Cisco Web Security Appliance with AsyncOS 11.8

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status active
Valid from 21.04.2022
Valid until 21.04.2027
Scheme 🇨🇦 CA
Manufacturer Cisco Systems, Inc.
Category Network and Network-Related Devices and Systems
Security level

Heuristics summary ?

Certificate ID: 567-LSS

Certificate ?

Certification report ?

Extracted keywords

File metadata

Author: Sinitski, Kiril
Creation date: D:20220421102208-04'00'
Modification date: D:20220421102209-04'00'
Pages: 18
Creator: Microsoft® Word for Microsoft 365
Producer: Microsoft® Word for Microsoft 365

Frontpage

Certificate ID: 567-LSS
Certification lab: CANADA

References

Security target ?

Extracted keywords

File metadata

Title: ST
Author: Cisco CC TME
Creation date: D:20220420150145-04'00'
Modification date: D:20220420150145-04'00'
Pages: 115
Creator: Microsoft® Word for Microsoft 365
Producer: Microsoft® Word for Microsoft 365

References

Heuristics ?

Certificate ID: 567-LSS

Extracted SARs

ASE_CCL.1, ASE_INT.1, ASE_SPD.1, ASE_REQ.1, ALC_CMC.1, AGD_OPE.1, ASE_ECD.1, AGD_PRE.1, AVA_VAN.1, ASE_OBJ.1, ADV_FSP.1, ATE_IND.1, ASE_TSS.1, ALC_CMS.1

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2018-0093
C M N
MEDIUM 6.1 2.7 18.01.2018 06:29
CVE-2020-3117
C M N
MEDIUM 4.7 1.4 23.09.2020 01:15
CVE-2020-3164
C M N
MEDIUM 5.3 1.4 04.03.2020 19:15
CVE-2020-3367
C M N
HIGH 7.8 5.9 18.11.2020 18:15
CVE-2020-3368
C M N
MEDIUM 5.8 1.4 18.06.2020 03:15
CVE-2020-3546
C M N
MEDIUM 5.3 1.4 04.09.2020 03:15
CVE-2020-3547
C M N
MEDIUM 6.5 3.6 04.09.2020 03:15
CVE-2020-3568
C M N
MEDIUM 5.8 1.4 08.10.2020 05:15
CVE-2021-1129
C M N
MEDIUM 5.3 1.4 20.01.2021 20:15
CVE-2021-1359
C M N
HIGH 8.8 5.9 08.07.2021 19:15
CVE-2021-1490
C M N
MEDIUM 6.1 2.7 06.05.2021 13:15
CVE-2021-1534
C M N
MEDIUM 5.3 1.4 06.10.2021 20:15
CVE-2021-1566
C M N
HIGH 7.4 5.2 16.06.2021 18:15
CVE-2021-34741
C M N
HIGH 7.5 3.6 04.11.2021 16:15
CVE-2022-20653
C M N
HIGH 7.5 3.6 17.02.2022 15:15
CVE-2022-20781
C M N
MEDIUM 5.4 2.7 06.04.2022 19:15
CVE-2022-20784
C M N
MEDIUM 5.3 1.4 06.04.2022 18:15

References ?

No references are available for this certificate.

Updates ?

  • 27.05.2022 The certificate became unavailable, either the certification report or the security target was unavailable during processing.
    Certificate removed

    A Common Criteria certificate for a product named Cisco Web Security Appliance with AsyncOS 11.8 is not available. This means that either its certification report or security target could not be downloaded during processing.

  • 21.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:a:cisco:web_security_appliance:11.8.0-382:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:web_security_appliance:11.8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:asyncos:11.8.0:*:*:*:*:*:*:*']} values added.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2018-0093', 'CVE-2022-20784', 'CVE-2020-3117', 'CVE-2021-1129', 'CVE-2021-1490', 'CVE-2020-3367', 'CVE-2021-1359', 'CVE-2020-3164']} values added.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The security_level was updated.

    • The new value is {'_type': 'Set', 'elements': []}.

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 1}]}}.
  • 04.05.2022 The certificate data changed.
    Certificate changed

    The Valid until date was updated.

    • The new value is 2027-04-21.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 22.04.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Cisco Web Security Appliance with AsyncOS 11.8 was processed.

Raw data

{
  "_type": "CommonCriteriaCert",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/567-LSS%20CT%20v1.2%20Eng.pdf",
  "dgst": "3af72451867b3187",
  "heuristics": {
    "_type": "CCHeuristics",
    "cert_id": "567-LSS",
    "cert_lab": [
      "CANADA"
    ],
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:a:cisco:web_security_appliance:11.8.0:*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:web_security_appliance:11.8.0-382:*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:asyncos:11.8:*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:asyncos:11.8.0:*:*:*:*:*:*:*"
      ]
    },
    "direct_dependency_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "SAR",
          "family": "ALC_CMC",
          "level": 1
        },
        {
          "_type": "SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "SAR",
          "family": "ATE_IND",
          "level": 1
        },
        {
          "_type": "SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "SAR",
          "family": "AVA_VAN",
          "level": 1
        },
        {
          "_type": "SAR",
          "family": "ASE_OBJ",
          "level": 1
        },
        {
          "_type": "SAR",
          "family": "ASE_REQ",
          "level": 1
        },
        {
          "_type": "SAR",
          "family": "ALC_CMS",
          "level": 1
        },
        {
          "_type": "SAR",
          "family": "ADV_FSP",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "11.8"
      ]
    },
    "indirect_dependency_cves": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2020-3164",
        "CVE-2020-3117",
        "CVE-2021-1490",
        "CVE-2021-1359",
        "CVE-2021-1129",
        "CVE-2020-3367",
        "CVE-2021-1566",
        "CVE-2021-1534",
        "CVE-2022-20781",
        "CVE-2022-20653",
        "CVE-2020-3368",
        "CVE-2020-3568",
        "CVE-2018-0093",
        "CVE-2021-34741",
        "CVE-2020-3546",
        "CVE-2020-3547",
        "CVE-2022-20784"
      ]
    },
    "report_references": {
      "_type": "References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "st_references": {
      "_type": "References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Cisco Systems, Inc.",
  "manufacturer_web": "https://www.cisco.com",
  "name": "Cisco Web Security Appliance with AsyncOS 11.8",
  "not_valid_after": "2027-04-21",
  "not_valid_before": "2022-04-21",
  "pdf_data": {
    "_type": "PdfData",
    "report_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {
        "cert_id": "567-LSS",
        "cert_lab": "CANADA"
      },
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "rules_IC_data_groups": {},
      "rules_block_cipher_modes": {},
      "rules_cc_claims": {},
      "rules_cert_id": {},
      "rules_certification_process": {},
      "rules_cplc": {},
      "rules_crypto_algs": {},
      "rules_crypto_engines": {},
      "rules_crypto_libs": {
        "OpenSSL": 2
      },
      "rules_defenses": {},
      "rules_device_id": {},
      "rules_ecc_curves": {},
      "rules_javacard": {},
      "rules_javacard_api_consts": {},
      "rules_javacard_packages": {},
      "rules_os": {},
      "rules_other": {},
      "rules_protection_profiles": {},
      "rules_security_assurance_components": {},
      "rules_security_functional_components": {},
      "rules_security_level": {},
      "rules_standard_id": {
        "ISO/IEC 17025": 1
      },
      "rules_technical_reports": {},
      "rules_vendor": {},
      "rules_vulnerabilities": {}
    },
    "report_metadata": {
      "/Author": "Sinitski, Kiril",
      "/CreationDate": "D:20220421102208-04\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20220421102209-04\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 665712,
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 18
    },
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "rules_IC_data_groups": {},
      "rules_block_cipher_modes": {
        "CBC": 5,
        "CTR": 5,
        "GCM": 4
      },
      "rules_cc_claims": {
        "A.ADMIN_CREDENTIALS_SECURE": 1,
        "A.LIMITED_FUNCTION": 1,
        "A.LIMITED_FUNCTIONALITY": 1,
        "A.NO_THRU_TRAFFIC_PROTECTION": 1,
        "A.PHYSICAL_PROTECTION": 2,
        "A.REGULAR_UPDATES": 1,
        "A.RESIDUAL_INFORMATION": 1,
        "A.TRUSTED_ADMINISTRATOR": 1,
        "OE": 1,
        "OE.ADMIN_CREDENTIALS_SECURE": 1,
        "OE.NO_GENERAL_PURPOSE": 1,
        "OE.NO_THRU_TRAFFIC_PROTECTION": 1,
        "OE.PHYSICAL": 1,
        "OE.RESIDUAL_INFORMATION": 1,
        "OE.TRUSTED_ADMIN": 1,
        "OE.UPDATES": 1,
        "T.PASSWORD_CRACKING": 1,
        "T.SECURITY_FUNCTIONALITY_COMPROMISE": 1,
        "T.SECURITY_FUNCTIONALITY_FAILURE": 1,
        "T.UNAUTHORIZED_ADMINISTRATOR_ACCESS": 1,
        "T.UNDETECTED_ACTIVITY": 1,
        "T.UNTRUSTED_COMMUNICATION_CHANNELS": 1,
        "T.UPDATE_COMPROMISE": 1,
        "T.WEAK_AUTHENTICATION_ENDPOINTS": 1,
        "T.WEAK_CRYPTOGRAPHY": 1
      },
      "rules_cert_id": {},
      "rules_certification_process": {},
      "rules_cplc": {},
      "rules_crypto_algs": {
        "AES": 20,
        "DH": 4,
        "Diffie-Hellman": 6,
        "ECC": 5,
        "ECDSA": 1,
        "HMAC": 7,
        "RBG": 15,
        "RNG": 1,
        "RSA 2048": 2,
        "SHA-1": 5,
        "SHA-256": 3,
        "SHA-384": 10,
        "SHA-512": 2,
        "SHA256": 8,
        "SHA384": 7
      },
      "rules_crypto_engines": {},
      "rules_crypto_libs": {},
      "rules_defenses": {},
      "rules_device_id": {},
      "rules_ecc_curves": {
        "P-256": 2,
        "P-384": 2,
        "P-521": 1,
        "secp256r1": 2,
        "secp384r1": 1,
        "secp521r1": 1
      },
      "rules_javacard": {},
      "rules_javacard_api_consts": {},
      "rules_javacard_packages": {},
      "rules_os": {},
      "rules_other": {
        "library": 1
      },
      "rules_protection_profiles": {},
      "rules_security_assurance_components": {
        "ADV_FSP.1": 2,
        "AGD_OPE.1": 3,
        "AGD_PRE.1": 2,
        "ALC_CMC.1": 2,
        "ALC_CMS.1": 2,
        "ASE_CCL.1": 2,
        "ASE_ECD.1": 2,
        "ASE_INT.1": 2,
        "ASE_OBJ.1": 2,
        "ASE_REQ.1": 2,
        "ASE_SPD.1": 2,
        "ASE_TSS.1": 2,
        "ATE_IND.1": 2,
        "AVA_VAN": 1,
        "AVA_VAN.1": 4
      },
      "rules_security_functional_components": {
        "FAU_GEN": 15,
        "FAU_GEN.1": 5,
        "FAU_GEN.1.1": 1,
        "FAU_GEN.1.2": 2,
        "FAU_GEN.2": 4,
        "FAU_GEN.2.1": 1,
        "FAU_STG": 1,
        "FAU_STG_EXT": 3,
        "FAU_STG_EXT.1": 9,
        "FAU_STG_EXT.1.1": 2,
        "FAU_STG_EXT.1.2": 2,
        "FAU_STG_EXT.1.3": 2,
        "FAU_STG_EXT.2": 3,
        "FAU_STG_EXT.3": 3,
        "FAU_STG_EXT.4": 3,
        "FAU_STG_EXT.5": 3,
        "FCS_CKM.1": 8,
        "FCS_CKM.1.1": 2,
        "FCS_CKM.2": 14,
        "FCS_CKM.2.1": 2,
        "FCS_CKM.4": 5,
        "FCS_CKM.4.1": 1,
        "FCS_NTP_EXT": 2,
        "FCS_NTP_EXT.1.4": 1,
        "FCS_RBG_EXT": 3,
        "FCS_RBG_EXT.1": 14,
        "FCS_RBG_EXT.1.1": 2,
        "FCS_RBG_EXT.1.2": 2,
        "FCS_SSHC_EXT": 3,
        "FCS_SSHC_EXT.1": 11,
        "FCS_SSHC_EXT.1.1": 2,
        "FCS_SSHC_EXT.1.2": 2,
        "FCS_SSHC_EXT.1.3": 2,
        "FCS_SSHC_EXT.1.4": 3,
        "FCS_SSHC_EXT.1.5": 2,
        "FCS_SSHC_EXT.1.6": 2,
        "FCS_SSHC_EXT.1.7": 2,
        "FCS_SSHC_EXT.1.8": 2,
        "FCS_SSHC_EXT.1.9": 2,
        "FCS_SSHS_EXT": 3,
        "FCS_SSHS_EXT.1": 11,
        "FCS_SSHS_EXT.1.1": 2,
        "FCS_SSHS_EXT.1.2": 2,
        "FCS_SSHS_EXT.1.3": 2,
        "FCS_SSHS_EXT.1.4": 2,
        "FCS_SSHS_EXT.1.5": 2,
        "FCS_SSHS_EXT.1.6": 2,
        "FCS_SSHS_EXT.1.7": 2,
        "FCS_SSHS_EXT.1.8": 2,
        "FCS_TLSC_EXT": 4,
        "FCS_TLSC_EXT.1": 1,
        "FCS_TLSS_EXT": 4,
        "FCS_TLSS_EXT.1": 14,
        "FCS_TLSS_EXT.1.1": 2,
        "FCS_TLSS_EXT.1.2": 2,
        "FCS_TLSS_EXT.1.3": 2,
        "FCS_TLSS_EXT.1.4": 5,
        "FCS_TLSS_EXT.2": 2,
        "FIA_AFL.1": 8,
        "FIA_AFL.1.1": 1,
        "FIA_AFL.1.2": 1,
        "FIA_PMG_EXT": 3,
        "FIA_PMG_EXT.1": 11,
        "FIA_PMG_EXT.1.1": 2,
        "FIA_UAU.1": 2,
        "FIA_UAU.7": 4,
        "FIA_UAU.7.1": 1,
        "FIA_UAU_EXT": 3,
        "FIA_UAU_EXT.2": 9,
        "FIA_UAU_EXT.2.1": 2,
        "FIA_UIA_EXT": 3,
        "FIA_UIA_EXT.1": 9,
        "FIA_UIA_EXT.1.1": 2,
        "FIA_UIA_EXT.1.2": 2,
        "FMT_SMF.1": 4,
        "FMT_SMF.1.1": 1,
        "FMT_SMR.2": 5,
        "FMT_SMR.2.1": 1,
        "FMT_SMR.2.2": 1,
        "FMT_SMR.2.3": 1,
        "FPT_APW_EXT": 3,
        "FPT_APW_EXT.1": 8,
        "FPT_APW_EXT.1.1": 2,
        "FPT_APW_EXT.1.2": 2,
        "FPT_PTD": 1,
        "FPT_SKP_EXT": 3,
        "FPT_SKP_EXT.1": 9,
        "FPT_SKP_EXT.1.1": 2,
        "FPT_STM": 1,
        "FPT_STM_EXT": 3,
        "FPT_STM_EXT.1": 7,
        "FPT_STM_EXT.1.1": 2,
        "FPT_STM_EXT.1.2": 2,
        "FPT_TST_EXT": 3,
        "FPT_TST_EXT.1": 8,
        "FPT_TST_EXT.1.1": 2,
        "FPT_TST_EXT.2": 2,
        "FPT_TUD_EXT": 3,
        "FPT_TUD_EXT.1": 9,
        "FPT_TUD_EXT.1.1": 2,
        "FPT_TUD_EXT.1.2": 2,
        "FPT_TUD_EXT.1.3": 2,
        "FPT_TUD_EXT.2": 2,
        "FTA_SSL": 1,
        "FTA_SSL.3": 4,
        "FTA_SSL.4": 4,
        "FTA_SSL.4.1": 1,
        "FTA_SSL_EXT": 3,
        "FTA_SSL_EXT.1": 10,
        "FTA_SSL_EXT.1.1": 2,
        "FTA_TAB.1": 7,
        "FTA_TAB.1.1": 1,
        "FTP_ITC.1": 7,
        "FTP_ITC.1.2": 1,
        "FTP_TRP.1": 1
      },
      "rules_security_level": {},
      "rules_standard_id": {
        "FIPS 140": 1,
        "FIPS 140-2": 2,
        "FIPS 186-4": 4,
        "FIPS PUB 140-2": 1,
        "FIPS PUB 180-4": 2,
        "FIPS PUB 186-4": 8,
        "ISO/IEC 18031:2011": 5,
        "ISO/IEC 9796-2": 1,
        "ISO/IEC 9797-": 1,
        "PKCS #1": 1,
        "PKCS#1": 1,
        "PKCS1": 1,
        "RFC 2818": 2,
        "RFC 2986": 2,
        "RFC 3268": 4,
        "RFC 3447": 1,
        "RFC 3526": 1,
        "RFC 4251": 3,
        "RFC 4253": 4,
        "RFC 4346": 5,
        "RFC 4492": 4,
        "RFC 5077": 3,
        "RFC 5246": 5,
        "RFC 5280": 7,
        "RFC 5289": 2,
        "RFC 5759": 1,
        "RFC 6960": 2,
        "TLS v1.0": 2,
        "TLSv1.1": 6,
        "TLSv1.2": 6,
        "X.509": 19
      },
      "rules_technical_reports": {},
      "rules_vendor": {
        "STM": 1
      },
      "rules_vulnerabilities": {}
    },
    "st_metadata": {
      "/Author": "Cisco CC TME",
      "/CreationDate": "D:20220420150145-04\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20220420150145-04\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "/Title": "ST",
      "pdf_file_size_bytes": 1667523,
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 115
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "ProtectionProfile",
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/CPP_ND_V2.2E.pdf",
        "pp_name": "collaborative Protection Profile for Network Devices v2.2e"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/567-LSS%20CR%20v1.2.pdf",
  "scheme": "CA",
  "security_level": {
    "_type": "Set",
    "elements": []
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/Cisco_WSA11.8_Security_Target_v0.12.pdf",
  "state": {
    "_type": "InternalState",
    "errors": [],
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true
  },
  "status": "active"
}