IBM WebSphere MQ v7.1.0.2

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status archived
Valid from 30.01.2014
Valid until 30.01.2016
Scheme 🇺🇸 US
Manufacturer IBM Corporation
Category Other Devices and Systems
Security level EAL2+, ALC_FLR.2

Heuristics summary ?

Certificate ?

Certification report ?

References

Security target ?

References

Heuristics ?

Extracted SARs

ALC_FLR.2

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2012-2201
C M N
HIGH 7.5 3.6 29.09.2022 03:15
CVE-2012-3295
C M N
MEDIUM 4.3 2.9 29.08.2012 22:55
CVE-2013-3028
C M N
MEDIUM 4.6 6.4 02.07.2013 21:55
CVE-2013-6734
C M N
LOW 3.5 2.9 22.02.2014 21:55
CVE-2014-0911
C M N
MEDIUM 4.3 2.9 07.05.2014 10:55
CVE-2014-4771
C M N
LOW 3.5 2.9 13.02.2015 02:59
CVE-2015-0176
C M N
MEDIUM 4.3 2.9 27.04.2015 11:59
CVE-2016-3013
C M N
MEDIUM 6.5 3.6 22.02.2017 19:59
CVE-2016-3052
C M N
MEDIUM 5.9 3.6 22.02.2017 19:59
CVE-2017-1612
C M N
HIGH 7.8 5.9 09.01.2018 20:29
CVE-2018-1374
C M N
MEDIUM 6.5 3.6 26.06.2018 20:29
CVE-2019-4141
C M N
MEDIUM 6.5 3.6 27.09.2019 14:15
CVE-2019-4261
C M N
MEDIUM 6.5 3.6 05.08.2019 14:15

References ?

No references are available for this certificate as its ID was not successfully extracted.

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': None}.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2015-0176', 'CVE-2016-3052', 'CVE-2016-3013', 'CVE-2019-4261', 'CVE-2019-4141']} values added.
  • 24.03.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2015-0176', 'CVE-2016-3052', 'CVE-2016-3013', 'CVE-2019-4261', 'CVE-2019-4141']} values discarded.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 05.02.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2013-3028', 'CVE-2016-3052', 'CVE-2016-3013', 'CVE-2013-6734']} values added.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2012-3295', 'CVE-2012-2201']} values added.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2012-3295', 'CVE-2012-2201']} values discarded.
  • 10.10.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:a:ibm:websphere:7.1.0.2:*:*:*:lombardi:*:*:*', 'cpe:2.3:a:ibm:websphere_extreme_scale_client:7.1.0.2:*:*:*:*:*:*:*']} values added.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2013-6734']} values added.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
    • The st_convert_ok property was set to False.
    • The report_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The report_extract_ok property was set to False.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:a:ibm:websphere:7.1.0.2:*:*:*:lombardi:*:*:*', 'cpe:2.3:a:ibm:websphere_extreme_scale_client:7.1.0.2:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:websphere_mq_jms:7.1:*:*:*:*:*:*:*']} values discarded.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2016-0360', 'CVE-2013-6734']} values discarded.
  • 01.10.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2012-2201']} values added.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was updated, with the [[1, 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/st_vid10491-st, code: nok'], [3, 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/st_vid10491-st, code: nok']] values inserted.

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': None, 'st_filename': None}.
  • 27.07.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2019-4656', 'CVE-2019-4619', 'CVE-2020-4310', 'CVE-2019-4719', 'CVE-2012-2199']} values discarded.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 2}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 29.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_pdf_hash': None, 'report_pdf_hash': None, 'st_txt_hash': None, 'report_txt_hash': None}.
  • 21.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:a:ibm:websphere:7.1.0.2:*:*:*:lombardi:*:*:*', 'cpe:2.3:a:ibm:websphere_extreme_scale_client:7.1.0.2:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:websphere_mq_jms:7.1:*:*:*:*:*:*:*']} values added.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2016-0360', 'CVE-2013-6734']} values added.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/st_vid10491-vr, code: nok', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/st_vid10491-vr, code: nok', 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/st_vid10491-vr, code: nok', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/st_vid10491-vr, code: nok'].

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ALC_FLR', 'level': 2}]}}.
    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:a:ibm:websphere:7.1.0.2:*:*:*:lombardi:*:*:*']} values discarded.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['7.1.0.2']}.
    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:a:ibm:websphere_mq:7.1.0.2:*:*:*:-:*:*:*', 'cpe:2.3:a:ibm:websphere:7.1.0.2:*:*:*:lombardi:*:*:*', 'cpe:2.3:a:ibm:websphere_mq:7.1:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:websphere_mq:7.1.0.2:*:*:*:*:*:*:*']}.
  • 12.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[1, 'cpe:2.3:a:ibm:websphere:7.1.0.2:*:*:*:lombardi:*:*:*'], [2, 'cpe:2.3:a:ibm:websphere_mq:7.1.0.2:*:*:*:-:*:*:*'], [3, 'cpe:2.3:a:ibm:websphere_mq:7.1:*:*:*:*:*:*:*']] values inserted.
  • 11.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[0, 'cpe:2.3:a:ibm:websphere_mq:7.1:*:*:*:*:*:*:*']] values inserted.
  • 03.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[2, 'cpe:2.3:a:ibm:websphere_mq:7.1.0.2:*:*:*:*:*:*:*'], [3, 'cpe:2.3:a:ibm:websphere_mq:7.1:*:*:*:*:*:*:*']] values inserted.
  • 02.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[1, 'cpe:2.3:a:ibm:websphere_mq:7.1.0.2:*:*:*:-:*:*:*'], [2, 'cpe:2.3:a:ibm:websphere_mq:7.1.0.2:*:*:*:*:*:*:*'], [3, 'cpe:2.3:a:ibm:websphere:7.1.0.2:*:*:*:lombardi:*:*:*']] values inserted.
  • 01.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[1, 'cpe:2.3:a:ibm:websphere_mq:7.1.0.2:*:*:*:*:*:*:*'], [2, 'cpe:2.3:a:ibm:websphere_mq:7.1.0.2:*:*:*:-:*:*:*']] values inserted.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name IBM WebSphere MQ v7.1.0.2 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": null,
  "dgst": "6af4a27251001715",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": null,
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:a:ibm:websphere_mq:7.1.0.2:*:*:*:*:*:*:*",
        "cpe:2.3:a:ibm:websphere_extreme_scale_client:7.1.0.2:*:*:*:*:*:*:*",
        "cpe:2.3:a:ibm:websphere_mq:7.1:*:*:*:*:*:*:*",
        "cpe:2.3:a:ibm:websphere:7.1.0.2:*:*:*:lombardi:*:*:*",
        "cpe:2.3:a:ibm:websphere_mq:7.1.0.2:*:*:*:-:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "7.1.0.2"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2017-1612",
        "CVE-2013-3028",
        "CVE-2016-3013",
        "CVE-2012-3295",
        "CVE-2014-4771",
        "CVE-2016-3052",
        "CVE-2014-0911",
        "CVE-2013-6734",
        "CVE-2012-2201",
        "CVE-2018-1374",
        "CVE-2019-4261",
        "CVE-2015-0176",
        "CVE-2019-4141"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "IBM Corporation",
  "manufacturer_web": "https://www.ibm.com",
  "name": "IBM WebSphere MQ v7.1.0.2",
  "not_valid_after": "2016-01-30",
  "not_valid_before": "2014-01-30",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": null,
    "report_frontpage": null,
    "report_keywords": null,
    "report_metadata": null,
    "st_filename": null,
    "st_frontpage": null,
    "st_keywords": null,
    "st_metadata": null
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid10491-vr",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2+",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid10491-st",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    }
  },
  "status": "archived"
}