VMware Horizon 7 v7.3.3, Horizon Client for Windows v4.6.1 and UAG v3.1.1

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status active
Valid from 04.02.2019
Valid until 04.02.2024
Scheme 🇨🇦 CA
Manufacturer VMware
Category Other Devices and Systems
Security level EAL2+, ALC_FLR.2

Heuristics summary ?

Certificate ID: 383-4-441

Certification report ?

Extracted keywords

Protocols
IPsec
Libraries
OpenSSL

Vendor
Microsoft Corporation, Microsoft

Security level
EAL 2+
Security Assurance Requirements (SAR)
ALC_FLR.2
Certificates
383-4-441

Vulnerabilities
CVE-2018-6971, CVE-2017-4948, CVE-2018-6970

Standards
ISO/IEC 17025

File metadata

Title: 383-4-XXX CR v0.1
Author: White, Debra E.
Creation date: D:20190304070948-05'00'
Modification date: D:20190304071003-05'00'
Pages: 17
Creator: Acrobat PDFMaker 17 for Word
Producer: Adobe PDF Library 15.0

References

Security target ?

Extracted keywords

Symmetric Algorithms
AES
Protocols
TLS, TLSv1.2, TLS 1.2, IPsec
Randomness
DRBG, RBG
Libraries
OpenSSL
TLS cipher suites
TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA

Vendor
Microsoft

Security level
EAL2+, EAL 2, EAL2
Claims
O.AUTH_USER, O.USER_ACCESS, O.SECURE_SETUP_DATA, O.USE_FIPS, O.CONFIG_ACCESS, O.ENDPOINT_RESOURCE, O.CHANNEL_PROTECTION, T.ATTACK_ACCESS, T.USER_ACCESS, T.USER_DATA, T.SPOOF, T.INTERCEPT, A.PHYSICAL, A.VM_HOST, A.CHANNEL_PROTECTION, OE.CONFIG_SERVER, OE.CONFIG_VM_HOST, OE.CONFIG_TP_SW, OE.AUTHENTICATE, OE.CHANNEL_PROTECTION, OE.ENCRYPTION, OE.SERVER_PHYSICAL, OE.ADMIN_USERS
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ACC, FDP_ACF, FIA_UAU.1, FIA_ATD.1, FIA_UID.2, FIA_UAU.2, FIA_UAU.5, FIA_ATD.1.1, FIA_UID.2.1, FIA_UAU.2.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.1, FMT_SMF.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1.1, FPT_ITC.1, FPT_ITI.1, FPT_ITT.1, FPT_ITC.1.1, FPT_ITI.1.1, FPT_ITI.1.2, FPT_ITT.1.1, FPT_IFC.1, FTA_SSL.3, FTA_SSL.4, FTA_SSL.3.1, FTA_SSL.4.1
Certification process
out of scope, and applications from your device of choice. However, Mac, Ubuntu Linux, Mobile devices are out of scope for the evaluation. Horizon Agent The Horizon Agent is responsible for the implementation of

Certification process
out of scope, and applications from your device of choice. However, Mac, Ubuntu Linux, Mobile devices are out of scope for the evaluation. Horizon Agent The Horizon Agent is responsible for the implementation of

Standards
FIPS 140-2, FIPS 186-4, FIPS140-2, NIST SP 800-90A, RFC 5246

File metadata

Title: Security Target
Author: CGI
Creation date: D:20190208134638-05'00'
Modification date: D:20190326124248-04'00'
Pages: 55
Creator: Acrobat PDFMaker 17 for Word
Producer: Adobe PDF Library 15.0

References

Heuristics ?

Certificate ID: 383-4-441

Extracted SARs

ASE_OBJ.2, ADV_TDS.1, ASE_TSS.1, ALC_FLR.2, ADV_ARC.1, ALC_DEL.1, ASE_REQ.2, ATE_FUN.1, ADV_FSP.2, AVA_VAN.2, ALC_CMC.2, ASE_CCL.1, ASE_ECD.1, AGD_OPE.1, ATE_COV.1, AGD_PRE.1, ALC_CMS.2, ASE_SPD.1, ATE_IND.2, ASE_INT.1

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2017-4935
C M N
HIGH 7.8 6.0 17.11.2017 14:29
CVE-2017-4936
C M N
HIGH 7.8 6.0 17.11.2017 14:29
CVE-2017-4937
C M N
HIGH 7.8 6.0 17.11.2017 14:29
CVE-2017-4948
C M N
HIGH 7.1 5.2 05.01.2018 14:29

References ?

Updates ?

  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name VMware Horizon 7 v7.3.3, Horizon Client for Windows v4.6.1 and UAG v3.1.1 was processed.

  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {'cert_id': '', 'cert_lab': 'CANADA'}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The report_keywords property was updated, with the {'rules_cert_id': {'383-4-441': 1}} data.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['3.1.1', '7.3.3', '4.6.1']}.
    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:a:vmware:horizon:7.3:*:*:*:*:*:*:*']}.
    • The cert_id property was set to 383-4-441.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The cert_lab property was set to ['CANADA'].
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 11.03.2022 The certificate data changed.
    Certificate changed

    The manufacturer was updated.

    • The new value is VMware.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 2}]}}.
    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:a:vmware:horizon_client:4.6.1:*:*:*:*:*:*:*']} values added.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2018-6970', 'CVE-2020-3961', 'CVE-2018-6964', 'CVE-2022-22962', 'CVE-2022-22964', 'CVE-2020-3957']} values added.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '6cef19039030adf67fedfc58e69f0537e2e67fe1287861976720dd35f16210cf', 'st_pdf_hash': '6dc4dc36d4a74894afc4909d3971f9a924a0c608976a4b25e7ad7d54c79be063', 'report_txt_hash': 'fa7a749faac8841cf1c92510658bd7b5413112c4293913668ecc368f5f4536f6', 'st_txt_hash': '3042af4c55b83a9e3dff8fa612d41c080ccedaabec4a229e5334ade9cacedaa9'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'TDES': 1}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'SSL': 2}, 'rules_randomness': {}, 'rules_tee': {'SE': 4}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 4, 'E2': 1}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA256': 4}, 'rules_crypto_schemes': {'TLS': 42, 'SSL': 37}, 'rules_randomness': {'DRBG': 2, 'RBG': 3}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to False.
    • The report_extract_ok property was set to False.
    • The errors property was set to ['Failed to read metadata of certs/reports/pdf/c6e205ed4cf148f5.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/c6e205ed4cf148f5.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/reports/pdf/c6e205ed4cf148f5.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/c6e205ed4cf148f5.pdf, error: can only concatenate list (not "IndirectObject") to list'].

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_keywords property was set to {'cc_cert_id': {'CA': {'383-4-441': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2+': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Microsoft': {'Microsoft Corporation': 2, 'Microsoft': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}, '3DES': {'TDES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 2}}, 'IPsec': {'IPsec': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 2}}, 'vulnerability': {'CVE': {'CVE-2018-6971': 1, 'CVE-2017-4948': 1, 'CVE-2018-6970': 1}}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 4}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 17025': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2+': 1, 'EAL 2': 2, 'EAL2': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_FSP.2': 2, 'ADV_TDS.1': 2}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_FLR.2': 5, 'ALC_CMC.2': 2, 'ALC_CMS.2': 2, 'ALC_DEL.1': 2}, 'ATE': {'ATE_COV.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_VAN.2': 2}, 'ASE': {'ASE_CCL.1': 2, 'ASE_ECD.1': 2, 'ASE_INT.1': 2, 'ASE_OBJ.2': 2, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2, 'ASE_TSS.1': 2}}, 'cc_sfr': {'FCS': {'FCS_CKM.1': 19, 'FCS_CKM.4': 11, 'FCS_COP.1': 14, 'FCS_CKM.1.1': 2, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ACC.1': 28, 'FDP_ACF.1': 26, 'FDP_ACC.1.1': 3, 'FDP_ACF.1.1': 3, 'FDP_ACF.1.2': 3, 'FDP_ACF.1.3': 3, 'FDP_ACF.1.4': 3}, 'FIA': {'FIA_UAU.1': 3, 'FIA_ATD.1': 9, 'FIA_UID.2': 9, 'FIA_UAU.2': 8, 'FIA_UAU.5': 7, 'FIA_ATD.1.1': 1, 'FIA_UID.2.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1': 4}, 'FMT': {'FMT_SMF.1': 22, 'FMT_SMR.1': 14, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1.1': 2}, 'FPT': {'FPT_ITC.1': 13, 'FPT_ITI.1': 13, 'FPT_ITT.1': 13, 'FPT_ITC.1.1': 1, 'FPT_ITI.1.1': 1, 'FPT_ITI.1.2': 1, 'FPT_ITT.1.1': 1, 'FPT_IFC.1': 1}, 'FTA': {'FTA_SSL.3': 7, 'FTA_SSL.4': 7, 'FTA_SSL.3.1': 1, 'FTA_SSL.4.1': 1}}, 'cc_claims': {'O': {'O.AUTH_USER': 9, 'O.USER_ACCESS': 11, 'O.SECURE_SETUP_DATA': 7, 'O.USE_FIPS': 7, 'O.CONFIG_ACCESS': 9, 'O.ENDPOINT_RESOURCE': 7, 'O.CHANNEL_PROTECTION': 10}, 'T': {'T.ATTACK_ACCESS': 3, 'T.USER_ACCESS': 3, 'T.USER_DATA': 3, 'T.SPOOF': 3, 'T.INTERCEPT': 3}, 'A': {'A.PHYSICAL': 3, 'A.VM_HOST': 3, 'A.CHANNEL_PROTECTION': 5}, 'OE': {'OE.CONFIG_SERVER': 6, 'OE.CONFIG_VM_HOST': 8, 'OE.CONFIG_TP_SW': 6, 'OE.AUTHENTICATE': 6, 'OE.CHANNEL_PROTECTION': 10, 'OE.ENCRYPTION': 8, 'OE.SERVER_PHYSICAL': 4, 'OE.ADMIN_USERS': 4}}, 'vendor': {'Microsoft': {'Microsoft': 14}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 4}, 'E2': {'E2': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 4}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 37}, 'TLS': {'TLS': 8, 'TLSv1.2': 2, 'TLS 1.2': 34}}, 'IPsec': {'IPsec': 8}}, 'randomness': {'PRNG': {'DRBG': 2}, 'RNG': {'RBG': 3}}, 'cipher_mode': {'CTR': {'CTR': 4}, 'GCM': {'GCM': 16}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_RSA_WITH_AES_256_CBC_SHA256': 2, 'TLS_RSA_WITH_AES_256_CBC_SHA': 2, 'TLS_RSA_WITH_AES_128_CBC_SHA256': 2, 'TLS_RSA_WITH_AES_128_CBC_SHA': 1}}, 'crypto_library': {'OpenSSL': {'OpenSSL': 37}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 11, 'FIPS 186-4': 1, 'FIPS140-2': 1}, 'NIST': {'NIST SP 800-90A': 1}, 'RFC': {'RFC 5246': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, '. However, Mac, Ubuntu Linux, Mobile devices are out of scope for the evaluation': 1, 'esktops and applications from your device of choice. However, Mac, Ubuntu Linux, Mobile devices are out of scope for the evaluation. Horizon Agent The Horizon Agent is responsible for the implementation of': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The cert_lab property was set to None.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}]}.
  • 27.07.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2020-3961', 'CVE-2019-5513', 'CVE-2018-6964', 'CVE-2020-3957', 'CVE-2022-22962', 'CVE-2022-22964']} values discarded.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to True.
    • The report_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 238616, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 17, '/Author': 'White, Debra E.', '/Comments': 'Version 1.1', '/Company': 'CSEC', '/CreationDate': "D:20190304070948-05'00'", '/Creator': 'Acrobat PDFMaker 17 for Word', '/ModDate': "D:20190304071003-05'00'", '/Producer': 'Adobe PDF Library 15.0', '/SourceModified': 'D:20190227120909', '/Title': '383-4-XXX CR v0.1', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:itsclientservices@cse-cst.gc.ca']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 680864, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 55, '/Author': 'CGI', '/Company': 'CGI', '/CreationDate': "D:20190208134638-05'00'", '/Creator': 'Acrobat PDFMaker 17 for Word', '/Date#20completed': 'TBD', '/DocDate': 'February 1, 2019', '/DocVersion': '1.1', '/EAL-PP': 'EAL2+', '/ModDate': "D:20190326124248-04'00'", '/Producer': 'Adobe PDF Library 15.0', '/STName': 'Security Target VMware Horizon 7 v7.3.3', '/SourceModified': 'D:20190207185220', '/TOENameFull': 'VMware Horizon 7 v7.3.3', '/TOENameShort': 'Horizon 7 v7.3.3', '/Title': 'Security Target', '/VendorNameFull': 'VMware, Inc.', '/VendorNameShort': 'VMware', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://docs.vmware.com/en/VMware-Horizon-7/7.3/horizon-installation.pdf', 'https://docs.vmware.com/en/VMware-Horizon-7/7.3/horizon-architecture-planning.pdf', 'https://docs.vmware.com/en/VMware-Horizon-7/7.4/horizon-upgrades/GUID-30AA88CF-8CDF-42E5-97D4-D75B2171434B.html', 'https://www.vmware.com/resources/compatibility/sim/interop_matrix.php%23db&260=&database=215,216,217,218,220,221,223,224', 'https://docs.vmware.com/en/VMware-Horizon-7/7.3/horizon-security.pdf', 'https://kb.vmware.com/s/article/2150295', 'https://docs.vmware.com/en/VMware-Horizon-7/7.3/horizon-upgrades.pdf', 'https://docs.vmware.com/en/VMware-Horizon-7/7.3/horizon-administration.pdf', 'https://docs.vmware.com/en/VMware-Horizon-7/7.3.3/rn/horizon-733-view-release-notes.html', 'https://kb.vmware.com/s/article/2149393', 'https://docs.vmware.com/en/VMware-Horizon-Client-for-Windows/4.6/horizon-client-windows-46-install.pdf', 'https://docs.vmware.com/en/VMware-Horizon-7/7.4/horizon-upgrades/GUID-DA388676-6002-406B-A591-AC1D3378D0D3.html', 'https://docs.vmware.com/en/Unified-Access-Gateway/index.html', 'https://docs.vmware.com/en/VMware-Horizon-Client-for-Windows/4.6/com.vmware.horizon.windows-client-46-install/GUID-D223AA9A-F2FF-439E-AD82-3C469AC0F1ED.html']}}.

    The computed heuristics were updated.

    • The cert_lab property was set to ['CANADA'].
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '383-4-441 CR v1.1e.pdf', 'st_filename': '383-4-441 VMware_Horizon 7_3_3_ST_v1.1.pdf'}.
    • The report_frontpage property was updated, with the {'canada': {}} data.
    • The report_keywords property was updated, with the {'symmetric_crypto': {}, 'crypto_protocol': {'__delete__': ['TLS']}, 'tee_name': {}} data.
    • The st_keywords property was updated, with the {'cc_sfr': {'__update__': {'FCS': {'__update__': {'FCS_CKM.1': 17, 'FCS_COP.1': 13}}, 'FDP': {'__insert__': {'FDP_ACC': 2, 'FDP_ACF': 1}}, 'FIA': {'__update__': {'FIA_ATD.1': 8, 'FIA_UAU.2': 7, 'FIA_UID.1': 3}}, 'FMT': {'__update__': {'FMT_SMF.1': 18, 'FMT_SMR.1': 15}}, 'FPT': {'__update__': {'FPT_ITI.1': 11, 'FPT_ITT.1': 14}}, 'FTA': {'__update__': {'FTA_SSL.4': 6}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.AUTH_USER': 8, 'O.USER_ACCESS': 6, 'O.USE_FIPS': 5, 'O.ENDPOINT_RESOURCE': 5, 'O.CHANNEL_PROTECTION': 9}}, 'T': {'__update__': {'T.USER_ACCESS': 2, 'T.SPOOF': 2}}, 'A': {'__update__': {'A.VM_HOST': 2}}, 'OE': {'__update__': {'OE.CONFIG_SERVER': 5, 'OE.CONFIG_VM_HOST': 6, 'OE.CONFIG_TP_SW': 5, 'OE.CHANNEL_PROTECTION': 9, 'OE.ENCRYPTION': 6, 'OE.ADMIN_USERS': 3}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 2}}}, '__delete__': ['E2']}}}, 'hash_function': {}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'TLS': {'__update__': {'TLSv1.2': 4}}}, '__delete__': ['SSL']}}}, 'randomness': {'__update__': {'RNG': {'__update__': {'RBG': 1}}}}, 'cipher_mode': {}, 'tls_cipher_suite': {'__update__': {'TLS': {'__update__': {'TLS_RSA_WITH_AES_128_CBC_SHA': 2}}}}, 'crypto_library': {'__update__': {'OpenSSL': {'__update__': {'OpenSSL': 39}}}}, 'standard_id': {'__update__': {'FIPS': {'__update__': {'FIPS 186-4': 2}}, 'NIST': {'__update__': {'NIST SP 800-90A': 2}}, 'RFC': {'__update__': {'RFC 5246': 2}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'and applications from your device of choice. However, Mac, Ubuntu Linux, Mobile devices are out of scope for the evaluation. Horizon Agent The Horizon Agent is responsible for the implementation of': 1}, '__delete__': ['. However, Mac, Ubuntu Linux, Mobile devices are out of scope for the evaluation', 'esktops and applications from your device of choice. However, Mac, Ubuntu Linux, Mobile devices are out of scope for the evaluation. Horizon Agent The Horizon Agent is responsible for the implementation of']}}}} data.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 10.10.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was set to None.
    • The related_cves property was set to None.
  • 16.11.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The st_metadata property was updated, with the {'/Date completed': 'TBD'} values inserted.

    The computed heuristics were updated.

    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:a:vmware:horizon_view:4.6:*:*:*:*:windows:*:*']}.
    • The related_cves property was set to {'_type': 'Set', 'elements': ['CVE-2017-4936', 'CVE-2017-4948', 'CVE-2017-4937', 'CVE-2017-4935']}.

Raw data

{
  "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert",
  "category": "Other Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/383-4-441%20ct%20v1.1e.pdf",
  "dgst": "c6e205ed4cf148f5",
  "heuristics": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics",
    "cert_id": "383-4-441",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:a:vmware:horizon_view:4.6:*:*:*:*:windows:*:*"
      ]
    },
    "direct_dependency_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.6.1",
        "3.1.1",
        "7.3.3"
      ]
    },
    "indirect_dependency_cves": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2017-4948",
        "CVE-2017-4935",
        "CVE-2017-4936",
        "CVE-2017-4937"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "VMware",
  "manufacturer_web": "https://www.vmware.com",
  "name": "VMware Horizon 7 v7.3.3, Horizon Client for Windows v4.6.1 and UAG v3.1.1",
  "not_valid_after": "2024-02-04",
  "not_valid_before": "2019-02-04",
  "pdf_data": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData",
    "report_filename": "383-4-441 CR v1.1e.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "CA": {
          "383-4-441": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 2
        }
      },
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 1
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 17025": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 2,
          "Microsoft Corporation": 2
        }
      },
      "vulnerability": {
        "CVE": {
          "CVE-2017-4948": 1,
          "CVE-2018-6970": 1,
          "CVE-2018-6971": 1
        }
      }
    },
    "report_metadata": {
      "/Author": "White, Debra E.",
      "/Comments": "Version 1.1",
      "/Company": "CSEC",
      "/CreationDate": "D:20190304070948-05\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 17 for Word",
      "/ModDate": "D:20190304071003-05\u002700\u0027",
      "/Producer": "Adobe PDF Library 15.0",
      "/SourceModified": "D:20190227120909",
      "/Title": "383-4-XXX CR v0.1",
      "pdf_file_size_bytes": 238616,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:itsclientservices@cse-cst.gc.ca"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 17
    },
    "st_filename": "383-4-441 VMware_Horizon 7_3_3_ST_v1.1.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CHANNEL_PROTECTION": 5,
          "A.PHYSICAL": 3,
          "A.VM_HOST": 2
        },
        "O": {
          "O.AUTH_USER": 8,
          "O.CHANNEL_PROTECTION": 9,
          "O.CONFIG_ACCESS": 9,
          "O.ENDPOINT_RESOURCE": 5,
          "O.SECURE_SETUP_DATA": 7,
          "O.USER_ACCESS": 6,
          "O.USE_FIPS": 5
        },
        "OE": {
          "OE.ADMIN_USERS": 3,
          "OE.AUTHENTICATE": 6,
          "OE.CHANNEL_PROTECTION": 9,
          "OE.CONFIG_SERVER": 5,
          "OE.CONFIG_TP_SW": 5,
          "OE.CONFIG_VM_HOST": 6,
          "OE.ENCRYPTION": 6,
          "OE.SERVER_PHYSICAL": 4
        },
        "T": {
          "T.ATTACK_ACCESS": 3,
          "T.INTERCEPT": 3,
          "T.SPOOF": 2,
          "T.USER_ACCESS": 2,
          "T.USER_DATA": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 2,
          "ADV_FSP.2": 2,
          "ADV_TDS.1": 2
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.2": 2,
          "ALC_CMS.2": 2,
          "ALC_DEL.1": 2,
          "ALC_FLR.2": 5
        },
        "ASE": {
          "ASE_CCL.1": 2,
          "ASE_ECD.1": 2,
          "ASE_INT.1": 2,
          "ASE_OBJ.2": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 2
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_VAN.2": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 2,
          "EAL2": 1,
          "EAL2+": 1
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM.1": 17,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.4": 11,
          "FCS_CKM.4.1": 1,
          "FCS_COP.1": 13,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_ACC": 2,
          "FDP_ACC.1": 28,
          "FDP_ACC.1.1": 3,
          "FDP_ACF": 1,
          "FDP_ACF.1": 26,
          "FDP_ACF.1.1": 3,
          "FDP_ACF.1.2": 3,
          "FDP_ACF.1.3": 3,
          "FDP_ACF.1.4": 3
        },
        "FIA": {
          "FIA_ATD.1": 8,
          "FIA_ATD.1.1": 1,
          "FIA_UAU.1": 3,
          "FIA_UAU.2": 7,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.5": 7,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UID.1": 3,
          "FIA_UID.2": 9,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_SMF.1": 18,
          "FMT_SMF.1.1": 2,
          "FMT_SMR.1": 15,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_IFC.1": 1,
          "FPT_ITC.1": 13,
          "FPT_ITC.1.1": 1,
          "FPT_ITI.1": 11,
          "FPT_ITI.1.1": 1,
          "FPT_ITI.1.2": 1,
          "FPT_ITT.1": 14,
          "FPT_ITT.1.1": 1
        },
        "FTA": {
          "FTA_SSL.3": 7,
          "FTA_SSL.3.1": 1,
          "FTA_SSL.4": 6,
          "FTA_SSL.4.1": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "and applications from your device of choice. However, Mac, Ubuntu Linux, Mobile devices are out of scope for the evaluation. Horizon Agent The Horizon Agent is responsible for the implementation of": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 39
        }
      },
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 8
        },
        "TLS": {
          "TLS": {
            "TLS": 8,
            "TLS 1.2": 34,
            "TLSv1.2": 4
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 2
        },
        "RNG": {
          "RBG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 11,
          "FIPS 186-4": 2,
          "FIPS140-2": 1
        },
        "NIST": {
          "NIST SP 800-90A": 2
        },
        "RFC": {
          "RFC 5246": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {
        "TLS": {
          "TLS_RSA_WITH_AES_128_CBC_SHA": 2,
          "TLS_RSA_WITH_AES_128_CBC_SHA256": 2,
          "TLS_RSA_WITH_AES_256_CBC_SHA": 2,
          "TLS_RSA_WITH_AES_256_CBC_SHA256": 2
        }
      },
      "vendor": {
        "Microsoft": {
          "Microsoft": 14
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "CGI",
      "/Company": "CGI",
      "/CreationDate": "D:20190208134638-05\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 17 for Word",
      "/Date completed": "TBD",
      "/DocDate": "February 1, 2019",
      "/DocVersion": "1.1",
      "/EAL-PP": "EAL2+",
      "/ModDate": "D:20190326124248-04\u002700\u0027",
      "/Producer": "Adobe PDF Library 15.0",
      "/STName": "Security Target VMware Horizon 7 v7.3.3",
      "/SourceModified": "D:20190207185220",
      "/TOENameFull": "VMware Horizon 7 v7.3.3",
      "/TOENameShort": "Horizon 7 v7.3.3",
      "/Title": "Security Target",
      "/VendorNameFull": "VMware, Inc.",
      "/VendorNameShort": "VMware",
      "pdf_file_size_bytes": 680864,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://docs.vmware.com/en/VMware-Horizon-7/7.3.3/rn/horizon-733-view-release-notes.html",
          "https://docs.vmware.com/en/VMware-Horizon-7/7.3/horizon-installation.pdf",
          "https://kb.vmware.com/s/article/2150295",
          "https://www.vmware.com/resources/compatibility/sim/interop_matrix.php%23db\u0026260=\u0026database=215,216,217,218,220,221,223,224",
          "https://docs.vmware.com/en/Unified-Access-Gateway/index.html",
          "https://docs.vmware.com/en/VMware-Horizon-7/7.4/horizon-upgrades/GUID-DA388676-6002-406B-A591-AC1D3378D0D3.html",
          "https://docs.vmware.com/en/VMware-Horizon-7/7.3/horizon-administration.pdf",
          "https://docs.vmware.com/en/VMware-Horizon-7/7.4/horizon-upgrades/GUID-30AA88CF-8CDF-42E5-97D4-D75B2171434B.html",
          "https://docs.vmware.com/en/VMware-Horizon-7/7.3/horizon-architecture-planning.pdf",
          "https://kb.vmware.com/s/article/2149393",
          "https://docs.vmware.com/en/VMware-Horizon-Client-for-Windows/4.6/com.vmware.horizon.windows-client-46-install/GUID-D223AA9A-F2FF-439E-AD82-3C469AC0F1ED.html",
          "https://docs.vmware.com/en/VMware-Horizon-7/7.3/horizon-security.pdf",
          "https://docs.vmware.com/en/VMware-Horizon-7/7.3/horizon-upgrades.pdf",
          "https://docs.vmware.com/en/VMware-Horizon-Client-for-Windows/4.6/horizon-client-windows-46-install.pdf"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 55
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/383-4-441%20CR%20v1.1e.pdf",
  "scheme": "CA",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.2",
      "EAL2+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/383-4-441%20VMware_Horizon%207_3_3_ST_v1.1.pdf",
  "state": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState",
    "errors": [],
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "6cef19039030adf67fedfc58e69f0537e2e67fe1287861976720dd35f16210cf",
    "report_txt_hash": "fa7a749faac8841cf1c92510658bd7b5413112c4293913668ecc368f5f4536f6",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "6dc4dc36d4a74894afc4909d3971f9a924a0c608976a4b25e7ad7d54c79be063",
    "st_txt_hash": "3042af4c55b83a9e3dff8fa612d41c080ccedaabec4a229e5334ade9cacedaa9"
  },
  "status": "active"
}