Microsoft Windows Server 2008 R2 Kernel Mode Cryptographic Primitives Library (cng.sys)

This certificate has known related CVEs, which means that the certified product might be vulnerable.

Certificate #1335

Webpage information ?

Status historical
Historical reason RNG SP800-131A Revision 1 Transition
Validation dates 12.08.2010 , 01.06.2011 , 21.06.2011 , 09.02.2012 , 24.01.2013
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode with Windows Server 2008 R2 Winload OS Loader (winload.exe) validated to FIPS 140-2 under Cert. #1333 operating in FIPS mode
Description CNG.SYS runs as a kernel mode export driver, and provides cryptographic services, through their documented interfaces, to Windows Server 2008 R2 kernel components. It supports several cryptographic algorithms accessible via a FIPS function table request irp (I/O request packet).
Tested configurations
  • Microsoft Windows Server 2008 R2 (IA64 version)
  • Microsoft Windows Server 2008 R2 (x64 Version)
  • Microsoft Windows Server 2008 R2 SP1 (IA64 version) (single-user mode)
  • Microsoft Windows Server 2008 R2 SP1 (x64 version)
Vendor Microsoft Corporation
References

This certificate's webpage directly references 1 certificates, transitively this expands into 2 certificates.

Security policy ?

Symmetric Algorithms
AES-128, AES-192, AES-256, AES, RC2, RC4, DES, Triple-DES, TDEA, HMAC
Asymmetric Algorithms
ECDH, ECDSA, Diffie-Hellman, DH
Hash functions
SHA-1, SHA-256, SHA-384, SHA-512, MD4, MD5
Schemes
Key Agreement
Protocols
SSL, TLS, TLSv1.0, IKEv1, IPsec
Randomness
PRNG, DRBG, RNG
Elliptic Curves
P-256, P-384, P-521
Block cipher modes
ECB, CBC, CFB, GCM, CCM

Vendor
Microsoft, Microsoft Corporation

Security level
Level 1

Standards
FIPS 140-2, FIPS PUB 140-2, FIPS 186-2, SP 800-56A

File metadata

Title Microsoft Word - Windows Server 2008 R2 CNGSYS FIPS Security Policy.docx
Author noltinge
Creation date D:20130117132504-05'00'
Modification date D:20130117132504-05'00'
Pages 32
Creator PScript5.dll Version 5.2
Producer Acrobat Distiller 8.1.0 (Windows)

References

Outgoing
  • 1333 - historical - Windows Server 2008 R2 Winload OS Loader (winload.exe)
Incoming
  • 2343 - historical - Vormetric Encryption Expert Cryptographic Module
  • 1338 - historical - Windows Server 2008 R2 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)
  • 1337 - historical - Windows Server 2008 R2 Enhanced Cryptographic Provider (RSAENH)
  • 1339 - historical - Windows Server 2008 R2 BitLockerâ„¢ Drive Encryption
  • 2212 - historical - Suite B Cryptographic Module
  • 2342 - historical - Vormetric Encryption Expert Cryptographic Module

Heuristics ?

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2007-6753
C M N
MEDIUM 6.2 10.0 28.03.2012 19:55
CVE-2008-1084
C M N
HIGH 7.2 10.0 08.04.2008 23:05
CVE-2008-1441
C M N
MEDIUM 5.4 6.9 12.06.2008 02:32
CVE-2008-2250
C M N
HIGH 7.2 10.0 15.10.2008 00:12
CVE-2008-2251
C M N
HIGH 7.2 10.0 15.10.2008 00:12
CVE-2008-2252
C M N
HIGH 7.2 10.0 15.10.2008 00:12
CVE-2008-3013
C M N
HIGH 9.3 10.0 11.09.2008 01:11
CVE-2008-4036
C M N
HIGH 7.2 10.0 15.10.2008 00:12
CVE-2008-4038
C M N
HIGH 10.0 10.0 15.10.2008 00:12
CVE-2008-4268
C M N
HIGH 8.5 10.0 10.12.2008 14:00
CVE-2008-4269
C M N
HIGH 8.5 10.0 10.12.2008 14:00
CVE-2009-0078
C M N
HIGH 7.2 10.0 15.04.2009 08:00
CVE-2009-0080
C M N
MEDIUM 6.9 10.0 15.04.2009 08:00
CVE-2009-0081
C M N
HIGH 9.3 10.0 10.03.2009 20:30
CVE-2009-0082
C M N
HIGH 7.2 10.0 10.03.2009 20:30
CVE-2009-0083
C M N
HIGH 7.2 10.0 10.03.2009 20:30
CVE-2009-0085
C M N
HIGH 7.1 6.9 10.03.2009 20:30
CVE-2009-0086
C M N
HIGH 10.0 10.0 15.04.2009 08:00
CVE-2009-0093
C M N
LOW 3.5 2.9 11.03.2009 14:19
CVE-2009-0094
C M N
MEDIUM 5.5 4.9 11.03.2009 14:19
CVE-2009-0230
C M N
HIGH 9.0 10.0 10.06.2009 18:00
CVE-2009-0231
C M N
HIGH 8.8 5.9 15.07.2009 15:30
CVE-2009-0233
C M N
MEDIUM 5.8 4.9 11.03.2009 14:19
CVE-2009-0234
C M N
MEDIUM 6.4 4.9 11.03.2009 14:19
CVE-2009-0320
C M N
MEDIUM 4.0 6.9 28.01.2009 18:30
CVE-2009-0568
C M N
HIGH 10.0 10.0 10.06.2009 18:00
CVE-2009-1216
C M N
HIGH 10.0 10.0 01.04.2009 18:00
CVE-2009-1536
C M N
LOW 2.6 2.9 12.08.2009 17:30
CVE-2009-2493
C M N
HIGH 9.3 10.0 29.07.2009 17:30
CVE-2009-2526
C M N
HIGH 7.8 6.9 14.10.2009 10:30
CVE-2009-2532
C M N
HIGH 10.0 10.0 14.10.2009 10:30
CVE-2009-3103
C M N
HIGH 10.0 10.0 08.09.2009 22:30
CVE-2010-0024
C M N
MEDIUM 5.0 2.9 14.04.2010 16:00
CVE-2010-0025
C M N
MEDIUM 5.0 2.9 14.04.2010 16:00
CVE-2010-0719
C M N
MEDIUM 4.7 6.9 26.02.2010 19:30
CVE-2010-3227
C M N
HIGH 9.3 10.0 26.10.2010 22:00
CVE-2010-4398
C M N
HIGH 7.8 5.9 06.12.2010 13:44
CVE-2010-4562
C M N
MEDIUM 4.3 2.9 02.02.2012 17:55
CVE-2010-4669
C M N
HIGH 7.8 6.9 07.01.2011 12:00
CVE-2011-1229
C M N
HIGH 7.2 10.0 13.04.2011 20:26
CVE-2012-1194
C M N
MEDIUM 6.4 4.9 17.02.2012 22:55
CVE-2017-0175
C M N
MEDIUM 4.7 3.6 12.05.2017 14:29
CVE-2017-11831
C M N
MEDIUM 4.7 3.6 15.11.2017 03:29
CVE-2017-11852
C M N
MEDIUM 4.7 3.6 15.11.2017 03:29
CVE-2018-0887
C M N
MEDIUM 5.5 3.6 12.04.2018 01:29
CVE-2018-0960
C M N
MEDIUM 5.5 3.6 12.04.2018 01:29
CVE-2018-0968
C M N
MEDIUM 5.5 3.6 12.04.2018 01:29
CVE-2018-0969
C M N
MEDIUM 5.5 3.6 12.04.2018 01:29
CVE-2018-0970
C M N
MEDIUM 5.5 3.6 12.04.2018 01:29
CVE-2018-0971
C M N
MEDIUM 5.5 3.6 12.04.2018 01:29
CVE-2018-0972
C M N
MEDIUM 5.5 3.6 12.04.2018 01:29
CVE-2018-0973
C M N
MEDIUM 5.5 3.6 12.04.2018 01:29
CVE-2018-0974
C M N
MEDIUM 5.5 3.6 12.04.2018 01:29
CVE-2018-0975
C M N
MEDIUM 5.5 3.6 12.04.2018 01:29
CVE-2018-8641
C M N
HIGH 7.8 5.9 12.12.2018 00:29
CVE-2024-29056
C M N
MEDIUM 4.3 1.4 09.04.2024 17:15

References ?

Updates ?

  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2010-3227', 'CVE-2010-4398', 'CVE-2010-4669', 'CVE-2018-8641']} values added.
  • 01.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2024-29056', 'CVE-2009-0231']} values added.
  • 18.05.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:o:microsoft:windows_server_2008:-:r2:itanium:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2008:-:r2:x64:*:*:*:*:*']} values discarded.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2010-0719', 'CVE-2009-0233', 'CVE-2008-2251', 'CVE-2009-0094', 'CVE-2008-4038', 'CVE-2009-0086', 'CVE-2009-0093', 'CVE-2009-0085', 'CVE-2009-2493', 'CVE-2008-3013', 'CVE-2009-0230', 'CVE-2009-1216', 'CVE-2009-0320', 'CVE-2017-0175', 'CVE-2007-6753', 'CVE-2009-0082', 'CVE-2009-0234', 'CVE-2008-4268', 'CVE-2012-1194', 'CVE-2008-4269', 'CVE-2009-0081', 'CVE-2010-4669', 'CVE-2009-3103', 'CVE-2010-4562', 'CVE-2009-0083', 'CVE-2017-11852', 'CVE-2009-0568', 'CVE-2008-1084', 'CVE-2009-0078', 'CVE-2008-2250', 'CVE-2008-4036']} values added.
  • 19.03.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2010-0719', 'CVE-2008-2251', 'CVE-2009-0243', 'CVE-2009-0093', 'CVE-2009-2509', 'CVE-2010-4398', 'CVE-2009-1124', 'CVE-2009-0230', 'CVE-2012-2551', 'CVE-2009-1216', 'CVE-2009-2501', 'CVE-2009-3126', 'CVE-2009-0320', 'CVE-2010-0239', 'CVE-2009-0082', 'CVE-2013-1292', 'CVE-2012-1194', 'CVE-2010-0026', 'CVE-2011-1872', 'CVE-2010-4669', 'CVE-2009-0089', 'CVE-2009-2500', 'CVE-2010-2549', 'CVE-2008-4834', 'CVE-2011-1248', 'CVE-2009-2502', 'CVE-2009-1126', 'CVE-2010-0241', 'CVE-2009-0085', 'CVE-2009-2493', 'CVE-2008-4114', 'CVE-2008-3013', 'CVE-2007-6753', 'CVE-2010-0233', 'CVE-2008-4269', 'CVE-2010-2742', 'CVE-2013-2556', 'CVE-2009-0081', 'CVE-2013-0076', 'CVE-2008-2249', 'CVE-2013-1293', 'CVE-2008-1084', 'CVE-2009-2503', 'CVE-2010-0035', 'CVE-2009-0233', 'CVE-2008-3465', 'CVE-2009-0094', 'CVE-2010-0242', 'CVE-2010-0240', 'CVE-2011-1264', 'CVE-2017-0175', 'CVE-2009-2508', 'CVE-2013-0013', 'CVE-2009-3103', 'CVE-2010-4562', 'CVE-2008-4835', 'CVE-2009-1123', 'CVE-2009-1125', 'CVE-2013-3862', 'CVE-2009-2528', 'CVE-2010-3960', 'CVE-2009-2515', 'CVE-2013-3868', 'CVE-2009-2504', 'CVE-2008-4038', 'CVE-2009-0086', 'CVE-2009-0234', 'CVE-2009-2516', 'CVE-2008-4268', 'CVE-2012-2549', 'CVE-2009-0083', 'CVE-2009-0550', 'CVE-2017-11852', 'CVE-2009-0568', 'CVE-2008-1454', 'CVE-2013-0011', 'CVE-2009-0078', 'CVE-2008-2250', 'CVE-2008-4036']} values discarded.
    • The direct_transitive_cves property was set to None.
    • The indirect_transitive_cves property was set to None.
  • 09.02.2023 The certificate data changed.
    Certificate changed

    The cert_id was updated.

    • The new value is 1335.

    The web extraction data was updated.

    • The following values were inserted: {'validation_history': [{'_type': 'sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry', 'date': '2010-08-12', 'validation_type': 'Initial', 'lab': 'SAIC-VA'}, {'_type': 'sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry', 'date': '2011-06-01', 'validation_type': 'Update', 'lab': 'SAIC-VA'}, {'_type': 'sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry', 'date': '2011-06-21', 'validation_type': 'Update', 'lab': 'SAIC-VA'}, {'_type': 'sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry', 'date': '2012-02-09', 'validation_type': 'Update', 'lab': 'SAIC-VA'}, {'_type': 'sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry', 'date': '2013-01-24', 'validation_type': 'Update', 'lab': ''}], 'vendor_url': 'http://www.microsoft.com', 'certificate_pdf_url': 'https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt1335.pdf', 'hw_versions': None, 'fw_versions': None}.
    • The standard property was set to FIPS 140-2.
    • The status property was set to historical.
    • The level property was set to 1.
    • The embodiment property was set to Multi-Chip Stand Alone.
    • The description property was set to CNG.SYS runs as a kernel mode export driver, and provides cryptographic services, through their documented interfaces, to Windows Server 2008 R2 kernel components. It supports several cryptographic algorithms accessible via a FIPS function table request irp (I/O request packet)..
    • The mentioned_certs property was updated, with the {'1333': 1} data.
    • The following properties were deleted: ['date_validation', 'algorithms', 'vendor_www', 'lab', 'lab_nvlap', 'security_policy_www', 'certificate_www', 'hw_version', 'fw_version', 'product_url'].

    The PDF extraction data was updated.

    • The following values were inserted: {'policy_metadata': {'pdf_file_size_bytes': 172795, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 32, '/CreationDate': "D:20130117132504-05'00'", '/Author': 'noltinge', '/Creator': 'PScript5.dll Version 5.2', '/Producer': 'Acrobat Distiller 8.1.0 (Windows)', '/ModDate': "D:20130117132504-05'00'", '/Title': 'Microsoft Word - Windows Server 2008 R2 CNGSYS FIPS Security Policy.docx', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}}.
    • The following properties were deleted: ['cert_id', 'algorithms', 'clean_cert_ids', 'st_metadata'].

    The computed heuristics were updated.

    • The following values were inserted: {'policy_prunned_references': {'_type': 'Set', 'elements': ['1333']}, 'module_prunned_references': {'_type': 'Set', 'elements': ['1333']}, 'policy_processed_references': {'_type': 'sec_certs.sample.certificate.References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['1337', '2343', '2342', '2212', '1339', '1338']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['1683', '2009', '2220', '1337', '2343', '2342', '2212', '1339', '1087', '1338']}, 'directly_referencing': {'_type': 'Set', 'elements': ['1333']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['1321', '1333']}}, 'module_processed_references': {'_type': 'sec_certs.sample.certificate.References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['1337', '2343', '2212', '1339', '1338']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['1699', '1732', '1683', '2220', '1337', '2343', '1087', '2212', '1339', '1086', '1338', '2162', '1595']}, 'directly_referencing': {'_type': 'Set', 'elements': ['1333']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['1321', '1333']}}, 'direct_transitive_cves': {'_type': 'Set', 'elements': ['CVE-2013-1256', 'CVE-2013-1267', 'CVE-2018-0971', 'CVE-2008-2251', 'CVE-2010-1886', 'CVE-2009-0093', 'CVE-2010-2550', 'CVE-2012-2551', 'CVE-2009-3126', 'CVE-2011-1234', 'CVE-2013-1283', 'CVE-2009-1926', 'CVE-2010-0026', 'CVE-2011-3416', 'CVE-2009-0089', 'CVE-2013-1255', 'CVE-2011-1248', 'CVE-2009-2502', 'CVE-2010-2551', 'CVE-2013-1263', 'CVE-2010-0252', 'CVE-2011-1878', 'CVE-2013-1287', 'CVE-2010-0485', 'CVE-2013-1286', 'CVE-2009-2493', 'CVE-2011-1894', 'CVE-2011-1873', 'CVE-2013-1254', 'CVE-2013-1342', 'CVE-2011-3414', 'CVE-2008-2249', 'CVE-2008-1084', 'CVE-2011-1887', 'CVE-2010-0018', 'CVE-2011-0089', 'CVE-2011-0041', 'CVE-2012-1527', 'CVE-2009-1546', 'CVE-2011-1240', 'CVE-2013-1344', 'CVE-2017-0175', 'CVE-2010-3229', 'CVE-2013-1271', 'CVE-2012-1866', 'CVE-2010-0234', 'CVE-2009-1123', 'CVE-2009-2510', 'CVE-2011-0087', 'CVE-2009-1125', 'CVE-2018-0970', 'CVE-2012-1865', 'CVE-2018-0969', 'CVE-2008-4038', 'CVE-2010-0482', 'CVE-2011-1883', 'CVE-2009-1929', 'CVE-2011-1283', 'CVE-2008-2252', 'CVE-2013-1266', 'CVE-2011-0674', 'CVE-2013-3866', 'CVE-2010-1897', 'CVE-2011-1879', 'CVE-2009-0078', 'CVE-2010-1896', 'CVE-2010-1889', 'CVE-2018-0960', 'CVE-2013-1275', 'CVE-2010-3943', 'CVE-2009-0243', 'CVE-2013-3865', 'CVE-2011-1236', 'CVE-2010-4398', 'CVE-2009-1124', 'CVE-2013-1252', 'CVE-2009-0230', 'CVE-2009-2501', 'CVE-2011-3415', 'CVE-2009-0082', 'CVE-2010-4669', 'CVE-2011-1230', 'CVE-2010-0481', 'CVE-2011-1267', 'CVE-2011-1241', 'CVE-2010-2744', 'CVE-2011-0662', 'CVE-2011-1227', 'CVE-2010-0241', 'CVE-2011-0086', 'CVE-2008-3013', 'CVE-2018-0975', 'CVE-2011-0658', 'CVE-2009-2514', 'CVE-2009-3677', 'CVE-2010-0233', 'CVE-2008-4269', 'CVE-2013-0076', 'CVE-2009-0081', 'CVE-2013-2556', 'CVE-2011-0660', 'CVE-2011-1875', 'CVE-2011-1238', 'CVE-2010-1890', 'CVE-2010-3338', 'CVE-2009-1127', 'CVE-2012-1851', 'CVE-2010-3940', 'CVE-2013-1280', 'CVE-2013-1270', 'CVE-2011-0677', 'CVE-2010-3227', 'CVE-2013-1273', 'CVE-2010-0270', 'CVE-2009-0094', 'CVE-2008-3465', 'CVE-2010-0242', 'CVE-2013-1276', 'CVE-2010-0818', 'CVE-2011-1876', 'CVE-2010-0240', 'CVE-2013-1264', 'CVE-2010-3961', 'CVE-2009-0231', 'CVE-2008-1436', 'CVE-2010-2552', 'CVE-2011-1229', 'CVE-2012-2527', 'CVE-2010-0021', 'CVE-2011-1228', 'CVE-2009-2508', 'CVE-2013-0013', 'CVE-2010-0476', 'CVE-2010-4562', 'CVE-2009-1928', 'CVE-2011-1881', 'CVE-2012-2530', 'CVE-2009-0080', 'CVE-2010-0231', 'CVE-2011-0666', 'CVE-2013-1261', 'CVE-2009-2528', 'CVE-2010-3960', 'CVE-2013-3868', 'CVE-2009-2504', 'CVE-2009-0086', 'CVE-2011-0676', 'CVE-2009-2524', 'CVE-2011-1237', 'CVE-2011-1233', 'CVE-2011-0670', 'CVE-2011-1885', 'CVE-2009-0234', 'CVE-2010-3956', 'CVE-2012-1867', 'CVE-2018-0973', 'CVE-2009-1930', 'CVE-2009-0083', 'CVE-2011-1226', 'CVE-2013-1277', 'CVE-2009-1536', 'CVE-2010-0250', 'CVE-2010-1887', 'CVE-2011-1880', 'CVE-2011-1882', 'CVE-2018-0972', 'CVE-2009-1133', 'CVE-2013-1250', 'CVE-2009-1216', 'CVE-2011-1869', 'CVE-2009-2532', 'CVE-2010-0239', 'CVE-2011-1874', 'CVE-2013-1262', 'CVE-2008-1441', 'CVE-2011-0671', 'CVE-2011-3417', 'CVE-2009-2500', 'CVE-2011-0675', 'CVE-2008-4834', 'CVE-2017-11831', 'CVE-2009-1126', 'CVE-2011-1888', 'CVE-2010-3957', 'CVE-2010-0022', 'CVE-2010-1893', 'CVE-2010-2554', 'CVE-2008-4114', 'CVE-2011-1239', 'CVE-2013-1278', 'CVE-2010-2742', 'CVE-2012-1528', 'CVE-2013-1293', 'CVE-2010-0035', 'CVE-2013-1274', 'CVE-2013-1279', 'CVE-2010-0820', 'CVE-2010-0269', 'CVE-2012-0175', 'CVE-2013-1268', 'CVE-2010-2743', 'CVE-2010-1255', 'CVE-2012-2529', 'CVE-2009-3103', 'CVE-2013-1259', 'CVE-2008-4835', 'CVE-2011-1232', 'CVE-2011-0665', 'CVE-2018-8641', 'CVE-2013-1248', 'CVE-2009-1920', 'CVE-2009-2513', 'CVE-2013-1285', 'CVE-2010-0480', 'CVE-2010-0486', 'CVE-2011-1231', 'CVE-2009-2515', 'CVE-2012-4774', 'CVE-2010-3970', 'CVE-2018-0974', 'CVE-2013-1253', 'CVE-2009-1545', 'CVE-2008-4268', 'CVE-2013-1294', 'CVE-2013-1343', 'CVE-2012-2549', 'CVE-2010-0025', 'CVE-2009-0550', 'CVE-2017-11852', 'CVE-2009-0568', 'CVE-2009-2494', 'CVE-2008-1454', 'CVE-2011-1884', 'CVE-2013-3864', 'CVE-2011-1282', 'CVE-2008-4036', 'CVE-2011-1242', 'CVE-2010-0719', 'CVE-2013-1249', 'CVE-2011-0033', 'CVE-2010-3939', 'CVE-2013-1341', 'CVE-2011-1268', 'CVE-2009-2509', 'CVE-2010-2746', 'CVE-2009-0320', 'CVE-2010-3959', 'CVE-2010-0810', 'CVE-2010-2555', 'CVE-2011-1284', 'CVE-2013-1292', 'CVE-2010-0020', 'CVE-2010-0017', 'CVE-2012-1194', 'CVE-2011-1235', 'CVE-2011-1872', 'CVE-2008-1083', 'CVE-2010-0024', 'CVE-2012-1850', 'CVE-2013-1260', 'CVE-2010-3941', 'CVE-2011-0657', 'CVE-2010-2549', 'CVE-2009-1925', 'CVE-2013-1251', 'CVE-2009-0085', 'CVE-2009-0229', 'CVE-2009-2526', 'CVE-2007-6753', 'CVE-2010-2568', 'CVE-2013-1269', 'CVE-2011-0661', 'CVE-2011-1281', 'CVE-2010-0232', 'CVE-2010-2729', 'CVE-2010-0812', 'CVE-2009-2503', 'CVE-2010-0484', 'CVE-2012-1864', 'CVE-2013-1265', 'CVE-2013-1272', 'CVE-2009-2511', 'CVE-2010-1892', 'CVE-2009-0233', 'CVE-2018-0968', 'CVE-2011-0088', 'CVE-2011-1264', 'CVE-2011-0034', 'CVE-2011-0096', 'CVE-2009-0232', 'CVE-2013-1257', 'CVE-2018-0887', 'CVE-2011-1877', 'CVE-2010-1883', 'CVE-2009-1544', 'CVE-2009-2512', 'CVE-2010-2738', 'CVE-2008-4037', 'CVE-2013-3862', 'CVE-2013-1258', 'CVE-2011-1249', 'CVE-2011-0667', 'CVE-2010-0477', 'CVE-2010-3942', 'CVE-2010-0819', 'CVE-2011-0672', 'CVE-2011-1225', 'CVE-2009-2516', 'CVE-2010-0487', 'CVE-2010-3974', 'CVE-2011-0090', 'CVE-2010-0811', 'CVE-2012-2556', 'CVE-2013-0011', 'CVE-2008-2250']}, 'indirect_transitive_cves': {'_type': 'Set', 'elements': ['CVE-2013-1256', 'CVE-2013-1267', 'CVE-2018-0971', 'CVE-2008-2251', 'CVE-2010-1886', 'CVE-2009-0093', 'CVE-2010-2550', 'CVE-2012-2551', 'CVE-2009-3126', 'CVE-2011-1234', 'CVE-2013-1283', 'CVE-2009-1926', 'CVE-2010-0026', 'CVE-2011-3416', 'CVE-2009-0089', 'CVE-2013-1255', 'CVE-2011-1248', 'CVE-2009-2502', 'CVE-2010-2551', 'CVE-2013-1263', 'CVE-2010-0252', 'CVE-2011-1878', 'CVE-2013-1287', 'CVE-2010-0485', 'CVE-2013-1286', 'CVE-2009-2493', 'CVE-2011-1894', 'CVE-2011-1873', 'CVE-2013-1254', 'CVE-2013-1342', 'CVE-2011-3414', 'CVE-2008-2249', 'CVE-2008-1084', 'CVE-2011-1887', 'CVE-2010-0018', 'CVE-2011-0089', 'CVE-2011-0041', 'CVE-2012-1527', 'CVE-2009-1546', 'CVE-2011-1240', 'CVE-2013-1344', 'CVE-2017-0175', 'CVE-2010-3229', 'CVE-2013-1271', 'CVE-2012-1866', 'CVE-2010-0234', 'CVE-2009-1123', 'CVE-2009-2510', 'CVE-2011-0087', 'CVE-2009-1125', 'CVE-2018-0970', 'CVE-2012-1865', 'CVE-2018-0969', 'CVE-2008-4038', 'CVE-2010-0482', 'CVE-2011-1883', 'CVE-2009-1929', 'CVE-2011-1283', 'CVE-2008-2252', 'CVE-2013-1266', 'CVE-2011-0674', 'CVE-2013-3866', 'CVE-2010-1897', 'CVE-2011-1879', 'CVE-2009-0078', 'CVE-2010-1896', 'CVE-2010-1889', 'CVE-2018-0960', 'CVE-2013-1275', 'CVE-2010-3943', 'CVE-2009-0243', 'CVE-2013-3865', 'CVE-2011-1236', 'CVE-2010-4398', 'CVE-2009-1124', 'CVE-2013-1252', 'CVE-2009-0230', 'CVE-2009-2501', 'CVE-2011-3415', 'CVE-2009-0082', 'CVE-2010-4669', 'CVE-2011-1230', 'CVE-2010-0481', 'CVE-2011-1267', 'CVE-2011-1241', 'CVE-2010-2744', 'CVE-2011-0662', 'CVE-2011-1227', 'CVE-2010-0241', 'CVE-2011-0086', 'CVE-2008-3013', 'CVE-2018-0975', 'CVE-2011-0658', 'CVE-2009-2514', 'CVE-2009-3677', 'CVE-2010-0233', 'CVE-2008-4269', 'CVE-2013-0076', 'CVE-2009-0081', 'CVE-2013-2556', 'CVE-2011-0660', 'CVE-2011-1875', 'CVE-2011-1238', 'CVE-2010-1890', 'CVE-2010-3338', 'CVE-2009-1127', 'CVE-2012-1851', 'CVE-2010-3940', 'CVE-2013-1280', 'CVE-2013-1270', 'CVE-2011-0677', 'CVE-2010-3227', 'CVE-2013-1273', 'CVE-2010-0270', 'CVE-2009-0094', 'CVE-2008-3465', 'CVE-2010-0242', 'CVE-2013-1276', 'CVE-2010-0818', 'CVE-2011-1876', 'CVE-2010-0240', 'CVE-2013-1264', 'CVE-2010-3961', 'CVE-2009-0231', 'CVE-2008-1436', 'CVE-2010-2552', 'CVE-2011-1229', 'CVE-2012-2527', 'CVE-2010-0021', 'CVE-2011-1228', 'CVE-2009-2508', 'CVE-2013-0013', 'CVE-2010-0476', 'CVE-2010-4562', 'CVE-2009-1928', 'CVE-2011-1881', 'CVE-2012-2530', 'CVE-2009-0080', 'CVE-2010-0231', 'CVE-2011-0666', 'CVE-2013-1261', 'CVE-2009-2528', 'CVE-2010-3960', 'CVE-2013-3868', 'CVE-2009-2504', 'CVE-2009-0086', 'CVE-2011-0676', 'CVE-2009-2524', 'CVE-2011-1237', 'CVE-2011-1233', 'CVE-2011-0670', 'CVE-2011-1885', 'CVE-2009-0234', 'CVE-2010-3956', 'CVE-2012-1867', 'CVE-2018-0973', 'CVE-2009-1930', 'CVE-2009-0083', 'CVE-2011-1226', 'CVE-2013-1277', 'CVE-2009-1536', 'CVE-2010-0250', 'CVE-2010-1887', 'CVE-2011-1880', 'CVE-2011-1882', 'CVE-2018-0972', 'CVE-2009-1133', 'CVE-2013-1250', 'CVE-2009-1216', 'CVE-2011-1869', 'CVE-2009-2532', 'CVE-2010-0239', 'CVE-2011-1874', 'CVE-2013-1262', 'CVE-2008-1441', 'CVE-2011-0671', 'CVE-2011-3417', 'CVE-2009-2500', 'CVE-2011-0675', 'CVE-2008-4834', 'CVE-2017-11831', 'CVE-2009-1126', 'CVE-2011-1888', 'CVE-2010-3957', 'CVE-2010-0022', 'CVE-2010-1893', 'CVE-2010-2554', 'CVE-2008-4114', 'CVE-2011-1239', 'CVE-2013-1278', 'CVE-2010-2742', 'CVE-2012-1528', 'CVE-2013-1293', 'CVE-2010-0035', 'CVE-2013-1274', 'CVE-2013-1279', 'CVE-2010-0820', 'CVE-2010-0269', 'CVE-2012-0175', 'CVE-2013-1268', 'CVE-2010-2743', 'CVE-2010-1255', 'CVE-2012-2529', 'CVE-2009-3103', 'CVE-2013-1259', 'CVE-2008-4835', 'CVE-2011-1232', 'CVE-2011-0665', 'CVE-2018-8641', 'CVE-2013-1248', 'CVE-2009-1920', 'CVE-2009-2513', 'CVE-2013-1285', 'CVE-2010-0480', 'CVE-2010-0486', 'CVE-2011-1231', 'CVE-2009-2515', 'CVE-2012-4774', 'CVE-2010-3970', 'CVE-2018-0974', 'CVE-2013-1253', 'CVE-2009-1545', 'CVE-2008-4268', 'CVE-2013-1294', 'CVE-2013-1343', 'CVE-2012-2549', 'CVE-2010-0025', 'CVE-2009-0550', 'CVE-2017-11852', 'CVE-2009-0568', 'CVE-2009-2494', 'CVE-2008-1454', 'CVE-2011-1884', 'CVE-2013-3864', 'CVE-2011-1282', 'CVE-2008-4036', 'CVE-2011-1242', 'CVE-2010-0719', 'CVE-2013-1249', 'CVE-2011-0033', 'CVE-2010-3939', 'CVE-2013-1341', 'CVE-2011-1268', 'CVE-2009-2509', 'CVE-2010-2746', 'CVE-2009-0320', 'CVE-2010-3959', 'CVE-2010-0810', 'CVE-2010-2555', 'CVE-2011-1284', 'CVE-2013-1292', 'CVE-2010-0020', 'CVE-2010-0017', 'CVE-2012-1194', 'CVE-2011-1235', 'CVE-2011-1872', 'CVE-2008-1083', 'CVE-2010-0024', 'CVE-2012-1850', 'CVE-2013-1260', 'CVE-2010-3941', 'CVE-2011-0657', 'CVE-2010-2549', 'CVE-2009-1925', 'CVE-2013-1251', 'CVE-2009-0085', 'CVE-2009-0229', 'CVE-2009-2526', 'CVE-2007-6753', 'CVE-2010-2568', 'CVE-2013-1269', 'CVE-2011-0661', 'CVE-2011-1281', 'CVE-2010-0232', 'CVE-2010-2729', 'CVE-2010-0812', 'CVE-2009-2503', 'CVE-2010-0484', 'CVE-2012-1864', 'CVE-2013-1265', 'CVE-2013-1272', 'CVE-2009-2511', 'CVE-2010-1892', 'CVE-2009-0233', 'CVE-2018-0968', 'CVE-2011-0088', 'CVE-2011-1264', 'CVE-2011-0034', 'CVE-2011-0096', 'CVE-2009-0232', 'CVE-2013-1257', 'CVE-2018-0887', 'CVE-2011-1877', 'CVE-2010-1883', 'CVE-2009-1544', 'CVE-2009-2512', 'CVE-2010-2738', 'CVE-2008-4037', 'CVE-2013-3862', 'CVE-2013-1258', 'CVE-2011-1249', 'CVE-2011-0667', 'CVE-2010-0477', 'CVE-2010-3942', 'CVE-2010-0819', 'CVE-2011-0672', 'CVE-2011-1225', 'CVE-2009-2516', 'CVE-2010-0487', 'CVE-2010-3974', 'CVE-2011-0090', 'CVE-2010-0811', 'CVE-2012-2556', 'CVE-2013-0011', 'CVE-2008-2250']}}.
    • The algorithms property was set to {'_type': 'Set', 'elements': ['SHS#1081', 'AES GCM#1168', 'ECDSA#142', 'DRBG#23', 'HMAC#686', 'DRBG#27', 'RNG#649', 'RSA#567', 'AES GMAC#1168', 'AES#1168', 'Triple-DES#846', 'AES#1187', 'RSA#559']}.
    • The following properties were deleted: ['keywords', 'unmatched_algs', 'clean_cert_ids', 'st_references', 'web_references'].

    The state was updated.

    • The following values were inserted: {'module_download_ok': True, 'policy_download_ok': True, 'policy_convert_garbage': False, 'policy_convert_ok': True, 'module_extract_ok': True, 'policy_extract_ok': True, 'policy_pdf_hash': '4fd8df9f869541ecf7e0796c7045e2b668729be688ad2c50d9e2997095a7955b', 'policy_txt_hash': '303594b3837c6d578a68c564b04dda70195bd7b5df36c7a052e7712ec9d7f392'}.
    • The following properties were deleted: ['sp_path', 'html_path', 'tables_done', 'file_status', 'txt_state'].
  • 16.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2008-4609']} values discarded.
  • 07.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The clean_cert_ids property was updated, with the {'#1081': 1, '#846': 1, '#1187': 1, '#567': 1, '#559': 1, '#649': 2} values inserted.
    • The st_references property was updated, with the {'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['1524']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['3092', '3093', '3095', '2844', '3544', '1524']}}, 'directly_referencing': {'__add__': {'_type': 'Set', 'elements': ['846', '567', '1081', '559', '649', '1187']}}, 'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['55', '82', '315', '454', '559', '382', '159', '1187', '319', '135', '308', '846', '299', '101', '102', '567', '1081', '229', '1168', '649', '62', '69', '568', '517', '239', '41', '261', '310', '218', '129', '131', '184']}}} data.
  • 05.11.2022 The certificate data changed.
    Certificate changed

    The web extraction data was updated.

    • The algorithms property was set to {'_type': 'Set', 'elements': []}.

    The PDF extraction data was updated.

    • The clean_cert_ids property was updated, with the {'#1081': 1, '#846': 1, '#1187': 1, '#567': 1, '#559': 1, '#142': 1, '#649': 2} values inserted.

    The computed heuristics were updated.

    • The algorithms property was set to {'_type': 'Set', 'elements': []}.
  • 25.10.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The keywords property was updated, with the {'fips_certlike': {'__update__': {'Certlike': {'__update__': {'SHA-1': 4}, '__delete__': ['SHA1', 'SHA256', 'SHA384', 'SHA512', 'PKCS1', 'DES (2', 'DES3']}}}, 'vendor': {'__update__': {'Microsoft': {'__update__': {'Microsoft': 16}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 8}, '__delete__': ['AES-']}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 26}, '__delete__': ['DEA']}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'HMAC': 32}}}}}, '__delete__': ['miscellaneous']}, 'asymmetric_crypto': {'__update__': {'ECC': {'__delete__': ['ECC']}, 'FF': {'__update__': {'DH': {'__update__': {'DH': 8}}}, '__delete__': ['DSA']}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA1': {'__update__': {'SHA-1': 4}, '__delete__': ['SHA1']}, 'SHA2': {'__delete__': ['SHA256', 'SHA384', 'SHA512', 'SHA-2', 'SHA2']}}, '__delete__': ['SHA3']}, 'MD': {'__update__': {'MD5': {'__update__': {'MD5': 3}}}}}, '__delete__': ['PBKDF']}, 'crypto_scheme': {'__update__': {'KA': {'__delete__': ['KA']}}, '__delete__': ['MAC']}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 1}}, 'TLS': {'__update__': {'TLS': 1}}}}}}, 'randomness': {'__update__': {'PRNG': {'__update__': {'PRNG': 1, 'DRBG': 7}}, 'RNG': {'__update__': {'RNG': 8}, '__delete__': ['RBG']}}}, 'cipher_mode': {'__update__': {'CBC': {'__update__': {'CBC': 6}}, 'CFB': {'__update__': {'CFB': 1}}, 'GCM': {'__update__': {'GCM': 2}}, 'CCM': {'__update__': {'CCM': 2}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'FIPS': {'__delete__': ['FIPS186']}, 'NIST': {'SP 800-56A': 1}}, '__delete__': ['PKCS']}, 'javacard_api_const': {}} data.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['1337', '2342', '2212', '1339', '1338']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['2220', '1337', '2342', '2212', '1339', '1338']}, 'directly_referencing': {'_type': 'Set', 'elements': ['1333']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['1321', '1333']}} data.
    • The web_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['1337', '2343', '2212', '1339', '1338']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['1699', '1732', '1683', '2220', '1337', '2343', '1087', '2212', '1339', '1086', '1338', '2162', '1595']}, 'directly_referencing': {'_type': 'Set', 'elements': ['1333']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['1321', '1333']}} data.

    The state was updated.

    • The tables_done property was set to True.
  • 10.10.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:o:microsoft:windows_server_2008:-:r2:*:*:*:*:x64:*', 'cpe:2.3:o:microsoft:windows_server_2008:-:r2:x64:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2008:-:r2:itanium:*:*:*:*:*']}.
    • The related_cves property was set to {'_type': 'Set', 'elements': ['CVE-2013-1256', 'CVE-2013-1267', 'CVE-2018-0971', 'CVE-2008-2251', 'CVE-2010-1886', 'CVE-2009-0093', 'CVE-2010-2550', 'CVE-2012-2551', 'CVE-2009-3126', 'CVE-2011-1234', 'CVE-2013-1283', 'CVE-2009-1926', 'CVE-2010-0026', 'CVE-2011-3416', 'CVE-2009-0089', 'CVE-2013-1255', 'CVE-2011-1248', 'CVE-2009-2502', 'CVE-2010-2551', 'CVE-2013-1263', 'CVE-2010-0252', 'CVE-2011-1878', 'CVE-2013-1287', 'CVE-2010-0485', 'CVE-2013-1286', 'CVE-2009-2493', 'CVE-2011-1894', 'CVE-2011-1873', 'CVE-2013-1254', 'CVE-2013-1342', 'CVE-2011-3414', 'CVE-2008-2249', 'CVE-2008-1084', 'CVE-2011-1887', 'CVE-2010-0018', 'CVE-2011-0089', 'CVE-2011-0041', 'CVE-2012-1527', 'CVE-2009-1546', 'CVE-2011-1240', 'CVE-2013-1344', 'CVE-2017-0175', 'CVE-2010-3229', 'CVE-2013-1271', 'CVE-2012-1866', 'CVE-2010-0234', 'CVE-2009-1123', 'CVE-2009-2510', 'CVE-2011-0087', 'CVE-2009-1125', 'CVE-2018-0970', 'CVE-2012-1865', 'CVE-2018-0969', 'CVE-2008-4038', 'CVE-2010-0482', 'CVE-2011-1883', 'CVE-2009-1929', 'CVE-2011-1283', 'CVE-2008-2252', 'CVE-2013-1266', 'CVE-2011-0674', 'CVE-2013-3866', 'CVE-2010-1897', 'CVE-2011-1879', 'CVE-2009-0078', 'CVE-2010-1896', 'CVE-2010-1889', 'CVE-2018-0960', 'CVE-2013-1275', 'CVE-2010-3943', 'CVE-2009-0243', 'CVE-2013-3865', 'CVE-2011-1236', 'CVE-2010-4398', 'CVE-2009-1124', 'CVE-2013-1252', 'CVE-2009-0230', 'CVE-2011-3415', 'CVE-2009-2501', 'CVE-2009-0082', 'CVE-2010-4669', 'CVE-2011-1230', 'CVE-2010-0481', 'CVE-2011-1267', 'CVE-2011-1241', 'CVE-2010-2744', 'CVE-2011-0662', 'CVE-2011-1227', 'CVE-2010-0241', 'CVE-2011-0086', 'CVE-2008-3013', 'CVE-2018-0975', 'CVE-2011-0658', 'CVE-2009-2514', 'CVE-2009-3677', 'CVE-2010-0233', 'CVE-2008-4269', 'CVE-2013-2556', 'CVE-2009-0081', 'CVE-2013-0076', 'CVE-2011-0660', 'CVE-2011-1875', 'CVE-2011-1238', 'CVE-2010-1890', 'CVE-2010-3338', 'CVE-2009-1127', 'CVE-2012-1851', 'CVE-2010-3940', 'CVE-2013-1280', 'CVE-2013-1270', 'CVE-2011-0677', 'CVE-2010-0270', 'CVE-2013-1273', 'CVE-2008-3465', 'CVE-2009-0094', 'CVE-2010-3227', 'CVE-2010-0242', 'CVE-2013-1276', 'CVE-2010-0818', 'CVE-2011-1876', 'CVE-2010-0240', 'CVE-2013-1264', 'CVE-2010-3961', 'CVE-2009-0231', 'CVE-2008-1436', 'CVE-2010-2552', 'CVE-2011-1229', 'CVE-2012-2527', 'CVE-2010-0021', 'CVE-2011-1228', 'CVE-2009-2508', 'CVE-2010-0476', 'CVE-2013-0013', 'CVE-2010-4562', 'CVE-2009-1928', 'CVE-2011-1881', 'CVE-2012-2530', 'CVE-2009-0080', 'CVE-2010-0231', 'CVE-2011-0666', 'CVE-2013-1261', 'CVE-2009-2528', 'CVE-2010-3960', 'CVE-2013-3868', 'CVE-2009-2504', 'CVE-2009-0086', 'CVE-2011-0676', 'CVE-2009-2524', 'CVE-2011-1237', 'CVE-2011-1233', 'CVE-2011-0670', 'CVE-2011-1885', 'CVE-2008-4609', 'CVE-2009-0234', 'CVE-2010-3956', 'CVE-2012-1867', 'CVE-2018-0973', 'CVE-2009-1930', 'CVE-2009-0083', 'CVE-2011-1226', 'CVE-2013-1277', 'CVE-2009-1536', 'CVE-2010-0250', 'CVE-2010-1887', 'CVE-2011-1880', 'CVE-2011-1882', 'CVE-2018-0972', 'CVE-2009-1133', 'CVE-2013-1250', 'CVE-2009-1216', 'CVE-2011-1869', 'CVE-2011-1874', 'CVE-2010-0239', 'CVE-2009-2532', 'CVE-2013-1262', 'CVE-2008-1441', 'CVE-2011-0671', 'CVE-2009-2500', 'CVE-2011-3417', 'CVE-2011-0675', 'CVE-2008-4834', 'CVE-2017-11831', 'CVE-2009-1126', 'CVE-2011-1888', 'CVE-2010-3957', 'CVE-2010-0022', 'CVE-2010-1893', 'CVE-2010-2554', 'CVE-2008-4114', 'CVE-2011-1239', 'CVE-2013-1278', 'CVE-2010-2742', 'CVE-2012-1528', 'CVE-2013-1293', 'CVE-2010-0035', 'CVE-2013-1274', 'CVE-2013-1279', 'CVE-2010-0820', 'CVE-2010-0269', 'CVE-2012-0175', 'CVE-2013-1268', 'CVE-2010-2743', 'CVE-2010-1255', 'CVE-2012-2529', 'CVE-2013-1259', 'CVE-2009-3103', 'CVE-2008-4835', 'CVE-2011-1232', 'CVE-2011-0665', 'CVE-2018-8641', 'CVE-2013-1248', 'CVE-2009-1920', 'CVE-2009-2513', 'CVE-2013-1285', 'CVE-2010-0480', 'CVE-2011-1231', 'CVE-2012-4774', 'CVE-2009-2515', 'CVE-2010-0486', 'CVE-2010-3970', 'CVE-2018-0974', 'CVE-2013-1253', 'CVE-2009-1545', 'CVE-2008-4268', 'CVE-2013-1294', 'CVE-2013-1343', 'CVE-2012-2549', 'CVE-2010-0025', 'CVE-2009-0550', 'CVE-2017-11852', 'CVE-2009-0568', 'CVE-2009-2494', 'CVE-2008-1454', 'CVE-2011-1884', 'CVE-2013-3864', 'CVE-2008-4036', 'CVE-2011-1282', 'CVE-2011-1242', 'CVE-2010-0719', 'CVE-2013-1249', 'CVE-2011-0033', 'CVE-2010-3939', 'CVE-2013-1341', 'CVE-2011-1268', 'CVE-2009-2509', 'CVE-2010-2746', 'CVE-2009-0320', 'CVE-2010-3959', 'CVE-2010-0810', 'CVE-2010-2555', 'CVE-2011-1284', 'CVE-2013-1292', 'CVE-2010-0020', 'CVE-2010-0017', 'CVE-2012-1194', 'CVE-2011-1235', 'CVE-2011-1872', 'CVE-2008-1083', 'CVE-2010-0024', 'CVE-2012-1850', 'CVE-2013-1260', 'CVE-2010-3941', 'CVE-2011-0657', 'CVE-2010-2549', 'CVE-2009-1925', 'CVE-2013-1251', 'CVE-2009-0085', 'CVE-2009-0229', 'CVE-2009-2526', 'CVE-2007-6753', 'CVE-2010-2568', 'CVE-2011-0661', 'CVE-2013-1269', 'CVE-2011-1281', 'CVE-2010-0232', 'CVE-2010-2729', 'CVE-2010-0812', 'CVE-2012-1864', 'CVE-2009-2503', 'CVE-2010-0484', 'CVE-2013-1265', 'CVE-2013-1272', 'CVE-2009-2511', 'CVE-2010-1892', 'CVE-2009-0233', 'CVE-2018-0968', 'CVE-2011-0088', 'CVE-2011-1264', 'CVE-2011-0034', 'CVE-2011-0096', 'CVE-2009-0232', 'CVE-2013-1257', 'CVE-2018-0887', 'CVE-2011-1877', 'CVE-2010-1883', 'CVE-2009-1544', 'CVE-2009-2512', 'CVE-2010-2738', 'CVE-2008-4037', 'CVE-2013-3862', 'CVE-2013-1258', 'CVE-2011-1249', 'CVE-2011-0667', 'CVE-2010-0477', 'CVE-2010-3942', 'CVE-2010-0819', 'CVE-2011-0672', 'CVE-2011-1225', 'CVE-2009-2516', 'CVE-2010-0487', 'CVE-2010-3974', 'CVE-2011-0090', 'CVE-2010-0811', 'CVE-2012-2556', 'CVE-2013-0011', 'CVE-2008-2250']}.
  • 08.10.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:a:microsoft:sql_server:2008:-:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:sql_server:2008:*:*:*:*:*:*:*']} values discarded.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2007-5090']} values discarded.
    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The web_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.fips.FIPSCertificate.

    The computed heuristics were updated.

    • The following values were inserted: {'clean_cert_ids': {'#1333': 1}}.
    • The _type property was set to sec_certs.sample.fips.FIPSCertificate.Heuristics.
    • The keywords property was set to {}.
    • The algorithms property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#846', 'algorithm_type': 'Triple-DES', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1168', 'algorithm_type': 'AES', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1187', 'algorithm_type': 'AES', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#686', 'algorithm_type': 'HMAC', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#567', 'algorithm_type': 'RSA', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1081', 'algorithm_type': 'SHS', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#23', 'algorithm_type': 'DRBG', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#649', 'algorithm_type': 'RNG', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1168', 'algorithm_type': 'AES GMAC', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#142', 'algorithm_type': 'ECDSA', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#559', 'algorithm_type': 'RSA', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1168', 'algorithm_type': 'AES GCM', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#27', 'algorithm_type': 'DRBG', 'vendor': None, 'implementation': None, 'date': None}]}.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The web_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.

    The state was updated.

    • The _type property was set to sec_certs.sample.fips.FIPSCertificate.InternalState.
    • The following properties were deleted: ['fragment_path'].
  • 29.06.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
  • 25.06.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
  • 23.06.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
  • 21.06.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The pdf_scan was updated.

    • The keywords property was updated, with the {'rules_cert_id': {}, 'rules_standard_id': {'__update__': {'FIPS ?(?:PUB )?[0-9]+-[0-9]+?': {'__update__': {'FIPS 186-2': {'__update__': {'count': 1}}}, '__delete__': ['FIPS 140-2']}, 'TLS[ ]*v[0-9\\.]+': {'__update__': {'TLSv1.0': {'__update__': {'count': 1}}}}}}, 'rules_security_assurance_components': {'__update__': {'ATE(?:_[A-Z]{3,4}){1,2}(?:\\.[0-9]|\\.[0-9]\\.[0-9]|)': {'__update__': {'ATE_BLOB': {'__update__': {'count': 1}}}, '__delete__': ['ATE_KEY_BLOB']}}}, 'rules_cc_claims': {'__update__': {'D\\.[\\._\\-A-Z]+?': {'__update__': {'D.SYS': {'__update__': {'count': 1}}}}}}, 'rules_javacard_api_consts': {'__update__': {'PAD_[A-Z_0-9]+': {'__delete__': ['PAD_NONE', 'PAD_OAEP']}}}, 'rules_block_cipher_modes': {'__insert__': {'CCM': {'CCM': {'count': 1}}}, '__update__': {'ECB': {'__update__': {'ECB': {'__update__': {'count': 1}}}}, 'CBC': {'__update__': {'CBC': {'__update__': {'count': 1}}}}, 'GCM': {'__update__': {'GCM': {'__update__': {'count': 1}}}}}}, 'rules_ecc_curves': {'__insert__': {'(NIST)? ?[PBK]-[0-9]{3}': {'P-521': {'count': 1}}}, '__update__': {'(?:Curve |curve |)P-(192|224|256|384|521)': {'__delete__': ['P-256', 'P-384']}}}} data.

    The computed heuristics were updated.

    • The keywords property was updated, with the {'rules_cert_id': {'__delete__': ['(?:#[^\\S\\r\\n]?|Cert\\.?(?!.\\s)[^\\S\\r\\n]?|Certificate[^\\S\\r\\n]?)(?P<id>\\d{4})(?!\\d)', '(?:#[^\\S\\r\\n]?|Cert\\.?(?!.\\s)[^\\S\\r\\n]?|Certificate[^\\S\\r\\n]?)(?P<id>\\d{3})(?!\\d)']}, 'rules_standard_id': {'__update__': {'FIPS ?(?:PUB )?[0-9]+-[0-9]+?': {'__update__': {'FIPS 186-2': {'__update__': {'count': 1}}}, '__delete__': ['FIPS 140-2']}, 'TLS[ ]*v[0-9\\.]+': {'__update__': {'TLSv1.0': {'__update__': {'count': 1}}}}}}, 'rules_security_assurance_components': {'__update__': {'ATE(?:_[A-Z]{3,4}){1,2}(?:\\.[0-9]|\\.[0-9]\\.[0-9]|)': {'__update__': {'ATE_BLOB': {'__update__': {'count': 1}}}, '__delete__': ['ATE_KEY_BLOB']}}}, 'rules_cc_claims': {'__update__': {'D\\.[\\._\\-A-Z]+?': {'__update__': {'D.SYS': {'__update__': {'count': 1}}}}}}, 'rules_javacard_api_consts': {'__update__': {'PAD_[A-Z_0-9]+': {'__delete__': ['PAD_NONE', 'PAD_OAEP']}}}, 'rules_block_cipher_modes': {'__insert__': {'CCM': {'CCM': {'count': 1}}}, '__update__': {'ECB': {'__update__': {'ECB': {'__update__': {'count': 1}}}}, 'CBC': {'__update__': {'CBC': {'__update__': {'count': 1}}}}, 'GCM': {'__update__': {'GCM': {'__update__': {'count': 1}}}}}}, 'rules_ecc_curves': {'__insert__': {'(NIST)? ?[PBK]-[0-9]{3}': {'P-521': {'count': 1}}}, '__update__': {'(?:Curve |curve |)P-(192|224|256|384|521)': {'__delete__': ['P-256', 'P-384']}}}} data.
    • The algorithms property was updated.
  • 07.06.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
  • 24.05.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
  • 22.05.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:a:microsoft:sql_server:2008:-:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:sql_server:2008:*:*:*:*:*:*:*']} values added.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2007-5090']} values added.
  • 20.05.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
  • 18.05.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
  • 17.05.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
  • 18.04.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
  • 11.03.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.
    • The following properties were deleted: ['connections'].

    The pdf_scan was updated.

    • The following properties were deleted: ['connections'].

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['1333']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['1333']}}, 'web_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['1333']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['1333']}}}.
    • The algorithms property was updated.
    • The following properties were deleted: ['connections', 'directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 23.02.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['2008']}.
    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:a:microsoft:server:2008:*:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:windows-nt:2008:*:*:*:*:*:*:*']}.
  • 12.02.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
    • The cpe_matches property was updated, with the [[1, 'cpe:2.3:a:microsoft:server:2008:*:*:*:*:*:*:*']] values inserted.
  • 11.02.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
    • The cpe_matches property was updated, with the [[1, 'cpe:2.3:a:microsoft:windows-nt:2008:*:*:*:*:*:*:*']] values inserted.
  • 03.02.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
    • The cpe_matches property was updated, with the [[1, 'cpe:2.3:a:microsoft:server:2008:*:*:*:*:*:*:*']] values inserted.
  • 02.02.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The module_type property was set to Software.
    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
    • The cpe_matches property was updated, with the [[1, 'cpe:2.3:a:microsoft:windows-nt:2008:*:*:*:*:*:*:*']] values inserted.
  • 31.01.2022 The certificate data changed.
    Certificate changed

    The web_scan was updated.

    • The algorithms property was updated.

    The computed heuristics were updated.

    • The algorithms property was updated.
  • 30.01.2022 The certificate was first processed.
    New certificate

    A new FIPS 140 certificate with the product name was processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 1335,
  "dgst": "c399e9273f18bf50",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "DRBG#27",
        "Triple-DES#846",
        "AES#1168",
        "ECDSA#142",
        "RNG#649",
        "DRBG#23",
        "AES#1187",
        "AES GMAC#1168",
        "AES GCM#1168",
        "RSA#559",
        "RSA#567",
        "SHS#1081",
        "HMAC#686"
      ]
    },
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:o:microsoft:windows_server_2008:-:r2:*:*:*:*:x64:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2008"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "1337",
          "1339",
          "2343",
          "1338",
          "2212"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "1333"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "1337",
          "1086",
          "1339",
          "2162",
          "1732",
          "2220",
          "2343",
          "1699",
          "1683",
          "1338",
          "1087",
          "2212",
          "1595"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "1333",
          "1321"
        ]
      }
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": [
        "1333"
      ]
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "1337",
          "1339",
          "2342",
          "2343",
          "1338",
          "2212"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "1333"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "1337",
          "1339",
          "2220",
          "2342",
          "2343",
          "1683",
          "1338",
          "2009",
          "1087",
          "2212"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "1333",
          "1321"
        ]
      }
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": [
        "1333"
      ]
    },
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2009-1536",
        "CVE-2007-6753",
        "CVE-2010-0025",
        "CVE-2010-4562",
        "CVE-2009-0094",
        "CVE-2009-0078",
        "CVE-2009-0083",
        "CVE-2011-1229",
        "CVE-2009-2526",
        "CVE-2018-0968",
        "CVE-2008-1441",
        "CVE-2008-1084",
        "CVE-2009-3103",
        "CVE-2009-1216",
        "CVE-2009-0234",
        "CVE-2009-0082",
        "CVE-2009-2532",
        "CVE-2010-0024",
        "CVE-2017-11852",
        "CVE-2018-0973",
        "CVE-2009-0085",
        "CVE-2024-29056",
        "CVE-2009-2493",
        "CVE-2008-3013",
        "CVE-2009-0080",
        "CVE-2008-4038",
        "CVE-2009-0568",
        "CVE-2008-4269",
        "CVE-2010-4398",
        "CVE-2017-0175",
        "CVE-2018-0969",
        "CVE-2009-0231",
        "CVE-2018-0887",
        "CVE-2009-0093",
        "CVE-2008-4036",
        "CVE-2018-0971",
        "CVE-2009-0230",
        "CVE-2009-0320",
        "CVE-2018-0974",
        "CVE-2008-2252",
        "CVE-2018-0975",
        "CVE-2010-0719",
        "CVE-2008-4268",
        "CVE-2017-11831",
        "CVE-2010-3227",
        "CVE-2018-0972",
        "CVE-2018-0970",
        "CVE-2008-2251",
        "CVE-2010-4669",
        "CVE-2012-1194",
        "CVE-2018-0960",
        "CVE-2018-8641",
        "CVE-2009-0233",
        "CVE-2009-0086",
        "CVE-2008-2250",
        "CVE-2009-0081"
      ]
    },
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 9
          },
          "ECDSA": {
            "ECDSA": 11
          }
        },
        "FF": {
          "DH": {
            "DH": 8,
            "Diffie-Hellman": 8
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 6
        },
        "CCM": {
          "CCM": 2
        },
        "CFB": {
          "CFB": 1
        },
        "ECB": {
          "ECB": 4
        },
        "GCM": {
          "GCM": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKEv1": 3
        },
        "IPsec": {
          "IPsec": 1
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 1,
            "TLSv1.0": 2
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 2,
          "P-384": 2,
          "P-521": 2
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1081": 1,
          "#1168": 4,
          "#1187": 1,
          "#1333": 1,
          "#142": 1,
          "#23": 1,
          "#27": 1,
          "#559": 1,
          "#567": 1,
          "#649": 2,
          "#686": 1,
          "#846": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES 256": 1,
          "AES Cert #1168": 1,
          "AES-128": 8,
          "AES-192": 4,
          "AES-256": 7,
          "DRBG (Cert. #23": 1,
          "DRBG (Cert. #27": 1,
          "HMAC (Cert. #686": 1,
          "HMAC-SHA-1": 2,
          "HMAC-SHA1": 2,
          "HMAC-SHA256": 2,
          "HMAC-SHA384": 2,
          "HMAC-SHA512": 2,
          "RSASSA-PKCS1-v1_5": 1,
          "SHA-1": 4,
          "SHA-256": 3,
          "SHA-384": 2,
          "SHA-512": 3
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 2
        }
      },
      "hash_function": {
        "MD": {
          "MD4": {
            "MD4": 1
          },
          "MD5": {
            "MD5": 3
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          },
          "SHA2": {
            "SHA-256": 3,
            "SHA-384": 2,
            "SHA-512": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 7,
          "PRNG": 1
        },
        "RNG": {
          "RNG": 8
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 11,
          "FIPS 186-2": 6,
          "FIPS PUB 140-2": 1
        },
        "NIST": {
          "SP 800-56A": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 8,
            "AES-128": 8,
            "AES-192": 4,
            "AES-256": 7
          },
          "RC": {
            "RC2": 2,
            "RC4": 2
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "Triple-DES": 5
          },
          "DES": {
            "DES": 26
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 32
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 16,
          "Microsoft Corporation": 3
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "noltinge",
      "/CreationDate": "D:20130117132504-05\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2",
      "/ModDate": "D:20130117132504-05\u002700\u0027",
      "/Producer": "Acrobat Distiller 8.1.0 (Windows)",
      "/Title": "Microsoft Word - Windows Server 2008 R2 CNGSYS FIPS Security Policy.docx",
      "pdf_file_size_bytes": 172795,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 32
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_garbage": false,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_pdf_hash": "4fd8df9f869541ecf7e0796c7045e2b668729be688ad2c50d9e2997095a7955b",
    "policy_txt_hash": "303594b3837c6d578a68c564b04dda70195bd7b5df36c7a052e7712ec9d7f392"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode with Windows Server 2008 R2 Winload OS Loader (winload.exe) validated to FIPS 140-2 under Cert. #1333 operating in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt1335.pdf",
    "date_sunset": null,
    "description": "CNG.SYS runs as a kernel mode export driver, and provides cryptographic services, through their documented interfaces, to Windows Server 2008 R2 kernel components. It supports several cryptographic algorithms accessible via a FIPS function table request irp (I/O request packet).",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": null,
    "fw_versions": null,
    "historical_reason": "RNG SP800-131A Revision 1 Transition",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {
      "1333": 1
    },
    "module_name": "Microsoft Windows Server 2008 R2 Kernel Mode Cryptographic Primitives Library (cng.sys)",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "6.1.7600.16385, 6.1.7600.16915, 6.1.7600.21092, 6.1.7601.17514, 6.1.7601.17919, 6.1.7601.17725, 6.1.7601.21861 and 6.1.7601.22076",
    "tested_conf": [
      "Microsoft Windows Server 2008 R2 (IA64 version)",
      "Microsoft Windows Server 2008 R2 (x64 Version)",
      "Microsoft Windows Server 2008 R2 SP1 (IA64 version) (single-user mode)",
      "Microsoft Windows Server 2008 R2 SP1 (x64 version)"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2010-08-12",
        "lab": "SAIC-VA",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2011-06-01",
        "lab": "SAIC-VA",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2011-06-21",
        "lab": "SAIC-VA",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2012-02-09",
        "lab": "SAIC-VA",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2013-01-24",
        "lab": "",
        "validation_type": "Update"
      }
    ],
    "vendor": "Microsoft Corporation",
    "vendor_url": "http://www.microsoft.com"
  }
}