Sourcefire 3D System (Sourcefire Defense Center: models DC500, DC1000, and DC3000; Sourcefire 3D Sensor licensed for IPS: models 3D500, 3D1000, 3D2000, 3D2100, 3D2500, 3D3500, 3D4500, 3D6500 and 3D9900; Sourcefire Virtual Defense Center, Sourcefire Virtual 3D Sensor licensed for IPS) Version 4.9.1.4 (SEU 371)

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status archived
Valid from 06.04.2011
Valid until 01.11.2014
Scheme 🇺🇸 US
Manufacturer Sourcefire Inc.
Category Detection Devices and Systems
Security level EAL2+, ALC_FLR.2

Heuristics summary ?

Certificate ID: CCEVS-VR-VID10406-2011

Certification report ?

Extracted keywords

Protocols
SSL, TLS, VPN
Libraries
OpenSSL

Vendor
Microsoft, Cisco

Security level
EAL 2, EAL2, EAL 3, EAL 2 augmented
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_IND.2, ATE_COV.1, ATE_FUN.1, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN, FAU_SAR, FAU_SEL, FAU_STG, FIA_ATD, FIA_UAU_EXT, FIA_UID, FMT_MOF, FMT_MTD, FMT_SMF.1, FMT_SMR, FPT_ITT, FTA_TAB
Certificates
CCEVS-VR-VID10406-2011

Vulnerabilities
CVE-2010-2306

File metadata

Creation date: D:20110503135412
Modification date: D:20110503135412
Pages: 55
Creator: Microsoft® Office Word 2007
Producer: Microsoft® Office Word 2007

Frontpage

Certificate ID: CCEVS-VR-VID10406-2011
Certified item: Sourcefire 3D System (Sourcefire Defense Center: models DC500, DC1000, and DC3000; Sourcefire 3D Sensor licensed for IPS: models 3D500, 3D1000, 3D2000, 3D2100, 3D2500, 3D3500, 3D4500, 3D6500 and 3D9900; Sourcefire Virtual Defense Center, Sourcefire Virtual 3D Sensor licensed for IPS) Version 4.9.1.4 (SEU 371
Certification lab: US NIAP

References

Outgoing
Incoming

Security target ?

Extracted keywords

Symmetric Algorithms
DES
Hash functions
MD5
Protocols
SSH, SSL, TLS, VPN
Libraries
OpenSSL

Vendor
Microsoft, Cisco

Security level
EAL2+, EAL2, EAL 2, EAL2 augmented, EAL 2 augmented
Claims
O.AUDIT_PROTECTION, O.AUDIT_SORT, O.PROTCT, O.IDSCAN, O.IDSENS, O.IDANLZ, O.RESPON, O.EADMIN, O.ACCESS, O.IDAUTH, O.OFLOWS, O.AUDITS, O.INTEGR, O.EXPORT, O.AUDIT_PRO, O.AUDIT_SOR, O.AUDIT, T.COMINT, T.COMDIS, T.LOSSOF, T.NOHALT, T.PRIVIL, T.IMPCON, T.INFLUX, T.FACCNT, T.SCNCFG, T.SCNMLC, T.SCNVUL, T.FALACT, T.FALREC, T.FALASC, T.MISUSE, T.INADVE, T.MISACT, A.ACCESS, A.DYNMIC, A.ASCOPE, A.PROTCT, A.LOCATE, A.VMXMIT, A.MANAGE, A.NOEVIL, A.NOTRST, OE.AUDIT, OE.AUDIT_SORT, OE.ALARMS, OE.XAUTH, OE.PROTECTCOMM, OE.TIME, OE.INSTAL, OE.PHYCAL, OE.CREDEN, OE.PERSON, OE.INTROP, OE.VMXMIT
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR.2, ALC_CMS.1, ALC_CMC, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL.1, FAU_STG.2, FAU_STG.4, FAU_GEN, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.1, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FAU_STG.3, FAU_STG.4.1, FDP_ACC.1, FIA_UAU_EXT.1, FIA_UAU, FIA_ATD.1, FIA_UID.1, FIA_UAU.1, FIA_AFL.1, FIA_UAU_EXT.1.1, FIA_UAU_EXT.1.2, FIA_ATD.1.1, FIA_UID.1.1, FIA_UID.1.2, FMT_MOF.1, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_ITT.1, FPT_ITA.1, FPT_ITC.1, FPT_ITI.2, FPT_STM.1, FPT_STM, FPT_ITT.1.1, FTA_TAB.1, FTA_TAB.1.1, FTP_ITT.1
Certificates
CCEVS-VR-VID10334-2010

Side-channel analysis
malfunction

File metadata

Title: Sourcefire 2008 ST
Author: CygnaCom
Creation date: D:20110503134838
Modification date: D:20110503134838
Pages: 116
Creator: Microsoft® Office Word 2007
Producer: Microsoft® Office Word 2007

References

Outgoing
  • CCEVS-VR-VID10334-2010 - Sourcefire 3D System (Sourcefire Defense Center: models DC500, DC1000, and DC3000; and Sourcefire 3D Sensor with IPS: models 3D500, 3D1000, 3D2000, 3D2100, 3D2500, 3D3500, 3D3800, 3D4500, 3D5800, 3D6500, and 3D9800) Version 4.8
Incoming
  • CCEVS-VR-VID10502-2012 - Sourcefire 3D System (Sourcefire Defense Center: models DC750, DC1500, and DC3500; Sourcefire 3D Sensor licensed for IPS: models 3D500, 3D1000, 3D2000, 3D7110, 3D7120, 3D8120, 3D8130, 3D8140, and 3D8250; Sourcefire Virtual Defense Center, Sourcefire Virtual 3D Sensor licensed for IPS) Version 4.10.2.4 (SEU568)

Heuristics ?

Certificate ID: CCEVS-VR-VID10406-2011

Extracted SARs

ASE_OBJ.2, ADV_TDS.1, ASE_TSS.1, ALC_FLR.2, ADV_ARC.1, ALC_DEL.1, ASE_REQ.2, ATE_FUN.1, ADV_FSP.2, AVA_VAN.2, ASE_CCL.1, ALC_CMC.2, ASE_ECD.1, AGD_OPE.1, ATE_COV.1, AGD_PRE.1, ALC_CMS.2, ASE_SPD.1, ATE_IND.2, ASE_INT.1

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2009-2344
C M N
HIGH 9.0 10.0 07.07.2009 19:30
CVE-2010-2306
C M N
MEDIUM 4.3 4.9 16.06.2010 20:30

References ?

Updates ?

  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Sourcefire 3D System (Sourcefire Defense Center: models DC500, DC1000, and DC3000; Sourcefire 3D Sensor licensed for IPS: models 3D500, 3D1000, 3D2000, 3D2100, 3D2500, 3D3500, 3D4500, 3D6500 and 3D9900; Sourcefire Virtual Defense Center, Sourcefire Virtual 3D Sensor licensed for IPS) Version 4.9.1.4 (SEU 371) was processed.

  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {'cert_id': 'CCEVS-VR-VID10406-2011', 'cert_item': 'Sourcefire 3D System (Sourcefire Defense Center: models DC500, DC1000, and DC3000; Sourcefire 3D Sensor licensed for IPS: models 3D500, 3D1000, 3D2000, 3D2100, 3D2500, 3D3500, 3D4500, 3D6500 and 3D9900; Sourcefire Virtual Defense Center, Sourcefire Virtual 3D Sensor licensed for IPS) Version 4.9.1.4 (SEU 371', 'cert_lab': 'US NIAP'}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['4.9.1.4']}.
    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:h:sourcefire:dc1000:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sourcefire:3d1000:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sourcefire:3d_sensor:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sourcefire:3d2000:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sourcefire:3d9900:*:*:*:*:*:*:*:*']}.
    • The related_cves property was set to {'_type': 'Set', 'elements': ['CVE-2010-2306', 'CVE-2009-2344']}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['CCEVS-VR-VID10502-2012']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['CCEVS-VR-VID10502-2012']}, 'directly_referencing': {'_type': 'Set', 'elements': ['CCEVS-VR-VID10334-2010']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['CCEVS-VR-VID10334-2010']}}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The cert_lab property was set to ['US'].
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 28.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:h:sourcefire:3d_sensor:*:*:*:*:*:*:*:*']} values discarded.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2009-2344']} values discarded.
  • 29.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:h:sourcefire:3d_sensor:*:*:*:*:*:*:*:*']} values added.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2009-2344']} values added.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 2}]}}.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': 'c75cc50fe48c62ca42042d5d24def78c6ccfbb930bcf7805e460730ee65298dd', 'st_pdf_hash': '321403a51550a0431125dd8aede2066d2c94aae23db43e918c592e5393b89cae', 'report_txt_hash': 'ba13ac8ed9fb401f01dcb8c358439808dc3a060674f41362182a6b47d50fd96a', 'st_txt_hash': '8674f7961ea124060900ceb3bffca01a4cfffb9f97f5c07a734dc3e3388350cb'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'SSL': 7, 'TLS': 1}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'DES': 1}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {'MD5': 2}, 'rules_crypto_schemes': {'SSL': 15, 'TLS': 1}, 'rules_randomness': {}, 'rules_tee': {'TEE': 1, 'SE': 6}, 'rules_side_channels': {'malfunction': 2}} values inserted.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.cygnacom.com/', 'http://www.niap-ccevs.org/', 'http://www.niap-ccevs.org/cc-scheme']}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://en.wikipedia.org/wiki/Superuser', 'https://support.sourcefire.com/']}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'US': {'CCEVS-VR-VID10406-2011': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 9, 'EAL2': 2, 'EAL 3': 1, 'EAL 2 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_FLR.2': 2, 'ALC_CMC.2': 2, 'ALC_CMS.2': 2, 'ALC_DEL.1': 2}, 'ATE': {'ATE_IND.2': 5, 'ATE_COV.1': 2, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VAN.2': 2}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FMT': {'FMT_SMF.1': 1}}, 'cc_claims': {}, 'vendor': {'Microsoft': {'Microsoft': 2}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 7}, 'TLS': {'TLS': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {'CVE': {'CVE-2010-2306': 2}}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {'com': {'com.com': 1}}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'US': {'CCEVS-VR-VID10334-2010': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2+': 2, 'EAL2': 5, 'EAL 2': 1, 'EAL2 augmented': 2, 'EAL 2 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 16, 'ADV_FSP.2': 6, 'ADV_TDS.1': 6, 'ADV_FSP.1': 3}, 'AGD': {'AGD_OPE.1': 5, 'AGD_PRE.1': 5}, 'ALC': {'ALC_CMC.2': 3, 'ALC_CMS.2': 3, 'ALC_DEL.1': 3, 'ALC_FLR.2': 6, 'ALC_CMS.1': 1}, 'ATE': {'ATE_COV.1': 5, 'ATE_FUN.1': 5, 'ATE_IND.2': 3}, 'AVA': {'AVA_VAN.2': 3}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 17, 'FAU_SAR.1': 13, 'FAU_SAR.2': 10, 'FAU_SAR.3': 9, 'FAU_SEL.1': 10, 'FAU_STG.2': 14, 'FAU_STG.4': 12, 'FAU_GEN': 1, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.1': 3, 'FAU_STG.2.1': 1, 'FAU_STG.2.2': 1, 'FAU_STG.2.3': 1, 'FAU_STG.3': 1, 'FAU_STG.4.1': 1}, 'FDP': {'FDP_ACC.1': 3}, 'FIA': {'FIA_UAU_EXT.1': 18, 'FIA_UAU': 2, 'FIA_ATD.1': 9, 'FIA_UID.1': 14, 'FIA_UAU.1': 2, 'FIA_AFL.1': 2, 'FIA_UAU_EXT.1.1': 2, 'FIA_UAU_EXT.1.2': 2, 'FIA_ATD.1.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UID.2': 1}, 'FMT': {'FMT_MOF.1': 14, 'FMT_MTD.1': 16, 'FMT_SMF.1': 18, 'FMT_SMR.1': 12, 'FMT_MOF.1.1': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_ITT.1': 12, 'FPT_ITA.1': 2, 'FPT_ITC.1': 2, 'FPT_ITI.2': 2, 'FPT_STM.1': 6, 'FPT_ITT.1.1': 1}, 'FTA': {'FTA_TAB.1': 10, 'FTA_TAB.1.1': 1}, 'FTP': {'FTP_ITT.1': 1}}, 'cc_claims': {'O': {'O.AUDIT_PROTECTION': 5, 'O.AUDIT_SORT': 5, 'O.PROTCT': 9, 'O.IDSCAN': 8, 'O.IDSENS': 8, 'O.IDANLZ': 7, 'O.RESPON': 4, 'O.EADMIN': 5, 'O.ACCESS': 11, 'O.IDAUTH': 20, 'O.OFLOWS': 5, 'O.AUDITS': 9, 'O.INTEGR': 6, 'O.EXPORT': 4, 'O.AUDIT_PRO': 1, 'O.AUDIT_SOR': 1, 'O.AUDIT': 1}, 'T': {'T.COMINT': 2, 'T.COMDIS': 2, 'T.LOSSOF': 2, 'T.NOHALT': 2, 'T.PRIVIL': 2, 'T.IMPCON': 2, 'T.INFLUX': 2, 'T.FACCNT': 2, 'T.SCNCFG': 2, 'T.SCNMLC': 2, 'T.SCNVUL': 2, 'T.FALACT': 2, 'T.FALREC': 2, 'T.FALASC': 2, 'T.MISUSE': 2, 'T.INADVE': 2, 'T.MISACT': 2}, 'A': {'A.ACCESS': 2, 'A.DYNMIC': 2, 'A.ASCOPE': 2, 'A.PROTCT': 2, 'A.LOCATE': 2, 'A.VMXMIT': 2, 'A.MANAGE': 2, 'A.NOEVIL': 2, 'A.NOTRST': 2}, 'OE': {'OE.AUDIT': 3, 'OE.AUDIT_SORT': 3, 'OE.ALARMS': 11, 'OE.XAUTH': 24, 'OE.PROTECTCOMM': 22, 'OE.TIME': 9, 'OE.INSTAL': 5, 'OE.PHYCAL': 7, 'OE.CREDEN': 5, 'OE.PERSON': 6, 'OE.INTROP': 5, 'OE.VMXMIT': 3}}, 'vendor': {'STMicroelectronics': {'STM': 7}, 'Microsoft': {'Microsoft': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 2}}}, 'crypto_scheme': {'KA': {'KA': 1}}, 'crypto_protocol': {'SSH': {'SSH': 10}, 'TLS': {'SSL': {'SSL': 15}, 'TLS': {'TLS': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 5}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 6}, 'other': {'TEE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}]}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'st_vid10406-vr.pdf', 'st_filename': 'st_vid10406-st.pdf'}.
    • The report_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 2': 10}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.2': 3}}}}, 'cc_sfr': {'__insert__': {'FAU': {'FAU_GEN': 1, 'FAU_SAR': 3, 'FAU_SEL': 1, 'FAU_STG': 2}, 'FIA': {'FIA_ATD': 1, 'FIA_UAU_EXT': 1, 'FIA_UID': 1}, 'FPT': {'FPT_ITT': 1}, 'FTA': {'FTA_TAB': 1}}, '__update__': {'FMT': {'__insert__': {'FMT_MOF': 1, 'FMT_MTD': 1, 'FMT_SMR': 1}}}}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 6}}}}}}, 'javacard_packages': {}} data.
    • The st_keywords property was updated, with the {'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_ARC.1': 24, 'ADV_FSP.2': 16, 'ADV_TDS.1': 16}}, 'AGD': {'__insert__': {'AGD_OPE': 1, 'AGD_PRE': 1}, '__update__': {'AGD_OPE.1': 13, 'AGD_PRE.1': 9}}, 'ALC': {'__insert__': {'ALC_CMC': 2}, '__update__': {'ALC_CMC.2': 8, 'ALC_CMS.2': 8, 'ALC_DEL.1': 7, 'ALC_FLR.2': 20}}, 'ATE': {'__update__': {'ATE_COV.1': 8, 'ATE_FUN.1': 12, 'ATE_IND.2': 9}}, 'AVA': {'__update__': {'AVA_VAN.2': 9}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_SAR.2': 9, 'FAU_STG.4': 11}}, 'FIA': {'__update__': {'FIA_UAU': 3}, '__delete__': ['FIA_UID.2']}, 'FMT': {'__update__': {'FMT_MTD.1': 17}}, 'FPT': {'__insert__': {'FPT_STM': 1}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.AUDIT_PROTECTION': 4, 'O.IDSCAN': 6, 'O.IDANLZ': 5, 'O.EADMIN': 3, 'O.IDAUTH': 18, 'O.AUDITS': 7, 'O.EXPORT': 2}}, 'OE': {'__update__': {'OE.ALARMS': 10, 'OE.PROTECTCOMM': 21, 'OE.PHYCAL': 6, 'OE.PERSON': 5, 'OE.VMXMIT': 2}}}}, 'vendor': {'__delete__': ['STMicroelectronics']}, 'crypto_scheme': {}, 'crypto_protocol': {'__update__': {'SSH': {'__update__': {'SSH': 8}}, 'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 10}}}}}}, 'tee_name': {}} data.
  • 26.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'vendor': {'__insert__': {'Cisco': {'Cisco': 2}}}, 'crypto_protocol': {'__insert__': {'VPN': {'VPN': 3}}}} data.
    • The st_keywords property was updated, with the {'vendor': {'__insert__': {'Cisco': {'Cisco': 3}}}, 'crypto_protocol': {'__insert__': {'VPN': {'VPN': 1}}}} data.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.

Raw data

{
  "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert",
  "category": "Detection Devices and Systems",
  "cert_link": null,
  "dgst": "5506b5232076d409",
  "heuristics": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics",
    "cert_id": "CCEVS-VR-VID10406-2011",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:h:sourcefire:3d2000:*:*:*:*:*:*:*:*",
        "cpe:2.3:h:sourcefire:3d1000:*:*:*:*:*:*:*:*",
        "cpe:2.3:h:sourcefire:3d_sensor:*:*:*:*:*:*:*:*",
        "cpe:2.3:h:sourcefire:dc1000:*:*:*:*:*:*:*:*",
        "cpe:2.3:h:sourcefire:3d9900:*:*:*:*:*:*:*:*"
      ]
    },
    "direct_dependency_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.9.1.4"
      ]
    },
    "indirect_dependency_cves": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2010-2306",
        "CVE-2009-2344"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "CCEVS-VR-VID10502-2012"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "CCEVS-VR-VID10334-2010"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "CCEVS-VR-VID10502-2012"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "CCEVS-VR-VID10334-2010"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Sourcefire Inc.",
  "manufacturer_web": "https://www.sourcefire.com/",
  "name": "Sourcefire 3D System (Sourcefire Defense Center: models DC500, DC1000, and DC3000; Sourcefire 3D Sensor licensed for IPS: models 3D500, 3D1000, 3D2000, 3D2100, 3D2500, 3D3500, 3D4500, 3D6500 and 3D9900; Sourcefire Virtual Defense Center, Sourcefire Virtual 3D Sensor licensed for IPS) Version 4.9.1.4 (SEU 371)",
  "not_valid_after": "2014-11-01",
  "not_valid_before": "2011-04-06",
  "pdf_data": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData",
    "report_filename": "st_vid10406-vr.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {
        "cert_id": "CCEVS-VR-VID10406-2011",
        "cert_item": "Sourcefire 3D System (Sourcefire Defense Center: models DC500, DC1000, and DC3000; Sourcefire 3D Sensor licensed for IPS: models 3D500, 3D1000, 3D2000, 3D2100, 3D2500, 3D3500, 3D4500, 3D6500 and 3D9900; Sourcefire Virtual Defense Center, Sourcefire Virtual 3D Sensor licensed for IPS) Version 4.9.1.4 (SEU 371",
        "cert_lab": "US NIAP"
      },
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID10406-2011": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.2": 2,
          "ALC_CMS.2": 2,
          "ALC_DEL.1": 2,
          "ALC_FLR.2": 3
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 5
        },
        "AVA": {
          "AVA_VAN.2": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 10,
          "EAL 2 augmented": 1,
          "EAL 3": 1,
          "EAL2": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_SAR": 3,
          "FAU_SEL": 1,
          "FAU_STG": 2
        },
        "FIA": {
          "FIA_ATD": 1,
          "FIA_UAU_EXT": 1,
          "FIA_UID": 1
        },
        "FMT": {
          "FMT_MOF": 1,
          "FMT_MTD": 1,
          "FMT_SMF.1": 1,
          "FMT_SMR": 1
        },
        "FPT": {
          "FPT_ITT": 1
        },
        "FTA": {
          "FTA_TAB": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 1
        }
      },
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 6
          },
          "TLS": {
            "TLS": 1
          }
        },
        "VPN": {
          "VPN": 3
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 2
        },
        "Microsoft": {
          "Microsoft": 2
        }
      },
      "vulnerability": {
        "CVE": {
          "CVE-2010-2306": 2
        }
      }
    },
    "report_metadata": {
      "/CreationDate": "D:20110503135412",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20110503135412",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "pdf_file_size_bytes": 681880,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.niap-ccevs.org/",
          "http://www.cygnacom.com/",
          "http://www.niap-ccevs.org/cc-scheme"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 55
    },
    "st_filename": "st_vid10406-st.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID10334-2010": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.ACCESS": 2,
          "A.ASCOPE": 2,
          "A.DYNMIC": 2,
          "A.LOCATE": 2,
          "A.MANAGE": 2,
          "A.NOEVIL": 2,
          "A.NOTRST": 2,
          "A.PROTCT": 2,
          "A.VMXMIT": 2
        },
        "O": {
          "O.ACCESS": 11,
          "O.AUDIT": 1,
          "O.AUDITS": 7,
          "O.AUDIT_PRO": 1,
          "O.AUDIT_PROTECTION": 4,
          "O.AUDIT_SOR": 1,
          "O.AUDIT_SORT": 5,
          "O.EADMIN": 3,
          "O.EXPORT": 2,
          "O.IDANLZ": 5,
          "O.IDAUTH": 18,
          "O.IDSCAN": 6,
          "O.IDSENS": 8,
          "O.INTEGR": 6,
          "O.OFLOWS": 5,
          "O.PROTCT": 9,
          "O.RESPON": 4
        },
        "OE": {
          "OE.ALARMS": 10,
          "OE.AUDIT": 3,
          "OE.AUDIT_SORT": 3,
          "OE.CREDEN": 5,
          "OE.INSTAL": 5,
          "OE.INTROP": 5,
          "OE.PERSON": 5,
          "OE.PHYCAL": 6,
          "OE.PROTECTCOMM": 21,
          "OE.TIME": 9,
          "OE.VMXMIT": 2,
          "OE.XAUTH": 24
        },
        "T": {
          "T.COMDIS": 2,
          "T.COMINT": 2,
          "T.FACCNT": 2,
          "T.FALACT": 2,
          "T.FALASC": 2,
          "T.FALREC": 2,
          "T.IMPCON": 2,
          "T.INADVE": 2,
          "T.INFLUX": 2,
          "T.LOSSOF": 2,
          "T.MISACT": 2,
          "T.MISUSE": 2,
          "T.NOHALT": 2,
          "T.PRIVIL": 2,
          "T.SCNCFG": 2,
          "T.SCNMLC": 2,
          "T.SCNVUL": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 24,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 16,
          "ADV_TDS.1": 16
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 13,
          "AGD_PRE": 1,
          "AGD_PRE.1": 9
        },
        "ALC": {
          "ALC_CMC": 2,
          "ALC_CMC.2": 8,
          "ALC_CMS.1": 1,
          "ALC_CMS.2": 8,
          "ALC_DEL.1": 7,
          "ALC_FLR.2": 20
        },
        "ATE": {
          "ATE_COV.1": 8,
          "ATE_FUN.1": 12,
          "ATE_IND.2": 9
        },
        "AVA": {
          "AVA_VAN.2": 9
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 2 augmented": 1,
          "EAL2": 5,
          "EAL2 augmented": 2,
          "EAL2+": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_GEN.1": 17,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_SAR.1": 13,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 9,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3": 9,
          "FAU_SAR.3.1": 1,
          "FAU_SEL.1": 10,
          "FAU_SEL.1.1": 1,
          "FAU_STG.1": 3,
          "FAU_STG.2": 14,
          "FAU_STG.2.1": 1,
          "FAU_STG.2.2": 1,
          "FAU_STG.2.3": 1,
          "FAU_STG.3": 1,
          "FAU_STG.4": 11,
          "FAU_STG.4.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 3
        },
        "FIA": {
          "FIA_AFL.1": 2,
          "FIA_ATD.1": 9,
          "FIA_ATD.1.1": 1,
          "FIA_UAU": 3,
          "FIA_UAU.1": 2,
          "FIA_UAU_EXT.1": 18,
          "FIA_UAU_EXT.1.1": 2,
          "FIA_UAU_EXT.1.2": 2,
          "FIA_UID.1": 14,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_MOF.1": 14,
          "FMT_MOF.1.1": 1,
          "FMT_MTD.1": 17,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 18,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 12,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_ITA.1": 2,
          "FPT_ITC.1": 2,
          "FPT_ITI.2": 2,
          "FPT_ITT.1": 12,
          "FPT_ITT.1.1": 1,
          "FPT_STM": 1,
          "FPT_STM.1": 6
        },
        "FTA": {
          "FTA_TAB.1": 10,
          "FTA_TAB.1.1": 1
        },
        "FTP": {
          "FTP_ITT.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 5
        }
      },
      "crypto_protocol": {
        "SSH": {
          "SSH": 8
        },
        "TLS": {
          "SSL": {
            "SSL": 10
          },
          "TLS": {
            "TLS": 1
          }
        },
        "VPN": {
          "VPN": 1
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "malfunction": 2
        }
      },
      "standard_id": {},
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 3
        },
        "Microsoft": {
          "Microsoft": 2
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "CygnaCom",
      "/CreationDate": "D:20110503134838",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20110503134838",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Title": "Sourcefire 2008 ST",
      "pdf_file_size_bytes": 1197238,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://en.wikipedia.org/wiki/Superuser",
          "https://support.sourcefire.com/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 116
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid10406-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2+",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid10406-st.pdf",
  "state": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState",
    "errors": [],
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "c75cc50fe48c62ca42042d5d24def78c6ccfbb930bcf7805e460730ee65298dd",
    "report_txt_hash": "ba13ac8ed9fb401f01dcb8c358439808dc3a060674f41362182a6b47d50fd96a",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "321403a51550a0431125dd8aede2066d2c94aae23db43e918c592e5393b89cae",
    "st_txt_hash": "8674f7961ea124060900ceb3bffca01a4cfffb9f97f5c07a734dc3e3388350cb"
  },
  "status": "archived"
}