Cisco FIPS Object Module

Certificate #4036

Webpage information

Status historical
Historical reason Moved to historical list due to sunsetting
Validation dates 23.09.2021
Standard FIPS 140-2
Security level 1
Type Firmware
Embodiment Multi-Chip Stand Alone
Caveat When installed, initialized and configured as specified in the Security Policy Section 3 and operated in FIPS mode. No assurance of the minimum strength of generated keys
Exceptions
  • Design Assurance: Level 3
  • Mitigation of Other Attacks: N/A
Description The Cisco FIPS Object Module (FOM) is a firmware library that provides cryptographic services to a vast array of Cisco's networking and collaboration products. The module provides FIPS 140 validated cryptographic algorithms for services such as IPSEC, SRTP, SSH, TLS, 802.1x, etc. The module does not directly implement any of these protocols, instead it provides the cryptographic primitives and functions to allow a developer to implement the various protocols.
Version (Firmware) 7.2a
Tested configurations
  • Cisco ASA 5555 with Linux 4.1 with Intel Xeon X3460 without PAA
  • Cisco Catalyst 9200 with Linux 4.4 with ARM 8 Cortex-A53 AArch64 without PAA
  • Cisco Catalyst 9300 with Linux 4.4 with Intel Xeon D-1526 with PAA
  • Cisco Firepower 9300 with Linux 4.1 with Intel Xeon E5-2658 with PAA
  • Cisco ISR 4321 with Linux 5.4 with Intel Atom C2558 with PAA
  • Cisco ISR 4451 with Linux 5.4 with Intel Xeon E3-1105C with PAA
  • Cisco UCS M5 with Linux 4.18 with Intel Xeon Gold 6128 with PAA
  • Evaluation board with Linux 2.6 with Cavium Octeon CN5230 without PAA
Vendor Cisco Systems, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, AES-, DES, Triple-DES, HMAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DH, DSA
Hash functions
SHA-1, SHA-384, SHA-512, SHA-256, SHA256, SHA3-256, SHA-3, SHA3-384, SHA3-512, SHA3-224
Schemes
MAC, Key exchange, Key Exchange, Key agreement
Protocols
SSH, SSHv2, TLS, IKEv2, IKE
Randomness
DRBG, RNG
Libraries
OpenSSL
Elliptic Curves
P-224, P-256, P-384, P-521, K-233, K-283, K-409, K-571, B-233, B-283, B-409, B-571
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XEX, XTS

Vendor
Microsoft, Cisco Systems, Inc, Cisco, Cisco Systems

Security level
Level 1, level 1

Standards
FIPS 140-2, FIPS PUB 140-2, FIPS 186-4, NIST SP 800-38F, NIST SP 800-90A, SP 800-90A, SP 800-38D, NIST SP 800-133, RFC 5246, RFC 4253, RFC 5288

File metadata

Title CISCO FIPS Object Module Security Policy
Subject FIPS 140-2 Security Policy
Author Kelvin Desplanque (kdesplan)
Creation date D:20210915173526-04'00'
Modification date D:20210915173526-04'00'
Pages 26
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4036,
  "dgst": "bfeb4fe71a02b5c0",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "CVL#A1420",
        "KBKDF#A1420",
        "RSA#A1420",
        "AES#A1420",
        "SHS#A1420",
        "Triple-DES#A1420",
        "KAS-SSC#A1420",
        "ECDSA#A1420",
        "DRBG#A1420",
        "DSA#A1420",
        "HMAC#A1420",
        "SHA-3#A1420"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "7.2"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDH": {
            "ECDH": 3
          },
          "ECDSA": {
            "ECDSA": 5
          }
        },
        "FF": {
          "DH": {
            "DH": 3,
            "Diffie-Hellman": 5
          },
          "DSA": {
            "DSA": 5
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 5
        },
        "CCM": {
          "CCM": 3
        },
        "CFB": {
          "CFB": 1
        },
        "CTR": {
          "CTR": 5
        },
        "ECB": {
          "ECB": 4
        },
        "GCM": {
          "GCM": 6
        },
        "OFB": {
          "OFB": 5
        },
        "XEX": {
          "XEX": 1
        },
        "XTS": {
          "XTS": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 1
        }
      },
      "crypto_protocol": {
        "IKE": {
          "IKE": 1,
          "IKEv2": 8
        },
        "SSH": {
          "SSH": 6,
          "SSHv2": 2
        },
        "TLS": {
          "TLS": {
            "TLS": 10
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key agreement": 2
        },
        "KEX": {
          "Key Exchange": 1,
          "Key exchange": 1
        },
        "MAC": {
          "MAC": 3
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "B-233": 2,
          "B-283": 2,
          "B-409": 2,
          "B-571": 2,
          "K-233": 2,
          "K-283": 2,
          "K-409": 2,
          "K-571": 2,
          "P-224": 10,
          "P-256": 12,
          "P-384": 10,
          "P-521": 2
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1": 1,
          "#3": 1,
          "Certificate 1": 1,
          "Certificate 6": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES 128/192/256": 1,
          "DRBG 6": 1,
          "HMAC-SHA-1": 10,
          "HMAC-SHA1": 8,
          "HMAC-SHA224": 2,
          "HMAC-SHA256": 2,
          "HMAC-SHA384": 2,
          "HMAC-SHA512": 2,
          "SHA-1": 2,
          "SHA-256": 1,
          "SHA-3": 1,
          "SHA-3 (256": 1,
          "SHA-384": 1,
          "SHA-512": 1,
          "SHA2- 384": 1,
          "SHA2-224": 4,
          "SHA2-256": 3,
          "SHA2-384": 2,
          "SHA2-512": 2,
          "SHA2-512 2": 1,
          "SHA256": 1,
          "SHA3-224": 2,
          "SHA3-256": 4,
          "SHA3-384": 3,
          "SHA3-512": 3
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 3,
          "level 1": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          },
          "SHA2": {
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 1,
            "SHA256": 1
          },
          "SHA3": {
            "SHA-3": 2,
            "SHA3-224": 2,
            "SHA3-256": 4,
            "SHA3-384": 3,
            "SHA3-512": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 14
        },
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 23,
          "FIPS 186-4": 6,
          "FIPS PUB 140-2": 1
        },
        "NIST": {
          "NIST SP 800-133": 1,
          "NIST SP 800-38F": 1,
          "NIST SP 800-90A": 1,
          "SP 800-38D": 1,
          "SP 800-90A": 6
        },
        "RFC": {
          "RFC 4253": 1,
          "RFC 5246": 2,
          "RFC 5288": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 15,
            "AES-": 3
          }
        },
        "DES": {
          "3DES": {
            "Triple-DES": 12
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 6,
            "HMAC": 6
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 32,
          "Cisco Systems": 2,
          "Cisco Systems, Inc": 26
        },
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Kelvin Desplanque (kdesplan)",
      "/CreationDate": "D:20210915173526-04\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20210915173526-04\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "/Subject": "FIPS 140-2 Security Policy",
      "/Title": "CISCO FIPS Object Module Security Policy",
      "pdf_file_size_bytes": 652158,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://csrc.nist.gov/groups/STM/cmvp/validation.html",
          "http://www.cisco.com/",
          "http://csrc.nist.gov/groups/STM/index.html"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 26
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "ae551584199b873c51dabb78a7f4a935194a48a65f3374e03259dc9de6e81347",
    "policy_txt_hash": "64569c4d139d4dc4b32922554e0e93c5e96ff46b8bcc2f39c01fcb9fa23a17d5"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When installed, initialized and configured as specified in the Security Policy Section 3 and operated in FIPS mode. No assurance of the minimum strength of generated keys",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/September 2021_011021_0714_Signed2.pdf",
    "date_sunset": null,
    "description": "The Cisco FIPS Object Module (FOM) is a firmware library that provides cryptographic services to a vast array of Cisco\u0027s networking and collaboration products. The module provides FIPS 140 validated cryptographic algorithms for services such as IPSEC, SRTP, SSH, TLS, 802.1x, etc. The module does not directly implement any of these protocols, instead it provides the cryptographic primitives and functions to allow a developer to implement the various protocols.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Design Assurance: Level 3",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": "7.2a",
    "historical_reason": "Moved to historical list due to sunsetting",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "Cisco FIPS Object Module",
    "module_type": "Firmware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": null,
    "tested_conf": [
      "Cisco ASA 5555 with Linux 4.1 with Intel Xeon X3460 without PAA",
      "Cisco Catalyst 9200 with Linux 4.4 with ARM 8 Cortex-A53 AArch64 without PAA",
      "Cisco Catalyst 9300 with Linux 4.4 with Intel Xeon D-1526 with PAA",
      "Cisco Firepower 9300 with Linux 4.1 with Intel Xeon E5-2658 with PAA",
      "Cisco ISR 4321 with Linux 5.4 with Intel Atom C2558 with PAA",
      "Cisco ISR 4451 with Linux 5.4 with Intel Xeon E3-1105C with PAA",
      "Cisco UCS M5 with Linux 4.18 with Intel Xeon Gold 6128 with PAA",
      "Evaluation board with Linux 2.6 with Cavium Octeon CN5230 without PAA"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2021-09-23",
        "lab": "Acumen Security",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Cisco Systems, Inc.",
    "vendor_url": "http://www.cisco.com"
  }
}