This page was not yet optimized for use on mobile
devices.
Cisco Firepower Cryptographic Module
Known vulnerabilities detected
Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.Certificate #3261
Webpage information
Security policy
Symmetric Algorithms
AES, AES-256, RC4, DES, Triple-DES, HMACAsymmetric Algorithms
RSA 2048, ECDH, DH, Diffie-HellmanHash functions
SHA-1, MD5Protocols
SSHv2, SSH, SSL, TLSv1.2, TLS v1.2, TLSRandomness
DRBGElliptic Curves
P-256, P-521Block cipher modes
CBC, CTR, GCMVendor
Cisco, Cisco Systems, Inc, Cisco SystemsSecurity level
Level 1, level 1Standards
FIPS 140-2, FIPS PUB 140-2, FIPS 140, FIPS 186-4, NIST SP 800-90A, SP 800-90A, SP 800-52, RFC 5288, RFC 5246, RFC 4253File metadata
| Title | CISCO 831 Security Policy |
|---|---|
| Subject | FIPS 140-2 Security Policy |
| Author | Scott Shorter |
| Creation date | D:20180808171248-04'00' |
| Modification date | D:20180808171248-04'00' |
| Pages | 13 |
| Creator | Microsoft® Word 2013 |
| Producer | Microsoft® Word 2013 |
References
Incoming- 3286 - historical - Cisco Adaptive Security Appliances Cryptographic Module
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.CPE matches
Related CVEs
| ID | Links | Severity | CVSS Score | Published on | ||
|---|---|---|---|---|---|---|
| Base | Exploitability | Impact | ||||
| CVE-2018-0272 | MEDIUM | 5.9 | 3.6 | 19.04.2018 | ||
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 3261,
"dgst": "b98f7dad337a57c1",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"HMAC#2811",
"AES#4266",
"SHS#3512",
"RSA#2297",
"CVL#1008",
"Triple-DES#2307",
"DRBG#1337"
]
},
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:a:cisco:firepower:6.2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower:6.2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower:6.2.3.7:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"6.2"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"3286"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"3286"
]
},
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"3286"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"3286"
]
},
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2018-0272"
]
},
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 9
}
},
"FF": {
"DH": {
"DH": 17,
"Diffie-Hellman": 14
}
},
"RSA": {
"RSA 2048": 4
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"CTR": {
"CTR": 1
},
"GCM": {
"GCM": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 13,
"SSHv2": 26
},
"TLS": {
"SSL": {
"SSL": 1
},
"TLS": {
"TLS": 45,
"TLS v1.2": 2,
"TLSv1.2": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 6,
"P-521": 6
}
},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#1": 1,
"#1008": 2
}
},
"fips_certlike": {
"Certlike": {
"AES 128/192/256": 2,
"AES-256": 1,
"Diffie-Hellman (CVL Cert. #1008": 2,
"HMAC-SHA- 256/384": 2,
"HMAC-SHA- 512 512": 2,
"HMAC-SHA1": 4,
"HMAC-SHA256": 2,
"HMAC-SHA384": 2,
"HMAC-SHA512": 4,
"RSA 2048": 4,
"SHA-1": 1
}
},
"fips_security_level": {
"Level": {
"Level 1": 5,
"level 1": 1
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 4
}
},
"SHA": {
"SHA1": {
"SHA-1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 42
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140": 2,
"FIPS 140-2": 14,
"FIPS 186-4": 2,
"FIPS PUB 140-2": 1
},
"NIST": {
"NIST SP 800-90A": 1,
"SP 800-52": 1,
"SP 800-90A": 2
},
"RFC": {
"RFC 4253": 1,
"RFC 5246": 1,
"RFC 5288": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 5,
"AES-256": 1
},
"RC": {
"RC4": 2
}
},
"DES": {
"3DES": {
"Triple-DES": 6
},
"DES": {
"DES": 3
}
},
"constructions": {
"MAC": {
"HMAC": 4
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 15,
"Cisco Systems": 4,
"Cisco Systems, Inc": 12
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Scott Shorter",
"/CreationDate": "D:20180808171248-04\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2013",
"/ModDate": "D:20180808171248-04\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2013",
"/Subject": "FIPS 140-2 Security Policy",
"/Title": "CISCO 831 Security Policy",
"pdf_file_size_bytes": 936632,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.cisco.com/c/en/us/products/index.html",
"http://csrc.nist.gov/groups/STM/index.html",
"http://csrc.nist.gov/groups/STM/cmvp/validation.html",
"http://www.cisco.com/",
"http://www.cisco.com/c/en/us/support/security/asa-5500-series-next-generation-firewalls/products-installation-and-configuration-guides-list.html",
"http://www.cisco.com/en/US/products/ps6120/index.html"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 13
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "39e15c5acf482c1a1e14fd2b4c84857958de93b899bbe2743e2f453583f4caac",
"policy_txt_hash": "781fbc43a869b9250264111594da6d550ec20510837f227d301563f69aaf957c"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertAug2018.pdf",
"date_sunset": null,
"description": "The module is designed to help you handle network traffic in a way that complies with your organization\u0027s security policy for protecting your network. The system can affect the flow of traffic using access control, which allows you to specify, in a granular fashion, how to handle the traffic entering, exiting, and traversing your network. All the information gathered from it can be used to filter and control that traffic.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Roles, Services, and Authentication: Level 3",
"Design Assurance: Level 2",
"Mitigation of Other Attacks: N/A"
],
"fw_versions": "6.2",
"historical_reason": "SP 800-56Arev3 transition",
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "Cisco Firepower Cryptographic Module",
"module_type": "Firmware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": null,
"tested_conf": [
"[Cisco ASA 5506-X, Cisco ASA 5506H-X, Cisco ASA 5506W-X, Cisco ASA 5508-X, Cisco ASA 5516-X, Cisco ASA 5525-X, Cisco ASA 5545-X, Cisco ASA 5555-X] with Fire Linux OS 6.2"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2018-08-14",
"lab": "Gossamer Security Solutions",
"validation_type": "Initial"
}
],
"vendor": "Cisco Systems, Inc.",
"vendor_url": "http://www.cisco.com"
}
}