This page was not yet optimized for use on mobile
devices.
Cisco Catalyst 6506, Catalyst 6506-E, Catalyst 6509 and Catalyst 6509-E Switch with Catalyst 6500 Series VPN Services Port Adapter (ws-ipsec-2 and ws-ipsec-3)
Known vulnerabilities detected
Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.Certificate #1153
Webpage information
Security policy
Symmetric Algorithms
AES, DES, Triple-DES, HMACAsymmetric Algorithms
DH, Diffie-HellmanHash functions
SHA-1, MD5Schemes
Key ExchangeProtocols
SSH, IKE, IPsec, VPN, PGPRandomness
PRNG, RNGTrusted Execution Environments
SEVendor
Cisco Systems, Inc, Cisco, Cisco SystemsSecurity level
Level 2, level 1Side-channel analysis
SPA, malfunctionStandards
FIPS 140-2, RFC 1334File metadata
| Title | granikos_sp_1.5.fm |
|---|---|
| Author | Scott Shorter |
| Creation date | D:20080828134347Z00'00' |
| Modification date | D:20090527124329Z00'00' |
| Pages | 32 |
| Creator | FrameMaker 7.0 |
| Producer | Acrobat Distiller 5.0.5 (Windows) |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.CPE matches
Related CVEs
| ID | Links | Severity | CVSS Score | Published on | ||
|---|---|---|---|---|---|---|
| Base | Exploitability | Impact | ||||
| CVE-2003-1001 | MEDIUM | 5.0 | 2.9 | 05.01.2004 | ||
| CVE-2003-1002 | MEDIUM | 5.0 | 2.9 | 05.01.2004 | ||
| CVE-2005-4258 | HIGH | 7.8 | 6.9 | 15.12.2005 | ||
| CVE-2007-1258 | MEDIUM | 6.1 | 6.9 | 03.03.2007 | ||
| CVE-2007-5134 | MEDIUM | 5.0 | 2.9 | 27.09.2007 | ||
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 1153,
"dgst": "c28474616c0273f2",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"HMAC#348",
"Triple-DES#569",
"RNG#356",
"HMAC#549",
"AES#598",
"RNG#553",
"SHS#947",
"SHS#647"
]
},
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:h:cisco:catalyst_6509-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_6500-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_6506-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_6500:-:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"5.7",
"1.0",
"1.1",
"3.0",
"2.1",
"12.2",
"1.4"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2007-5134",
"CVE-2007-1258",
"CVE-2003-1002",
"CVE-2005-4258",
"CVE-2003-1001"
]
},
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"DH": 8,
"Diffie-Hellman": 6
}
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 21
},
"IPsec": {
"IPsec": 14
},
"PGP": {
"PGP": 2
},
"SSH": {
"SSH": 1
},
"VPN": {
"VPN": 63
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"HMAC SHA-1": 2,
"HMAC-SHA-1": 4,
"SHA-1": 9
}
},
"fips_security_level": {
"Level": {
"Level 2": 4,
"level 1": 1
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 1
}
},
"SHA": {
"SHA1": {
"SHA-1": 9
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 5
},
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"malfunction": 1
},
"SCA": {
"SPA": 10
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 20
},
"RFC": {
"RFC 1334": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 8
}
},
"DES": {
"3DES": {
"Triple-DES": 11
},
"DES": {
"DES": 2
}
},
"constructions": {
"MAC": {
"HMAC": 4
}
}
},
"tee_name": {
"IBM": {
"SE": 5
}
},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 115,
"Cisco Systems": 11,
"Cisco Systems, Inc": 6
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Scott Shorter",
"/CreationDate": "D:20080828134347Z00\u002700\u0027",
"/Creator": "FrameMaker 7.0",
"/ModDate": "D:20090527124329Z00\u002700\u0027",
"/Producer": "Acrobat Distiller 5.0.5 (Windows)",
"/Title": "granikos_sp_1.5.fm",
"pdf_file_size_bytes": 1598842,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.cisco.com/en/US/learning/index.html",
"http://www.cisco.com/techsupport/contacts",
"http://www.cisco.com/en/US/partner/ordering/",
"http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html",
"http://pgp.mit.edu:11371/pks/lookup?search=psirt%40cisco.com\u0026op=index\u0026exact=on",
"mailto:[email protected]",
"http://www.cisco.com/go/iqmagazine",
"http://www.cisco.com/techsupport/servicerequest",
"http://www.cisco.com",
"http://www.cisco.com/go/marketplace/",
"http://www.cisco.com/univercd/home/home.htm",
"http://www.cisco.com/univercd/cc/td/doc/es_inpck/pdi.htm",
"http://tools.cisco.com/RPF/register/register.do",
"mailto:[email protected]",
"http://www.cisco.com/packet",
"http://www.cisco.com/en/US/products/products_psirt_rss_feed.html",
"http://www.cisco.com/public/countries_languages.shtml",
"http://www.cisco.com/ipj",
"http://www.ciscopress.com",
"http://www.cisco.com/techsupport",
"http://www.cisco.com/go/psirt"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 32
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "0a35a2516f6cce70876e3e2f722a1429da6baa2b4bc33053b10ab63ce853b16d",
"policy_txt_hash": "a7585224275e5c1abae94c93da84cd58bd63bdc43f2f34e49cd7e61f64ddf048"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt1153.pdf",
"date_sunset": null,
"description": "The Catalyst 6500 series switches with the VPN Services Port Adapter offer versatility, integration, and security to branch offices. With numerous network modules and service modules available, the modular architecture of the Cisco router easily allows interfaces to be upgraded to accommodate network expansion. The Catalyst 6500 series switches provide a scalable, secure, manageable remote access server that meets FIPS 140-2 Level 2 requirements.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": null,
"fw_versions": "IOS 12.2(33)SXI and IOS 12.2(33)SXI1",
"historical_reason": "RNG SP800-131A Revision 1 Transition",
"hw_versions": "6506, 6509, 6506-E and 6509-E; Backplane chassis: Hardware Versions 1.1(6506-E), 1.4 (6509-E) and 3.0 (6506, 6509); Supervisor Blade: Hardware Versions 5.7 (SUP720-3B), 5.7 (SUP720-3BXL) and 2.1 (SUP720-10GbE); IPSec VPN SPA: Hardware Version 1.0",
"level": 2,
"mentioned_certs": {},
"module_name": "Cisco Catalyst 6506, Catalyst 6506-E, Catalyst 6509 and Catalyst 6509-E Switch with Catalyst 6500 Series VPN Services Port Adapter (ws-ipsec-2 and ws-ipsec-3)",
"module_type": "Hardware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2009-07-01",
"lab": "SAIC-VA",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2010-05-28",
"lab": "",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2012-02-23",
"lab": "",
"validation_type": "Update"
}
],
"vendor": "Cisco Systems, Inc.",
"vendor_url": "http://www.cisco.com"
}
}