Cisco Nexus 5000 Series Switch w/2000 Series Fabric Extenders running s/w NX-OS v5.0(3)N1(1c), and Cisco Secure Access Control Server (ACS) running s/w v5.2 patch 3

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status archived
Valid from 08.09.2011
Valid until 05.06.2015
Scheme 🇺🇸 US
Manufacturer Cisco Systems, Inc.
Category Network and Network-Related Devices and Systems
Security level ALC_FLR.2, EAL4+
Maintenance updates Cisco Nexus 5000 with v5.0(3)N1(1c) (06.07.2012) Certification report
Cisco Nexus 5000 with v5.2(1)N1(2a) (31.03.2014) Certification report

Heuristics summary ?

Certificate ID: CCEVS-VR-10384-2011

Certificate ?

Certification report ?

Extracted keywords

Schemes
MAC
Protocols
SSH, TLS

Vendor
Microsoft, Cisco Systems, Inc, Cisco, Cisco Systems

Security level
EAL 4, EAL4, EAL 4 augmented, EAL4 augmented
Security Assurance Requirements (SAR)
ALC_FLR.2
Certificates
CCEVS-VR-10384-2011

Standards
FIPS 140-2

File metadata

Title: Validation Report for N7K
Author: Tammy Compton
Creation date: D:20110919143541
Modification date: D:20110919143541
Pages: 23
Creator: Microsoft® Office Word 2007
Producer: Microsoft® Office Word 2007

Frontpage

Certificate ID: CCEVS-VR-10384-2011
Certified item: Cisco Systems, Inc, 170 West Tasman Dr., San Jose, CA 95134 Cisco Nexus 5000 Series Switch
Certification lab: US NIAP

References

No references.

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, TDES
Asymmetric Algorithms
Diffie-Hellman, DSA
Hash functions
MD5
Schemes
MAC, Key Agreement
Protocols
SSH, SSL, TLS
Block cipher modes
CBC

Vendor
Microsoft, Cisco, Cisco Systems, Inc, Cisco Systems

Security level
EAL4, EAL 4, EAL4 augmented, EAL 4 augmented
Claims
T.AVAIL, T.NETTRAFFIC, T.IMPCONF, T.ADMINAUTHOR, T.ADMINAUDIT, T.AUDITCOMP, T.VRFCOMP, A.PROTCT, A.LOCATE, A.MANAGE, A.NOEVIL, A.NOTRST, OE.PERSON, OE.INSTALL, OE.TIME
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.3, ADV_FSP.4, ADV_IMP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.4, ALC_LCD.1, ALC_TAT.1, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ATE_COV.2, ATE_IND.2, ATE_DPT.2, ATE_FUN.1, AVA_VAN.3, ASE_CCL.1, ASE_REQ.2, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_STG.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.4.1, FCS_COP.1.1, FDP_IFC.1, FDP_IFF.1, FDP_ITC.1, FDP_ITC.2, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ACC.1, FIA_UAU.1, FIA_UAU.5, FIA_UID.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FPT_STM.1.1

Standards
FIPS 140-2, FIPS 186-3, FIPS 186-2, FIPS 197, FIPS 46-3, FIPS 180-2, RFC 3414, RFC 1321, RFC 2631, RFC 2246, CCMB-2006-09-001, CCMB-2007-09-003, CCMB-2007-09-004

File metadata

Author: Cisco Systems, Inc.
Creation date: D:20140331112214-04'00'
Modification date: D:20140402080134-04'00'
Pages: 65
Creator: Microsoft® Word 2010
Producer: Microsoft® Word 2010

References

No references.

Heuristics ?

Certificate ID: CCEVS-VR-10384-2011

Extracted SARs

ADV_ARC.1, ADV_FSP.4, ALC_CMS.4, ALC_TAT.1, ATE_COV.2, ASE_CCL.1, ALC_FLR.2, AVA_VAN.3, ASE_TSS.1, ADV_IMP.1, ADV_TDS.3, ASE_ECD.1, ASE_REQ.2, AGD_PRE.1, ALC_CMC.4, ALC_LCD.1, ALC_DVS.1, ATE_FUN.1, ATE_DPT.2, ASE_INT.1, ASE_OBJ.2, ASE_SPD.1, ATE_IND.2, ALC_DEL.1, AGD_OPE.1

CPE matches

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2011-2569
C M N
MEDIUM 6.8 10.0 27.10.2011 21:55
CVE-2011-4667
C M N
MEDIUM 5.9 3.6 25.09.2017 21:29
CVE-2012-4135
C M N
MEDIUM 4.6 6.9 21.12.2013 14:22
CVE-2012-5424
C M N
MEDIUM 5.0 2.9 07.11.2012 23:55
CVE-2013-6975
C M N
MEDIUM 4.6 6.9 20.05.2014 11:13
CVE-2013-6982
C M N
MEDIUM 4.3 2.9 08.01.2014 21:55
CVE-2014-3295
C M N
MEDIUM 4.8 4.9 14.06.2014 04:26
CVE-2015-0718
C M N
HIGH 7.5 3.6 03.03.2016 22:59
CVE-2015-5987
C M N
HIGH 8.6 4.0 31.12.2015 16:59
CVE-2015-5988
C M N
CRITICAL 9.8 5.9 31.12.2015 16:59
CVE-2015-5989
C M N
CRITICAL 9.8 5.9 31.12.2015 16:59
CVE-2015-5990
C M N
HIGH 8.8 5.9 31.12.2015 16:59
CVE-2015-6398
C M N
HIGH 7.5 3.6 07.02.2016 11:59
CVE-2016-1302
C M N
HIGH 8.8 5.9 07.02.2016 11:59
CVE-2016-1307
C M N
MEDIUM 5.4 2.5 07.02.2016 11:59
CVE-2016-1317
C M N
MEDIUM 4.3 1.4 09.02.2016 03:59
CVE-2016-1319
C M N
MEDIUM 5.3 1.4 09.02.2016 03:59
CVE-2016-1344
C M N
MEDIUM 5.9 3.6 26.03.2016 01:59
CVE-2016-1348
C M N
HIGH 7.5 3.6 26.03.2016 01:59
CVE-2016-1349
C M N
HIGH 7.5 3.6 26.03.2016 01:59
CVE-2016-1350
C M N
HIGH 7.5 3.6 26.03.2016 01:59
CVE-2016-1351
C M N
HIGH 7.5 3.6 26.03.2016 01:59
CVE-2016-1409
C M N
HIGH 7.5 3.6 29.05.2016 22:59
CVE-2016-1453
C M N
CRITICAL 9.8 5.9 06.10.2016 10:59
CVE-2017-6770
C M N
MEDIUM 4.2 2.5 07.08.2017 06:29

References ?

No references are available for this certificate.

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f236f9d201366977ed3b42c4bb8eceb917eff91f378852ae1d4643419bb156f6', 'txt_hash': '01c726914d1393597a662376b2781d052e64bd9c16a11ba9142ccdf21d6934b5'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f6cd105652ce68488060c6b6e4897d5fef8e46dade0bded06e47e88c2af585b1', 'txt_hash': '12883cedd21faf9e42526628d926caf988acfe5065154e40015c745e89356ef8'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}.
    • The report_frontpage property was set to {'US': {'cert_id': 'CCEVS-VR-10384-2011', 'cert_item': 'Cisco Systems, Inc, 170 West Tasman Dr., San Jose, CA 95134 Cisco Nexus 5000 Series Switch', 'cert_lab': 'US NIAP'}}.
    • The st_frontpage property was set to None.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': None}.
    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:o:cisco:nx-os:5.2\\\\(9\\\\):*:*:*:*:*:*:*']} values added.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2016-1319', 'CVE-2015-5987', 'CVE-2016-1307', 'CVE-2016-1348', 'CVE-2015-5990', 'CVE-2015-5989', 'CVE-2016-1350', 'CVE-2013-6975', 'CVE-2015-0718', 'CVE-2015-6398', 'CVE-2016-1317', 'CVE-2015-5988', 'CVE-2016-1344', 'CVE-2016-1349', 'CVE-2016-1302']} values added.
  • 24.03.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2016-1319', 'CVE-2016-1348', 'CVE-2016-1307', 'CVE-2016-1302', 'CVE-2016-1350', 'CVE-2013-6975', 'CVE-2015-6398', 'CVE-2016-1317', 'CVE-2016-1344', 'CVE-2016-1349', 'CVE-2015-0718']} values discarded.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2012-07-06', 'maintenance_title': 'Cisco Nexus 5000 with v5.0(3)N1(1c)', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/ACMR%20VID-10384%20Cisco%20Nexus%205000.pdf', 'maintenance_st_link': None}, {'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2014-03-31', 'maintenance_title': 'Cisco Nexus 5000 with v5.2(1)N1(2a)', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/st_vid10384-add2.pdf', 'maintenance_st_link': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 05.02.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2016-1319', 'CVE-2016-1351', 'CVE-2016-1348', 'CVE-2016-1307', 'CVE-2013-6982', 'CVE-2016-1350', 'CVE-2013-6975', 'CVE-2016-1409', 'CVE-2016-1317', 'CVE-2016-1453', 'CVE-2016-1344', 'CVE-2016-1349', 'CVE-2016-1302']} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/st_vid10384-vr.pdf, code: nok'].
    • The st_pdf_hash property was set to f6cd105652ce68488060c6b6e4897d5fef8e46dade0bded06e47e88c2af585b1.
    • The st_txt_hash property was set to 12883cedd21faf9e42526628d926caf988acfe5065154e40015c745e89356ef8.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 734086, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 65, '/Author': 'Cisco Systems, Inc.', '/CreationDate': "D:20140331112214-04'00'", '/Creator': 'Microsoft® Word 2010', '/ModDate': "D:20140402080134-04'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://en.wikipedia.org/wiki/Bit']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 3, 'EAL 4': 2, 'EAL4 augmented': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_TDS.3': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 5, 'ALC_CMC.4': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_IND.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VAN.3': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_REQ.2': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 15, 'FAU_SAR.1': 11, 'FAU_STG.1': 5, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 2, 'FAU_SAR.1.2': 2, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FCS': {'FCS_CKM.1': 36, 'FCS_CKM.4': 29, 'FCS_COP.1': 53, 'FCS_CKM.1.1': 2, 'FCS_CKM.2': 4, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 7}, 'FDP': {'FDP_IFC.1': 27, 'FDP_IFF.1': 21, 'FDP_ITC.1': 16, 'FDP_ITC.2': 16, 'FDP_IFC.1.1': 2, 'FDP_IFF.1.1': 2, 'FDP_IFF.1.2': 2, 'FDP_IFF.1.3': 2, 'FDP_IFF.1.4': 2, 'FDP_IFF.1.5': 2, 'FDP_ACC.1': 4}, 'FIA': {'FIA_UAU.1': 12, 'FIA_UAU.5': 7, 'FIA_UID.1': 21, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 2, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1.1': 2, 'FIA_UID.1.2': 2}, 'FMT': {'FMT_MSA.1': 20, 'FMT_MSA.3': 17, 'FMT_MTD.1': 12, 'FMT_SMF.1': 16, 'FMT_SMR.1': 25, 'FMT_MSA.1.1': 2, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MTD.1.1': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 9, 'FPT_STM.1.1': 1}}, 'cc_claims': {'T': {'T.AVAIL': 3, 'T.NETTRAFFIC': 3, 'T.IMPCONF': 3, 'T.ADMINAUTHOR': 3, 'T.ADMINAUDIT': 3, 'T.AUDITCOMP': 3, 'T.VRFCOMP': 3}, 'A': {'A.PROTCT': 3, 'A.LOCATE': 3, 'A.MANAGE': 3, 'A.NOEVIL': 3, 'A.NOTRST': 3}, 'OE': {'OE.PERSON': 4, 'OE.INSTALL': 3, 'OE.TIME': 3}}, 'vendor': {'Microsoft': {'Microsoft': 2}, 'Cisco': {'Cisco': 97, 'Cisco Systems, Inc': 4, 'Cisco Systems': 3}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 9}}, 'DES': {'DES': {'DES': 2}, '3DES': {'Triple-DES': 5, 'TDES': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 8}, 'DSA': {'DSA': 7}}}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 8}}}, 'crypto_scheme': {'MAC': {'MAC': 28}, 'KA': {'Key Agreement': 4}}, 'crypto_protocol': {'SSH': {'SSH': 32}, 'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS': 36}}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 4}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 2, 'FIPS 186-3': 1, 'FIPS 186-2': 4, 'FIPS 197': 2, 'FIPS 46-3': 2, 'FIPS 180-2': 2}, 'RFC': {'RFC 3414': 4, 'RFC 1321': 2, 'RFC 2631': 2, 'RFC 2246': 1}, 'CC': {'CCMB-2006-09-001': 1, 'CCMB-2007-09-003': 1, 'CCMB-2007-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to st_vid10384-st.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]} values added.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/st_vid10384-st.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]} values discarded.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to f6cd105652ce68488060c6b6e4897d5fef8e46dade0bded06e47e88c2af585b1.
    • The st_txt_hash property was set to 12883cedd21faf9e42526628d926caf988acfe5065154e40015c745e89356ef8.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 734086, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 65, '/Author': 'Cisco Systems, Inc.', '/CreationDate': "D:20140331112214-04'00'", '/Creator': 'Microsoft® Word 2010', '/ModDate': "D:20140402080134-04'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://en.wikipedia.org/wiki/Bit']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 3, 'EAL 4': 2, 'EAL4 augmented': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_TDS.3': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 5, 'ALC_CMC.4': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_IND.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VAN.3': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_REQ.2': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 15, 'FAU_SAR.1': 11, 'FAU_STG.1': 5, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 2, 'FAU_SAR.1.2': 2, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FCS': {'FCS_CKM.1': 36, 'FCS_CKM.4': 29, 'FCS_COP.1': 53, 'FCS_CKM.1.1': 2, 'FCS_CKM.2': 4, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 7}, 'FDP': {'FDP_IFC.1': 27, 'FDP_IFF.1': 21, 'FDP_ITC.1': 16, 'FDP_ITC.2': 16, 'FDP_IFC.1.1': 2, 'FDP_IFF.1.1': 2, 'FDP_IFF.1.2': 2, 'FDP_IFF.1.3': 2, 'FDP_IFF.1.4': 2, 'FDP_IFF.1.5': 2, 'FDP_ACC.1': 4}, 'FIA': {'FIA_UAU.1': 12, 'FIA_UAU.5': 7, 'FIA_UID.1': 21, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 2, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1.1': 2, 'FIA_UID.1.2': 2}, 'FMT': {'FMT_MSA.1': 20, 'FMT_MSA.3': 17, 'FMT_MTD.1': 12, 'FMT_SMF.1': 16, 'FMT_SMR.1': 25, 'FMT_MSA.1.1': 2, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MTD.1.1': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 9, 'FPT_STM.1.1': 1}}, 'cc_claims': {'T': {'T.AVAIL': 3, 'T.NETTRAFFIC': 3, 'T.IMPCONF': 3, 'T.ADMINAUTHOR': 3, 'T.ADMINAUDIT': 3, 'T.AUDITCOMP': 3, 'T.VRFCOMP': 3}, 'A': {'A.PROTCT': 3, 'A.LOCATE': 3, 'A.MANAGE': 3, 'A.NOEVIL': 3, 'A.NOTRST': 3}, 'OE': {'OE.PERSON': 4, 'OE.INSTALL': 3, 'OE.TIME': 3}}, 'vendor': {'Microsoft': {'Microsoft': 2}, 'Cisco': {'Cisco': 97, 'Cisco Systems, Inc': 4, 'Cisco Systems': 3}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 9}}, 'DES': {'DES': {'DES': 2}, '3DES': {'Triple-DES': 5, 'TDES': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 8}, 'DSA': {'DSA': 7}}}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 8}}}, 'crypto_scheme': {'MAC': {'MAC': 28}, 'KA': {'Key Agreement': 4}}, 'crypto_protocol': {'SSH': {'SSH': 32}, 'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS': 36}}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 4}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 2, 'FIPS 186-3': 1, 'FIPS 186-2': 4, 'FIPS 197': 2, 'FIPS 46-3': 2, 'FIPS 180-2': 2}, 'RFC': {'RFC 3414': 4, 'RFC 1321': 2, 'RFC 2631': 2, 'RFC 2246': 1}, 'CC': {'CCMB-2006-09-001': 1, 'CCMB-2007-09-003': 1, 'CCMB-2007-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to st_vid10384-st.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]} values added.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/st_vid10384-st.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2011-4667', 'CVE-2012-5424', 'CVE-2011-2569', 'CVE-2012-4135']} values added.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]} values discarded.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2011-4667', 'CVE-2012-5424', 'CVE-2011-2569', 'CVE-2012-4135']} values discarded.
  • 10.10.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(4\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(2\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(2\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(9\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1c\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)a1\\(2\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(9\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(7\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\):-:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(5\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(3\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1c\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2\\):*:*:*:*:*:*:*']} values added.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2016-1319', 'CVE-2016-1348', 'CVE-2016-1307', 'CVE-2016-1302', 'CVE-2016-1350', 'CVE-2015-6398', 'CVE-2016-1317', 'CVE-2016-1344', 'CVE-2016-1349', 'CVE-2015-0718']} values added.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(4\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(2\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(7\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:nexus_5000_series:*:*', 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(4\\):*:*:*:*:nexus_5000_series:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(6\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:nexus_5000_series:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(2\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(9\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(8\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1c\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(6\\):*:*:*:*:nexus_5000_series:*:*', 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(3\\):*:*:*:*:nexus_5000_series:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(9\\)n1\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)a1\\(2\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(9\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(7\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_access_control_system:5.2\\(0.3\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(9\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\):-:*:*:*:*:*:*', 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(1\\):*:*:*:*:nexus_5000_series:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(5\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(8\\):*:*:*:*:nexus_5000_series:*:*', 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(2\\):*:*:*:*:nexus_5000_series:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(3\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:nexus_5000_series:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(3a\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(5\\):*:*:*:*:nexus_5000_series:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1c\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(7\\):*:*:*:*:nexus_5000_series:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(4\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:nx-os:5.2\\(9\\)n1\\(1\\):*:*:*:*:nexus_5000_series:*:*', 'cpe:2.3:o:cisco:nx-os:5.2:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(9a\\):*:*:*:*:*:*:*']} values discarded.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2016-1319', 'CVE-2016-1348', 'CVE-2018-0253', 'CVE-2016-1307', 'CVE-2018-0147', 'CVE-2016-1302', 'CVE-2014-0649', 'CVE-2014-0650', 'CVE-2015-0580', 'CVE-2016-1350', 'CVE-2015-6398', 'CVE-2015-4219', 'CVE-2014-0648', 'CVE-2016-1317', 'CVE-2015-6394', 'CVE-2016-1344', 'CVE-2016-1349', 'CVE-2015-0718']} values discarded.
  • 26.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'vendor': {'__insert__': {'Cisco': {'Cisco Systems, Inc': 2, 'Cisco': 106, 'Cisco Systems': 2}}}} data.
    • The st_keywords property was updated, with the {'vendor': {'__insert__': {'Cisco': {'Cisco': 97, 'Cisco Systems, Inc': 4, 'Cisco Systems': 3}}}} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'st_vid10384-vr.pdf', 'st_filename': 'st_vid10384-st.pdf'}.
    • The report_keywords property was updated, with the {'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.2': 5}}}}, 'tee_name': {}} data.
    • The st_keywords property was updated, with the {'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.2': 5}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_SAR.1': 11, 'FAU_STG.1': 5}}, 'FCS': {'__update__': {'FCS_CKM.1': 36, 'FCS_CKM.4': 29, 'FCS_COP.1': 53}}, 'FIA': {'__update__': {'FIA_UID.1': 21}}, 'FMT': {'__update__': {'FMT_MSA.1': 20, 'FMT_MSA.3': 17, 'FMT_MTD.1': 12, 'FMT_SMF.1': 16, 'FMT_SMR.1': 25}}}}, 'cc_claims': {'__update__': {'OE': {'__update__': {'OE.INSTALL': 3}}}}, 'vendor': {'__delete__': ['STMicroelectronics']}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 9}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 2}}, '3DES': {'__update__': {'Triple-DES': 5}}}}}}, 'asymmetric_crypto': {'__update__': {'FF': {'__update__': {'DH': {'__update__': {'Diffie-Hellman': 8}}, 'DSA': {'__update__': {'DSA': 7}}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 28}}, 'KA': {'__update__': {'Key Agreement': 4}, '__delete__': ['KA']}}}, 'standard_id': {'__update__': {'RFC': {'__update__': {'RFC 3414': 4}}}}} data.
  • 30.07.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2016-1347']} values discarded.
  • 27.07.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2012-1357', 'CVE-2019-1614', 'CVE-2012-3051', 'CVE-2019-1599', 'CVE-2019-1731', 'CVE-2019-1594', 'CVE-2014-3261', 'CVE-2019-1604', 'CVE-2019-1597', 'CVE-2014-2200', 'CVE-2005-4499', 'CVE-2017-3875', 'CVE-2013-1178', 'CVE-2019-1769', 'CVE-2016-1346', 'CVE-2019-1616', 'CVE-2019-1598', 'CVE-2013-1181', 'CVE-2013-1180', 'CVE-2015-5990', 'CVE-2020-3120', 'CVE-2019-1612', 'CVE-2019-1790', 'CVE-2015-0721', 'CVE-2020-10136', 'CVE-2019-1779', 'CVE-2019-1603', 'CVE-2019-1609', 'CVE-2018-0307', 'CVE-2019-1734', 'CVE-2019-1596', 'CVE-2021-34714', 'CVE-2018-0331', 'CVE-2018-0306', 'CVE-2015-4197', 'CVE-2011-4023', 'CVE-2019-1591', 'CVE-2019-1783', 'CVE-2011-2581', 'CVE-2018-0311', 'CVE-2018-0330', 'CVE-2019-15799', 'CVE-2019-1588', 'CVE-2012-2469', 'CVE-2015-5989', 'CVE-2019-1649', 'CVE-2019-1768', 'CVE-2019-1963', 'CVE-2018-0291', 'CVE-2019-1778', 'CVE-2019-1600', 'CVE-2019-15800', 'CVE-2019-1781', 'CVE-2013-1179', 'CVE-2016-1329', 'CVE-2019-1726', 'CVE-2019-15802', 'CVE-2019-1791', 'CVE-2019-1727', 'CVE-2019-1795', 'CVE-2014-3341', 'CVE-2018-0301', 'CVE-2017-3883', 'CVE-2019-1611', 'CVE-2015-5987', 'CVE-2019-15804', 'CVE-2012-0352', 'CVE-2016-1454', 'CVE-2019-1775', 'CVE-2019-1593', 'CVE-2019-1858', 'CVE-2015-5988', 'CVE-2018-0295', 'CVE-2019-1595', 'CVE-2014-2201', 'CVE-2019-1767', 'CVE-2018-0293', 'CVE-2020-3119', 'CVE-2018-0292', 'CVE-2019-15803', 'CVE-2019-1962', 'CVE-2015-0658', 'CVE-2015-6392', 'CVE-2019-1774', 'CVE-2019-1610', 'CVE-2019-1729', 'CVE-2019-1782', 'CVE-2019-1784', 'CVE-2019-1605', 'CVE-2019-15801', 'CVE-2015-6312', 'CVE-2019-1601', 'CVE-2015-6393', 'CVE-2019-1776', 'CVE-2019-1735', 'CVE-2020-3170', 'CVE-2019-1965', 'CVE-2019-1780', 'CVE-2019-1811', 'CVE-2015-6260', 'CVE-2019-1813', 'CVE-2013-1122', 'CVE-2019-1608', 'CVE-2019-1812', 'CVE-2019-1901', 'CVE-2013-5566', 'CVE-2015-6313']} values discarded.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2012-07-06', 'maintenance_title': 'Cisco Nexus 5000 with v5.0(3)N1(1c)', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/ACMR%20VID-10384%20Cisco%20Nexus%205000.pdf', 'maintenance_st_link': None}, {'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2014-03-31', 'maintenance_title': 'Cisco Nexus 5000 with v5.2(1)N1(2a)', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/st_vid10384-add2.pdf', 'maintenance_st_link': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://en.wikipedia.org/wiki/Bit']}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'US': {'CCEVS-VR-10384-2011': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 9, 'EAL4': 2, 'EAL 4 augmented': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 4}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Microsoft': {'Microsoft': 2}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 4}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'TLS': {'TLS': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 3}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 3, 'EAL 4': 2, 'EAL4 augmented': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_TDS.3': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 3, 'ALC_CMC.4': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_IND.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VAN.3': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_REQ.2': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 15, 'FAU_SAR.1': 12, 'FAU_STG.1': 6, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 2, 'FAU_SAR.1.2': 2, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FCS': {'FCS_CKM.1': 37, 'FCS_CKM.4': 32, 'FCS_COP.1': 56, 'FCS_CKM.1.1': 2, 'FCS_CKM.2': 4, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 7}, 'FDP': {'FDP_IFC.1': 27, 'FDP_IFF.1': 21, 'FDP_ITC.1': 16, 'FDP_ITC.2': 16, 'FDP_IFC.1.1': 2, 'FDP_IFF.1.1': 2, 'FDP_IFF.1.2': 2, 'FDP_IFF.1.3': 2, 'FDP_IFF.1.4': 2, 'FDP_IFF.1.5': 2, 'FDP_ACC.1': 4}, 'FIA': {'FIA_UAU.1': 12, 'FIA_UAU.5': 7, 'FIA_UID.1': 22, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 2, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1.1': 2, 'FIA_UID.1.2': 2}, 'FMT': {'FMT_MSA.1': 21, 'FMT_MSA.3': 18, 'FMT_MTD.1': 14, 'FMT_SMF.1': 20, 'FMT_SMR.1': 30, 'FMT_MSA.1.1': 2, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MTD.1.1': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 9, 'FPT_STM.1.1': 1}}, 'cc_claims': {'T': {'T.AVAIL': 3, 'T.NETTRAFFIC': 3, 'T.IMPCONF': 3, 'T.ADMINAUTHOR': 3, 'T.ADMINAUDIT': 3, 'T.AUDITCOMP': 3, 'T.VRFCOMP': 3}, 'A': {'A.PROTCT': 3, 'A.LOCATE': 3, 'A.MANAGE': 3, 'A.NOEVIL': 3, 'A.NOTRST': 3}, 'OE': {'OE.PERSON': 4, 'OE.INSTALL': 4, 'OE.TIME': 3}}, 'vendor': {'STMicroelectronics': {'STM': 10}, 'Microsoft': {'Microsoft': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 11}}, 'DES': {'DES': {'DES': 10}, '3DES': {'Triple-DES': 7, 'TDES': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 9}, 'DSA': {'DSA': 9}}}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 8}}}, 'crypto_scheme': {'MAC': {'MAC': 36}, 'KA': {'Key Agreement': 3, 'KA': 5}}, 'crypto_protocol': {'SSH': {'SSH': 32}, 'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS': 36}}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 4}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 2, 'FIPS 186-3': 1, 'FIPS 186-2': 4, 'FIPS 197': 2, 'FIPS 46-3': 2, 'FIPS 180-2': 2}, 'RFC': {'RFC 3414': 3, 'RFC 1321': 2, 'RFC 2631': 2, 'RFC 2246': 1}, 'CC': {'CCMB-2006-09-001': 1, 'CCMB-2007-09-003': 1, 'CCMB-2007-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': 'f236f9d201366977ed3b42c4bb8eceb917eff91f378852ae1d4643419bb156f6', 'st_pdf_hash': 'f6cd105652ce68488060c6b6e4897d5fef8e46dade0bded06e47e88c2af585b1', 'report_txt_hash': '01c726914d1393597a662376b2781d052e64bd9c16a11ba9142ccdf21d6934b5', 'st_txt_hash': '12883cedd21faf9e42526628d926caf988acfe5065154e40015c745e89356ef8'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'MAC': 4, 'TLS': 1}, 'rules_randomness': {}, 'rules_tee': {'SE': 3}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 11, 'DES': 9, 'TDES': 1}, 'rules_asymmetric_crypto': {'Diffie-Hellman': 9, 'DSA': 9}, 'rules_pq_crypto': {}, 'rules_hashes': {'MD5': 8}, 'rules_crypto_schemes': {'MAC': 36, 'SSL': 1, 'TLS': 36}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
  • 27.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2016-1445']} values discarded.
  • 21.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(4\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(2\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(4\\):*:*:*:*:nexus_5000_series:*:*', 'cpe:2.3:a:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:nexus_5000_series:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(7\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(6\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:nexus_5000_series:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(2\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(8\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(6\\):*:*:*:*:nexus_5000_series:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1c\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(9\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(3\\):*:*:*:*:nexus_5000_series:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(9\\)n1\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)a1\\(2\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(9\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(7\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_access_control_system:5.2\\(0.3\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\):-:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(1\\):*:*:*:*:nexus_5000_series:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(9\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(5\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(8\\):*:*:*:*:nexus_5000_series:*:*', 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(2\\):*:*:*:*:nexus_5000_series:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(3\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(3a\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:nexus_5000_series:*:*', 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(5\\):*:*:*:*:nexus_5000_series:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1c\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(7\\):*:*:*:*:nexus_5000_series:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(4\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:nx-os:5.2\\(9\\)n1\\(1\\):*:*:*:*:nexus_5000_series:*:*', 'cpe:2.3:o:cisco:nx-os:5.2:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(9a\\):*:*:*:*:*:*:*']} values added.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2016-1307', 'CVE-2012-3051', 'CVE-2016-1329', 'CVE-2019-15801', 'CVE-2014-0649', 'CVE-2019-15802', 'CVE-2015-6394', 'CVE-2015-6312', 'CVE-2016-1349', 'CVE-2015-0718', 'CVE-2016-1351', 'CVE-2015-5987', 'CVE-2019-15804', 'CVE-2018-0147', 'CVE-2016-1302', 'CVE-2014-0650', 'CVE-2016-1350', 'CVE-2014-0648', 'CVE-2016-1347', 'CVE-2015-5988', 'CVE-2015-6313', 'CVE-2019-15799', 'CVE-2017-3875', 'CVE-2016-1445', 'CVE-2015-5989', 'CVE-2016-1346', 'CVE-2016-1317', 'CVE-2019-15803', 'CVE-2015-6260', 'CVE-2016-1348', 'CVE-2018-0253', 'CVE-2015-0658', 'CVE-2015-5990', 'CVE-2015-0580', 'CVE-2015-6398', 'CVE-2015-4219', 'CVE-2019-15800', 'CVE-2016-1344', 'CVE-2016-1319']} values added.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}]}}.
    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:a:cisco:secure_access_control_server:5.0:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:secure_access_control_server:5.2:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(5\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*']} values added.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2013-1181', 'CVE-2012-1357', 'CVE-2012-5424', 'CVE-2012-0352', 'CVE-2011-2581', 'CVE-2011-4667', 'CVE-2014-2200', 'CVE-2011-4023', 'CVE-2011-2569', 'CVE-2013-5566', 'CVE-2005-4499']} values added.
  • 05.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2019-15799', 'CVE-2019-15804', 'CVE-2019-15801', 'CVE-2019-15802', 'CVE-2019-15800', 'CVE-2019-15803']} values added.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 07.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2017-6770', 'CVE-2016-1453']} values added.
  • 29.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.3b\\):*:*:*:*:*:*:*']} values added.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2021-34714', 'CVE-2021-1229', 'CVE-2022-20625']} values added.
  • 28.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1\\\\\\):*:*:*:*:*:*:*']} values added.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2021-34714', 'CVE-2021-1229', 'CVE-2022-20625']} values discarded.
  • 09.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.3b\\):*:*:*:*:*:*:*']} values added.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2022-20625']} values added.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The cert_lab property was set to ['US'].
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {'cert_id': 'CCEVS-VR-10384-2011', 'cert_item': 'Cisco Systems, Inc, 170 West Tasman Dr., San Jose, CA 95134 Cisco Nexus 5000 Series Switch', 'cert_lab': 'US NIAP'}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['5.2', '5.0']}.
    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(9b\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(2\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1a\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(1b\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(1a\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1g\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1b\\):*:*:*:*:hyper-v:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(7\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.1\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(2.2\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(8b\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1h\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(3\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(5\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(5\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(2.2b\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(7\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.2a\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.1\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(3\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(3.1\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1a\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.2\\):*:*:*:*:vsphere:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(3.15\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(4\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(1b\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(8\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(8a\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(9\\)n1\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(7\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.2\\):*:*:*:*:hyper-v:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(2.1\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1c\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(4\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.2c\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.4b\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(4\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(1a\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(1.1\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(3a\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(5\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.2b\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.15\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(2.8\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1d\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.6\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.2\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1b\\):*:*:*:*:vsphere:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1b\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(1.1b\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.3\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(7\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(6\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(6\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1a\\):*:*:*:*:vsphere:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1e\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(2.1\\):*:*:*:*:microsoft_hyper-v:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(5\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.5a\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(9\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\):-:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.4\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.3\\):*:*:*:*:vsphere:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(2a\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.3\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(8a\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(3a\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(2.5\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1f\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(2\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(9a\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(5\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(2a\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.2\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(9\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(1.1\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(2.1a\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.1\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(9\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)sv5\\\\\\(1.2\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(2.1\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(3\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.5b\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1b\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.2\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(1.1a\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.10\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(4\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(1\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(2.1\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.3a\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(1.1c\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(8\\\\\\):*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:nx-os:5.2\\(9a\\):*:*:*:*:*:*:*']}.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2017-3875', 'CVE-2012-3051', 'CVE-2020-3172', 'CVE-2012-2469', 'CVE-2018-0294', 'CVE-2017-12329']} values added.
  • 12.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[0, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(5\\\\\\):*:*:*:*:*:*:*'], [1, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1a\\):*:*:*:*:vsphere:*:*'], [2, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1a\\):*:*:*:*:*:*:*'], [6, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.4b\\):*:*:*:*:*:*:*'], [7, 'cpe:2.3:a:cisco:nx-os:5.2\\(3a\\):*:*:*:*:nexus_7000_series:*:*'], [8, 'cpe:2.3:o:cisco:nx-os:5.2\\(3a\\):*:*:*:*:*:*:*'], [9, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(9\\):*:*:*:*:*:*:*'], [10, 'cpe:2.3:o:cisco:nx-os:5.2\\(9a\\):*:*:*:*:*:*:*'], [12, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2a\\):*:*:*:*:*:*:*'], [13, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*'], [14, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*'], [15, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.1\\):*:*:*:*:*:*:*'], [16, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(1.1\\):*:*:*:*:*:*:*'], [17, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(2\\):*:*:*:*:*:*:*'], [18, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u1\\(2\\):*:*:*:*:nexus_3000_series:*:*'], [19, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(3\\\\\\):*:*:*:*:*:*:*'], [20, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(8\\\\\\):*:*:*:*:*:*:*'], [21, 'cpe:2.3:a:cisco:nx-os:5.0\\(2a\\):*:*:*:*:nexus_7000_series:*:*'], [22, 'cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*'], [23, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u1\\\\\\(1\\\\\\):*:*:*:*:*:*:*'], [24, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u2\\\\\\(2d\\\\\\):*:*:*:*:*:*:*'], [25, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u3\\\\\\(2b\\\\\\):*:*:*:*:*:*:*'], [26, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(7\\):*:*:*:*:*:*:*'], [27, 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(7\\):*:*:*:*:nexus_5000_series:*:*'], [28, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1d\\\\\\):*:*:*:*:*:*:*'], [29, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2\\):*:*:*:*:*:*:*'], [30, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u2\\(2\\):*:*:*:*:nexus_3000_series:*:*'], [31, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.2a\\):*:*:*:*:*:*:*'], [32, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1f\\\\\\):*:*:*:*:*:*:*'], [33, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.5a\\):*:*:*:*:*:*:*'], [34, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u4\\\\\\(1\\\\\\):*:*:*:*:*:*:*'], [36, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1\\):*:*:*:*:*:*:*'], [37, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u2\\\\\\(2a\\\\\\):*:*:*:*:*:*:*'], [38, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(2.2b\\):*:*:*:*:*:*:*'], [39, 'cpe:2.3:o:cisco:nx-os:5.2\\(7\\):*:*:*:*:*:*:*'], [40, 'cpe:2.3:a:cisco:nx-os:5.2\\(7\\):*:*:*:*:nexus_7000_series:*:*'], [41, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u1\\\\\\(1a\\\\\\):*:*:*:*:*:*:*'], [42, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1f\\):*:*:*:*:*:*:*'], [43, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u5\\(1f\\):*:*:*:*:nexus_3000_series:*:*'], [44, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(2.1\\):*:*:*:*:*:*:*'], [45, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)a1\\(1\\):*:*:*:*:*:*:*'], [46, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)n2\\\\\\(2b\\\\\\):*:*:*:*:*:*:*'], [47, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u5\\(1b\\):*:*:*:*:nexus_3000_series:*:*'], [48, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1b\\):*:*:*:*:*:*:*'], [49, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.3\\):*:*:*:*:*:*:*'], [50, 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(5\\):*:*:*:*:nexus_5000_series:*:*'], [51, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(5\\):*:*:*:*:*:*:*'], [52, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(8b\\):*:*:*:*:*:*:*'], [53, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u5\\(1h\\):*:*:*:*:nexus_3000_series:*:*'], [54, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1h\\):*:*:*:*:*:*:*'], [57, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u1\\\\\\(2\\\\\\):*:*:*:*:*:*:*'], [58, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1\\\\\\):*:*:*:*:*:*:*'], [59, 'cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*'], [60, 'cpe:2.3:a:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:nexus_5000_series:*:*'], [61, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.3\\):*:*:*:*:*:*:*'], [62, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.3\\):*:*:*:*:vsphere:*:*'], [63, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1a\\\\\\):*:*:*:*:*:*:*'], [64, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:nexus_5000_series:*:*'], [65, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*'], [66, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*'], [67, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(2\\\\\\):*:*:*:*:*:*:*'], [68, 'cpe:2.3:a:cisco:nx-os:5.0\\(5\\):*:*:*:*:nexus_7000_series:*:*'], [69, 'cpe:2.3:o:cisco:nx-os:5.0\\(5\\):*:*:*:*:*:*:*'], [70, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*'], [71, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\):*:*:*:*:nexus_7000_series:*:*'], [72, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*'], [73, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.3a\\):*:*:*:*:*:*:*'], [74, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.2\\):*:*:*:*:*:*:*'], [75, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.1\\):*:*:*:*:*:*:*'], [76, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(1.1a\\):*:*:*:*:*:*:*'], [77, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2c\\):*:*:*:*:*:*:*'], [78, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u2\\(2c\\):*:*:*:*:nexus_3000_series:*:*'], [79, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u3\\\\\\(2a\\\\\\):*:*:*:*:*:*:*'], [80, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1\\):*:*:*:*:*:*:*'], [81, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(1\\\\\\):*:*:*:*:*:*:*'], [82, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(2.1a\\):*:*:*:*:*:*:*'], [83, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\):*:*:*:*:*:*:*'], [84, 'cpe:2.3:o:cisco:nx-os:5.2\\(3\\):*:*:*:*:*:*:*'], [87, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(2\\):*:*:*:*:*:*:*'], [88, 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(2\\):*:*:*:*:nexus_5000_series:*:*'], [89, 'cpe:2.3:o:cisco:nx-os:5.2\\(9\\)n1\\(1\\):*:*:*:*:*:*:*'], [90, 'cpe:2.3:a:cisco:nx-os:5.2\\(9\\)n1\\(1\\):*:*:*:*:nexus_5000_series:*:*'], [91, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1g\\\\\\):*:*:*:*:*:*:*'], [92, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(2a\\\\\\):*:*:*:*:*:*:*'], [93, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(2.1\\):*:*:*:*:*:*:*'], [94, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(6\\):*:*:*:*:*:*:*'], [95, 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(6\\):*:*:*:*:nexus_5000_series:*:*'], [96, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1a\\):*:*:*:*:*:*:*'], [97, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u5\\(1a\\):*:*:*:*:nexus_3000_series:*:*'], [98, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1c\\\\\\):*:*:*:*:*:*:*'], [99, 'cpe:2.3:o:cisco:nx-os:5.2\\(5\\):*:*:*:*:*:*:*']] values inserted.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2021-1229', 'CVE-2011-4667', 'CVE-2020-3168', 'CVE-2015-4197', 'CVE-2015-6394']} values added.
  • 11.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[0, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(1\\\\\\):*:*:*:*:*:*:*'], [1, 'cpe:2.3:o:cisco:nx-os:5.2\\(7\\):*:*:*:*:*:*:*'], [2, 'cpe:2.3:a:cisco:nx-os:5.2\\(7\\):*:*:*:*:nexus_7000_series:*:*'], [3, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\):*:*:*:*:*:*:*'], [4, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u1\\\\\\(2\\\\\\):*:*:*:*:*:*:*'], [5, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u3\\\\\\(1\\\\\\):*:*:*:*:*:*:*'], [6, 'cpe:2.3:o:cisco:nx-os:5.2\\(9a\\):*:*:*:*:*:*:*'], [7, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u3\\\\\\(2a\\\\\\):*:*:*:*:*:*:*'], [8, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(9\\):*:*:*:*:*:*:*'], [9, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(2.1\\):*:*:*:*:*:*:*'], [10, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u1\\\\\\(1b\\\\\\):*:*:*:*:*:*:*'], [11, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*'], [12, 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(1\\):*:*:*:*:nexus_5000_series:*:*'], [13, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.2\\):*:*:*:*:*:*:*'], [14, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u5\\(1b\\):*:*:*:*:nexus_3000_series:*:*'], [15, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1b\\):*:*:*:*:*:*:*'], [16, 'cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*'], [17, 'cpe:2.3:a:cisco:nx-os:5.0\\(2a\\):*:*:*:*:nexus_7000_series:*:*'], [19, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1d\\):*:*:*:*:*:*:*'], [20, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1a\\\\\\):*:*:*:*:*:*:*'], [23, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*'], [25, 'cpe:2.3:a:cisco:nx-os:5.2\\(3a\\):*:*:*:*:nexus_7000_series:*:*'], [26, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1d\\\\\\):*:*:*:*:*:*:*'], [27, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u1\\(1b\\):*:*:*:*:nexus_3000_series:*:*'], [28, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u1\\(1b\\):*:*:*:*:*:*:*'], [29, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1b\\):*:*:*:*:*:*:*'], [30, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.3\\):*:*:*:*:*:*:*'], [31, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(2.1a\\):*:*:*:*:*:*:*'], [32, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u1\\(1d\\):*:*:*:*:nexus_3000_series:*:*'], [33, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u1\\(1d\\):*:*:*:*:*:*:*'], [34, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1d\\):*:*:*:*:*:*:*'], [35, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u4\\\\\\(1\\\\\\):*:*:*:*:*:*:*'], [36, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:nexus_5000_series:*:*'], [37, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*'], [38, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)a1\\(2\\):*:*:*:*:*:*:*'], [39, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1e\\\\\\):*:*:*:*:*:*:*'], [40, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:nexus_5000_series:*:*'], [41, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:*:*:*'], [42, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u1\\(1a\\):*:*:*:*:*:*:*'], [43, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u1\\(1a\\):*:*:*:*:nexus_3000_series:*:*'], [44, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1a\\):*:*:*:*:*:*:*'], [45, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(5\\\\\\):*:*:*:*:*:*:*'], [46, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2a\\):*:*:*:*:*:*:*'], [47, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u2\\(2a\\):*:*:*:*:nexus_3000_series:*:*'], [48, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(1a\\\\\\):*:*:*:*:*:*:*'], [50, 'cpe:2.3:h:cisco:secure_access_control_server:5.2:*:*:*:*:*:*:*'], [51, 'cpe:2.3:o:cisco:nx-os:5.2:*:*:*:*:*:*:*'], [52, 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(2\\):*:*:*:*:nexus_5000_series:*:*'], [53, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(2\\):*:*:*:*:*:*:*'], [54, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(4\\\\\\):*:*:*:*:*:*:*'], [57, 'cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*'], [58, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(2\\\\\\)n2\\\\\\(1a\\\\\\):*:*:*:*:*:*:*'], [59, 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(8a\\):*:*:*:*:nexus_5000_series:*:*'], [60, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(8a\\):*:*:*:*:*:*:*'], [61, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(5\\\\\\):*:*:*:*:*:*:*'], [62, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.15\\):*:*:*:*:*:*:*'], [63, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1c\\):*:*:*:*:*:*:*'], [64, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(1.1c\\):*:*:*:*:*:*:*'], [65, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(1.1\\):*:*:*:*:*:*:*'], [66, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(1.1a\\):*:*:*:*:*:*:*'], [67, 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(1b\\):*:*:*:*:nexus_5000_series:*:*'], [68, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(1b\\):*:*:*:*:*:*:*'], [69, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1\\\\\\):*:*:*:*:*:*:*'], [70, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u2\\\\\\(2b\\\\\\):*:*:*:*:*:*:*'], [71, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1\\):*:*:*:*:*:*:*'], [72, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u5\\(1\\):*:*:*:*:nexus_3000_series:*:*'], [73, 'cpe:2.3:o:cisco:nx-os:5.2\\(9\\):*:*:*:*:*:*:*'], [74, 'cpe:2.3:a:cisco:nx-os:5.2\\(9\\):*:*:*:*:nexus_7000_series:*:*'], [76, 'cpe:2.3:a:cisco:nx-os:5.2\\(4\\):*:*:*:*:nexus_7000_series:*:*'], [77, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(1\\):*:*:*:*:*:*:*'], [78, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u2\\(1\\):*:*:*:*:nexus_3000_series:*:*'], [79, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u2\\\\\\(2c\\\\\\):*:*:*:*:*:*:*'], [80, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(8\\\\\\):*:*:*:*:*:*:*'], [81, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)sv5\\\\\\(1.2\\):*:*:*:*:*:*:*'], [82, 'cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*'], [83, 'cpe:2.3:a:cisco:secure_access_control_server:5.0:*:*:*:*:*:*:*'], [85, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u3\\(2b\\):*:*:*:*:nexus_3000_series:*:*'], [86, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2b\\):*:*:*:*:*:*:*'], [87, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.1\\):*:*:*:*:*:*:*'], [88, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(2.1\\):*:*:*:*:microsoft_hyper-v:*:*'], [89, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(2.1\\):*:*:*:*:*:*:*'], [90, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.6\\):*:*:*:*:*:*:*'], [91, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)a1\\(2a\\):*:*:*:*:*:*:*'], [93, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u3\\\\\\(2b\\\\\\):*:*:*:*:*:*:*'], [94, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(2.8\\):*:*:*:*:*:*:*'], [95, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u2\\\\\\(2\\\\\\):*:*:*:*:*:*:*'], [96, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(4\\\\\\):*:*:*:*:*:*:*'], [97, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1b\\):*:*:*:*:vsphere:*:*'], [98, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1b\\):*:*:*:*:hyper-v:*:*'], [99, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1b\\):*:*:*:*:*:*:*']] values inserted.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2013-5566', 'CVE-2011-2569', 'CVE-2012-1357', 'CVE-2017-12329']} values added.
  • 03.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[0, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(8\\):*:*:*:*:*:*:*'], [1, 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(8\\):*:*:*:*:nexus_5000_series:*:*'], [2, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1a\\):*:*:*:*:*:*:*'], [3, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1a\\):*:*:*:*:vsphere:*:*'], [4, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1a\\):*:*:*:*:*:*:*'], [5, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u5\\(1a\\):*:*:*:*:nexus_3000_series:*:*'], [6, 'cpe:2.3:o:cisco:nx-os:5.2\\(3\\):*:*:*:*:*:*:*'], [7, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:nexus_5000_series:*:*'], [8, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*'], [9, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1g\\\\\\):*:*:*:*:*:*:*'], [10, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)n2\\\\\\(2a\\\\\\):*:*:*:*:*:*:*'], [12, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u5\\(1d\\):*:*:*:*:nexus_3000_series:*:*'], [14, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u1\\(1d\\):*:*:*:*:nexus_3000_series:*:*'], [17, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(1.1\\):*:*:*:*:*:*:*'], [18, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.6\\):*:*:*:*:*:*:*'], [19, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(1.1c\\):*:*:*:*:*:*:*'], [20, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(2.1\\):*:*:*:*:*:*:*'], [21, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(2.1\\):*:*:*:*:microsoft_hyper-v:*:*'], [22, 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(2\\):*:*:*:*:nexus_5000_series:*:*'], [23, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(2\\):*:*:*:*:*:*:*'], [24, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u2\\\\\\(2d\\\\\\):*:*:*:*:*:*:*'], [25, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(2a\\\\\\):*:*:*:*:*:*:*'], [26, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(3\\\\\\):*:*:*:*:*:*:*'], [27, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)n2\\\\\\(2\\\\\\):*:*:*:*:*:*:*'], [28, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1d\\\\\\):*:*:*:*:*:*:*'], [29, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(8\\\\\\):*:*:*:*:*:*:*'], [30, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(5\\\\\\):*:*:*:*:*:*:*'], [31, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.1\\):*:*:*:*:*:*:*'], [32, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.3a\\):*:*:*:*:*:*:*'], [33, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*'], [34, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*'], [35, 'cpe:2.3:a:cisco:nx-os:5.2\\(3a\\):*:*:*:*:nexus_7000_series:*:*'], [36, 'cpe:2.3:o:cisco:nx-os:5.2\\(3a\\):*:*:*:*:*:*:*'], [37, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(1.1\\):*:*:*:*:*:*:*'], [38, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1f\\\\\\):*:*:*:*:*:*:*'], [39, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.4\\):*:*:*:*:*:*:*'], [40, 'cpe:2.3:o:cisco:nx-os:5.2:*:*:*:*:*:*:*'], [41, 'cpe:2.3:h:cisco:secure_access_control_server:5.2:*:*:*:*:*:*:*'], [42, 'cpe:2.3:a:cisco:secure_access_control_server:5.2:*:*:*:*:*:*:*'], [43, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u1\\\\\\(1\\\\\\):*:*:*:*:*:*:*'], [45, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(1.1a\\):*:*:*:*:*:*:*'], [47, 'cpe:2.3:a:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:nexus_5000_series:*:*'], [48, 'cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*'], [49, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u2\\\\\\(2a\\\\\\):*:*:*:*:*:*:*'], [50, 'cpe:2.3:a:cisco:nx-os:5.0\\(5\\):*:*:*:*:nexus_7000_series:*:*'], [51, 'cpe:2.3:o:cisco:nx-os:5.0\\(5\\):*:*:*:*:*:*:*'], [52, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(2\\\\\\)n2\\\\\\(1\\\\\\):*:*:*:*:*:*:*'], [53, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(1a\\\\\\):*:*:*:*:*:*:*'], [54, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2\\):*:*:*:*:*:*:*'], [55, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u3\\(2\\):*:*:*:*:nexus_3000_series:*:*'], [56, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(9b\\):*:*:*:*:*:*:*'], [57, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2d\\):*:*:*:*:*:*:*'], [58, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u2\\(2d\\):*:*:*:*:nexus_3000_series:*:*'], [59, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.5a\\):*:*:*:*:*:*:*'], [60, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1c\\\\\\):*:*:*:*:*:*:*'], [61, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u3\\\\\\(2\\\\\\):*:*:*:*:*:*:*'], [62, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1\\\\\\):*:*:*:*:*:*:*'], [64, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u2\\\\\\(2\\\\\\):*:*:*:*:*:*:*'], [65, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u5\\(1g\\):*:*:*:*:nexus_3000_series:*:*'], [66, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1g\\):*:*:*:*:*:*:*'], [67, 'cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*'], [68, 'cpe:2.3:a:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*'], [69, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(2.1a\\):*:*:*:*:*:*:*'], [70, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(4\\\\\\):*:*:*:*:*:*:*'], [71, 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(3\\):*:*:*:*:nexus_5000_series:*:*'], [72, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(3\\):*:*:*:*:*:*:*'], [73, 'cpe:2.3:a:cisco:nx-os:5.0\\(2a\\):*:*:*:*:nexus_7000_series:*:*'], [74, 'cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*'], [75, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u2\\\\\\(1\\\\\\):*:*:*:*:*:*:*'], [76, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1h\\\\\\):*:*:*:*:*:*:*'], [77, 'cpe:2.3:a:cisco:nx-os:5.2\\(4\\):*:*:*:*:nexus_7000_series:*:*'], [78, 'cpe:2.3:o:cisco:nx-os:5.2\\(4\\):*:*:*:*:*:*:*'], [79, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(3.1\\):*:*:*:*:*:*:*'], [80, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u1\\\\\\(1d\\\\\\):*:*:*:*:*:*:*'], [81, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.2\\):*:*:*:*:*:*:*'], [82, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.2\\):*:*:*:*:hyper-v:*:*'], [83, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.2\\):*:*:*:*:vsphere:*:*'], [84, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.3\\):*:*:*:*:*:*:*'], [85, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)a1\\(1\\):*:*:*:*:*:*:*'], [86, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)n2\\\\\\(2b\\\\\\):*:*:*:*:*:*:*'], [87, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u3\\\\\\(2b\\\\\\):*:*:*:*:*:*:*'], [88, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u3\\\\\\(1\\\\\\):*:*:*:*:*:*:*'], [89, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1\\):*:*:*:*:*:*:*'], [90, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*'], [91, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*'], [92, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u5\\(1h\\):*:*:*:*:nexus_3000_series:*:*'], [93, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1h\\):*:*:*:*:*:*:*'], [94, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.1\\):*:*:*:*:*:*:*'], [95, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(3a\\\\\\):*:*:*:*:*:*:*'], [96, 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(6\\):*:*:*:*:nexus_5000_series:*:*'], [97, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(6\\):*:*:*:*:*:*:*'], [98, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u2\\(1\\):*:*:*:*:nexus_3000_series:*:*'], [99, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(1\\):*:*:*:*:*:*:*']] values inserted.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2011-3317', 'CVE-2012-3051', 'CVE-2020-3172', 'CVE-2012-5424', 'CVE-2012-2469', 'CVE-2021-1229', 'CVE-2011-4667', 'CVE-2020-3168', 'CVE-2011-3293', 'CVE-2005-4499', 'CVE-2016-1465']} values added.
  • 02.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[0, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)n2\\\\\\(2b\\\\\\):*:*:*:*:*:*:*'], [1, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u1\\(1a\\):*:*:*:*:*:*:*'], [2, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1a\\):*:*:*:*:*:*:*'], [3, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u1\\(1a\\):*:*:*:*:nexus_3000_series:*:*'], [4, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u2\\\\\\(2d\\\\\\):*:*:*:*:*:*:*'], [5, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.5b\\):*:*:*:*:*:*:*'], [7, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u1\\\\\\(1a\\\\\\):*:*:*:*:*:*:*'], [8, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(1.1b\\):*:*:*:*:*:*:*'], [10, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(1.1\\):*:*:*:*:*:*:*'], [13, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.3\\):*:*:*:*:*:*:*'], [14, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.3\\):*:*:*:*:vsphere:*:*'], [15, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u5\\(1d\\):*:*:*:*:nexus_3000_series:*:*'], [16, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1d\\):*:*:*:*:*:*:*'], [17, 'cpe:2.3:o:cisco:nx-os:5.2\\(5\\):*:*:*:*:*:*:*'], [18, 'cpe:2.3:a:cisco:nx-os:5.2\\(5\\):*:*:*:*:nexus_7000_series:*:*'], [19, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.15\\):*:*:*:*:*:*:*'], [20, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.1\\):*:*:*:*:*:*:*'], [21, 'cpe:2.3:o:cisco:nx-os:5.2\\(9\\)n1\\(1\\):*:*:*:*:*:*:*'], [22, 'cpe:2.3:a:cisco:nx-os:5.2\\(9\\)n1\\(1\\):*:*:*:*:nexus_5000_series:*:*'], [23, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(9a\\):*:*:*:*:*:*:*'], [24, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(8\\\\\\):*:*:*:*:*:*:*'], [25, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(7\\\\\\):*:*:*:*:*:*:*'], [27, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u4\\\\\\(1\\\\\\):*:*:*:*:*:*:*'], [29, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u3\\(2\\):*:*:*:*:nexus_3000_series:*:*'], [30, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2\\):*:*:*:*:*:*:*'], [31, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u2\\\\\\(2\\\\\\):*:*:*:*:*:*:*'], [32, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2b\\):*:*:*:*:*:*:*'], [33, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u3\\(2b\\):*:*:*:*:nexus_3000_series:*:*'], [35, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(1b\\):*:*:*:*:*:*:*'], [36, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u2\\\\\\(2b\\\\\\):*:*:*:*:*:*:*'], [37, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:*:*:*'], [38, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:nexus_5000_series:*:*'], [39, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1b\\):*:*:*:*:vsphere:*:*'], [40, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1b\\):*:*:*:*:*:*:*'], [41, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1b\\):*:*:*:*:hyper-v:*:*'], [42, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(8a\\\\\\):*:*:*:*:*:*:*'], [43, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(5\\\\\\):*:*:*:*:*:*:*'], [44, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u5\\(1b\\):*:*:*:*:nexus_3000_series:*:*'], [45, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1b\\):*:*:*:*:*:*:*'], [46, 'cpe:2.3:o:cisco:nx-os:5.2\\(3\\):*:*:*:*:*:*:*'], [47, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(2a\\\\\\):*:*:*:*:*:*:*'], [48, 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(2a\\):*:*:*:*:nexus_5000_series:*:*'], [49, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(2a\\):*:*:*:*:*:*:*'], [50, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)a1\\(2a\\):*:*:*:*:*:*:*'], [53, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)a1\\(2\\):*:*:*:*:*:*:*'], [54, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(9b\\):*:*:*:*:*:*:*'], [55, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(1a\\\\\\):*:*:*:*:*:*:*'], [56, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.4b\\):*:*:*:*:*:*:*'], [57, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*'], [58, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:nexus_5000_series:*:*'], [59, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*'], [62, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(2a\\):*:*:*:*:*:*:*'], [63, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u1\\(2a\\):*:*:*:*:nexus_3000_series:*:*'], [64, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1f\\):*:*:*:*:*:*:*'], [65, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u5\\(1f\\):*:*:*:*:nexus_3000_series:*:*'], [66, 'cpe:2.3:o:cisco:nx-os:5.2\\(4\\):*:*:*:*:*:*:*'], [67, 'cpe:2.3:a:cisco:nx-os:5.2\\(4\\):*:*:*:*:nexus_7000_series:*:*'], [68, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(2.8\\):*:*:*:*:*:*:*'], [69, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1d\\\\\\):*:*:*:*:*:*:*'], [70, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1d\\):*:*:*:*:*:*:*'], [71, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u1\\(1d\\):*:*:*:*:*:*:*'], [72, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u1\\(1d\\):*:*:*:*:nexus_3000_series:*:*'], [75, 'cpe:2.3:a:cisco:nx-os:5.0\\(2a\\):*:*:*:*:nexus_7000_series:*:*'], [76, 'cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*'], [77, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u2\\\\\\(2a\\\\\\):*:*:*:*:*:*:*'], [78, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(4\\\\\\):*:*:*:*:*:*:*'], [79, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(1.1a\\):*:*:*:*:*:*:*'], [80, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.2\\):*:*:*:*:*:*:*'], [81, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1j\\):-:*:*:*:*:*:*'], [82, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\):*:*:*:*:nexus_7000_series:*:*'], [83, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*'], [84, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*'], [85, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1e\\\\\\):*:*:*:*:*:*:*'], [86, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.2c\\):*:*:*:*:*:*:*'], [87, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2c\\):*:*:*:*:*:*:*'], [88, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u2\\(2c\\):*:*:*:*:nexus_3000_series:*:*'], [89, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(7\\\\\\):*:*:*:*:*:*:*'], [90, 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(5\\):*:*:*:*:nexus_5000_series:*:*'], [91, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(5\\):*:*:*:*:*:*:*'], [92, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(2.5\\):*:*:*:*:*:*:*'], [93, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(1b\\\\\\):*:*:*:*:*:*:*'], [94, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:nexus_5000_series:*:*'], [95, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*'], [96, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(8\\):*:*:*:*:*:*:*'], [97, 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(8\\):*:*:*:*:nexus_5000_series:*:*'], [98, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(2\\\\\\):*:*:*:*:*:*:*'], [99, 'cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*']] values inserted.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2015-6394', 'CVE-2017-3875']} values added.
  • 01.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[0, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u5\\\\\\(1g\\\\\\):*:*:*:*:*:*:*'], [1, 'cpe:2.3:a:cisco:nx-os:5.2\\(5\\):*:*:*:*:nexus_7000_series:*:*'], [2, 'cpe:2.3:o:cisco:nx-os:5.2\\(5\\):*:*:*:*:*:*:*'], [3, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1a\\):*:*:*:*:*:*:*'], [4, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1a\\):*:*:*:*:vsphere:*:*'], [5, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.3\\):*:*:*:*:*:*:*'], [6, 'cpe:2.3:o:cisco:nx-os:5.2\\(9\\):*:*:*:*:*:*:*'], [7, 'cpe:2.3:a:cisco:nx-os:5.2\\(9\\):*:*:*:*:nexus_7000_series:*:*'], [8, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(7\\\\\\):*:*:*:*:*:*:*'], [9, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.4\\):*:*:*:*:*:*:*'], [12, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u1\\(1\\):*:*:*:*:nexus_3000_series:*:*'], [13, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1\\):*:*:*:*:*:*:*'], [15, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(1.1a\\):*:*:*:*:*:*:*'], [18, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u2\\\\\\(1\\\\\\):*:*:*:*:*:*:*'], [20, 'cpe:2.3:a:cisco:nx-os:5.2\\(7\\):*:*:*:*:nexus_7000_series:*:*'], [21, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)n1\\\\\\(1c\\\\\\):*:*:*:*:*:*:*'], [22, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u2\\(2b\\):*:*:*:*:nexus_3000_series:*:*'], [23, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2b\\):*:*:*:*:*:*:*'], [24, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(4\\\\\\):*:*:*:*:*:*:*'], [25, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)n2\\\\\\(2b\\\\\\):*:*:*:*:*:*:*'], [26, 'cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*'], [27, 'cpe:2.3:a:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:nexus_5000_series:*:*'], [28, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(7\\\\\\):*:*:*:*:*:*:*'], [29, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.3\\):*:*:*:*:*:*:*'], [30, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.3\\):*:*:*:*:vsphere:*:*'], [31, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u5\\(1g\\):*:*:*:*:nexus_3000_series:*:*'], [32, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1g\\):*:*:*:*:*:*:*'], [33, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(9b\\):*:*:*:*:*:*:*'], [37, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u1\\\\\\(1a\\\\\\):*:*:*:*:*:*:*'], [38, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1j\\):-:*:*:*:*:*:*'], [39, 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(5\\):*:*:*:*:nexus_5000_series:*:*'], [40, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(5\\):*:*:*:*:*:*:*'], [41, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u2\\\\\\(2c\\\\\\):*:*:*:*:*:*:*'], [42, 'cpe:2.3:a:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:nexus_5000_series:*:*'], [43, 'cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*'], [44, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(2.8\\):*:*:*:*:*:*:*'], [45, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(2.1\\):*:*:*:*:*:*:*'], [46, 'cpe:2.3:a:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*'], [47, 'cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*'], [48, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(2\\\\\\)n1\\\\\\(1\\\\\\):*:*:*:*:*:*:*'], [49, 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(7\\):*:*:*:*:nexus_5000_series:*:*'], [50, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(7\\):*:*:*:*:*:*:*'], [51, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(5\\\\\\):*:*:*:*:*:*:*'], [52, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u1\\\\\\(2\\\\\\):*:*:*:*:*:*:*'], [53, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\):*:*:*:*:*:*:*'], [54, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\):-:*:*:*:*:*:*'], [55, 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\):*:*:*:*:nexus_7000_series:*:*'], [56, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(2\\\\\\)n2\\\\\\(1a\\\\\\):*:*:*:*:*:*:*'], [57, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.2\\):*:*:*:*:*:*:*'], [58, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u3\\\\\\(2a\\\\\\):*:*:*:*:*:*:*'], [59, 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(8\\):*:*:*:*:nexus_5000_series:*:*'], [60, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(8\\):*:*:*:*:*:*:*'], [61, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u3\\\\\\(2\\\\\\):*:*:*:*:*:*:*'], [62, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(5\\\\\\):*:*:*:*:*:*:*'], [63, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(1.1\\):*:*:*:*:*:*:*'], [64, 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(3\\):*:*:*:*:nexus_5000_series:*:*'], [65, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(3\\):*:*:*:*:*:*:*'], [66, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.2c\\):*:*:*:*:*:*:*'], [67, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.4b\\):*:*:*:*:*:*:*'], [68, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)sv5\\\\\\(1.2\\):*:*:*:*:*:*:*'], [69, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1h\\):*:*:*:*:*:*:*'], [70, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u5\\(1h\\):*:*:*:*:nexus_3000_series:*:*'], [71, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.5a\\):*:*:*:*:*:*:*'], [72, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*'], [73, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*'], [74, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.1\\):*:*:*:*:*:*:*'], [75, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(1b\\):*:*:*:*:*:*:*'], [76, 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(1b\\):*:*:*:*:nexus_5000_series:*:*'], [77, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(9\\\\\\):*:*:*:*:*:*:*'], [78, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(1b\\\\\\):*:*:*:*:*:*:*'], [79, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2d\\):*:*:*:*:*:*:*'], [80, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u2\\(2d\\):*:*:*:*:nexus_3000_series:*:*'], [81, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.2a\\):*:*:*:*:*:*:*'], [82, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u2\\\\\\(2d\\\\\\):*:*:*:*:*:*:*'], [83, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\):*:*:*:*:*:*:*'], [85, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2b\\):*:*:*:*:*:*:*'], [86, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u3\\(2b\\):*:*:*:*:nexus_3000_series:*:*'], [87, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1b\\):*:*:*:*:*:*:*'], [88, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u1\\(1b\\):*:*:*:*:nexus_3000_series:*:*'], [89, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u1\\(1b\\):*:*:*:*:*:*:*'], [91, 'cpe:2.3:o:cisco:nx-os:5.2\\\\\\(1\\\\\\)n1\\\\\\(8\\\\\\):*:*:*:*:*:*:*'], [94, 'cpe:2.3:o:cisco:nx-os:5.0\\\\\\(3\\\\\\)u1\\\\\\(2a\\\\\\):*:*:*:*:*:*:*'], [95, 'cpe:2.3:a:cisco:nx-os:5.2\\(1\\)n1\\(1\\):*:*:*:*:nexus_5000_series:*:*'], [96, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*'], [97, 'cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2\\):*:*:*:*:*:*:*'], [98, 'cpe:2.3:a:cisco:nx-os:5.0\\(3\\)u2\\(2\\):*:*:*:*:nexus_3000_series:*:*'], [99, 'cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(2.2b\\):*:*:*:*:*:*:*']] values inserted.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2015-4197']} values added.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Cisco Nexus 5000 Series Switch w/2000 Series Fabric Extenders running s/w NX-OS v5.0(3)N1(1c), and Cisco Secure Access Control Server (ACS) running s/w v5.2 patch 3 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": null,
  "dgst": "88f1d07b028c7978",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-10384-2011",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:o:cisco:nx-os:5.2\\(4\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.2\\(1\\):-:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_access_control_server:5.0:*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1c\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1c\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(5\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.0\\(5\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.2\\\\(9\\\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.2\\(5\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(2\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*",
        "cpe:2.3:a:cisco:secure_access_control_server:5.2:*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(2\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.2\\(1\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.2\\(7\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)a1\\(2\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.2\\(9\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.2\\(3\\):*:*:*:*:*:*:*",
        "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(3\\):*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.2",
        "5.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2013-6975",
        "CVE-2017-6770",
        "CVE-2015-5987",
        "CVE-2011-4667",
        "CVE-2013-6982",
        "CVE-2016-1344",
        "CVE-2016-1319",
        "CVE-2011-2569",
        "CVE-2016-1350",
        "CVE-2012-4135",
        "CVE-2015-6398",
        "CVE-2015-5990",
        "CVE-2014-3295",
        "CVE-2015-5988",
        "CVE-2016-1302",
        "CVE-2012-5424",
        "CVE-2016-1349",
        "CVE-2016-1351",
        "CVE-2016-1409",
        "CVE-2016-1453",
        "CVE-2016-1348",
        "CVE-2015-5989",
        "CVE-2015-0718",
        "CVE-2016-1307",
        "CVE-2016-1317"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2014-03-31",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid10384-add2.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Cisco Nexus 5000 with v5.2(1)N1(2a)"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2012-07-06",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/ACMR%20VID-10384%20Cisco%20Nexus%205000.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Cisco Nexus 5000 with v5.0(3)N1(1c)"
      }
    ]
  },
  "manufacturer": "Cisco Systems, Inc.",
  "manufacturer_web": "https://www.cisco.com",
  "name": "Cisco Nexus 5000 Series Switch w/2000 Series Fabric Extenders running s/w NX-OS v5.0(3)N1(1c), and Cisco Secure Access Control Server (ACS) running s/w v5.2 patch 3",
  "not_valid_after": "2015-06-05",
  "not_valid_before": "2011-09-08",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "st_vid10384-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-10384-2011",
        "cert_item": "Cisco Systems, Inc, 170 West Tasman Dr., San Jose, CA 95134 Cisco Nexus 5000 Series Switch",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-10384-2011": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 9,
          "EAL 4 augmented": 2,
          "EAL4": 2,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 2
        },
        "TLS": {
          "TLS": {
            "TLS": 1
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 4
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 106,
          "Cisco Systems": 2,
          "Cisco Systems, Inc": 2
        },
        "Microsoft": {
          "Microsoft": 2
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Tammy Compton",
      "/CreationDate": "D:20110919143541",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20110919143541",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Title": "Validation Report for N7K",
      "pdf_file_size_bytes": 279006,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 23
    },
    "st_filename": "st_vid10384-st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "Diffie-Hellman": 8
          },
          "DSA": {
            "DSA": 7
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.LOCATE": 3,
          "A.MANAGE": 3,
          "A.NOEVIL": 3,
          "A.NOTRST": 3,
          "A.PROTCT": 3
        },
        "OE": {
          "OE.INSTALL": 3,
          "OE.PERSON": 4,
          "OE.TIME": 3
        },
        "T": {
          "T.ADMINAUDIT": 3,
          "T.ADMINAUTHOR": 3,
          "T.AUDITCOMP": 3,
          "T.AVAIL": 3,
          "T.IMPCONF": 3,
          "T.NETTRAFFIC": 3,
          "T.VRFCOMP": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR.2": 5,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.2": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 2,
          "EAL 4 augmented": 1,
          "EAL4": 3,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 15,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_SAR.1": 11,
          "FAU_SAR.1.1": 2,
          "FAU_SAR.1.2": 2,
          "FAU_STG.1": 5,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1
        },
        "FCS": {
          "FCS_CKM.1": 36,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.2": 4,
          "FCS_CKM.4": 29,
          "FCS_CKM.4.1": 1,
          "FCS_COP.1": 53,
          "FCS_COP.1.1": 7
        },
        "FDP": {
          "FDP_ACC.1": 4,
          "FDP_IFC.1": 27,
          "FDP_IFC.1.1": 2,
          "FDP_IFF.1": 21,
          "FDP_IFF.1.1": 2,
          "FDP_IFF.1.2": 2,
          "FDP_IFF.1.3": 2,
          "FDP_IFF.1.4": 2,
          "FDP_IFF.1.5": 2,
          "FDP_ITC.1": 16,
          "FDP_ITC.2": 16
        },
        "FIA": {
          "FIA_UAU.1": 12,
          "FIA_UAU.1.1": 2,
          "FIA_UAU.1.2": 2,
          "FIA_UAU.5": 7,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UID.1": 21,
          "FIA_UID.1.1": 2,
          "FIA_UID.1.2": 2
        },
        "FMT": {
          "FMT_MSA.1": 20,
          "FMT_MSA.1.1": 2,
          "FMT_MSA.3": 17,
          "FMT_MSA.3.1": 2,
          "FMT_MSA.3.2": 2,
          "FMT_MTD.1": 12,
          "FMT_MTD.1.1": 2,
          "FMT_SMF.1": 16,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 25,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_STM.1": 9,
          "FPT_STM.1.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 32
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 36
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 4
        },
        "MAC": {
          "MAC": 28
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 8
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2006-09-001": 1,
          "CCMB-2007-09-003": 1,
          "CCMB-2007-09-004": 1
        },
        "FIPS": {
          "FIPS 140-2": 2,
          "FIPS 180-2": 2,
          "FIPS 186-2": 4,
          "FIPS 186-3": 1,
          "FIPS 197": 2,
          "FIPS 46-3": 2
        },
        "RFC": {
          "RFC 1321": 2,
          "RFC 2246": 1,
          "RFC 2631": 2,
          "RFC 3414": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 9
          }
        },
        "DES": {
          "3DES": {
            "TDES": 1,
            "Triple-DES": 5
          },
          "DES": {
            "DES": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 97,
          "Cisco Systems": 3,
          "Cisco Systems, Inc": 4
        },
        "Microsoft": {
          "Microsoft": 2
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Cisco Systems, Inc.",
      "/CreationDate": "D:20140331112214-04\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20140402080134-04\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "pdf_file_size_bytes": 734086,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://en.wikipedia.org/wiki/Bit"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 65
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid10384-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid10384-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "f236f9d201366977ed3b42c4bb8eceb917eff91f378852ae1d4643419bb156f6",
      "txt_hash": "01c726914d1393597a662376b2781d052e64bd9c16a11ba9142ccdf21d6934b5"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "f6cd105652ce68488060c6b6e4897d5fef8e46dade0bded06e47e88c2af585b1",
      "txt_hash": "12883cedd21faf9e42526628d926caf988acfe5065154e40015c745e89356ef8"
    }
  },
  "status": "archived"
}