterprise:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_basic:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_basic:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_basic_n:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_basic_n:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_premium:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_premium:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:starter:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:ultimate:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:ultimate:*:x86:*
Related CVEs
| ID | Links | Severity | CVSS Score | Published on |
|---|---|---|---|---|
| Base score | ||||
| CVE-2012-5362 | HIGH | 7.5 | 20.02.2020 | |
| CVE-2012-5364 | HIGH | 7.5 | 20.02.2020 | |
| CVE-2018-0598 | HIGH | 7.8 | 26.06.2018 | |
| CVE-2018-0599 | HIGH | 7.8 | 26.06.2018 | |
| CVE-2018-7249 | HIGH | 7.0 | 26.02.2018 | |
| CVE-2018-7250 | MEDIUM | 5.5 | 26.02.2018 | |
| CVE-2021-36958 | HIGH | 9.3 | 12.08.2021 |
Showing 5 out of 7.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 978,
"dgst": "759b87b87ba0c0c7",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"SHS#753",
"AES#739",
"RSA#354",
"HMAC#415"
]
},
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:ultimate:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_basic_n:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:ultimate:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_basic:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:business:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:business_n:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:business_n:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:ultimate:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:business:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:beta1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:-:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:*:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_basic_n:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:business_n:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_basic:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:beta2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:-:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:ultimate:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:enterprise:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_basic:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_basic_n:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_basic:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:business:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:starter:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:enterprise:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:business_n:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:gold:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_premium:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_premium:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_basic:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_premium:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:business_n:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:business:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:business:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:enterprise:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_basic_n:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:starter:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_basic_n:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:enterprise:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_basic:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:business_n:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:enterprise:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:home_premium:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:enterprise:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:starter:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_basic_n:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:ultimate:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:business:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:ultimate:*:x86:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:*:*:home_premium:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:home_premium:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:-:*:x64:*"
]
},
"direct_transitive_cves": {
"_type": "Set",
"elements": [
"CVE-2012-5364",
"CVE-2018-0599",
"CVE-2012-5362",
"CVE-2021-36958",
"CVE-2018-7249",
"CVE-2018-0598",
"CVE-2018-7250"
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": {
"_type": "Set",
"elements": [
"CVE-2019-1466",
"CVE-2021-36958",
"CVE-2018-7249",
"CVE-2019-5921",
"CVE-2018-0970",
"CVE-2022-21897",
"CVE-2018-0887",
"CVE-2018-0972",
"CVE-2018-7250",
"CVE-2023-34367",
"CVE-2018-0974",
"CVE-2019-1467",
"CVE-2018-0969",
"CVE-2018-0971",
"CVE-2019-1474",
"CVE-2022-21893",
"CVE-2018-0973",
"CVE-2012-5364",
"CVE-2018-0599",
"CVE-2018-0968",
"CVE-2012-5362",
"CVE-2018-6947",
"CVE-2018-8563",
"CVE-2018-0598",
"CVE-2018-0960",
"CVE-2019-1465",
"CVE-2018-0975"
]
},
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"979"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"1002",
"2162",
"1500",
"1003",
"980",
"1001",
"1053",
"1000",
"979"
]
},
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"1053",
"979"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"1002",
"1003",
"980",
"1001",
"1053",
"2009",
"1000",
"979"
]
},
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2012-5364",
"CVE-2018-0599",
"CVE-2012-5362",
"CVE-2021-36958",
"CVE-2018-7249",
"CVE-2018-0598",
"CVE-2018-7250"
]
},
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#354": 1,
"#415": 1,
"#739": 1,
"#753": 1
}
},
"fips_certlike": {
"Certlike": {
"HMAC-SHA-256": 5,
"HMAC-SHA-256 (Cert. #415": 1,
"PKCS#1": 3,
"RSA PKCS#1": 3,
"SHA-1": 1,
"SHA-256": 2,
"SHS (Cert. #753": 1
}
},
"fips_security_level": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-256": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 3
},
"PKCS": {
"PKCS#1": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 6
}
},
"constructions": {
"MAC": {
"HMAC-SHA-256": 3
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 6
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "jmaresca",
"/CreationDate": "D:20090716140810-04\u002700\u0027",
"/Creator": "PDFCreator Version 0.9.7",
"/Keywords": "",
"/ModDate": "D:20090716140810-04\u002700\u0027",
"/Producer": "GPL Ghostscript 8.63",
"/Subject": "",
"/Title": "Windows Vista Bootmgr FIPS Security Policy_SP2",
"pdf_file_size_bytes": 85062,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 5
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "331b27d16f5d3c795502a5eb6cc98bcdb1c80cb1bbff76251f14f82b908e5ae2",
"policy_txt_hash": "b68344a126ee2985537dcc2622877ad7522599f10dc9bd8a3fc93f4edcce4771"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt978.pdf",
"date_sunset": null,
"description": "This is the system boot manager, called by the bootstrapping code that resides in the boot sector. It checks its own integrity and then checks the integrity of the OS loader and launches it.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": null,
"fw_versions": null,
"historical_reason": "Moved to historical list due to sunsetting",
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "Windows Vista Boot Manager (bootmgr)",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": "6.0.6001.18000 and 6.0.6002.18005",
"tested_conf": [
"Microsoft Windows Vista Ultimate Edition SP1 (x64 version) (single-user mode)",
"Microsoft Windows Vista Ultimate Edition SP1 (x86 Version)"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2008-07-21",
"lab": "SAIC-VA",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2009-07-24",
"lab": "",
"validation_type": "Update"
}
],
"vendor": "Microsoft Corporation",
"vendor_url": "http://www.microsoft.com"
}
}