This page was not yet optimized for use on mobile devices.
Apple macOS 13 Ventura
This certificate has known related CVEs, which means that
the certified
product might be vulnerable.
CSV information ?
Status | active |
---|---|
Valid from | 06.02.2024 |
Valid until | 06.02.2026 |
Scheme | 🇺🇸 US |
Manufacturer | Apple Inc. |
Category | Operating Systems |
Security level | |
Protection profiles |
Heuristics summary ?
Certificate ID: CCEVS-VR-VID-11347-2024
Certificate ?
Extracted keywords
Certificates
CCEVS-VR-VID11347-2024Evaluation facilities
atsecFile metadata
Creation date: | D:20240212111807-05'00' |
---|---|
Modification date: | D:20240212111807-05'00' |
Pages: | 1 |
Producer: | iText 2.1.0 (by lowagie.com) |
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, HMACAsymmetric Algorithms
ECDSAProtocols
TLS 1.2, TLS, VPNRandomness
TRNG, DRBGBlock cipher modes
CBCVendor
BroadcomCertificates
CCEVS-VR-VID11347-2024Evaluation facilities
atsecFile metadata
Creation date: | D:20240212111436-05'00' |
---|---|
Modification date: | D:20240212111436-05'00' |
Pages: | 23 |
Creator: | Microsoft® Word 2019 |
Producer: | Microsoft® Word 2019 |
Frontpage
Certificate ID: | CCEVS-VR-VID11347-2024 |
---|---|
Certified item: | Apple macOS 13 Ventura |
Certification lab: | US NIAP |
References
No references.
Security target ?
Extracted keywords
Symmetric Algorithms
AES, AES-256, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, CBC-MACAsymmetric Algorithms
RSA 4096, ECDH, ECDHE, ECDSA, ECC, Diffie-HellmanHash functions
SHA-1, SHA-256, SHA-384, SHA-512, PBKDF2, PBKDFSchemes
MAC, Key AgreementProtocols
TLS, TLS 1.2, PGPRandomness
TRNG, DRBG, RBGElliptic Curves
P-256, P-384, P-521, curve P-256, P-512, secp256r1, secp384r1, secp521r1Block cipher modes
CBC, GCM, CCMTLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHAVendor
BroadcomClaims
O.ACCOUNTABILITY, O.INTEGRITY, O.MANAGEMENT, O.PROTECTED_STORAGE, O.PROTECTED_COMMS, T.NETWORK_ATTACK, T.NETWORK_EAVESDROP, T.LOCAL_ATTACK, T.LIMITED_PHYSICAL_ACCESS, A.PLATFORM, A.PROPER_USER, A.PROPER_ADMIN, OE.PLATFORM, OE.PROPER_USER, OE.PROPER_ADMINSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_TSU_EXT.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN, FAU_GEN.1.1, FAU_GEN.1.2, FCS_CKM.1, FCS_CKM.2, FCS_CKM_EXT.4, FCS_CKM_EXT.8, FCS_COP.1, FCS_RBG_EXT.1, FCS_STO_EXT.1, FCS_TLSC_EXT.1, FCS_TLSC_EXT.2, FCS_TLSC_EXT.4, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM_EXT.4.1, FCS_CKM_EXT.4.2, FCS_CKM_EXT.8.1, FCS_COP.1.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_STO_EXT.1.1, FCS_TLSC_EXT.1.1, FCS_TLSC_EXT.1.2, FCS_TLSC_EXT.1.3, FCS_TLSC_EXT.2.1, FCS_TLSC_EXT.4.1, FDP_ACF_EXT.1, FDP_ACF_EXT.1.1, FIA_AFL.1, FIA_BLT_EXT.1, FIA_BLT_EXT.2, FIA_BLT_EXT.3, FIA_BLT_EXT.4, FIA_BLT_EXT.6, FIA_BLT_EXT.7, FIA_UAU.5, FIA_BLT_EXT.5, FIA_AFL.1.1, FIA_AFL.1.2, FIA_BLT_EXT.1.1, FIA_BLT_EXT.2.1, FIA_BLT_EXT.3.1, FIA_BLT_EXT.4.1, FIA_BLT_EXT.4.2, FIA_BLT_EXT.6.1, FIA_BLT_EXT.7.1, FIA_UAU.5.1, FIA_UAU.5.2, FMT_MOF_EXT.1, FMT_MOF_EXT, FMT_SMF_EXT.1, FMT_SMF_EXT, FMT_MOF_EXT.1.1, FMT_SMF_EXT.1.1, FPT_ACF_EXT.1, FPT_ASLR_EXT.1, FPT_SBOP_EXT.1, FPT_TST_EXT.1, FPT_TUD_EXT.1, FPT_TUD_EXT.2, FPT_TUD_EXT, FPT_ACF_EXT.1.1, FPT_ACF_EXT.1.2, FPT_ASLR_EXT.1.1, FPT_SBOP_EXT.1.1, FPT_TST_EXT.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.2.1, FPT_TUD_EXT.2.2, FTA_TAB.1, FTA_TAB.1.1, FTP_BLT_EXT.1, FTP_BLT_EXT.2, FTP_BLT_EXT, FTP_ITC_EXT.1, FTP_TRP.1, FTP_BLT_EXT.1.1, FTP_BLT_EXT.1.2, FTP_BLT_EXT.2.1, FTP_BLT_EXT.3, FTP_ITC_EXT.1.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Certification process
out of scope, The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER PP Origin: OSPP The user of the OS is not willfully negligent or hostileCertification process
out of scope, The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER PP Origin: OSPP The user of the OS is not willfully negligent or hostileStandards
FIPS PUB 186-4, FIPS 140-3, FIPS186-4, FIPS198-1, NIST SP 800-38A, NIST SP 800-38D, NIST SP 800-38C, NIST SP 800-57, NIST SP 800-56A, RFC 8017, RFC 5246, RFC 5288, RFC 5289, RFC 6125, RFC 5280, RFC 6960, RFC8017, X.509, x.509File metadata
Title: | Apple macOS 13 Ventura Security Target (version 1.1 as of ) |
---|---|
Subject: | Apple macOS 13 Ventura |
Keywords: | macOS, operating system |
Author: | Alejandro Masino |
Creation date: | D:20240112163408-03'00' |
Pages: | 75 |
Creator: | Generated by CCTool version 2.9-beta17 |
Producer: | Apache FOP Version 2.8 |
References
No references.
Heuristics ?
Certificate ID: CCEVS-VR-VID-11347-2024
Extracted SARs
ALC_CMS.1, ASE_REQ.2, ALC_TSU_EXT.1, ASE_CCL.1, ASE_INT.1, ADV_FSP.1, ASE_OBJ.2, ATE_IND.1, AGD_OPE.1, AVA_VAN.1, ASE_SPD.1, ALC_CMC.1, AGD_PRE.1, ASE_ECD.1, ASE_TSS.1Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-1999-0590 | HIGH | 10.0 | 10.0 | 01.06.2000 04:00 | ||
CVE-2001-0102 | HIGH | 7.2 | 10.0 | 12.02.2001 05:00 | ||
CVE-2021-39537 | HIGH | 8.8 | 5.9 | 20.09.2021 16:15 | ||
CVE-2022-24836 | HIGH | 7.5 | 3.6 | 11.04.2022 22:15 | ||
CVE-2022-29181 | HIGH | 8.2 | 4.2 | 20.05.2022 19:15 | ||
CVE-2022-32942 | HIGH | 7.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-32943 | MEDIUM | 5.3 | 1.4 | 15.12.2022 19:15 | ||
CVE-2022-42837 | CRITICAL | 9.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-42840 | HIGH | 7.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-42841 | HIGH | 7.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-42842 | CRITICAL | 9.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-42843 | MEDIUM | 5.5 | 3.6 | 15.12.2022 19:15 | ||
CVE-2022-42845 | HIGH | 7.2 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-42847 | HIGH | 7.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-42852 | MEDIUM | 6.5 | 3.6 | 15.12.2022 19:15 | ||
CVE-2022-42853 | MEDIUM | 5.5 | 3.6 | 15.12.2022 19:15 | ||
CVE-2022-42854 | MEDIUM | 5.5 | 3.6 | 15.12.2022 19:15 | ||
CVE-2022-42855 | HIGH | 7.1 | 5.2 | 15.12.2022 19:15 | ||
CVE-2022-42856 | HIGH | 8.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-42858 | HIGH | 7.8 | 5.9 | 10.04.2023 19:15 | ||
CVE-2022-42859 | MEDIUM | 5.5 | 3.6 | 15.12.2022 19:15 | ||
CVE-2022-42861 | HIGH | 8.8 | 6.0 | 15.12.2022 19:15 | ||
CVE-2022-42862 | MEDIUM | 5.5 | 3.6 | 15.12.2022 19:15 | ||
CVE-2022-42863 | HIGH | 8.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-42864 | HIGH | 7.0 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-42865 | MEDIUM | 5.5 | 3.6 | 15.12.2022 19:15 | ||
CVE-2022-42866 | MEDIUM | 5.5 | 3.6 | 15.12.2022 19:15 | ||
CVE-2022-42867 | HIGH | 8.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-42915 | CRITICAL | 9.8 | 5.9 | 29.10.2022 20:15 | ||
CVE-2022-42916 | HIGH | 7.5 | 3.6 | 29.10.2022 02:15 | ||
CVE-2022-46689 | HIGH | 7.0 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-46690 | HIGH | 7.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-46691 | HIGH | 8.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-46692 | MEDIUM | 5.5 | 3.6 | 15.12.2022 19:15 | ||
CVE-2022-46693 | HIGH | 7.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-46695 | MEDIUM | 6.5 | 3.6 | 15.12.2022 19:15 | ||
CVE-2022-46696 | HIGH | 8.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-46697 | HIGH | 7.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-46698 | MEDIUM | 6.5 | 3.6 | 15.12.2022 19:15 | ||
CVE-2022-46699 | HIGH | 8.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-46700 | HIGH | 8.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-46701 | HIGH | 7.8 | 5.9 | 15.12.2022 19:15 | ||
CVE-2022-46703 | MEDIUM | 5.5 | 3.6 | 10.04.2023 19:15 | ||
CVE-2022-46704 | MEDIUM | 5.5 | 3.6 | 27.02.2023 20:15 | ||
CVE-2022-46705 | MEDIUM | 4.3 | 1.4 | 27.02.2023 20:15 | ||
CVE-2022-46716 | HIGH | 7.5 | 3.6 | 10.04.2023 19:15 | ||
CVE-2023-23493 | LOW | 3.3 | 1.4 | 27.02.2023 20:15 | ||
CVE-2023-23496 | HIGH | 8.8 | 5.9 | 27.02.2023 20:15 | ||
CVE-2023-23497 | HIGH | 7.8 | 5.9 | 27.02.2023 20:15 | ||
CVE-2023-23498 | LOW | 3.3 | 1.4 | 27.02.2023 20:15 | ||
CVE-2023-23499 | MEDIUM | 5.5 | 3.6 | 27.02.2023 20:15 | ||
CVE-2023-23500 | MEDIUM | 5.5 | 3.6 | 27.02.2023 20:15 | ||
CVE-2023-23501 | MEDIUM | 5.5 | 3.6 | 27.02.2023 20:15 | ||
CVE-2023-23502 | MEDIUM | 5.5 | 3.6 | 27.02.2023 20:15 | ||
CVE-2023-23503 | MEDIUM | 5.5 | 3.6 | 27.02.2023 20:15 | ||
CVE-2023-23504 | HIGH | 7.8 | 5.9 | 27.02.2023 20:15 | ||
CVE-2023-23505 | LOW | 3.3 | 1.4 | 27.02.2023 20:15 | ||
CVE-2023-23506 | MEDIUM | 5.5 | 3.6 | 27.02.2023 20:15 | ||
CVE-2023-23507 | HIGH | 7.8 | 5.9 | 27.02.2023 20:15 | ||
CVE-2023-23508 | MEDIUM | 5.5 | 3.6 | 27.02.2023 20:15 | ||
CVE-2023-23510 | MEDIUM | 5.5 | 3.6 | 27.02.2023 20:15 | ||
CVE-2023-23511 | MEDIUM | 5.5 | 3.6 | 27.02.2023 20:15 | ||
CVE-2023-23512 | MEDIUM | 6.5 | 3.6 | 27.02.2023 20:15 | ||
CVE-2023-23513 | CRITICAL | 9.8 | 5.9 | 27.02.2023 20:15 | ||
CVE-2023-23514 | HIGH | 7.8 | 5.9 | 27.02.2023 20:15 | ||
CVE-2023-23517 | HIGH | 8.8 | 5.9 | 27.02.2023 20:15 | ||
CVE-2023-23518 | HIGH | 8.8 | 5.9 | 27.02.2023 20:15 | ||
CVE-2023-23519 | HIGH | 7.5 | 3.6 | 27.02.2023 20:15 | ||
CVE-2023-23520 | MEDIUM | 5.9 | 3.6 | 27.02.2023 20:15 | ||
CVE-2023-23522 | MEDIUM | 5.5 | 3.6 | 27.02.2023 20:15 | ||
CVE-2023-23524 | HIGH | 7.5 | 3.6 | 27.02.2023 20:15 | ||
CVE-2023-23529 | HIGH | 8.8 | 5.9 | 27.02.2023 20:15 | ||
CVE-2023-23530 | HIGH | 8.6 | 6.0 | 27.02.2023 20:15 | ||
CVE-2023-23531 | HIGH | 8.6 | 6.0 | 27.02.2023 20:15 | ||
CVE-2023-28205 | HIGH | 8.8 | 5.9 | 10.04.2023 19:15 | ||
CVE-2023-28206 | HIGH | 8.6 | 6.0 | 10.04.2023 19:15 |
Scheme data ?
Product | Apple macOS 13 Ventura | |
---|---|---|
Vendor | Apple Inc. | |
Product Link | https://www.niap-ccevs.org/Product/Compliant.cfm?PID=11347 | |
Id | 11347 | |
Cc Claim | ·MOD_BT_V1.0 ·PP_OS_V4.2.1 | |
Cert Lab | atsec information security corporation | |
Certification Date | 2024.02.06 | |
Assurance Maintenance Date | 2026.02.06 | |
Enhanced | ||
Certification Date | 2024.02.06 | |
Cert Id | CCEVS-VR-VID11347-2024 | |
Product Type | Operating System | |
Cc Claim | Protection Profile Compliant | |
Protection Profile | PP-Module for Bluetooth Version 1.0 | |
Evaluation Facility | atsec information security corporation | |
Cert Link | https://www.niap-ccevs.org/MMO/Product/st_vid11347-ci.pdf | |
Target Link | https://www.niap-ccevs.org/MMO/Product/st_vid11347-st.pdf | |
Report Link | https://www.niap-ccevs.org/MMO/Product/st_vid11347-vr.pdf | |
Assurance Activity Link | https://www.niap-ccevs.org/MMO/Product/st_vid11347-aar.pdf | |
Administrative Guides | [frozendict({'link': 'https://www.niap-ccevs.org/MMO/Product/st_vid11347-agd.pdf'})] |
References ?
No references are available for this certificate.
Updates ?
-
15.02.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a01e4a35e7d3eb305bc2f2631e5df0c027778b3fc873656bdc627192eb38fdbb', 'txt_hash': '340f6b03a643df20d5d8e02b0636be6c261b22c98349c813b6f4be61b15ba7c8'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e847d89047bcf69eb2371b7f04892fd2aadd9fe6c7f0c482f2070b234078610b', 'txt_hash': '06ec5eee9d68c64c5c725969663a6997c6e09465e08370c7842420088ca6b320'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a2a552381f227e14460ad033ed84fa8db2db6b1b35b03fe9d201a8d94f9ee1e0', 'txt_hash': '85d18d856f1123eec71f1948659f9233943eb705593a0af9dfbf19ef4e2d7504'}}
. - The following properties were deleted:
['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash']
.
The PDF extraction data was updated.
- The following values were inserted:
{'cert_metadata': {'pdf_file_size_bytes': 187072, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/ModDate': "D:20240212111807-05'00'", '/CreationDate': "D:20240212111807-05'00'", '/Producer': 'iText 2.1.0 (by lowagie.com)', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'US': {'CCEVS-VR-VID11347-2024': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'atsec': {'atsec': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': 'st_vid11347-ci.pdf'}
. - The report_frontpage property was set to
{'US': {'cert_id': 'CCEVS-VR-VID11347-2024', 'cert_item': 'Apple macOS 13 Ventura', 'cert_lab': 'US NIAP'}}
. - The st_frontpage property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
CCEVS-VR-VID-11347-2024
.
- The following values were inserted:
-
13.02.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Apple macOS 13 Ventura was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Operating Systems",
"cert_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid11347-ci.pdf",
"dgst": "121516053d432d1e",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CCEVS-VR-VID-11347-2024",
"cert_lab": [
"US"
],
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:apple:macos:13.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:13.1:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TSU_EXT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"13"
]
},
"indirect_transitive_cves": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2023-23517",
"CVE-2023-23500",
"CVE-2022-42859",
"CVE-2022-42916",
"CVE-2022-46692",
"CVE-2022-42858",
"CVE-2023-23512",
"CVE-2022-46690",
"CVE-2022-46703",
"CVE-2022-32943",
"CVE-2023-23502",
"CVE-2022-46705",
"CVE-2022-46698",
"CVE-2022-46695",
"CVE-2022-42866",
"CVE-2022-42853",
"CVE-2022-46701",
"CVE-2023-23507",
"CVE-2022-46696",
"CVE-2023-23518",
"CVE-2023-28206",
"CVE-2022-42847",
"CVE-2022-46689",
"CVE-2022-46700",
"CVE-2023-23508",
"CVE-2023-23510",
"CVE-2022-42915",
"CVE-2022-42842",
"CVE-2001-0102",
"CVE-2023-23524",
"CVE-2022-42843",
"CVE-2022-42864",
"CVE-2022-42837",
"CVE-2023-23522",
"CVE-2022-29181",
"CVE-2023-23505",
"CVE-2023-23531",
"CVE-2023-23503",
"CVE-2023-23498",
"CVE-2022-42861",
"CVE-2022-32942",
"CVE-2022-42867",
"CVE-2023-28205",
"CVE-2023-23499",
"CVE-2022-42863",
"CVE-2022-42852",
"CVE-2022-46693",
"CVE-2022-46699",
"CVE-2022-24836",
"CVE-2023-23519",
"CVE-2023-23520",
"CVE-2023-23514",
"CVE-2022-46691",
"CVE-2023-23497",
"CVE-2023-23493",
"CVE-2023-23496",
"CVE-2022-42840",
"CVE-2023-23530",
"CVE-2022-42862",
"CVE-2023-23501",
"CVE-2023-23513",
"CVE-1999-0590",
"CVE-2022-42865",
"CVE-2022-42855",
"CVE-2023-23529",
"CVE-2023-23504",
"CVE-2022-46716",
"CVE-2022-42841",
"CVE-2021-39537",
"CVE-2022-46697",
"CVE-2022-42845",
"CVE-2022-42854",
"CVE-2023-23511",
"CVE-2023-23506",
"CVE-2022-42856",
"CVE-2022-46704"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"assurance_maintenance_date": "2026.02.06",
"cc_claim": "\u00b7MOD_BT_V1.0\n \n \u00b7PP_OS_V4.2.1",
"cert_lab": "atsec information security corporation",
"certification_date": "2024.02.06",
"enhanced": {
"administrative_guides": [
{
"link": "https://www.niap-ccevs.org/MMO/Product/st_vid11347-agd.pdf"
}
],
"assurance_activity_link": "https://www.niap-ccevs.org/MMO/Product/st_vid11347-aar.pdf",
"cc_claim": "Protection Profile Compliant",
"cert_id": "CCEVS-VR-VID11347-2024",
"cert_link": "https://www.niap-ccevs.org/MMO/Product/st_vid11347-ci.pdf",
"certification_date": "2024.02.06",
"evaluation_facility": "atsec information security corporation",
"product_type": "Operating System",
"protection_profile": "PP-Module for Bluetooth Version 1.0",
"report_link": "https://www.niap-ccevs.org/MMO/Product/st_vid11347-vr.pdf",
"target_link": "https://www.niap-ccevs.org/MMO/Product/st_vid11347-st.pdf"
},
"id": "11347",
"product": "Apple macOS 13 Ventura",
"product_link": "https://www.niap-ccevs.org/Product/Compliant.cfm?PID=11347",
"vendor": "Apple Inc."
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Apple Inc.",
"manufacturer_web": "https://www.apple.com/",
"name": "Apple macOS 13 Ventura",
"not_valid_after": "2026-02-06",
"not_valid_before": "2024-02-06",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "st_vid11347-ci.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"US": {
"CCEVS-VR-VID11347-2024": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20240212111807-05\u002700\u0027",
"/ModDate": "D:20240212111807-05\u002700\u0027",
"/Producer": "iText 2.1.0 (by lowagie.com)",
"pdf_file_size_bytes": 187072,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "st_vid11347-vr.pdf",
"report_frontpage": {
"US": {
"cert_id": "CCEVS-VR-VID11347-2024",
"cert_item": "Apple macOS 13 Ventura",
"cert_lab": "US NIAP"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 1
}
}
},
"cc_cert_id": {
"US": {
"CCEVS-VR-VID11347-2024": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 3,
"TLS 1.2": 2
}
},
"VPN": {
"VPN": 3
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 5
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 1
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"constructions": {
"MAC": {
"HMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Broadcom": {
"Broadcom": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20240212111436-05\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2019",
"/ModDate": "D:20240212111436-05\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2019",
"pdf_file_size_bytes": 507002,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 23
},
"st_filename": "st_vid11347-st.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 4
},
"ECDH": {
"ECDH": 7,
"ECDHE": 3
},
"ECDSA": {
"ECDSA": 8
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
}
},
"RSA": {
"RSA 4096": 1
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.PLATFORM": 4,
"A.PROPER_ADMIN": 4,
"A.PROPER_USER": 4
},
"O": {
"O.ACCOUNTABILITY": 8,
"O.INTEGRITY": 20,
"O.MANAGEMENT": 11,
"O.PROTECTED_COMMS": 32,
"O.PROTECTED_STORAGE": 8
},
"OE": {
"OE.PLATFORM": 3,
"OE.PROPER_ADMIN": 3,
"OE.PROPER_USER": 3
},
"T": {
"T.LIMITED_PHYSICAL_ACCESS": 3,
"T.LOCAL_ATTACK": 2,
"T.NETWORK_ATTACK": 11,
"T.NETWORK_EAVESDROP": 5
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.1": 1,
"ALC_CMS.1": 1,
"ALC_TSU_EXT.1": 10
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_IND.1": 1
},
"AVA": {
"AVA_VAN.1": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 10,
"FAU_GEN.1": 12,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1
},
"FCS": {
"FCS_CKM.1": 11,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 12,
"FCS_CKM.2.1": 1,
"FCS_CKM_EXT.4": 10,
"FCS_CKM_EXT.4.1": 2,
"FCS_CKM_EXT.4.2": 1,
"FCS_CKM_EXT.8": 11,
"FCS_CKM_EXT.8.1": 1,
"FCS_COP.1": 57,
"FCS_COP.1.1": 4,
"FCS_RBG_EXT.1": 12,
"FCS_RBG_EXT.1.1": 1,
"FCS_RBG_EXT.1.2": 1,
"FCS_STO_EXT.1": 9,
"FCS_STO_EXT.1.1": 1,
"FCS_TLSC_EXT.1": 11,
"FCS_TLSC_EXT.1.1": 1,
"FCS_TLSC_EXT.1.2": 1,
"FCS_TLSC_EXT.1.3": 1,
"FCS_TLSC_EXT.2": 9,
"FCS_TLSC_EXT.2.1": 1,
"FCS_TLSC_EXT.4": 9,
"FCS_TLSC_EXT.4.1": 1
},
"FDP": {
"FDP_ACF_EXT.1": 10,
"FDP_ACF_EXT.1.1": 1
},
"FIA": {
"FIA_AFL.1": 9,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_BLT_EXT.1": 10,
"FIA_BLT_EXT.1.1": 1,
"FIA_BLT_EXT.2": 10,
"FIA_BLT_EXT.2.1": 1,
"FIA_BLT_EXT.3": 12,
"FIA_BLT_EXT.3.1": 1,
"FIA_BLT_EXT.4": 10,
"FIA_BLT_EXT.4.1": 1,
"FIA_BLT_EXT.4.2": 1,
"FIA_BLT_EXT.5": 2,
"FIA_BLT_EXT.6": 11,
"FIA_BLT_EXT.6.1": 1,
"FIA_BLT_EXT.7": 10,
"FIA_BLT_EXT.7.1": 1,
"FIA_UAU.5": 9,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1
},
"FMT": {
"FMT_MOF_EXT": 10,
"FMT_MOF_EXT.1": 10,
"FMT_MOF_EXT.1.1": 1,
"FMT_SMF_EXT": 11,
"FMT_SMF_EXT.1": 12,
"FMT_SMF_EXT.1.1": 2
},
"FPT": {
"FPT_ACF_EXT.1": 9,
"FPT_ACF_EXT.1.1": 1,
"FPT_ACF_EXT.1.2": 1,
"FPT_ASLR_EXT.1": 9,
"FPT_ASLR_EXT.1.1": 1,
"FPT_SBOP_EXT.1": 9,
"FPT_SBOP_EXT.1.1": 1,
"FPT_TST_EXT.1": 9,
"FPT_TST_EXT.1.1": 1,
"FPT_TUD_EXT": 1,
"FPT_TUD_EXT.1": 10,
"FPT_TUD_EXT.1.1": 1,
"FPT_TUD_EXT.1.2": 1,
"FPT_TUD_EXT.2": 9,
"FPT_TUD_EXT.2.1": 1,
"FPT_TUD_EXT.2.2": 1
},
"FTA": {
"FTA_TAB.1": 9,
"FTA_TAB.1.1": 1
},
"FTP": {
"FTP_BLT_EXT": 23,
"FTP_BLT_EXT.1": 10,
"FTP_BLT_EXT.1.1": 1,
"FTP_BLT_EXT.1.2": 1,
"FTP_BLT_EXT.2": 10,
"FTP_BLT_EXT.2.1": 1,
"FTP_BLT_EXT.3": 2,
"FTP_ITC_EXT.1": 11,
"FTP_ITC_EXT.1.1": 1,
"FTP_TRP.1": 9,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {
"OutOfScope": {
"The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER PP Origin: OSPP The user of the OS is not willfully negligent or hostile": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"CCM": {
"CCM": 3
},
"GCM": {
"GCM": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PGP": {
"PGP": 2
},
"TLS": {
"TLS": {
"TLS": 53,
"TLS 1.2": 5
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 33,
"P-384": 28,
"P-512": 2,
"P-521": 34,
"curve P-256": 1,
"secp256r1": 2,
"secp384r1": 2,
"secp521r1": 2
}
},
"eval_facility": {},
"hash_function": {
"PBKDF": {
"PBKDF": 1,
"PBKDF2": 2
},
"SHA": {
"SHA1": {
"SHA-1": 13
},
"SHA2": {
"SHA-256": 23,
"SHA-384": 12,
"SHA-512": 18
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 5
},
"RNG": {
"RBG": 2
},
"TRNG": {
"TRNG": 3
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-3": 1,
"FIPS PUB 186-4": 7,
"FIPS186-4": 6,
"FIPS198-1": 2
},
"NIST": {
"NIST SP 800-38A": 2,
"NIST SP 800-38C": 2,
"NIST SP 800-38D": 2,
"NIST SP 800-56A": 1,
"NIST SP 800-57": 1
},
"RFC": {
"RFC 5246": 6,
"RFC 5280": 3,
"RFC 5288": 4,
"RFC 5289": 8,
"RFC 6125": 2,
"RFC 6960": 1,
"RFC 8017": 2,
"RFC8017": 2
},
"X509": {
"X.509": 13,
"x.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 20,
"AES-256": 3
}
},
"constructions": {
"MAC": {
"CBC-MAC": 2,
"HMAC": 5,
"HMAC-SHA-256": 5,
"HMAC-SHA-384": 4,
"HMAC-SHA-512": 4
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA": 1,
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 2,
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA": 1,
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 2,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": 1,
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 2,
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": 1,
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 2,
"TLS_RSA_WITH_AES_128_CBC_SHA": 2,
"TLS_RSA_WITH_AES_128_GCM_SHA256": 2,
"TLS_RSA_WITH_AES_256_CBC_SHA": 2,
"TLS_RSA_WITH_AES_256_GCM_SHA384": 2
}
},
"vendor": {
"Broadcom": {
"Broadcom": 9
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Alejandro Masino",
"/CreationDate": "D:20240112163408-03\u002700\u0027",
"/Creator": "Generated by CCTool version 2.9-beta17",
"/Keywords": "macOS, operating system",
"/Producer": "Apache FOP Version 2.8",
"/Subject": "Apple macOS 13 Ventura",
"/Title": "Apple macOS 13 Ventura Security Target (version 1.1 as of )",
"pdf_file_size_bytes": 612098,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://support.apple.com/HT201220",
"https://support.apple.com/kb/HT201214",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36116",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0365",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0645",
"https://www.bluetooth.com/specifications/",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=30198",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16806",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0630",
"https://csrc.nist.gov/pubs/fips/186-4/final",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36719",
"https://www.niap-ccevs.org/MMO/PP/CFG_GPOS-BT_V1.0.pdf",
"https://csrc.nist.gov/pubs/sp/800/38/a/final",
"https://www.niap-ccevs.org/MMO/PP/PP_OS_V4.2.1.pdf",
"https://csrc.nist.gov/pubs/sp/800/90/a/r1/final",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0680",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0441",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0649",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0600",
"https://csrc.nist.gov/pubs/sp/800/38/d/final",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36233",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=11217",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0640",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16017",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16666",
"http://www.ietf.org/rfc/rfc8017.txt",
"https://www.apple.com/legal/intellectual-property/trademark/appletmlist.html",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36097",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36093",
"https://lists.apple.com/mailman/listinfo/security-announce/",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36119",
"https://csrc.nist.gov/pubs/sp/800/38/c/upd1/final",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=15968",
"https://www.niap-ccevs.org/MMO/Product/st_vid11347-agd.pdf",
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R5.pdf",
"https://csrc.nist.gov/pubs/sp/800/56/a/r3/final",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0501",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0707",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0493",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0685",
"https://csrc.nist.gov/pubs/fips/198-1/final",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36098",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16030",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=13842",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=16039",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36096",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=6904",
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R5.pdf",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=9226",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0650",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0463",
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R5.pdf",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0386",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0715",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0671",
"https://support.apple.com/HT201222",
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=1352",
"https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0578",
"https://www.niap-ccevs.org/Profile/Info.cfm?PPID=425\u0026id=425"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 75
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL1",
"pp_ids": {
"_type": "Set",
"elements": [
"PP_OS_V4.2.1"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/PP_OS_V4.2.1.pdf",
"pp_name": "Protection Profile for General Purpose Operating Systems, Version 4.2.1"
},
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/MOD_BT_V1.0.pdf",
"pp_name": "PP-Module for Bluetooth Version 1.0"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid11347-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": []
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid11347-st.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "a2a552381f227e14460ad033ed84fa8db2db6b1b35b03fe9d201a8d94f9ee1e0",
"txt_hash": "85d18d856f1123eec71f1948659f9233943eb705593a0af9dfbf19ef4e2d7504"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "a01e4a35e7d3eb305bc2f2631e5df0c027778b3fc873656bdc627192eb38fdbb",
"txt_hash": "340f6b03a643df20d5d8e02b0636be6c261b22c98349c813b6f4be61b15ba7c8"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e847d89047bcf69eb2371b7f04892fd2aadd9fe6c7f0c482f2070b234078610b",
"txt_hash": "06ec5eee9d68c64c5c725969663a6997c6e09465e08370c7842420088ca6b320"
}
},
"status": "active"
}