Cisco Web Security Appliance with AsyncOS 11.8
CSV information ?
Status | active |
---|---|
Valid from | 21.04.2022 |
Valid until | 21.04.2027 |
Scheme | 🇨🇦 CA |
Manufacturer | Cisco Systems, Inc. |
Category | Network and Network-Related Devices and Systems |
Security level |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
File metadata
Author: | Sinitski, Kiril |
---|---|
Creation date: | D:20220421102208-04'00' |
Modification date: | D:20220421102209-04'00' |
Pages: | 18 |
Creator: | Microsoft® Word for Microsoft 365 |
Producer: | Microsoft® Word for Microsoft 365 |
Frontpage
Certificate ID: | 567-LSS |
---|---|
Certification lab: | CANADA |
References
Security target ?
Extracted keywords
File metadata
Title: | ST |
---|---|
Author: | Cisco CC TME |
Creation date: | D:20220420150145-04'00' |
Modification date: | D:20220420150145-04'00' |
Pages: | 115 |
Creator: | Microsoft® Word for Microsoft 365 |
Producer: | Microsoft® Word for Microsoft 365 |
References
Heuristics ?
Extracted SARs
ASE_CCL.1, ASE_INT.1, ASE_SPD.1, ASE_REQ.1, ALC_CMC.1, AGD_OPE.1, ASE_ECD.1, AGD_PRE.1, AVA_VAN.1, ASE_OBJ.1, ADV_FSP.1, ATE_IND.1, ASE_TSS.1, ALC_CMS.1CPE matches
Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-2018-0093 | MEDIUM | 6.1 | 2.7 | 18.01.2018 06:29 | ||
CVE-2020-3117 | MEDIUM | 4.7 | 1.4 | 23.09.2020 01:15 | ||
CVE-2020-3164 | MEDIUM | 5.3 | 1.4 | 04.03.2020 19:15 | ||
CVE-2020-3367 | HIGH | 7.8 | 5.9 | 18.11.2020 18:15 | ||
CVE-2020-3368 | MEDIUM | 5.8 | 1.4 | 18.06.2020 03:15 | ||
CVE-2020-3546 | MEDIUM | 5.3 | 1.4 | 04.09.2020 03:15 | ||
CVE-2020-3547 | MEDIUM | 6.5 | 3.6 | 04.09.2020 03:15 | ||
CVE-2020-3568 | MEDIUM | 5.8 | 1.4 | 08.10.2020 05:15 | ||
CVE-2021-1129 | MEDIUM | 5.3 | 1.4 | 20.01.2021 20:15 | ||
CVE-2021-1359 | HIGH | 8.8 | 5.9 | 08.07.2021 19:15 | ||
CVE-2021-1490 | MEDIUM | 6.1 | 2.7 | 06.05.2021 13:15 | ||
CVE-2021-1534 | MEDIUM | 5.3 | 1.4 | 06.10.2021 20:15 | ||
CVE-2021-1566 | HIGH | 7.4 | 5.2 | 16.06.2021 18:15 | ||
CVE-2021-34741 | HIGH | 7.5 | 3.6 | 04.11.2021 16:15 | ||
CVE-2022-20653 | HIGH | 7.5 | 3.6 | 17.02.2022 15:15 | ||
CVE-2022-20781 | MEDIUM | 5.4 | 2.7 | 06.04.2022 19:15 | ||
CVE-2022-20784 | MEDIUM | 5.3 | 1.4 | 06.04.2022 18:15 |
References ?
No references are available for this certificate.
Updates ?
-
27.05.2022 The certificate became unavailable,
either the certification report or the security target was unavailable during
processing.
Certificate removed
A Common Criteria certificate for a product named Cisco Web Security Appliance with AsyncOS 11.8 is not available. This means that either its certification report or security target could not be downloaded during processing.
-
21.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
{'_type': 'Set', 'elements': ['cpe:2.3:a:cisco:web_security_appliance:11.8.0-382:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:web_security_appliance:11.8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:asyncos:11.8.0:*:*:*:*:*:*:*']}
values added. - The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2018-0093', 'CVE-2022-20784', 'CVE-2020-3117', 'CVE-2021-1129', 'CVE-2021-1490', 'CVE-2020-3367', 'CVE-2021-1359', 'CVE-2020-3164']}
values added.
- The cpe_matches property was updated, with the
-
13.05.2022 The certificate data changed.
Certificate changed
The security_level was updated.
- The new value is
{'_type': 'Set', 'elements': []}
.
The computed heuristics were updated.
- The following values were inserted:
{'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 1}]}}
.
- The new value is
-
04.05.2022 The certificate data changed.
Certificate changed
The Valid until date was updated.
- The new value is
2027-04-21
.
- The new value is
-
24.04.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'direct_dependency_cves': None, 'indirect_dependency_cves': None}
.
- The following values were inserted:
-
22.04.2022 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Cisco Web Security Appliance with AsyncOS 11.8 was processed.
Raw data
{
"_type": "CommonCriteriaCert",
"category": "Network and Network-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/files/epfiles/567-LSS%20CT%20v1.2%20Eng.pdf",
"dgst": "3af72451867b3187",
"heuristics": {
"_type": "CCHeuristics",
"cert_id": "567-LSS",
"cert_lab": [
"CANADA"
],
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:a:cisco:web_security_appliance:11.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:web_security_appliance:11.8.0-382:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asyncos:11.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asyncos:11.8.0:*:*:*:*:*:*:*"
]
},
"direct_dependency_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "SAR",
"family": "ALC_CMC",
"level": 1
},
{
"_type": "SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "SAR",
"family": "ATE_IND",
"level": 1
},
{
"_type": "SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "SAR",
"family": "AVA_VAN",
"level": 1
},
{
"_type": "SAR",
"family": "ASE_OBJ",
"level": 1
},
{
"_type": "SAR",
"family": "ASE_REQ",
"level": 1
},
{
"_type": "SAR",
"family": "ALC_CMS",
"level": 1
},
{
"_type": "SAR",
"family": "ADV_FSP",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"11.8"
]
},
"indirect_dependency_cves": null,
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2020-3164",
"CVE-2020-3117",
"CVE-2021-1490",
"CVE-2021-1359",
"CVE-2021-1129",
"CVE-2020-3367",
"CVE-2021-1566",
"CVE-2021-1534",
"CVE-2022-20781",
"CVE-2022-20653",
"CVE-2020-3368",
"CVE-2020-3568",
"CVE-2018-0093",
"CVE-2021-34741",
"CVE-2020-3546",
"CVE-2020-3547",
"CVE-2022-20784"
]
},
"report_references": {
"_type": "References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"st_references": {
"_type": "References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Cisco Systems, Inc.",
"manufacturer_web": "https://www.cisco.com",
"name": "Cisco Web Security Appliance with AsyncOS 11.8",
"not_valid_after": "2027-04-21",
"not_valid_before": "2022-04-21",
"pdf_data": {
"_type": "PdfData",
"report_frontpage": {
"anssi": {},
"bsi": {},
"canada": {
"cert_id": "567-LSS",
"cert_lab": "CANADA"
},
"niap": {},
"nscib": {}
},
"report_keywords": {
"rules_IC_data_groups": {},
"rules_block_cipher_modes": {},
"rules_cc_claims": {},
"rules_cert_id": {},
"rules_certification_process": {},
"rules_cplc": {},
"rules_crypto_algs": {},
"rules_crypto_engines": {},
"rules_crypto_libs": {
"OpenSSL": 2
},
"rules_defenses": {},
"rules_device_id": {},
"rules_ecc_curves": {},
"rules_javacard": {},
"rules_javacard_api_consts": {},
"rules_javacard_packages": {},
"rules_os": {},
"rules_other": {},
"rules_protection_profiles": {},
"rules_security_assurance_components": {},
"rules_security_functional_components": {},
"rules_security_level": {},
"rules_standard_id": {
"ISO/IEC 17025": 1
},
"rules_technical_reports": {},
"rules_vendor": {},
"rules_vulnerabilities": {}
},
"report_metadata": {
"/Author": "Sinitski, Kiril",
"/CreationDate": "D:20220421102208-04\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20220421102209-04\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"pdf_file_size_bytes": 665712,
"pdf_is_encrypted": false,
"pdf_number_of_pages": 18
},
"st_frontpage": {
"anssi": {},
"bsi": {},
"canada": {},
"niap": {},
"nscib": {}
},
"st_keywords": {
"rules_IC_data_groups": {},
"rules_block_cipher_modes": {
"CBC": 5,
"CTR": 5,
"GCM": 4
},
"rules_cc_claims": {
"A.ADMIN_CREDENTIALS_SECURE": 1,
"A.LIMITED_FUNCTION": 1,
"A.LIMITED_FUNCTIONALITY": 1,
"A.NO_THRU_TRAFFIC_PROTECTION": 1,
"A.PHYSICAL_PROTECTION": 2,
"A.REGULAR_UPDATES": 1,
"A.RESIDUAL_INFORMATION": 1,
"A.TRUSTED_ADMINISTRATOR": 1,
"OE": 1,
"OE.ADMIN_CREDENTIALS_SECURE": 1,
"OE.NO_GENERAL_PURPOSE": 1,
"OE.NO_THRU_TRAFFIC_PROTECTION": 1,
"OE.PHYSICAL": 1,
"OE.RESIDUAL_INFORMATION": 1,
"OE.TRUSTED_ADMIN": 1,
"OE.UPDATES": 1,
"T.PASSWORD_CRACKING": 1,
"T.SECURITY_FUNCTIONALITY_COMPROMISE": 1,
"T.SECURITY_FUNCTIONALITY_FAILURE": 1,
"T.UNAUTHORIZED_ADMINISTRATOR_ACCESS": 1,
"T.UNDETECTED_ACTIVITY": 1,
"T.UNTRUSTED_COMMUNICATION_CHANNELS": 1,
"T.UPDATE_COMPROMISE": 1,
"T.WEAK_AUTHENTICATION_ENDPOINTS": 1,
"T.WEAK_CRYPTOGRAPHY": 1
},
"rules_cert_id": {},
"rules_certification_process": {},
"rules_cplc": {},
"rules_crypto_algs": {
"AES": 20,
"DH": 4,
"Diffie-Hellman": 6,
"ECC": 5,
"ECDSA": 1,
"HMAC": 7,
"RBG": 15,
"RNG": 1,
"RSA 2048": 2,
"SHA-1": 5,
"SHA-256": 3,
"SHA-384": 10,
"SHA-512": 2,
"SHA256": 8,
"SHA384": 7
},
"rules_crypto_engines": {},
"rules_crypto_libs": {},
"rules_defenses": {},
"rules_device_id": {},
"rules_ecc_curves": {
"P-256": 2,
"P-384": 2,
"P-521": 1,
"secp256r1": 2,
"secp384r1": 1,
"secp521r1": 1
},
"rules_javacard": {},
"rules_javacard_api_consts": {},
"rules_javacard_packages": {},
"rules_os": {},
"rules_other": {
"library": 1
},
"rules_protection_profiles": {},
"rules_security_assurance_components": {
"ADV_FSP.1": 2,
"AGD_OPE.1": 3,
"AGD_PRE.1": 2,
"ALC_CMC.1": 2,
"ALC_CMS.1": 2,
"ASE_CCL.1": 2,
"ASE_ECD.1": 2,
"ASE_INT.1": 2,
"ASE_OBJ.1": 2,
"ASE_REQ.1": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 2,
"ATE_IND.1": 2,
"AVA_VAN": 1,
"AVA_VAN.1": 4
},
"rules_security_functional_components": {
"FAU_GEN": 15,
"FAU_GEN.1": 5,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 2,
"FAU_GEN.2": 4,
"FAU_GEN.2.1": 1,
"FAU_STG": 1,
"FAU_STG_EXT": 3,
"FAU_STG_EXT.1": 9,
"FAU_STG_EXT.1.1": 2,
"FAU_STG_EXT.1.2": 2,
"FAU_STG_EXT.1.3": 2,
"FAU_STG_EXT.2": 3,
"FAU_STG_EXT.3": 3,
"FAU_STG_EXT.4": 3,
"FAU_STG_EXT.5": 3,
"FCS_CKM.1": 8,
"FCS_CKM.1.1": 2,
"FCS_CKM.2": 14,
"FCS_CKM.2.1": 2,
"FCS_CKM.4": 5,
"FCS_CKM.4.1": 1,
"FCS_NTP_EXT": 2,
"FCS_NTP_EXT.1.4": 1,
"FCS_RBG_EXT": 3,
"FCS_RBG_EXT.1": 14,
"FCS_RBG_EXT.1.1": 2,
"FCS_RBG_EXT.1.2": 2,
"FCS_SSHC_EXT": 3,
"FCS_SSHC_EXT.1": 11,
"FCS_SSHC_EXT.1.1": 2,
"FCS_SSHC_EXT.1.2": 2,
"FCS_SSHC_EXT.1.3": 2,
"FCS_SSHC_EXT.1.4": 3,
"FCS_SSHC_EXT.1.5": 2,
"FCS_SSHC_EXT.1.6": 2,
"FCS_SSHC_EXT.1.7": 2,
"FCS_SSHC_EXT.1.8": 2,
"FCS_SSHC_EXT.1.9": 2,
"FCS_SSHS_EXT": 3,
"FCS_SSHS_EXT.1": 11,
"FCS_SSHS_EXT.1.1": 2,
"FCS_SSHS_EXT.1.2": 2,
"FCS_SSHS_EXT.1.3": 2,
"FCS_SSHS_EXT.1.4": 2,
"FCS_SSHS_EXT.1.5": 2,
"FCS_SSHS_EXT.1.6": 2,
"FCS_SSHS_EXT.1.7": 2,
"FCS_SSHS_EXT.1.8": 2,
"FCS_TLSC_EXT": 4,
"FCS_TLSC_EXT.1": 1,
"FCS_TLSS_EXT": 4,
"FCS_TLSS_EXT.1": 14,
"FCS_TLSS_EXT.1.1": 2,
"FCS_TLSS_EXT.1.2": 2,
"FCS_TLSS_EXT.1.3": 2,
"FCS_TLSS_EXT.1.4": 5,
"FCS_TLSS_EXT.2": 2,
"FIA_AFL.1": 8,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_PMG_EXT": 3,
"FIA_PMG_EXT.1": 11,
"FIA_PMG_EXT.1.1": 2,
"FIA_UAU.1": 2,
"FIA_UAU.7": 4,
"FIA_UAU.7.1": 1,
"FIA_UAU_EXT": 3,
"FIA_UAU_EXT.2": 9,
"FIA_UAU_EXT.2.1": 2,
"FIA_UIA_EXT": 3,
"FIA_UIA_EXT.1": 9,
"FIA_UIA_EXT.1.1": 2,
"FIA_UIA_EXT.1.2": 2,
"FMT_SMF.1": 4,
"FMT_SMF.1.1": 1,
"FMT_SMR.2": 5,
"FMT_SMR.2.1": 1,
"FMT_SMR.2.2": 1,
"FMT_SMR.2.3": 1,
"FPT_APW_EXT": 3,
"FPT_APW_EXT.1": 8,
"FPT_APW_EXT.1.1": 2,
"FPT_APW_EXT.1.2": 2,
"FPT_PTD": 1,
"FPT_SKP_EXT": 3,
"FPT_SKP_EXT.1": 9,
"FPT_SKP_EXT.1.1": 2,
"FPT_STM": 1,
"FPT_STM_EXT": 3,
"FPT_STM_EXT.1": 7,
"FPT_STM_EXT.1.1": 2,
"FPT_STM_EXT.1.2": 2,
"FPT_TST_EXT": 3,
"FPT_TST_EXT.1": 8,
"FPT_TST_EXT.1.1": 2,
"FPT_TST_EXT.2": 2,
"FPT_TUD_EXT": 3,
"FPT_TUD_EXT.1": 9,
"FPT_TUD_EXT.1.1": 2,
"FPT_TUD_EXT.1.2": 2,
"FPT_TUD_EXT.1.3": 2,
"FPT_TUD_EXT.2": 2,
"FTA_SSL": 1,
"FTA_SSL.3": 4,
"FTA_SSL.4": 4,
"FTA_SSL.4.1": 1,
"FTA_SSL_EXT": 3,
"FTA_SSL_EXT.1": 10,
"FTA_SSL_EXT.1.1": 2,
"FTA_TAB.1": 7,
"FTA_TAB.1.1": 1,
"FTP_ITC.1": 7,
"FTP_ITC.1.2": 1,
"FTP_TRP.1": 1
},
"rules_security_level": {},
"rules_standard_id": {
"FIPS 140": 1,
"FIPS 140-2": 2,
"FIPS 186-4": 4,
"FIPS PUB 140-2": 1,
"FIPS PUB 180-4": 2,
"FIPS PUB 186-4": 8,
"ISO/IEC 18031:2011": 5,
"ISO/IEC 9796-2": 1,
"ISO/IEC 9797-": 1,
"PKCS #1": 1,
"PKCS#1": 1,
"PKCS1": 1,
"RFC 2818": 2,
"RFC 2986": 2,
"RFC 3268": 4,
"RFC 3447": 1,
"RFC 3526": 1,
"RFC 4251": 3,
"RFC 4253": 4,
"RFC 4346": 5,
"RFC 4492": 4,
"RFC 5077": 3,
"RFC 5246": 5,
"RFC 5280": 7,
"RFC 5289": 2,
"RFC 5759": 1,
"RFC 6960": 2,
"TLS v1.0": 2,
"TLSv1.1": 6,
"TLSv1.2": 6,
"X.509": 19
},
"rules_technical_reports": {},
"rules_vendor": {
"STM": 1
},
"rules_vulnerabilities": {}
},
"st_metadata": {
"/Author": "Cisco CC TME",
"/CreationDate": "D:20220420150145-04\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20220420150145-04\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"/Title": "ST",
"pdf_file_size_bytes": 1667523,
"pdf_is_encrypted": false,
"pdf_number_of_pages": 115
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "ProtectionProfile",
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/CPP_ND_V2.2E.pdf",
"pp_name": "collaborative Protection Profile for Network Devices v2.2e"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/567-LSS%20CR%20v1.2.pdf",
"scheme": "CA",
"security_level": {
"_type": "Set",
"elements": []
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/Cisco_WSA11.8_Security_Target_v0.12.pdf",
"state": {
"_type": "InternalState",
"errors": [],
"report_convert_ok": true,
"report_download_ok": true,
"report_extract_ok": true,
"st_convert_ok": true,
"st_download_ok": true,
"st_extract_ok": true
},
"status": "active"
}