Microsoft Exchange Server 2010 SP1 Enterprise (English) 64-bit

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status archived
Valid from 16.02.2011
Valid until 13.07.2017
Scheme 🇦🇺 AU
Manufacturer Microsoft Corporation
Category Other Devices and Systems
Security level EAL4+, ALC_FLR.3

Heuristics summary ?

Certificate ID: Certificate Number: 2011/72

Certificate ?

Certification report ?

Extracted keywords

Protocols
TLS

Vendor
Microsoft, Microsoft Corporation

Security level
EAL4, EAL4+, EAL4 augmented
Security Assurance Requirements (SAR)
ALC_FLR.3
Certificates
Certificate Number: 2011/72

Vulnerabilities
CVE-2010-3332

Standards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Title: Certification Report
Subject: Certificate Number: 2011/72
Author: roslyn.dinkgreve
Creation date: D:20110415144320
Modification date: D:20110415144320
Pages: 25
Creator: Microsoft® Office Word 2007
Producer: Microsoft® Office Word 2007

References

No references.

Security target ?

Extracted keywords

Protocols
TLS

Vendor
Microsoft

Security level
EAL4+, EAL4, EAL4 augmented
Claims
O.DAC, O.CONBLK, O.RESTDIST, O.REDUCE_SPAM, O.MAIL_FLOW, O.WIPE, T.UNAUTH_DAC, T.AUTH_DAC, T.UNAUTHUSE, T.SPAM, T.DL_MISUSE, A.COM_PROT, A.INSTALL, A.PLATFORM, A.BLOCKLIST, A.NO_EVIL_ADM, A.PHYS_PROTECT, A.NO_EVIL_ADMIN, OE.PLATFORM, OE.COM_PROT, OE.INSTALL, OE.BLOCKLIST, OE.PHYSICAL, OSP.MAIL_FLOW, OSP.WIPE
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3, ASE_INT, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_REQ, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FDP_IFF, FDP_ACC, FDP_ACF, FDP_IFC, FDP_ACF.1, FDP_ACC.1, FDP_IFF.1, FDP_IFC.1, FIA_SOS.1, FIA_UAU.2, FIA_UID.2, FIA_USB.1, FIA_SOS.1.1, FIA_UAU, FIA_UAU.1, FIA_UAU.2.1, FIA_UID.1, FIA_UID, FIA_UID.2.1, FIA_USB, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_ATD.1, FMT_MOF.1, FMT_SMF.1, FMT_MSA.1, FMT_MSA, FMT_MSA.3, FMT_MOF.1.1, FMT_SMR.1, FMT_SMF.1.1, FMT_MSA.1.1, FMT_MSA.3.2
Certification process
out of scope, the device on receipt of the command is dependent on the platform and configuration and considered out of scope. 4.3 Security objectives for the IT environment Identifier Objective statements OE.PLATFORM The

Certification process
out of scope, the device on receipt of the command is dependent on the platform and configuration and considered out of scope. 4.3 Security objectives for the IT environment Identifier Objective statements OE.PLATFORM The

Standards
RFC 2821, RFC 2822

File metadata

Title: Exchange 2010
Subject: EAL4 Security Target
Author: Aaron Doggett (stratsec)
Creation date: D:20101223114445+11'00'
Modification date: D:20101223114445+11'00'
Pages: 66
Creator: Microsoft® Word 2010
Producer: Microsoft® Word 2010

References

No references.

Heuristics ?

Certificate ID: Certificate Number: 2011/72

Extracted SARs

ALC_DVS.1, AGD_PRE.1, ASE_REQ.2, ASE_OBJ.2, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, ASE_TSS.1, ALC_CMC.4, ASE_CCL.1, ASE_INT.1, ALC_DEL.1, ASE_ECD.1, ALC_LCD.1, ALC_TAT.1, ATE_FUN.1, ATE_DPT.1, ADV_FSP.4, ADV_TDS.3, ASE_SPD.1, ALC_CMS.4, ATE_COV.2, ATE_IND.2, ADV_IMP.1, ADV_ARC.1

CPE matches

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-1999-1322
C M N
MEDIUM 4.6 6.4 12.11.1998 05:00
CVE-2000-0216
C M N
MEDIUM 5.0 2.9 29.02.2000 05:00
CVE-2012-4791
C M N
LOW 3.5 2.9 12.12.2012 00:55
CVE-2013-0418
C M N
MEDIUM 6.8 6.4 17.01.2013 01:55
CVE-2013-5072
C M N
MEDIUM 4.3 2.9 11.12.2013 00:55
CVE-2014-6319
C M N
MEDIUM 5.0 2.9 11.12.2014 00:59
CVE-2016-0138
C M N
MEDIUM 4.3 1.4 14.09.2016 10:59
CVE-2017-8621
C M N
MEDIUM 6.1 2.7 11.07.2017 21:29
CVE-2018-0924
C M N
MEDIUM 6.5 3.6 14.03.2018 17:29
CVE-2018-0940
C M N
MEDIUM 6.5 3.6 14.03.2018 17:29
CVE-2018-8151
C M N
MEDIUM 4.3 1.4 09.05.2018 19:29
CVE-2018-8154
C M N
CRITICAL 9.8 5.9 09.05.2018 19:29
CVE-2018-8302
C M N
CRITICAL 9.8 5.9 15.08.2018 17:29
CVE-2019-0724
C M N
HIGH 8.1 5.9 05.03.2019 23:29
CVE-2019-0817
C M N
MEDIUM 5.4 2.5 09.04.2019 21:29
CVE-2019-1084
C M N
MEDIUM 6.5 3.6 15.07.2019 19:15
CVE-2019-1136
C M N
HIGH 8.1 5.9 15.07.2019 19:15
CVE-2020-0688
C M N
HIGH 8.8 5.9 11.02.2020 22:15
CVE-2020-17144
C M N
HIGH 8.4 6.0 10.12.2020 00:15
CVE-2021-26857
C M N
HIGH 7.8 5.9 03.03.2021 00:15

References ?

No references are available for this certificate.

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e9acfa7611ca40a0e4365d143c6c5ac8213a00879778a96ab9b94ea32f8df5be', 'txt_hash': '47fe88bbc7df67e9471f2b83da23091b6a74621d9d30066bbe863c8784986369'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4a9ec6bc13219418b8ba0b648bbd805a0816074157737ac0288351f1fc5cc367', 'txt_hash': '94cf4714ccaf5e9e6db113cca121a677edd61a7b64ff38a21c5f13fc62cd18f1'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}.
    • The report_frontpage property was set to {}.
    • The st_frontpage property was set to None.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': None}.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-1999-1322', 'CVE-2000-0216']} values added.
  • 24.03.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-1999-1322', 'CVE-2000-0216']} values discarded.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 05.02.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2016-0138', 'CVE-2013-5072', 'CVE-2020-0688', 'CVE-2013-0418', 'CVE-2020-17144']} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 4a9ec6bc13219418b8ba0b648bbd805a0816074157737ac0288351f1fc5cc367.
    • The st_txt_hash property was set to 94cf4714ccaf5e9e6db113cca121a677edd61a7b64ff38a21c5f13fc62cd18f1.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 861830, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 66, '/Title': 'Exchange 2010', '/Author': 'Aaron Doggett (stratsec)', '/Subject': 'EAL4 Security Target', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20101223114445+11'00'", '/ModDate': "D:20101223114445+11'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 2, 'EAL4': 11, 'EAL4 augmented': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_FSP.4': 2, 'ADV_IMP.1': 2, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_FLR.3': 8, 'ALC_CMC.4': 2, 'ALC_CMS.4': 2, 'ALC_DEL.1': 2, 'ALC_DVS.1': 2, 'ALC_LCD.1': 2, 'ALC_TAT.1': 2}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_VAN.3': 2}, 'ASE': {'ASE_INT': 2, 'ASE_CCL': 2, 'ASE_SPD': 2, 'ASE_OBJ': 2, 'ASE_REQ': 2, 'ASE_TSS': 2, 'ASE_CCL.1': 2, 'ASE_ECD.1': 2, 'ASE_INT.1': 2, 'ASE_OBJ.2': 2, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2, 'ASE_TSS.1': 2}}, 'cc_sfr': {'FDP': {'FDP_IFF': 70, 'FDP_ACC': 20, 'FDP_ACF': 24, 'FDP_IFC': 39, 'FDP_ACF.1': 5, 'FDP_ACC.1': 7, 'FDP_IFF.1': 10, 'FDP_IFC.1': 12}, 'FIA': {'FIA_SOS.1': 6, 'FIA_UAU.2': 7, 'FIA_UID.2': 4, 'FIA_USB.1': 5, 'FIA_SOS.1.1': 1, 'FIA_UAU': 1, 'FIA_UAU.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.1': 2, 'FIA_UID': 1, 'FIA_UID.2.1': 1, 'FIA_USB': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_ATD.1': 3}, 'FMT': {'FMT_MOF.1': 7, 'FMT_SMF.1': 22, 'FMT_MSA.1': 28, 'FMT_MSA': 62, 'FMT_MSA.3': 15, 'FMT_MOF.1.1': 1, 'FMT_SMR.1': 18, 'FMT_SMF.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.2': 1}}, 'cc_claims': {'O': {'O.DAC': 14, 'O.CONBLK': 6, 'O.RESTDIST': 7, 'O.REDUCE_SPAM': 6, 'O.MAIL_FLOW': 5, 'O.WIPE': 5}, 'T': {'T.UNAUTH_DAC': 3, 'T.AUTH_DAC': 5, 'T.UNAUTHUSE': 2, 'T.SPAM': 7, 'T.DL_MISUSE': 4}, 'A': {'A.COM_PROT': 2, 'A.INSTALL': 2, 'A.PLATFORM': 2, 'A.BLOCKLIST': 2, 'A.NO_EVIL_ADM': 1, 'A.PHYS_PROTECT': 2, 'A.NO_EVIL_ADMIN': 1}, 'OE': {'OE.PLATFORM': 18, 'OE.COM_PROT': 2, 'OE.INSTALL': 3, 'OE.BLOCKLIST': 2, 'OE.PHYSICAL': 2}, 'OSP': {'OSP.MAIL_FLOW': 3, 'OSP.WIPE': 3}}, 'vendor': {'Microsoft': {'Microsoft': 10}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 16}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'RFC': {'RFC 2821': 9, 'RFC 2822': 6}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'the device on receipt of the command is dependent on the platform and configuration and considered out of scope. 4.3 Security objectives for the IT environment Identifier Objective statements OE.PLATFORM The': 1}}}.
    • The st_filename property was set to E14_EAL4_ASE_1.0.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/E14_EAL4_ASE_1.0.pdf, code: 408'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 4a9ec6bc13219418b8ba0b648bbd805a0816074157737ac0288351f1fc5cc367.
    • The st_txt_hash property was set to 94cf4714ccaf5e9e6db113cca121a677edd61a7b64ff38a21c5f13fc62cd18f1.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 861830, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 66, '/Title': 'Exchange 2010', '/Author': 'Aaron Doggett (stratsec)', '/Subject': 'EAL4 Security Target', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20101223114445+11'00'", '/ModDate': "D:20101223114445+11'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 2, 'EAL4': 11, 'EAL4 augmented': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_FSP.4': 2, 'ADV_IMP.1': 2, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_FLR.3': 8, 'ALC_CMC.4': 2, 'ALC_CMS.4': 2, 'ALC_DEL.1': 2, 'ALC_DVS.1': 2, 'ALC_LCD.1': 2, 'ALC_TAT.1': 2}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_VAN.3': 2}, 'ASE': {'ASE_INT': 2, 'ASE_CCL': 2, 'ASE_SPD': 2, 'ASE_OBJ': 2, 'ASE_REQ': 2, 'ASE_TSS': 2, 'ASE_CCL.1': 2, 'ASE_ECD.1': 2, 'ASE_INT.1': 2, 'ASE_OBJ.2': 2, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2, 'ASE_TSS.1': 2}}, 'cc_sfr': {'FDP': {'FDP_IFF': 70, 'FDP_ACC': 20, 'FDP_ACF': 24, 'FDP_IFC': 39, 'FDP_ACF.1': 5, 'FDP_ACC.1': 7, 'FDP_IFF.1': 10, 'FDP_IFC.1': 12}, 'FIA': {'FIA_SOS.1': 6, 'FIA_UAU.2': 7, 'FIA_UID.2': 4, 'FIA_USB.1': 5, 'FIA_SOS.1.1': 1, 'FIA_UAU': 1, 'FIA_UAU.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.1': 2, 'FIA_UID': 1, 'FIA_UID.2.1': 1, 'FIA_USB': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_ATD.1': 3}, 'FMT': {'FMT_MOF.1': 7, 'FMT_SMF.1': 22, 'FMT_MSA.1': 28, 'FMT_MSA': 62, 'FMT_MSA.3': 15, 'FMT_MOF.1.1': 1, 'FMT_SMR.1': 18, 'FMT_SMF.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.2': 1}}, 'cc_claims': {'O': {'O.DAC': 14, 'O.CONBLK': 6, 'O.RESTDIST': 7, 'O.REDUCE_SPAM': 6, 'O.MAIL_FLOW': 5, 'O.WIPE': 5}, 'T': {'T.UNAUTH_DAC': 3, 'T.AUTH_DAC': 5, 'T.UNAUTHUSE': 2, 'T.SPAM': 7, 'T.DL_MISUSE': 4}, 'A': {'A.COM_PROT': 2, 'A.INSTALL': 2, 'A.PLATFORM': 2, 'A.BLOCKLIST': 2, 'A.NO_EVIL_ADM': 1, 'A.PHYS_PROTECT': 2, 'A.NO_EVIL_ADMIN': 1}, 'OE': {'OE.PLATFORM': 18, 'OE.COM_PROT': 2, 'OE.INSTALL': 3, 'OE.BLOCKLIST': 2, 'OE.PHYSICAL': 2}, 'OSP': {'OSP.MAIL_FLOW': 3, 'OSP.WIPE': 3}}, 'vendor': {'Microsoft': {'Microsoft': 10}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 16}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'RFC': {'RFC 2821': 9, 'RFC 2822': 6}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'the device on receipt of the command is dependent on the platform and configuration and considered out of scope. 4.3 Security objectives for the IT environment Identifier Objective statements OE.PLATFORM The': 1}}}.
    • The st_filename property was set to E14_EAL4_ASE_1.0.pdf.

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2012-4791']} values added.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/E14_EAL4_ASE_1.0.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2012-4791']} values discarded.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 10.10.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_1:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_3:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_31:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_11:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_22:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_26:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp2:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_25:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_16:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_14:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_28:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_7:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_5:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_9:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_18:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_23:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_29:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_17:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_10:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp1:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_8:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_30:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_15:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_27:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_6:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup20:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_20:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_24:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_2:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_19:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_21:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_12:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_4:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_13:*:*:*:*:*:*']}.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2018-8151', 'CVE-2016-0138', 'CVE-2012-4791', 'CVE-2017-8621', 'CVE-2019-1084', 'CVE-2013-5072', 'CVE-2018-0940', 'CVE-2021-26857', 'CVE-2014-6319', 'CVE-2020-17144', 'CVE-2018-8154', 'CVE-2020-0688', 'CVE-2019-0817', 'CVE-2019-0724', 'CVE-2018-8302', 'CVE-2013-0418', 'CVE-2019-1136', 'CVE-2018-0924']} values added.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:a:microsoft:exchange_server:2010:-:*:*:*:*:x64:*']} values discarded.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2010-0024', 'CVE-2010-0025']} values discarded.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'EFS-T024 CR SP1.pdf', 'st_filename': 'E14_EAL4_ASE_1.0.pdf'}.
    • The report_keywords property was updated, with the {'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.3': 9}}}}, 'vendor': {'__update__': {'Microsoft': {'__update__': {'Microsoft Corporation': 1}}}}, 'eval_facility': {}, 'standard_id': {'__update__': {'CC': {'__insert__': {'CCMB-2009-07-004': 2}, '__update__': {'CCMB-2009-07-001': 2, 'CCMB-2009-07-002': 2, 'CCMB-2009-07-003': 2}}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL4': 11, 'EAL4 augmented': 4}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.3': 8}}}}, 'cc_sfr': {'__update__': {'FDP': {'__insert__': {'FDP_IFF': 70, 'FDP_ACC': 20, 'FDP_ACF': 24, 'FDP_IFC': 39}}, 'FIA': {'__insert__': {'FIA_UAU': 1, 'FIA_UID': 1, 'FIA_USB': 1}, '__update__': {'FIA_SOS.1': 6, 'FIA_UAU.2': 7, 'FIA_UID.2': 4, 'FIA_USB.1': 5, 'FIA_UID.1': 2, 'FIA_ATD.1': 3}}, 'FMT': {'__insert__': {'FMT_MSA': 62}, '__update__': {'FMT_MSA.1': 28, 'FMT_SMR.1': 18}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.CONBLK': 6}}, 'OE': {'__update__': {'OE.INSTALL': 3}}}}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'TLS': {'__update__': {'TLS': 16}}}}}}, 'side_channel_analysis': {}, 'tee_name': {}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'out of scope': 1}}}}} data.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.stratsec.net/Microsoft-Exchange2010-CC-Certification.aspx', 'http://www.dsd.gov.au/']}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'AU': {'Certificate Number: 2011/72': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 9, 'EAL4+': 1, 'EAL4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.3': 6}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Microsoft': {'Microsoft': 29, 'Microsoft Corporation': 2}}, 'eval_facility': {'atsec': {'atsec': 3}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 7}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {'CVE': {'CVE-2010-3332': 3}}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 2, 'EAL4': 10, 'EAL4 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_FSP.4': 2, 'ADV_IMP.1': 2, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_FLR.3': 6, 'ALC_CMC.4': 2, 'ALC_CMS.4': 2, 'ALC_DEL.1': 2, 'ALC_DVS.1': 2, 'ALC_LCD.1': 2, 'ALC_TAT.1': 2}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_VAN.3': 2}, 'ASE': {'ASE_INT': 2, 'ASE_CCL': 2, 'ASE_SPD': 2, 'ASE_OBJ': 2, 'ASE_REQ': 2, 'ASE_TSS': 2, 'ASE_CCL.1': 2, 'ASE_ECD.1': 2, 'ASE_INT.1': 2, 'ASE_OBJ.2': 2, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2, 'ASE_TSS.1': 2}}, 'cc_sfr': {'FDP': {'FDP_ACF.1': 5, 'FDP_ACC.1': 7, 'FDP_IFF.1': 10, 'FDP_IFC.1': 12}, 'FIA': {'FIA_SOS.1': 7, 'FIA_UAU.2': 6, 'FIA_UID.2': 6, 'FIA_USB.1': 4, 'FIA_SOS.1.1': 1, 'FIA_UAU.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.1': 3, 'FIA_UID.2.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_ATD.1': 4}, 'FMT': {'FMT_MOF.1': 7, 'FMT_SMF.1': 22, 'FMT_MSA.1': 27, 'FMT_MSA.3': 15, 'FMT_MOF.1.1': 1, 'FMT_SMR.1': 28, 'FMT_SMF.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.2': 1}}, 'cc_claims': {'O': {'O.DAC': 14, 'O.CONBLK': 7, 'O.RESTDIST': 7, 'O.REDUCE_SPAM': 6, 'O.MAIL_FLOW': 5, 'O.WIPE': 5}, 'T': {'T.UNAUTH_DAC': 3, 'T.AUTH_DAC': 5, 'T.UNAUTHUSE': 2, 'T.SPAM': 7, 'T.DL_MISUSE': 4}, 'A': {'A.COM_PROT': 2, 'A.INSTALL': 2, 'A.PLATFORM': 2, 'A.BLOCKLIST': 2, 'A.NO_EVIL_ADM': 1, 'A.PHYS_PROTECT': 2, 'A.NO_EVIL_ADMIN': 1}, 'OE': {'OE.PLATFORM': 18, 'OE.COM_PROT': 2, 'OE.INSTALL': 4, 'OE.BLOCKLIST': 2, 'OE.PHYSICAL': 2}, 'OSP': {'OSP.MAIL_FLOW': 3, 'OSP.WIPE': 3}}, 'vendor': {'Microsoft': {'Microsoft': 10}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 18}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 14}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 6}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'RFC': {'RFC 2821': 9, 'RFC 2822': 6}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'the device on receipt of the command is dependent on the platform and configuration and considered out of scope. 4.3 Security objectives for the IT environment Identifier Objective statements OE.PLATFORM The': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The cert_id property was set to Certificate Number: 2011/72.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': 'e9acfa7611ca40a0e4365d143c6c5ac8213a00879778a96ab9b94ea32f8df5be', 'st_pdf_hash': '4a9ec6bc13219418b8ba0b648bbd805a0816074157737ac0288351f1fc5cc367', 'report_txt_hash': '47fe88bbc7df67e9471f2b83da23091b6a74621d9d30066bbe863c8784986369', 'st_txt_hash': '94cf4714ccaf5e9e6db113cca121a677edd61a7b64ff38a21c5f13fc62cd18f1'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'TLS': 7}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'TLS': 18}, 'rules_randomness': {}, 'rules_tee': {'SE': 6}, 'rules_side_channels': {}} values inserted.
  • 21.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:a:microsoft:exchange_server:2010:-:*:*:*:*:x64:*']} values added.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2010-0024', 'CVE-2010-0025']} values added.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 29.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-1999-1322', 'CVE-2000-0216']} values added.
  • 28.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-1999-1322', 'CVE-2000-0216']} values discarded.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['64', '2010']}.
    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:a:microsoft:exchange_server:2010:-:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:exchange_server:2010:*:*:*:*:*:*:*']}.
  • 11.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[1, 'cpe:2.3:a:microsoft:exchange_server:2010:-:*:*:*:*:*:*']] values inserted.
  • 03.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[1, 'cpe:2.3:a:microsoft:exchange_server:2010:*:*:*:*:*:*:*']] values inserted.
  • 01.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[1, 'cpe:2.3:a:microsoft:exchange_server:2010:-:*:*:*:*:*:*']] values inserted.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Microsoft Exchange Server 2010 SP1 Enterprise (English) 64-bit was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": null,
  "dgst": "11708925f70ce5d3",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "Certificate Number: 2011/72",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_15:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_10:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_11:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_27:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_13:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_3:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_4:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_7:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_19:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_18:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_20:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_16:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_9:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_12:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp1:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_6:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_29:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_31:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp2:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_26:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup20:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_22:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_14:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_25:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_5:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_8:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_1:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_17:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_21:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_24:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_30:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_23:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_2:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_28:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2010",
        "64"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-1999-1322",
        "CVE-2019-0724",
        "CVE-2018-8154",
        "CVE-2017-8621",
        "CVE-2012-4791",
        "CVE-2016-0138",
        "CVE-2021-26857",
        "CVE-2014-6319",
        "CVE-2020-0688",
        "CVE-2018-8302",
        "CVE-2019-0817",
        "CVE-2019-1136",
        "CVE-2018-0924",
        "CVE-2018-0940",
        "CVE-2020-17144",
        "CVE-2013-5072",
        "CVE-2013-0418",
        "CVE-2019-1084",
        "CVE-2018-8151",
        "CVE-2000-0216"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Microsoft Corporation",
  "manufacturer_web": "https://www.microsoft.com",
  "name": "Microsoft Exchange Server 2010 SP1 Enterprise (English) 64-bit",
  "not_valid_after": "2017-07-13",
  "not_valid_before": "2011-02-16",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "EFS-T024 CR SP1.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "AU": {
          "Certificate Number: 2011/72": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.3": 9
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 9,
          "EAL4 augmented": 1,
          "EAL4+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 7
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2009-07-001": 2,
          "CCMB-2009-07-002": 2,
          "CCMB-2009-07-003": 2,
          "CCMB-2009-07-004": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 29,
          "Microsoft Corporation": 1
        }
      },
      "vulnerability": {
        "CVE": {
          "CVE-2010-3332": 3
        }
      }
    },
    "report_metadata": {
      "/Author": "roslyn.dinkgreve",
      "/CreationDate": "D:20110415144320",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20110415144320",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Subject": "Certificate Number: 2011/72",
      "/Title": "Certification Report",
      "pdf_file_size_bytes": 745978,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.stratsec.net/Microsoft-Exchange2010-CC-Certification.aspx",
          "http://www.dsd.gov.au/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 25
    },
    "st_filename": "E14_EAL4_ASE_1.0.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.BLOCKLIST": 2,
          "A.COM_PROT": 2,
          "A.INSTALL": 2,
          "A.NO_EVIL_ADM": 1,
          "A.NO_EVIL_ADMIN": 1,
          "A.PHYS_PROTECT": 2,
          "A.PLATFORM": 2
        },
        "O": {
          "O.CONBLK": 6,
          "O.DAC": 14,
          "O.MAIL_FLOW": 5,
          "O.REDUCE_SPAM": 6,
          "O.RESTDIST": 7,
          "O.WIPE": 5
        },
        "OE": {
          "OE.BLOCKLIST": 2,
          "OE.COM_PROT": 2,
          "OE.INSTALL": 3,
          "OE.PHYSICAL": 2,
          "OE.PLATFORM": 18
        },
        "OSP": {
          "OSP.MAIL_FLOW": 3,
          "OSP.WIPE": 3
        },
        "T": {
          "T.AUTH_DAC": 5,
          "T.DL_MISUSE": 4,
          "T.SPAM": 7,
          "T.UNAUTHUSE": 2,
          "T.UNAUTH_DAC": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 2,
          "ADV_FSP.4": 2,
          "ADV_IMP.1": 2,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.4": 2,
          "ALC_CMS.4": 2,
          "ALC_DEL.1": 2,
          "ALC_DVS.1": 2,
          "ALC_FLR.3": 8,
          "ALC_LCD.1": 2,
          "ALC_TAT.1": 2
        },
        "ASE": {
          "ASE_CCL": 2,
          "ASE_CCL.1": 2,
          "ASE_ECD.1": 2,
          "ASE_INT": 2,
          "ASE_INT.1": 2,
          "ASE_OBJ": 2,
          "ASE_OBJ.2": 2,
          "ASE_REQ": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS": 2,
          "ASE_TSS.1": 2
        },
        "ATE": {
          "ATE_COV.2": 2,
          "ATE_DPT.1": 2,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_VAN.3": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 11,
          "EAL4 augmented": 4,
          "EAL4+": 2
        }
      },
      "cc_sfr": {
        "FDP": {
          "FDP_ACC": 20,
          "FDP_ACC.1": 7,
          "FDP_ACF": 24,
          "FDP_ACF.1": 5,
          "FDP_IFC": 39,
          "FDP_IFC.1": 12,
          "FDP_IFF": 70,
          "FDP_IFF.1": 10
        },
        "FIA": {
          "FIA_ATD.1": 3,
          "FIA_SOS.1": 6,
          "FIA_SOS.1.1": 1,
          "FIA_UAU": 1,
          "FIA_UAU.1": 1,
          "FIA_UAU.2": 7,
          "FIA_UAU.2.1": 1,
          "FIA_UID": 1,
          "FIA_UID.1": 2,
          "FIA_UID.2": 4,
          "FIA_UID.2.1": 1,
          "FIA_USB": 1,
          "FIA_USB.1": 5,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MOF.1": 7,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 62,
          "FMT_MSA.1": 28,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 15,
          "FMT_MSA.3.2": 1,
          "FMT_SMF.1": 22,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 18
        }
      },
      "certification_process": {
        "OutOfScope": {
          "out of scope": 1,
          "the device on receipt of the command is dependent on the platform and configuration and considered out of scope. 4.3 Security objectives for the IT environment Identifier Objective statements OE.PLATFORM The": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 16
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "RFC": {
          "RFC 2821": 9,
          "RFC 2822": 6
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 10
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Aaron Doggett (stratsec)",
      "/CreationDate": "D:20101223114445+11\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20101223114445+11\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "/Subject": "EAL4 Security Target",
      "/Title": "Exchange 2010",
      "pdf_file_size_bytes": 861830,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 66
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/EFS-T024%20CR%20SP1.pdf",
  "scheme": "AU",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_FLR.3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/E14_EAL4_ASE_1.0.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e9acfa7611ca40a0e4365d143c6c5ac8213a00879778a96ab9b94ea32f8df5be",
      "txt_hash": "47fe88bbc7df67e9471f2b83da23091b6a74621d9d30066bbe863c8784986369"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4a9ec6bc13219418b8ba0b648bbd805a0816074157737ac0288351f1fc5cc367",
      "txt_hash": "94cf4714ccaf5e9e6db113cca121a677edd61a7b64ff38a21c5f13fc62cd18f1"
    }
  },
  "status": "archived"
}