Microsoft Windows 7, Microsoft Windows Server 2008 R2

CSV information ?

Status archived
Valid from 24.03.2011
Valid until 01.11.2014
Scheme 🇺🇸 US
Manufacturer Microsoft Corporation
Category Operating Systems
Security level EAL4+, ALC_FLR.3

Heuristics summary ?

Certificate ID: CCEVS-VR-10390-2010

Certificate ?

Certification report ?

Extracted keywords

Schemes
MAC, Key Exchange
Protocols
SSL, TLS, IKE, IPsec

Vendor
Broadcom, Microsoft Corporation, Microsoft, Cisco

Security level
EAL 4, EAL4, EAL 4 augmented, EAL4 augmented
Security Assurance Requirements (SAR)
ALC_FLR.3
Certificates
CCEVS-VR-10390-2010

Standards
FIPS 140-2

File metadata

Title: Validation Report for Win7
Author: Ken Elliott
Creation date: D:20110412124748
Modification date: D:20110412124748
Pages: 35
Creator: Microsoft® Office Word 2007
Producer: Microsoft® Office Word 2007

Frontpage

Certificate ID: CCEVS-VR-10390-2010
Certified item: Microsoft Corporation, Corporate Headquarters, One Microsoft Way, Redmond, WA 98052-6399 Windows 7 and Windows Server 2008 R2
Certification lab: US NIAP

References

No references.

Security target ?

Extracted keywords

Symmetric Algorithms
AES, AES-256, AES-, RC4, DES, 3DES, TDEA, Elephant, HMAC
Asymmetric Algorithms
ECDH, ECDSA, Diffie-Hellman, DH, DSA
Hash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA384, SHA-2
Schemes
MAC, Key Exchange, Key Agreement, Key agreement
Protocols
SSL, TLS, IKE, IPsec, VPN
Randomness
PRNG, RNG, RBG
Elliptic Curves
P-256, P-384, P-521
Block cipher modes
ECB, CBC, CFB, GCM, CCM

Vendor
Broadcom, Microsoft, Microsoft Corporation, Cisco

Security level
EAL 4, EAL4, EAL2, EAL 4 augmented, EAL4 augmented, EAL2 augmented
Claims
O.ACCESS, O.ACCESS_HISTORY, O.ADMIN_ROLE, O.AUDIT_GENERATION, O.AUDIT_PROTECTION, O.AUDIT_REVIEW, O.CORRECT_TSF_OPERATION, O.CRYPTOGRAPHIC_SERVICES, O.DISCRETIONARY_ACCESS, O.DISCRETIONARY_USER_CONT, O.DISPLAY_BANNER, O.MANAGE, O.PROTECT, O.RECOVERY, O.RESIDUAL_INFORMATION, O.RESOURCE_EXHAUSTION, O.DOMAIN_ISOLATION, O.TSF_CRYPTOGRAPHIC_INTEGR, O.USER_AUTHENTICATION, O.USER_IDENTIFICATION, O.TSF_CRYPTOGRAPHIC_INTEGRITY, T.ADMIN_ERROR, T.ADMIN_ROGUE, T.AUDIT_COMPROMISE, T.CRYPTO_COMPROMISE, T.MASQUERADE, T.OPERATIONAL_ERRORS, T.REPLAY, T.RESIDUAL_DATA, T.RESOURCE_EXHAUSTION, T.TSF_COMPROMISE, T.UNATTENDED_SESSION, T.UNAUTHORIZED_ACCESS, T.UNIDENTIFIED_ACTIONS, T.UNKNOWN_STATE, A.PHYSICAL, OE.PHYSICAL
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_ARC, ADV_FSP, ADV_IMP, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.3, ALC_LCD.1, ALC_TAT.1, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_FLR.2, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.3, AVA_VAN
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL.1, FAU_STG.1, FAU_STG.3, FAU_STG.4, FAU_GEN, FAU_SAR, FAU_SEL, FAU_STG, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FAU_STG.4.1, FCO_NRO_CIMC.3, FCO_NRO_CIMC.4, FCO_NRO_CIMC, FCO_NRO_CIMC.3.1, FCO_NRO_CIMC.3.2, FCO_NRO_CIMC.3.3, FCO_NRO_CIMC.4.1, FCO_NRO_CIMC.4.2, FCO_NRO, FCS_BCM_EXT.1, FCS_CKM, FCS_CKM.4, FCS_COA_EXT.1, FCS_COP, FCS_RBG_EXT.1, FCS_COP.1, FCS_BCM_EXT, FCS_COA_EXT, FCS_RBG_EXT, FCS_CKM.1, FCS_BCM_EXT.1.1, FCS_CKM.4.1, FCS_COA_EXT.1.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FDP_ACC, FDP_ACF, FDP_ACF_CIMC.2, FDP_ACF_CIMC.3, FDP_CIMC_CER.1, FDP_CIMC_CRL.1, FDP_CIMC_CSE.1, FDP_CIMC_OCSP.1, FDP_ETC_CIMC.5, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_ITT.1, FDP_RIP.2, FDP_UCT.1, FDP_UIT.1, FDP_ACF_CIMC, FDP_CIMC_CER, FDP_CIMC_CRL, FDP_CIMC_CSE, FDP_CIMC_OCSP, FDP_ETC_CIMC, FDP_ITT, FDP_RIP, FDP_UCT, FDP_UIT, FDP_ACF.1.2, FDP_ACF_CIMC.2.1, FDP_ACF_CIMC.2.2, FDP_ACF_CIMC.3.1, FDP_CIMC_CER.1.1, FDP_CIMC_CER.1.2, FDP_CIMC_CER.1.3, FDP_CIMC_CER.1.4, FDP_CIMC_CRL.1.1, FDP_CIMC_CSE.1.1, FDP_CIMC_OCSP.1.1, FDP_ETC_CIMC.5.1, FDP_ITT.1.1, FDP_RIP.2.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ACC.1, FDP_ITC.1, FDP_ITC.2, FDP_ACF.1, FDP_IFF.1, FIA_AFL_EXT.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.1, FIA_UAU.6, FIA_UAU.7, FIA_UID.1, FIA_USB.1, FIA_AFL_EXT, FIA_ATD, FIA_SOS, FIA_UAU, FIA_UID, FIA_USB, FIA_AFL_EXT.1.1, FIA_AFL_EXT.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.6.1, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_AFL.1, FMT_MOF, FMT_MOF_CIMC.3, FMT_MOF_CIMC.5, FMT_MOF_CIMC.6, FMT_MSA, FMT_MSA.2, FMT_MTD, FMT_MTD_CIMC.4, FMT_MTD_CIMC.5, FMT_MTD_CIMC.7, FMT_REV, FMT_SAE.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF_CIMC, FMT_MTD_CIMC, FMT_SAE, FMT_SMF, FMT_SMR, FMT_SMR.2, FMT_MOF_CIMC.3.1, FMT_MOF_CIMC.3.2, FMT_MOF_CIMC.3.3, FMT_MOF_CIMC.3.4, FMT_MOF_CIMC.5.1, FMT_MOF_CIMC.5.2, FMT_MOF_CIMC.5.3, FMT_MOF_CIMC.6.1, FMT_MOF_CIMC.6.2, FMT_MOF_CIMC.6.3, FMT_MSA.2.1, FMT_MTD_CIMC.4.1, FMT_MTD_CIMC.5.1, FMT_MTD_CIMC.7.1, FMT_SAE.1.1, FMT_SAE.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.1, FMT_MSA.3, FMT_MOF.1, FPT_ITT.1, FPT_ITT.3, FPT_RCV.1, FPT_STM.1, FPT_TRC_EXT.1, FPT_TST_EXT.1, FPT_TRC_EXT, FPT_TST_EXT, FPT_ITT, FPT_RCV, FPT_STM, FPT_TST.1, FPT_ITT.1.1, FPT_ITT.3.1, FPT_ITT.3.2, FPT_RCV.1.1, FPT_STM.1.1, FPT_TRC_EXT.1.1, FPT_TST_EXT.1.1, FPT_TST_EXT.1.2, FPT_TST_EXT.1.3, FRU_RSA.1, FRU_RSA, FRU_RSA.1.1, FTA_MCS.1, FTA_SSL.1, FTA_SSL.2, FTA_SSL.3, FTA_TAB.1, FTA_TAH.1, FTA_TSE.1, FTA_MCS, FTA_SSL, FTA_TAB, FTA_TAH, FTA_TSE, FTA_MCS.1.1, FTA_MCS.1.2, FTA_SSL.1.1, FTA_SSL.1.2, FTA_SSL.2.1, FTA_SSL.2.2, FTA_SSL.3.1, FTA_TAB.1.1, FTA_TAH.1.1, FTA_TAH.1.2, FTA_TAH.1.3, FTA_TSE.1.1, FTA_TRP.1, FTP_TRP.1, FTP_TRP, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3, FTP_ITC.1

Standards
FIPS 140-2, FIPS PUB 140-2, FIPS PUB 186-3, FIPS 46-3, FIPS 186-2, FIPS 197, NIST SP 800-57, NIST SP 800-56A, NIST SP 800-90, PKCS #7, PKCS#7, RFC 3739, RFC3280, RFC 2560, RFC 4120, RFC 2797, RFC 3280, x.509, X.509

File metadata

Author: Mike Grimm
Creation date: D:20110330133045
Modification date: D:20110330133045
Pages: 190
Creator: Microsoft® Office Word 2007
Producer: Microsoft® Office Word 2007

References

No references.

Heuristics ?

Certificate ID: CCEVS-VR-10390-2010

Extracted SARs

ADV_ARC.1, ATE_COV.2, ATE_DPT.1, ADV_TDS.3, ADV_FSP.4, ALC_CMS.4, AGD_PRE.1, ATE_IND.2, ALC_TAT.1, ALC_LCD.1, ALC_CMC.4, AVA_VAN.3, ALC_DEL.1, ALC_DVS.1, ATE_FUN.1, ALC_FLR.3, AGD_OPE.1, ADV_IMP.1

References ?

No references are available for this certificate.

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '69044a45799e992d1473a17c7c028add89ca57f694f46bbbae6fdeafcb00fe0e', 'txt_hash': '21be91723dc5514c2468cb7bfd4067d4952641c50c165624188ed06d3c0780b2'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b679b459790fa490704bedaf9ad05b7c627271d2083713c6333b87eeb6368dce', 'txt_hash': '3f28a5a8f4e08bc1795602ed7a33a555ce9ccac4f1ec33343410e835ecc10d03'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}.
    • The report_frontpage property was set to {'US': {'cert_id': 'CCEVS-VR-10390-2010', 'cert_item': 'Microsoft Corporation, Corporate Headquarters, One Microsoft Way, Redmond, WA 98052-6399 Windows 7 and Windows Server 2008 R2', 'cert_lab': 'US NIAP'}}.
    • The st_frontpage property was set to None.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'CA': {'2011 1 1': 1, '2011 5 3': 1, '2011 8 3': 1, '7-9-2010': 1}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'CA': {'1 2 3': 1}}} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': None}.
  • 24.03.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was set to None.
    • The related_cves property was set to None.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 05.02.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2013-2556', 'CVE-2013-1271', 'CVE-2013-1341', 'CVE-2013-3864', 'CVE-2013-1250', 'CVE-2013-1263', 'CVE-2013-0011', 'CVE-2013-1253', 'CVE-2013-1248', 'CVE-2013-1255', 'CVE-2013-1259', 'CVE-2013-1261', 'CVE-2013-1260', 'CVE-2013-1344', 'CVE-2013-1274', 'CVE-2013-1285', 'CVE-2013-1343', 'CVE-2013-1342', 'CVE-2013-0076', 'CVE-2013-1266', 'CVE-2013-1264', 'CVE-2013-1287', 'CVE-2013-1272', 'CVE-2013-1252', 'CVE-2013-1275', 'CVE-2013-1283', 'CVE-2013-3865', 'CVE-2013-1293', 'CVE-2013-1267', 'CVE-2013-1277', 'CVE-2013-1269', 'CVE-2013-1256', 'CVE-2013-1273', 'CVE-2013-1268', 'CVE-2013-3866', 'CVE-2013-3862', 'CVE-2013-1257', 'CVE-2013-1276', 'CVE-2013-3868', 'CVE-2013-1265', 'CVE-2013-1251', 'CVE-2013-1278', 'CVE-2013-1279', 'CVE-2013-1286', 'CVE-2013-1249', 'CVE-2013-1254', 'CVE-2013-1258', 'CVE-2013-0013', 'CVE-2013-1292', 'CVE-2013-1280', 'CVE-2013-1262', 'CVE-2013-1294', 'CVE-2013-1270']} values added.
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/st_vid10390-vr.pdf, code: 408'].
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2011-3417', 'CVE-2008-1083', 'CVE-2012-2549', 'CVE-2011-3415', 'CVE-2011-1883', 'CVE-2008-4834', 'CVE-2011-0674', 'CVE-2011-0657', 'CVE-2012-1865', 'CVE-2012-2556', 'CVE-2011-1869', 'CVE-2008-1441', 'CVE-2011-1230', 'CVE-2011-0670', 'CVE-2008-4036', 'CVE-2008-4038', 'CVE-2011-1882', 'CVE-2011-1888', 'CVE-2008-1084', 'CVE-2007-6753', 'CVE-2008-2250', 'CVE-2011-0677', 'CVE-2012-1851', 'CVE-2011-1239', 'CVE-2011-1887', 'CVE-2011-1281', 'CVE-2011-3416', 'CVE-2011-0089', 'CVE-2011-1874', 'CVE-2008-3013', 'CVE-2008-2252', 'CVE-2011-1233', 'CVE-2011-1894', 'CVE-2012-1527', 'CVE-2011-1885', 'CVE-2011-1240', 'CVE-2011-0088', 'CVE-2011-1236', 'CVE-2011-1249', 'CVE-2011-1238', 'CVE-2008-4037', 'CVE-2011-1268', 'CVE-2012-2551', 'CVE-2012-1867', 'CVE-2011-0087', 'CVE-2011-0658', 'CVE-2011-1264', 'CVE-2011-1229', 'CVE-2011-0660', 'CVE-2011-1267', 'CVE-2011-0672', 'CVE-2011-0671', 'CVE-2012-1850', 'CVE-2011-1228', 'CVE-2011-1872', 'CVE-2008-2249', 'CVE-2008-2251', 'CVE-2008-4114', 'CVE-2011-1237', 'CVE-2011-1282', 'CVE-2011-0662', 'CVE-2011-0667', 'CVE-2008-1436', 'CVE-2011-1879', 'CVE-2008-3465', 'CVE-2011-1234', 'CVE-2011-1873', 'CVE-2011-0676', 'CVE-2012-1528', 'CVE-2011-1884', 'CVE-2011-0033', 'CVE-2011-1241', 'CVE-2011-1227', 'CVE-2012-2529', 'CVE-2011-1881', 'CVE-2011-1877', 'CVE-2011-0034', 'CVE-2011-0096', 'CVE-2011-0086', 'CVE-2012-2530', 'CVE-2011-1880', 'CVE-2012-2527', 'CVE-2011-0666', 'CVE-2011-0665', 'CVE-2011-0661', 'CVE-2011-1225', 'CVE-2012-0175', 'CVE-2011-1235', 'CVE-2011-1283', 'CVE-2008-4835', 'CVE-2011-1248', 'CVE-2011-1878', 'CVE-2011-1231', 'CVE-2011-1232', 'CVE-2011-1226', 'CVE-2011-0675', 'CVE-2008-1454', 'CVE-2012-1864', 'CVE-2008-4269', 'CVE-2012-1194', 'CVE-2012-1866', 'CVE-2011-1875', 'CVE-2008-4268', 'CVE-2011-1242', 'CVE-2011-1876', 'CVE-2011-0041', 'CVE-2011-0090', 'CVE-2011-3414', 'CVE-2012-4774', 'CVE-2011-1284']} values added.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/st_vid10390-vr.pdf, code: nok'].
    • The st_pdf_hash property was set to b679b459790fa490704bedaf9ad05b7c627271d2083713c6333b87eeb6368dce.
    • The st_txt_hash property was set to 3f28a5a8f4e08bc1795602ed7a33a555ce9ccac4f1ec33343410e835ecc10d03.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 2425180, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 190, '/Author': 'Mike Grimm', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20110330133045', '/ModDate': 'D:20110330133045', '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://msdn.microsoft.com/en-us/library/dd207968(PROT.10).aspx', 'http://msdn.microsoft.com/en-us/library/cc233219(PROT.10).aspx', 'http://www.microsoft.com/technet/security/bulletin/MS10-073.mspx', 'http://msdn.microsoft.com/en-us/library/cc227906(PROT.10).aspx', 'http://support.microsoft.com/kb/309408', 'http://support.microsoft.com/kb/2492505', 'http://msdn.microsoft.com/en-us/library/cc223122(PROT.10).aspx', 'http://www.microsoft.com/technet/security/bulletin/MS10-085.mspx', 'http://technet.microsoft.com/en-us/library/cc739804(WS.10).aspx', 'http://creativecommons.org/licenses/by-nd-nc/1.0/', 'http://msdn.microsoft.com/en-us/library/cc233855(PROT.10).aspx']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 3, 'EAL4': 5, 'EAL2': 1, 'EAL 4 augmented': 3, 'EAL4 augmented': 1, 'EAL2 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 11, 'ADV_FSP.4': 12, 'ADV_IMP.1': 8, 'ADV_TDS.3': 16, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 11, 'AGD_PRE.1': 7, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC.4': 16, 'ALC_CMS.4': 7, 'ALC_DEL.1': 6, 'ALC_DVS.1': 6, 'ALC_FLR.3': 23, 'ALC_LCD.1': 7, 'ALC_TAT.1': 8, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1, 'ALC_FLR.2': 1}, 'ATE': {'ATE_COV.2': 6, 'ATE_DPT.1': 6, 'ATE_FUN.1': 9, 'ATE_IND.2': 8, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.3': 8, 'AVA_VAN': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 4, 'FAU_GEN.2': 4, 'FAU_SAR.1': 6, 'FAU_SAR.2': 6, 'FAU_SAR.3': 4, 'FAU_SEL.1': 6, 'FAU_STG.1': 5, 'FAU_STG.3': 5, 'FAU_STG.4': 7, 'FAU_GEN': 8, 'FAU_SAR': 7, 'FAU_SEL': 3, 'FAU_STG': 9, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1, 'FAU_SEL.1.1': 2, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3.1': 1, 'FAU_STG.4.1': 1}, 'FCO': {'FCO_NRO_CIMC.3': 7, 'FCO_NRO_CIMC.4': 7, 'FCO_NRO_CIMC': 8, 'FCO_NRO_CIMC.3.1': 1, 'FCO_NRO_CIMC.3.2': 1, 'FCO_NRO_CIMC.3.3': 1, 'FCO_NRO_CIMC.4.1': 1, 'FCO_NRO_CIMC.4.2': 1, 'FCO_NRO': 1}, 'FCS': {'FCS_BCM_EXT.1': 5, 'FCS_CKM': 16, 'FCS_CKM.4': 13, 'FCS_COA_EXT.1': 4, 'FCS_COP': 65, 'FCS_RBG_EXT.1': 6, 'FCS_COP.1': 1, 'FCS_BCM_EXT': 4, 'FCS_COA_EXT': 4, 'FCS_RBG_EXT': 4, 'FCS_CKM.1': 7, 'FCS_BCM_EXT.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COA_EXT.1.1': 1, 'FCS_RBG_EXT.1.1': 1, 'FCS_RBG_EXT.1.2': 1}, 'FDP': {'FDP_ACC': 56, 'FDP_ACF': 64, 'FDP_ACF_CIMC.2': 7, 'FDP_ACF_CIMC.3': 7, 'FDP_CIMC_CER.1': 8, 'FDP_CIMC_CRL.1': 8, 'FDP_CIMC_CSE.1': 7, 'FDP_CIMC_OCSP.1': 8, 'FDP_ETC_CIMC.5': 7, 'FDP_IFC': 25, 'FDP_IFC.1': 12, 'FDP_IFF': 31, 'FDP_ITT.1': 8, 'FDP_RIP.2': 5, 'FDP_UCT.1': 9, 'FDP_UIT.1': 8, 'FDP_ACF_CIMC': 8, 'FDP_CIMC_CER': 4, 'FDP_CIMC_CRL': 4, 'FDP_CIMC_CSE': 4, 'FDP_CIMC_OCSP': 4, 'FDP_ETC_CIMC': 4, 'FDP_ITT': 3, 'FDP_RIP': 2, 'FDP_UCT': 2, 'FDP_UIT': 3, 'FDP_ACF.1.2': 1, 'FDP_ACF_CIMC.2.1': 1, 'FDP_ACF_CIMC.2.2': 1, 'FDP_ACF_CIMC.3.1': 1, 'FDP_CIMC_CER.1.1': 1, 'FDP_CIMC_CER.1.2': 1, 'FDP_CIMC_CER.1.3': 1, 'FDP_CIMC_CER.1.4': 1, 'FDP_CIMC_CRL.1.1': 1, 'FDP_CIMC_CSE.1.1': 1, 'FDP_CIMC_OCSP.1.1': 1, 'FDP_ETC_CIMC.5.1': 1, 'FDP_ITT.1.1': 1, 'FDP_RIP.2.1': 1, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ACC.1': 12, 'FDP_ITC.1': 4, 'FDP_ITC.2': 4, 'FDP_ACF.1': 3, 'FDP_IFF.1': 2}, 'FIA': {'FIA_AFL_EXT.1': 5, 'FIA_ATD.1': 6, 'FIA_SOS.1': 7, 'FIA_UAU.1': 6, 'FIA_UAU.6': 6, 'FIA_UAU.7': 4, 'FIA_UID.1': 7, 'FIA_USB.1': 6, 'FIA_AFL_EXT': 4, 'FIA_ATD': 5, 'FIA_SOS': 3, 'FIA_UAU': 9, 'FIA_UID': 3, 'FIA_USB': 3, 'FIA_AFL_EXT.1.1': 1, 'FIA_AFL_EXT.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.6.1': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_AFL.1': 1}, 'FMT': {'FMT_MOF': 30, 'FMT_MOF_CIMC.3': 9, 'FMT_MOF_CIMC.5': 9, 'FMT_MOF_CIMC.6': 10, 'FMT_MSA': 140, 'FMT_MSA.2': 5, 'FMT_MTD': 69, 'FMT_MTD_CIMC.4': 7, 'FMT_MTD_CIMC.5': 8, 'FMT_MTD_CIMC.7': 7, 'FMT_REV': 20, 'FMT_SAE.1': 5, 'FMT_SMF.1': 20, 'FMT_SMR.1': 29, 'FMT_MOF_CIMC': 12, 'FMT_MTD_CIMC': 10, 'FMT_SAE': 3, 'FMT_SMF': 3, 'FMT_SMR': 3, 'FMT_SMR.2': 1, 'FMT_MOF_CIMC.3.1': 1, 'FMT_MOF_CIMC.3.2': 1, 'FMT_MOF_CIMC.3.3': 1, 'FMT_MOF_CIMC.3.4': 1, 'FMT_MOF_CIMC.5.1': 1, 'FMT_MOF_CIMC.5.2': 1, 'FMT_MOF_CIMC.5.3': 1, 'FMT_MOF_CIMC.6.1': 1, 'FMT_MOF_CIMC.6.2': 1, 'FMT_MOF_CIMC.6.3': 1, 'FMT_MSA.2.1': 1, 'FMT_MTD_CIMC.4.1': 1, 'FMT_MTD_CIMC.5.1': 1, 'FMT_MTD_CIMC.7.1': 1, 'FMT_SAE.1.1': 1, 'FMT_SAE.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.1': 6, 'FMT_MSA.3': 11, 'FMT_MOF.1': 3}, 'FPT': {'FPT_ITT.1': 5, 'FPT_ITT.3': 7, 'FPT_RCV.1': 5, 'FPT_STM.1': 6, 'FPT_TRC_EXT.1': 4, 'FPT_TST_EXT.1': 3, 'FPT_TRC_EXT': 4, 'FPT_TST_EXT': 4, 'FPT_ITT': 5, 'FPT_RCV': 3, 'FPT_STM': 2, 'FPT_TST.1': 2, 'FPT_ITT.1.1': 1, 'FPT_ITT.3.1': 1, 'FPT_ITT.3.2': 1, 'FPT_RCV.1.1': 1, 'FPT_STM.1.1': 1, 'FPT_TRC_EXT.1.1': 1, 'FPT_TST_EXT.1.1': 1, 'FPT_TST_EXT.1.2': 1, 'FPT_TST_EXT.1.3': 1}, 'FRU': {'FRU_RSA.1': 5, 'FRU_RSA': 3, 'FRU_RSA.1.1': 1}, 'FTA': {'FTA_MCS.1': 5, 'FTA_SSL.1': 5, 'FTA_SSL.2': 5, 'FTA_SSL.3': 8, 'FTA_TAB.1': 5, 'FTA_TAH.1': 4, 'FTA_TSE.1': 8, 'FTA_MCS': 3, 'FTA_SSL': 9, 'FTA_TAB': 2, 'FTA_TAH': 3, 'FTA_TSE': 3, 'FTA_MCS.1.1': 1, 'FTA_MCS.1.2': 1, 'FTA_SSL.1.1': 1, 'FTA_SSL.1.2': 1, 'FTA_SSL.2.1': 1, 'FTA_SSL.2.2': 1, 'FTA_SSL.3.1': 1, 'FTA_TAB.1.1': 1, 'FTA_TAH.1.1': 1, 'FTA_TAH.1.2': 1, 'FTA_TAH.1.3': 1, 'FTA_TSE.1.1': 1, 'FTA_TRP.1': 1}, 'FTP': {'FTP_TRP.1': 11, 'FTP_TRP': 3, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1, 'FTP_ITC.1': 2}}, 'cc_claims': {'O': {'O.ACCESS': 5, 'O.ACCESS_HISTORY': 1, 'O.ADMIN_ROLE': 1, 'O.AUDIT_GENERATION': 1, 'O.AUDIT_PROTECTION': 2, 'O.AUDIT_REVIEW': 1, 'O.CORRECT_TSF_OPERATION': 1, 'O.CRYPTOGRAPHIC_SERVICES': 5, 'O.DISCRETIONARY_ACCESS': 2, 'O.DISCRETIONARY_USER_CONT': 1, 'O.DISPLAY_BANNER': 1, 'O.MANAGE': 1, 'O.PROTECT': 5, 'O.RECOVERY': 1, 'O.RESIDUAL_INFORMATION': 1, 'O.RESOURCE_EXHAUSTION': 1, 'O.DOMAIN_ISOLATION': 1, 'O.TSF_CRYPTOGRAPHIC_INTEGR': 1, 'O.USER_AUTHENTICATION': 1, 'O.USER_IDENTIFICATION': 1, 'O.TSF_CRYPTOGRAPHIC_INTEGRITY': 1}, 'T': {'T.ADMIN_ERROR': 1, 'T.ADMIN_ROGUE': 1, 'T.AUDIT_COMPROMISE': 1, 'T.CRYPTO_COMPROMISE': 1, 'T.MASQUERADE': 1, 'T.OPERATIONAL_ERRORS': 1, 'T.REPLAY': 5, 'T.RESIDUAL_DATA': 1, 'T.RESOURCE_EXHAUSTION': 1, 'T.TSF_COMPROMISE': 1, 'T.UNATTENDED_SESSION': 1, 'T.UNAUTHORIZED_ACCESS': 1, 'T.UNIDENTIFIED_ACTIONS': 1, 'T.UNKNOWN_STATE': 1}, 'A': {'A.PHYSICAL': 1}, 'OE': {'OE.PHYSICAL': 1}}, 'vendor': {'Broadcom': {'Broadcom': 2}, 'Microsoft': {'Microsoft': 231, 'Microsoft Corporation': 3}, 'Cisco': {'Cisco': 4}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 9, 'AES-256': 2, 'AES-': 1}, 'RC': {'RC4': 2}}, 'DES': {'DES': {'DES': 3}, '3DES': {'3DES': 5, 'TDEA': 1}}, 'LWC_competition': {'Elephant': {'Elephant': 1}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 12}, 'ECDSA': {'ECDSA': 11}}, 'FF': {'DH': {'Diffie-Hellman': 3, 'DH': 1}, 'DSA': {'DSA': 6}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}, 'SHA2': {'SHA-256': 4, 'SHA-384': 3, 'SHA-512': 3, 'SHA384': 1, 'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KEX': {'Key Exchange': 5}, 'KA': {'Key Agreement': 5, 'Key agreement': 2}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 4}, 'TLS': {'TLS': 4}}, 'IKE': {'IKE': 15}, 'IPsec': {'IPsec': 5}, 'VPN': {'VPN': 6}}, 'randomness': {'PRNG': {'PRNG': 1}, 'RNG': {'RNG': 6, 'RBG': 2}}, 'cipher_mode': {'ECB': {'ECB': 6}, 'CBC': {'CBC': 6}, 'CFB': {'CFB': 2}, 'GCM': {'GCM': 2}, 'CCM': {'CCM': 4}}, 'ecc_curve': {'NIST': {'P-256': 14, 'P-384': 12, 'P-521': 14}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 26, 'FIPS PUB 140-2': 2, 'FIPS PUB 186-3': 1, 'FIPS 46-3': 2, 'FIPS 186-2': 5, 'FIPS 197': 1}, 'NIST': {'NIST SP 800-57': 1, 'NIST SP 800-56A': 2, 'NIST SP 800-90': 1}, 'PKCS': {'PKCS #7': 3, 'PKCS#7': 1}, 'RFC': {'RFC 3739': 1, 'RFC3280': 1, 'RFC 2560': 3, 'RFC 4120': 1, 'RFC 2797': 2, 'RFC 3280': 4}, 'X509': {'x.509': 1, 'X.509': 15}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to st_vid10390-st.pdf.

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2011-3417', 'CVE-2012-2549', 'CVE-2011-3415', 'CVE-2011-1883', 'CVE-2011-0674', 'CVE-2011-0657', 'CVE-2012-1865', 'CVE-2012-2556', 'CVE-2011-1869', 'CVE-2011-1230', 'CVE-2011-0670', 'CVE-2011-1882', 'CVE-2011-1888', 'CVE-2007-6753', 'CVE-2011-0677', 'CVE-2012-1851', 'CVE-2011-1239', 'CVE-2011-1887', 'CVE-2011-1281', 'CVE-2011-3416', 'CVE-2011-0089', 'CVE-2011-1874', 'CVE-2011-1233', 'CVE-2011-1894', 'CVE-2012-1527', 'CVE-2011-1885', 'CVE-2011-1240', 'CVE-2011-0088', 'CVE-2011-1236', 'CVE-2011-1249', 'CVE-2011-1238', 'CVE-2011-1268', 'CVE-2012-2551', 'CVE-2012-1867', 'CVE-2011-0087', 'CVE-2011-0658', 'CVE-2011-1264', 'CVE-2011-1229', 'CVE-2011-0660', 'CVE-2011-1267', 'CVE-2011-0672', 'CVE-2011-0671', 'CVE-2012-1850', 'CVE-2011-1228', 'CVE-2011-1872', 'CVE-2011-1237', 'CVE-2011-1282', 'CVE-2011-0662', 'CVE-2011-0667', 'CVE-2011-1879', 'CVE-2011-1234', 'CVE-2011-1873', 'CVE-2011-0676', 'CVE-2012-1528', 'CVE-2011-1884', 'CVE-2011-0033', 'CVE-2011-1241', 'CVE-2011-1227', 'CVE-2012-2529', 'CVE-2011-1881', 'CVE-2011-1877', 'CVE-2011-0034', 'CVE-2011-0096', 'CVE-2011-0086', 'CVE-2012-2530', 'CVE-2011-1880', 'CVE-2012-2527', 'CVE-2011-0666', 'CVE-2011-0665', 'CVE-2011-0661', 'CVE-2011-1225', 'CVE-2012-0175', 'CVE-2011-1235', 'CVE-2011-1283', 'CVE-2011-1248', 'CVE-2011-1878', 'CVE-2011-1231', 'CVE-2011-1232', 'CVE-2011-1226', 'CVE-2011-0675', 'CVE-2012-1864', 'CVE-2012-1194', 'CVE-2012-1866', 'CVE-2011-1875', 'CVE-2011-1242', 'CVE-2011-1876', 'CVE-2011-0041', 'CVE-2011-0090', 'CVE-2011-3414', 'CVE-2012-4774', 'CVE-2011-1284']} values discarded.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}]} values added.
  • 21.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/st_vid10390-st.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2008-1436', 'CVE-2008-1083', 'CVE-2008-4834', 'CVE-2008-3465', 'CVE-2008-4037', 'CVE-2008-4835', 'CVE-2008-1441', 'CVE-2008-4036', 'CVE-2008-4038', 'CVE-2008-1084', 'CVE-2008-2250', 'CVE-2008-1454', 'CVE-2008-4269', 'CVE-2008-4268', 'CVE-2008-2249', 'CVE-2008-2251', 'CVE-2008-4114', 'CVE-2008-3013', 'CVE-2008-2252']} values discarded.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}]} values discarded.
  • 16.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2008-4609']} values discarded.
  • 10.10.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:o:microsoft:windows_server_2008:-:r2:x64:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2008:-:r2:*:*:*:*:x64:*', 'cpe:2.3:o:microsoft:windows_server_2008:-:r2:itanium:*:*:*:*:*']}.
    • The related_cves property was set to {'_type': 'Set', 'elements': ['CVE-2008-4834', 'CVE-2013-1253', 'CVE-2010-1255', 'CVE-2013-1285', 'CVE-2013-1274', 'CVE-2010-3959', 'CVE-2013-1273', 'CVE-2013-3868', 'CVE-2011-1887', 'CVE-2009-1125', 'CVE-2010-0234', 'CVE-2012-1527', 'CVE-2009-2515', 'CVE-2009-1536', 'CVE-2010-0818', 'CVE-2009-2493', 'CVE-2010-0242', 'CVE-2011-1238', 'CVE-2009-0081', 'CVE-2018-0968', 'CVE-2013-3865', 'CVE-2011-0660', 'CVE-2013-1268', 'CVE-2010-3961', 'CVE-2010-0477', 'CVE-2010-2554', 'CVE-2010-0484', 'CVE-2010-0269', 'CVE-2011-1282', 'CVE-2013-1292', 'CVE-2009-0568', 'CVE-2018-0975', 'CVE-2013-1341', 'CVE-2013-3864', 'CVE-2010-0022', 'CVE-2013-0011', 'CVE-2011-1879', 'CVE-2011-1234', 'CVE-2010-0820', 'CVE-2011-1873', 'CVE-2012-1528', 'CVE-2011-1241', 'CVE-2010-2549', 'CVE-2009-0083', 'CVE-2013-3866', 'CVE-2008-4609', 'CVE-2009-1544', 'CVE-2013-1279', 'CVE-2010-3960', 'CVE-2010-3970', 'CVE-2013-1270', 'CVE-2010-0810', 'CVE-2009-1928', 'CVE-2011-1878', 'CVE-2011-1232', 'CVE-2010-2746', 'CVE-2009-1123', 'CVE-2009-3677', 'CVE-2013-1267', 'CVE-2010-1890', 'CVE-2009-1133', 'CVE-2010-3227', 'CVE-2013-0013', 'CVE-2011-1284', 'CVE-2011-3417', 'CVE-2009-1925', 'CVE-2013-1250', 'CVE-2011-3415', 'CVE-2010-2568', 'CVE-2013-1261', 'CVE-2013-1260', 'CVE-2012-2556', 'CVE-2010-3338', 'CVE-2013-0076', 'CVE-2011-0670', 'CVE-2008-4038', 'CVE-2011-1882', 'CVE-2009-1546', 'CVE-2011-0677', 'CVE-2012-1851', 'CVE-2009-2532', 'CVE-2011-1239', 'CVE-2018-0887', 'CVE-2010-0485', 'CVE-2017-11852', 'CVE-2011-3416', 'CVE-2011-0089', 'CVE-2010-0811', 'CVE-2013-1262', 'CVE-2010-4398', 'CVE-2011-1233', 'CVE-2013-1271', 'CVE-2018-0973', 'CVE-2011-1249', 'CVE-2011-1236', 'CVE-2008-4037', 'CVE-2009-2512', 'CVE-2010-2744', 'CVE-2012-2551', 'CVE-2009-2511', 'CVE-2011-0658', 'CVE-2013-1293', 'CVE-2011-1229', 'CVE-2010-0812', 'CVE-2013-1256', 'CVE-2011-0671', 'CVE-2011-1228', 'CVE-2010-2550', 'CVE-2010-0819', 'CVE-2009-2510', 'CVE-2013-1278', 'CVE-2009-0093', 'CVE-2008-2249', 'CVE-2010-1892', 'CVE-2010-4669', 'CVE-2010-0252', 'CVE-2009-2509', 'CVE-2010-3956', 'CVE-2010-1887', 'CVE-2009-0078', 'CVE-2010-4562', 'CVE-2010-0481', 'CVE-2008-3465', 'CVE-2013-1255', 'CVE-2011-0033', 'CVE-2010-3974', 'CVE-2009-1126', 'CVE-2009-2508', 'CVE-2012-2529', 'CVE-2013-3862', 'CVE-2009-0229', 'CVE-2011-0096', 'CVE-2017-11831', 'CVE-2012-2527', 'CVE-2009-0085', 'CVE-2009-3126', 'CVE-2009-0233', 'CVE-2011-1225', 'CVE-2011-1283', 'CVE-2009-2526', 'CVE-2013-1287', 'CVE-2010-0020', 'CVE-2011-0675', 'CVE-2009-1929', 'CVE-2010-0021', 'CVE-2010-3942', 'CVE-2011-1876', 'CVE-2011-0090', 'CVE-2009-0243', 'CVE-2008-1083', 'CVE-2012-2549', 'CVE-2010-0270', 'CVE-2011-1883', 'CVE-2010-0719', 'CVE-2010-2729', 'CVE-2011-0674', 'CVE-2011-0657', 'CVE-2010-0231', 'CVE-2008-1441', 'CVE-2011-1230', 'CVE-2008-4036', 'CVE-2011-1888', 'CVE-2008-2250', 'CVE-2013-1269', 'CVE-2010-0480', 'CVE-2010-0026', 'CVE-2018-0971', 'CVE-2011-1281', 'CVE-2013-1286', 'CVE-2009-1124', 'CVE-2010-0482', 'CVE-2011-1874', 'CVE-2009-2503', 'CVE-2013-1280', 'CVE-2010-0241', 'CVE-2011-1240', 'CVE-2013-1259', 'CVE-2010-0240', 'CVE-2011-1268', 'CVE-2013-1343', 'CVE-2013-1342', 'CVE-2013-1264', 'CVE-2009-1545', 'CVE-2012-1867', 'CVE-2009-2500', 'CVE-2011-0087', 'CVE-2010-1897', 'CVE-2009-1216', 'CVE-2011-1267', 'CVE-2011-0672', 'CVE-2018-0972', 'CVE-2009-0232', 'CVE-2009-3103', 'CVE-2013-1249', 'CVE-2010-0018', 'CVE-2011-1872', 'CVE-2013-1258', 'CVE-2011-1237', 'CVE-2010-2555', 'CVE-2011-0662', 'CVE-2010-2738', 'CVE-2010-2552', 'CVE-2010-1889', 'CVE-2013-1263', 'CVE-2011-0676', 'CVE-2011-1884', 'CVE-2013-1266', 'CVE-2010-1886', 'CVE-2009-0550', 'CVE-2013-1275', 'CVE-2011-1881', 'CVE-2011-1877', 'CVE-2011-0086', 'CVE-2009-1930', 'CVE-2012-2530', 'CVE-2011-1880', 'CVE-2013-1294', 'CVE-2010-0025', 'CVE-2009-0094', 'CVE-2013-2556', 'CVE-2011-0665', 'CVE-2018-0974', 'CVE-2013-1344', 'CVE-2011-1231', 'CVE-2009-0080', 'CVE-2010-3229', 'CVE-2013-1277', 'CVE-2010-0232', 'CVE-2008-4269', 'CVE-2012-1864', 'CVE-2012-1866', 'CVE-2009-2524', 'CVE-2009-2514', 'CVE-2011-1875', 'CVE-2008-4268', 'CVE-2011-1242', 'CVE-2009-2516', 'CVE-2013-1251', 'CVE-2018-0960', 'CVE-2011-3414', 'CVE-2010-0233', 'CVE-2009-2513', 'CVE-2018-0970', 'CVE-2013-1248', 'CVE-2012-1865', 'CVE-2009-0086', 'CVE-2017-0175', 'CVE-2011-1869', 'CVE-2009-2494', 'CVE-2013-1252', 'CVE-2009-0082', 'CVE-2008-1084', 'CVE-2007-6753', 'CVE-2010-0017', 'CVE-2010-2743', 'CVE-2008-3013', 'CVE-2008-2252', 'CVE-2013-1254', 'CVE-2011-1894', 'CVE-2011-1885', 'CVE-2010-0476', 'CVE-2011-0088', 'CVE-2009-0231', 'CVE-2013-1283', 'CVE-2010-1896', 'CVE-2009-0234', 'CVE-2011-1264', 'CVE-2009-1920', 'CVE-2012-1850', 'CVE-2010-1893', 'CVE-2009-0320', 'CVE-2010-3939', 'CVE-2008-2251', 'CVE-2008-4114', 'CVE-2009-2504', 'CVE-2009-2528', 'CVE-2011-0667', 'CVE-2008-1436', 'CVE-2009-2502', 'CVE-2010-2742', 'CVE-2013-1272', 'CVE-2011-1227', 'CVE-2010-3941', 'CVE-2009-2501', 'CVE-2010-1883', 'CVE-2010-0486', 'CVE-2010-0250', 'CVE-2011-0034', 'CVE-2010-0035', 'CVE-2013-1265', 'CVE-2010-3957', 'CVE-2010-2551', 'CVE-2010-0487', 'CVE-2009-0230', 'CVE-2011-0666', 'CVE-2011-0661', 'CVE-2012-0175', 'CVE-2011-1235', 'CVE-2008-4835', 'CVE-2011-1248', 'CVE-2010-0239', 'CVE-2010-3943', 'CVE-2009-0089', 'CVE-2011-1226', 'CVE-2010-3940', 'CVE-2008-1454', 'CVE-2012-1194', 'CVE-2018-8641', 'CVE-2009-1926', 'CVE-2013-1257', 'CVE-2013-1276', 'CVE-2009-1127', 'CVE-2010-0024', 'CVE-2011-0041', 'CVE-2018-0969', 'CVE-2012-4774']}.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for General-Purpose Operating Systems in a Networked Environment, ...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_gpospp_v1.0.pdf', 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for General-Purpose Operating Systems in a Networked Environment, ...', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp_gpospp_v1.0.pdf', 'pp_link': None, 'pp_ids': None}]}.

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:o:microsoft:windows_server:2008:*:*:*:*:*:itanium:*', 'cpe:2.3:a:microsoft:sql_server:2008:*:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:sql_server:2008:-:*:*:*:*:*:*']} values discarded.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2009-0230', 'CVE-2009-0568', 'CVE-2007-5090']} values discarded.
  • 26.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'vendor': {'__insert__': {'Cisco': {'Cisco': 1}}}} data.
    • The st_keywords property was updated, with the {'vendor': {'__insert__': {'Cisco': {'Cisco': 4}}}, 'crypto_protocol': {'__insert__': {'VPN': {'VPN': 6}}}} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'st_vid10390-vr.pdf', 'st_filename': 'st_vid10390-st.pdf'}.
    • The report_keywords property was updated, with the {'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.3': 5}}}}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 1}}}}}}, 'tee_name': {}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL4': 5}}}}, 'cc_sar': {'__update__': {'ADV': {'__insert__': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_TDS': 1}, '__update__': {'ADV_ARC.1': 11, 'ADV_FSP.4': 12, 'ADV_IMP.1': 8, 'ADV_TDS.3': 16}}, 'AGD': {'__insert__': {'AGD_OPE': 1, 'AGD_PRE': 1}, '__update__': {'AGD_OPE.1': 11, 'AGD_PRE.1': 7}}, 'ALC': {'__insert__': {'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, '__update__': {'ALC_CMC.4': 16, 'ALC_CMS.4': 7, 'ALC_DEL.1': 6, 'ALC_DVS.1': 6, 'ALC_FLR.3': 23, 'ALC_LCD.1': 7, 'ALC_TAT.1': 8}}, 'ATE': {'__insert__': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, '__update__': {'ATE_COV.2': 6, 'ATE_DPT.1': 6, 'ATE_FUN.1': 9, 'ATE_IND.2': 8}}, 'AVA': {'__insert__': {'AVA_VAN': 1}, '__update__': {'AVA_VAN.3': 8}}}}, 'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_SAR': 7, 'FAU_SEL': 3, 'FAU_STG': 9}, '__update__': {'FAU_SEL.1': 6, 'FAU_STG.1': 5, 'FAU_GEN': 8}}, 'FCO': {'__insert__': {'FCO_NRO_CIMC': 8}, '__update__': {'FCO_NRO_CIMC.3': 7}}, 'FCS': {'__insert__': {'FCS_CKM': 16, 'FCS_COP': 65, 'FCS_BCM_EXT': 4, 'FCS_COA_EXT': 4, 'FCS_RBG_EXT': 4}}, 'FDP': {'__insert__': {'FDP_ACC': 56, 'FDP_ACF': 64, 'FDP_IFC': 25, 'FDP_IFF': 31, 'FDP_ACF_CIMC': 8, 'FDP_CIMC_CER': 4, 'FDP_CIMC_CRL': 4, 'FDP_CIMC_CSE': 4, 'FDP_CIMC_OCSP': 4, 'FDP_ETC_CIMC': 4, 'FDP_ITT': 3, 'FDP_RIP': 2, 'FDP_UCT': 2, 'FDP_UIT': 3}}, 'FIA': {'__insert__': {'FIA_AFL_EXT': 4, 'FIA_ATD': 5, 'FIA_SOS': 3, 'FIA_UAU': 9, 'FIA_UID': 3, 'FIA_USB': 3}, '__update__': {'FIA_UID.1': 7}}, 'FMT': {'__insert__': {'FMT_MOF': 30, 'FMT_MSA': 140, 'FMT_MTD': 69, 'FMT_REV': 20, 'FMT_MOF_CIMC': 12, 'FMT_MTD_CIMC': 10, 'FMT_SAE': 3, 'FMT_SMF': 3, 'FMT_SMR': 3}, '__update__': {'FMT_MOF_CIMC.3': 9, 'FMT_MTD_CIMC.4': 7, 'FMT_SMR.1': 29}}, 'FPT': {'__insert__': {'FPT_TRC_EXT': 4, 'FPT_TST_EXT': 4, 'FPT_ITT': 5, 'FPT_RCV': 3, 'FPT_STM': 2}}, 'FRU': {'__insert__': {'FRU_RSA': 3}}, 'FTA': {'__insert__': {'FTA_MCS': 3, 'FTA_SSL': 9, 'FTA_TAB': 2, 'FTA_TAH': 3, 'FTA_TSE': 3}}, 'FTP': {'__insert__': {'FTP_TRP': 3}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.AUDIT_PROTECTION': 2, 'O.DISCRETIONARY_ACCESS': 2}}}, '__delete__': ['D']}, 'vendor': {'__update__': {'Microsoft': {'__update__': {'Microsoft': 231, 'Microsoft Corporation': 3}}}, '__delete__': ['Infineon', 'STMicroelectronics']}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 3}, '__delete__': ['DEA']}}}}}, 'asymmetric_crypto': {'__update__': {'FF': {'__update__': {'DH': {'__update__': {'DH': 1, 'Diffie-Hellman': 3}}, 'DSA': {'__update__': {'DSA': 6}}}}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA1': {'__delete__': ['SHA1']}, 'SHA2': {'__delete__': ['SHA256', 'SHA512']}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 2}}}}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 4}}, 'TLS': {'__update__': {'TLS': 4}}}}, 'IKE': {'__update__': {'IKE': 15}}}}, 'randomness': {'__update__': {'PRNG': {'__delete__': ['DRBG']}, 'RNG': {'__update__': {'RNG': 6, 'RBG': 2}}}}, 'cipher_mode': {'__update__': {'ECB': {'__update__': {'ECB': 6}}, 'CBC': {'__update__': {'CBC': 6}}}}, 'ecc_curve': {'__update__': {'NIST': {'__update__': {'P-521': 14}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'FIPS': {'__update__': {'FIPS 140-2': 26}}, 'RFC': {'__insert__': {'RFC 3739': 1}, '__update__': {'RFC 2560': 3}}, 'X509': {'__update__': {'X.509': 15}}}}} data.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for General-Purpose Operating Systems in a Networked Environment, ...', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_gpospp_v1.0.pdf', 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://support.microsoft.com/kb/2492505']}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://msdn.microsoft.com/en-us/library/dd207968(PROT.10).aspx', 'http://msdn.microsoft.com/en-us/library/cc233219(PROT.10).aspx', 'http://www.microsoft.com/technet/security/bulletin/MS10-073.mspx', 'http://msdn.microsoft.com/en-us/library/cc227906(PROT.10).aspx', 'http://support.microsoft.com/kb/309408', 'http://support.microsoft.com/kb/2492505', 'http://msdn.microsoft.com/en-us/library/cc223122(PROT.10).aspx', 'http://www.microsoft.com/technet/security/bulletin/MS10-085.mspx', 'http://technet.microsoft.com/en-us/library/cc739804(WS.10).aspx', 'http://creativecommons.org/licenses/by-nd-nc/1.0/', 'http://msdn.microsoft.com/en-us/library/cc233855(PROT.10).aspx']}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'US': {'CCEVS-VR-10390-2010': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 9, 'EAL4': 1, 'EAL 4 augmented': 1, 'EAL4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.3': 4}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Broadcom': {'Broadcom': 2}, 'Microsoft': {'Microsoft Corporation': 3, 'Microsoft': 46}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KEX': {'Key Exchange': 4}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 3}, 'TLS': {'TLS': 2}}, 'IKE': {'IKE': 1}, 'IPsec': {'IPsec': 2}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 5}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 3, 'EAL4': 4, 'EAL2': 1, 'EAL 4 augmented': 3, 'EAL4 augmented': 1, 'EAL2 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_FSP.4': 2, 'ADV_IMP.1': 2, 'ADV_TDS.3': 2}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_CMC.4': 2, 'ALC_CMS.4': 2, 'ALC_DEL.1': 2, 'ALC_DVS.1': 2, 'ALC_FLR.3': 8, 'ALC_LCD.1': 2, 'ALC_TAT.1': 2, 'ALC_FLR.2': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_VAN.3': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 4, 'FAU_GEN.2': 4, 'FAU_SAR.1': 6, 'FAU_SAR.2': 6, 'FAU_SAR.3': 4, 'FAU_SEL.1': 5, 'FAU_STG.1': 6, 'FAU_STG.3': 5, 'FAU_STG.4': 7, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1, 'FAU_SEL.1.1': 2, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3.1': 1, 'FAU_STG.4.1': 1, 'FAU_GEN': 2}, 'FCO': {'FCO_NRO_CIMC.3': 8, 'FCO_NRO_CIMC.4': 7, 'FCO_NRO_CIMC.3.1': 1, 'FCO_NRO_CIMC.3.2': 1, 'FCO_NRO_CIMC.3.3': 1, 'FCO_NRO_CIMC.4.1': 1, 'FCO_NRO_CIMC.4.2': 1, 'FCO_NRO': 1}, 'FCS': {'FCS_BCM_EXT.1': 5, 'FCS_CKM.4': 13, 'FCS_COA_EXT.1': 4, 'FCS_RBG_EXT.1': 6, 'FCS_COP.1': 1, 'FCS_CKM.1': 7, 'FCS_BCM_EXT.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COA_EXT.1.1': 1, 'FCS_RBG_EXT.1.1': 1, 'FCS_RBG_EXT.1.2': 1}, 'FDP': {'FDP_ACF_CIMC.2': 7, 'FDP_ACF_CIMC.3': 7, 'FDP_CIMC_CER.1': 8, 'FDP_CIMC_CRL.1': 8, 'FDP_CIMC_CSE.1': 7, 'FDP_CIMC_OCSP.1': 8, 'FDP_ETC_CIMC.5': 7, 'FDP_IFC.1': 12, 'FDP_ITT.1': 8, 'FDP_RIP.2': 5, 'FDP_UCT.1': 9, 'FDP_UIT.1': 8, 'FDP_ACF.1.2': 1, 'FDP_ACF_CIMC.2.1': 1, 'FDP_ACF_CIMC.2.2': 1, 'FDP_ACF_CIMC.3.1': 1, 'FDP_CIMC_CER.1.1': 1, 'FDP_CIMC_CER.1.2': 1, 'FDP_CIMC_CER.1.3': 1, 'FDP_CIMC_CER.1.4': 1, 'FDP_CIMC_CRL.1.1': 1, 'FDP_CIMC_CSE.1.1': 1, 'FDP_CIMC_OCSP.1.1': 1, 'FDP_ETC_CIMC.5.1': 1, 'FDP_ITT.1.1': 1, 'FDP_RIP.2.1': 1, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ACC.1': 12, 'FDP_ITC.1': 4, 'FDP_ITC.2': 4, 'FDP_ACF.1': 3, 'FDP_IFF.1': 2}, 'FIA': {'FIA_AFL_EXT.1': 5, 'FIA_ATD.1': 6, 'FIA_SOS.1': 7, 'FIA_UAU.1': 6, 'FIA_UAU.6': 6, 'FIA_UAU.7': 4, 'FIA_UID.1': 8, 'FIA_USB.1': 6, 'FIA_AFL_EXT.1.1': 1, 'FIA_AFL_EXT.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.6.1': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_AFL.1': 1}, 'FMT': {'FMT_MOF_CIMC.3': 10, 'FMT_MOF_CIMC.5': 9, 'FMT_MOF_CIMC.6': 10, 'FMT_MSA.2': 5, 'FMT_MTD_CIMC.4': 8, 'FMT_MTD_CIMC.5': 8, 'FMT_MTD_CIMC.7': 7, 'FMT_SAE.1': 5, 'FMT_SMF.1': 20, 'FMT_SMR.1': 35, 'FMT_SMR.2': 1, 'FMT_MOF_CIMC.3.1': 1, 'FMT_MOF_CIMC.3.2': 1, 'FMT_MOF_CIMC.3.3': 1, 'FMT_MOF_CIMC.3.4': 1, 'FMT_MOF_CIMC.5.1': 1, 'FMT_MOF_CIMC.5.2': 1, 'FMT_MOF_CIMC.5.3': 1, 'FMT_MOF_CIMC.6.1': 1, 'FMT_MOF_CIMC.6.2': 1, 'FMT_MOF_CIMC.6.3': 1, 'FMT_MSA.2.1': 1, 'FMT_MTD_CIMC.4.1': 1, 'FMT_MTD_CIMC.5.1': 1, 'FMT_MTD_CIMC.7.1': 1, 'FMT_SAE.1.1': 1, 'FMT_SAE.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.1': 6, 'FMT_MSA.3': 11, 'FMT_MOF.1': 3}, 'FPT': {'FPT_ITT.1': 5, 'FPT_ITT.3': 7, 'FPT_RCV.1': 5, 'FPT_STM.1': 6, 'FPT_TRC_EXT.1': 4, 'FPT_TST_EXT.1': 3, 'FPT_TST.1': 2, 'FPT_ITT.1.1': 1, 'FPT_ITT.3.1': 1, 'FPT_ITT.3.2': 1, 'FPT_RCV.1.1': 1, 'FPT_STM.1.1': 1, 'FPT_TRC_EXT.1.1': 1, 'FPT_TST_EXT.1.1': 1, 'FPT_TST_EXT.1.2': 1, 'FPT_TST_EXT.1.3': 1}, 'FRU': {'FRU_RSA.1': 5, 'FRU_RSA.1.1': 1}, 'FTA': {'FTA_MCS.1': 5, 'FTA_SSL.1': 5, 'FTA_SSL.2': 5, 'FTA_SSL.3': 8, 'FTA_TAB.1': 5, 'FTA_TAH.1': 4, 'FTA_TSE.1': 8, 'FTA_MCS.1.1': 1, 'FTA_MCS.1.2': 1, 'FTA_SSL.1.1': 1, 'FTA_SSL.1.2': 1, 'FTA_SSL.2.1': 1, 'FTA_SSL.2.2': 1, 'FTA_SSL.3.1': 1, 'FTA_TAB.1.1': 1, 'FTA_TAH.1.1': 1, 'FTA_TAH.1.2': 1, 'FTA_TAH.1.3': 1, 'FTA_TSE.1.1': 1, 'FTA_TRP.1': 1}, 'FTP': {'FTP_TRP.1': 11, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1, 'FTP_ITC.1': 2}}, 'cc_claims': {'D': {'D.SYS': 1}, 'O': {'O.ACCESS': 5, 'O.ACCESS_HISTORY': 1, 'O.ADMIN_ROLE': 1, 'O.AUDIT_GENERATION': 1, 'O.AUDIT_PROTECTION': 5, 'O.AUDIT_REVIEW': 1, 'O.CORRECT_TSF_OPERATION': 1, 'O.CRYPTOGRAPHIC_SERVICES': 5, 'O.DISCRETIONARY_ACCESS': 5, 'O.DISCRETIONARY_USER_CONT': 1, 'O.DISPLAY_BANNER': 1, 'O.MANAGE': 1, 'O.PROTECT': 5, 'O.RECOVERY': 1, 'O.RESIDUAL_INFORMATION': 1, 'O.RESOURCE_EXHAUSTION': 1, 'O.DOMAIN_ISOLATION': 1, 'O.TSF_CRYPTOGRAPHIC_INTEGR': 1, 'O.USER_AUTHENTICATION': 1, 'O.USER_IDENTIFICATION': 1, 'O.TSF_CRYPTOGRAPHIC_INTEGRITY': 1}, 'T': {'T.ADMIN_ERROR': 1, 'T.ADMIN_ROGUE': 1, 'T.AUDIT_COMPROMISE': 1, 'T.CRYPTO_COMPROMISE': 1, 'T.MASQUERADE': 1, 'T.OPERATIONAL_ERRORS': 1, 'T.REPLAY': 5, 'T.RESIDUAL_DATA': 1, 'T.RESOURCE_EXHAUSTION': 1, 'T.TSF_COMPROMISE': 1, 'T.UNATTENDED_SESSION': 1, 'T.UNAUTHORIZED_ACCESS': 1, 'T.UNIDENTIFIED_ACTIONS': 1, 'T.UNKNOWN_STATE': 1}, 'A': {'A.PHYSICAL': 1}, 'OE': {'OE.PHYSICAL': 1}}, 'vendor': {'Infineon': {'Infineon': 1}, 'STMicroelectronics': {'STM': 9}, 'Broadcom': {'Broadcom': 2}, 'Microsoft': {'Microsoft': 232, 'Microsoft Corporation': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 9, 'AES-256': 2, 'AES-': 1}, 'RC': {'RC4': 2}}, 'DES': {'DES': {'DES': 8, 'DEA': 1}, '3DES': {'3DES': 5, 'TDEA': 1}}, 'LWC_competition': {'Elephant': {'Elephant': 1}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 12}, 'ECDSA': {'ECDSA': 11}}, 'FF': {'DH': {'DH': 13, 'Diffie-Hellman': 4}, 'DSA': {'DSA': 20}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 2, 'SHA-1': 2}, 'SHA2': {'SHA-256': 4, 'SHA-384': 3, 'SHA-512': 3, 'SHA256': 2, 'SHA384': 1, 'SHA512': 1, 'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 3}, 'KEX': {'Key Exchange': 5}, 'KA': {'Key Agreement': 5, 'Key agreement': 2}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 16}, 'TLS': {'TLS': 10}}, 'IKE': {'IKE': 14}, 'IPsec': {'IPsec': 5}}, 'randomness': {'PRNG': {'PRNG': 1, 'DRBG': 1}, 'RNG': {'RNG': 7, 'RBG': 3}}, 'cipher_mode': {'ECB': {'ECB': 7}, 'CBC': {'CBC': 12}, 'CFB': {'CFB': 2}, 'GCM': {'GCM': 2}, 'CCM': {'CCM': 4}}, 'ecc_curve': {'NIST': {'P-256': 14, 'P-384': 12, 'P-521': 12}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 3}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 22, 'FIPS PUB 140-2': 2, 'FIPS PUB 186-3': 1, 'FIPS 46-3': 2, 'FIPS 186-2': 5, 'FIPS 197': 1}, 'NIST': {'NIST SP 800-57': 1, 'NIST SP 800-56A': 2, 'NIST SP 800-90': 1}, 'PKCS': {'PKCS #7': 3, 'PKCS#7': 1}, 'RFC': {'RFC3280': 1, 'RFC 4120': 1, 'RFC 2797': 2, 'RFC 3280': 4, 'RFC 2560': 2}, 'X509': {'x.509': 1, 'X.509': 11}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '69044a45799e992d1473a17c7c028add89ca57f694f46bbbae6fdeafcb00fe0e', 'st_pdf_hash': 'b679b459790fa490704bedaf9ad05b7c627271d2083713c6333b87eeb6368dce', 'report_txt_hash': '21be91723dc5514c2468cb7bfd4067d4952641c50c165624188ed06d3c0780b2', 'st_txt_hash': '3f28a5a8f4e08bc1795602ed7a33a555ce9ccac4f1ec33343410e835ecc10d03'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_vendor': {'Broadcom': 2}} data.
    • The st_keywords property was updated, with the {'rules_vendor': {'__insert__': {'Broadcom': 2}}, 'rules_block_cipher_modes': {'__insert__': {'CCM': 4}}} data.
  • 21.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:o:microsoft:windows_server:2008:*:*:*:*:*:itanium:*', 'cpe:2.3:a:microsoft:sql_server:2008:-:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:sql_server:2008:*:*:*:*:*:*:*']} values added.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2009-0230', 'CVE-2009-0568', 'CVE-2007-5090']} values added.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 29.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was set to {'_type': 'Set', 'elements': ['CVE-2007-5348', 'CVE-2008-3012', 'CVE-2008-3014']}.
  • 28.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was set to None.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The cert_lab property was set to ['US'].
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {'cert_id': 'CCEVS-VR-10390-2010', 'cert_item': 'Microsoft Corporation, Corporate Headquarters, One Microsoft Way, Redmond, WA 98052-6399 Windows 7 and Windows Server 2008 R2', 'cert_lab': 'US NIAP'}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['2008', '7']}.
    • The cpe_matches property was set to {'_type': 'Set', 'elements': ['cpe:2.3:a:microsoft:server:2008:*:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:windows-nt:2008:*:*:*:*:*:*:*']}.
  • 12.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[1, 'cpe:2.3:a:microsoft:server:2008:*:*:*:*:*:*:*']] values inserted.
  • 11.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[1, 'cpe:2.3:a:microsoft:windows-nt:2008:*:*:*:*:*:*:*']] values inserted.
  • 03.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[1, 'cpe:2.3:a:microsoft:server:2008:*:*:*:*:*:*:*']] values inserted.
  • 02.02.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the [[1, 'cpe:2.3:a:microsoft:windows-nt:2008:*:*:*:*:*:*:*']] values inserted.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Microsoft Windows 7, Microsoft Windows Server 2008 R2 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Operating Systems",
  "cert_link": null,
  "dgst": "cbda608152d4fe2e",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-10390-2010",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "7",
        "2008"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Microsoft Corporation",
  "manufacturer_web": "https://www.microsoft.com",
  "name": "Microsoft Windows 7, Microsoft Windows Server 2008 R2",
  "not_valid_after": "2014-11-01",
  "not_valid_before": "2011-03-24",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "st_vid10390-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-10390-2010",
        "cert_item": "Microsoft Corporation, Corporate Headquarters, One Microsoft Way, Redmond, WA 98052-6399 Windows 7 and Windows Server 2008 R2",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-10390-2010": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.3": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 9,
          "EAL 4 augmented": 1,
          "EAL4": 1,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 1
        },
        "IPsec": {
          "IPsec": 2
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 2
          }
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 4
        },
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Broadcom": {
          "Broadcom": 2
        },
        "Cisco": {
          "Cisco": 1
        },
        "Microsoft": {
          "Microsoft": 46,
          "Microsoft Corporation": 3
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Ken Elliott",
      "/CreationDate": "D:20110412124748",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20110412124748",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Title": "Validation Report for Win7",
      "pdf_file_size_bytes": 510768,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://support.microsoft.com/kb/2492505"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 35
    },
    "st_filename": "st_vid10390-st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 12
          },
          "ECDSA": {
            "ECDSA": 11
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 3
          },
          "DSA": {
            "DSA": 6
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.PHYSICAL": 1
        },
        "O": {
          "O.ACCESS": 5,
          "O.ACCESS_HISTORY": 1,
          "O.ADMIN_ROLE": 1,
          "O.AUDIT_GENERATION": 1,
          "O.AUDIT_PROTECTION": 2,
          "O.AUDIT_REVIEW": 1,
          "O.CORRECT_TSF_OPERATION": 1,
          "O.CRYPTOGRAPHIC_SERVICES": 5,
          "O.DISCRETIONARY_ACCESS": 2,
          "O.DISCRETIONARY_USER_CONT": 1,
          "O.DISPLAY_BANNER": 1,
          "O.DOMAIN_ISOLATION": 1,
          "O.MANAGE": 1,
          "O.PROTECT": 5,
          "O.RECOVERY": 1,
          "O.RESIDUAL_INFORMATION": 1,
          "O.RESOURCE_EXHAUSTION": 1,
          "O.TSF_CRYPTOGRAPHIC_INTEGR": 1,
          "O.TSF_CRYPTOGRAPHIC_INTEGRITY": 1,
          "O.USER_AUTHENTICATION": 1,
          "O.USER_IDENTIFICATION": 1
        },
        "OE": {
          "OE.PHYSICAL": 1
        },
        "T": {
          "T.ADMIN_ERROR": 1,
          "T.ADMIN_ROGUE": 1,
          "T.AUDIT_COMPROMISE": 1,
          "T.CRYPTO_COMPROMISE": 1,
          "T.MASQUERADE": 1,
          "T.OPERATIONAL_ERRORS": 1,
          "T.REPLAY": 5,
          "T.RESIDUAL_DATA": 1,
          "T.RESOURCE_EXHAUSTION": 1,
          "T.TSF_COMPROMISE": 1,
          "T.UNATTENDED_SESSION": 1,
          "T.UNAUTHORIZED_ACCESS": 1,
          "T.UNIDENTIFIED_ACTIONS": 1,
          "T.UNKNOWN_STATE": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 11,
          "ADV_FSP": 1,
          "ADV_FSP.4": 12,
          "ADV_IMP": 1,
          "ADV_IMP.1": 8,
          "ADV_TDS": 1,
          "ADV_TDS.3": 16
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 11,
          "AGD_PRE": 1,
          "AGD_PRE.1": 7
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 16,
          "ALC_CMS": 1,
          "ALC_CMS.4": 7,
          "ALC_DEL": 1,
          "ALC_DEL.1": 6,
          "ALC_DVS": 1,
          "ALC_DVS.1": 6,
          "ALC_FLR": 1,
          "ALC_FLR.2": 1,
          "ALC_FLR.3": 23,
          "ALC_LCD": 1,
          "ALC_LCD.1": 7,
          "ALC_TAT": 1,
          "ALC_TAT.1": 8
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.2": 6,
          "ATE_DPT": 1,
          "ATE_DPT.1": 6,
          "ATE_FUN": 1,
          "ATE_FUN.1": 9,
          "ATE_IND": 1,
          "ATE_IND.2": 8
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.3": 8
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 3,
          "EAL 4 augmented": 3,
          "EAL2": 1,
          "EAL2 augmented": 1,
          "EAL4": 5,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 8,
          "FAU_GEN.1": 4,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 4,
          "FAU_GEN.2.1": 1,
          "FAU_SAR": 7,
          "FAU_SAR.1": 6,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 6,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3": 4,
          "FAU_SAR.3.1": 1,
          "FAU_SEL": 3,
          "FAU_SEL.1": 6,
          "FAU_SEL.1.1": 2,
          "FAU_STG": 9,
          "FAU_STG.1": 5,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.3": 5,
          "FAU_STG.3.1": 1,
          "FAU_STG.4": 7,
          "FAU_STG.4.1": 1
        },
        "FCO": {
          "FCO_NRO": 1,
          "FCO_NRO_CIMC": 8,
          "FCO_NRO_CIMC.3": 7,
          "FCO_NRO_CIMC.3.1": 1,
          "FCO_NRO_CIMC.3.2": 1,
          "FCO_NRO_CIMC.3.3": 1,
          "FCO_NRO_CIMC.4": 7,
          "FCO_NRO_CIMC.4.1": 1,
          "FCO_NRO_CIMC.4.2": 1
        },
        "FCS": {
          "FCS_BCM_EXT": 4,
          "FCS_BCM_EXT.1": 5,
          "FCS_BCM_EXT.1.1": 1,
          "FCS_CKM": 16,
          "FCS_CKM.1": 7,
          "FCS_CKM.4": 13,
          "FCS_CKM.4.1": 1,
          "FCS_COA_EXT": 4,
          "FCS_COA_EXT.1": 4,
          "FCS_COA_EXT.1.1": 1,
          "FCS_COP": 65,
          "FCS_COP.1": 1,
          "FCS_RBG_EXT": 4,
          "FCS_RBG_EXT.1": 6,
          "FCS_RBG_EXT.1.1": 1,
          "FCS_RBG_EXT.1.2": 1
        },
        "FDP": {
          "FDP_ACC": 56,
          "FDP_ACC.1": 12,
          "FDP_ACF": 64,
          "FDP_ACF.1": 3,
          "FDP_ACF.1.2": 1,
          "FDP_ACF_CIMC": 8,
          "FDP_ACF_CIMC.2": 7,
          "FDP_ACF_CIMC.2.1": 1,
          "FDP_ACF_CIMC.2.2": 1,
          "FDP_ACF_CIMC.3": 7,
          "FDP_ACF_CIMC.3.1": 1,
          "FDP_CIMC_CER": 4,
          "FDP_CIMC_CER.1": 8,
          "FDP_CIMC_CER.1.1": 1,
          "FDP_CIMC_CER.1.2": 1,
          "FDP_CIMC_CER.1.3": 1,
          "FDP_CIMC_CER.1.4": 1,
          "FDP_CIMC_CRL": 4,
          "FDP_CIMC_CRL.1": 8,
          "FDP_CIMC_CRL.1.1": 1,
          "FDP_CIMC_CSE": 4,
          "FDP_CIMC_CSE.1": 7,
          "FDP_CIMC_CSE.1.1": 1,
          "FDP_CIMC_OCSP": 4,
          "FDP_CIMC_OCSP.1": 8,
          "FDP_CIMC_OCSP.1.1": 1,
          "FDP_ETC_CIMC": 4,
          "FDP_ETC_CIMC.5": 7,
          "FDP_ETC_CIMC.5.1": 1,
          "FDP_IFC": 25,
          "FDP_IFC.1": 12,
          "FDP_IFF": 31,
          "FDP_IFF.1": 2,
          "FDP_ITC.1": 4,
          "FDP_ITC.2": 4,
          "FDP_ITT": 3,
          "FDP_ITT.1": 8,
          "FDP_ITT.1.1": 1,
          "FDP_RIP": 2,
          "FDP_RIP.2": 5,
          "FDP_RIP.2.1": 1,
          "FDP_UCT": 2,
          "FDP_UCT.1": 9,
          "FDP_UCT.1.1": 1,
          "FDP_UIT": 3,
          "FDP_UIT.1": 8,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_AFL.1": 1,
          "FIA_AFL_EXT": 4,
          "FIA_AFL_EXT.1": 5,
          "FIA_AFL_EXT.1.1": 1,
          "FIA_AFL_EXT.1.2": 1,
          "FIA_ATD": 5,
          "FIA_ATD.1": 6,
          "FIA_ATD.1.1": 1,
          "FIA_SOS": 3,
          "FIA_SOS.1": 7,
          "FIA_SOS.1.1": 1,
          "FIA_UAU": 9,
          "FIA_UAU.1": 6,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.6": 6,
          "FIA_UAU.6.1": 1,
          "FIA_UAU.7": 4,
          "FIA_UAU.7.1": 1,
          "FIA_UID": 3,
          "FIA_UID.1": 7,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB": 3,
          "FIA_USB.1": 6,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MOF": 30,
          "FMT_MOF.1": 3,
          "FMT_MOF_CIMC": 12,
          "FMT_MOF_CIMC.3": 9,
          "FMT_MOF_CIMC.3.1": 1,
          "FMT_MOF_CIMC.3.2": 1,
          "FMT_MOF_CIMC.3.3": 1,
          "FMT_MOF_CIMC.3.4": 1,
          "FMT_MOF_CIMC.5": 9,
          "FMT_MOF_CIMC.5.1": 1,
          "FMT_MOF_CIMC.5.2": 1,
          "FMT_MOF_CIMC.5.3": 1,
          "FMT_MOF_CIMC.6": 10,
          "FMT_MOF_CIMC.6.1": 1,
          "FMT_MOF_CIMC.6.2": 1,
          "FMT_MOF_CIMC.6.3": 1,
          "FMT_MSA": 140,
          "FMT_MSA.1": 6,
          "FMT_MSA.2": 5,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 11,
          "FMT_MTD": 69,
          "FMT_MTD_CIMC": 10,
          "FMT_MTD_CIMC.4": 7,
          "FMT_MTD_CIMC.4.1": 1,
          "FMT_MTD_CIMC.5": 8,
          "FMT_MTD_CIMC.5.1": 1,
          "FMT_MTD_CIMC.7": 7,
          "FMT_MTD_CIMC.7.1": 1,
          "FMT_REV": 20,
          "FMT_SAE": 3,
          "FMT_SAE.1": 5,
          "FMT_SAE.1.1": 1,
          "FMT_SAE.1.2": 1,
          "FMT_SMF": 3,
          "FMT_SMF.1": 20,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 3,
          "FMT_SMR.1": 29,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1,
          "FMT_SMR.2": 1
        },
        "FPT": {
          "FPT_ITT": 5,
          "FPT_ITT.1": 5,
          "FPT_ITT.1.1": 1,
          "FPT_ITT.3": 7,
          "FPT_ITT.3.1": 1,
          "FPT_ITT.3.2": 1,
          "FPT_RCV": 3,
          "FPT_RCV.1": 5,
          "FPT_RCV.1.1": 1,
          "FPT_STM": 2,
          "FPT_STM.1": 6,
          "FPT_STM.1.1": 1,
          "FPT_TRC_EXT": 4,
          "FPT_TRC_EXT.1": 4,
          "FPT_TRC_EXT.1.1": 1,
          "FPT_TST.1": 2,
          "FPT_TST_EXT": 4,
          "FPT_TST_EXT.1": 3,
          "FPT_TST_EXT.1.1": 1,
          "FPT_TST_EXT.1.2": 1,
          "FPT_TST_EXT.1.3": 1
        },
        "FRU": {
          "FRU_RSA": 3,
          "FRU_RSA.1": 5,
          "FRU_RSA.1.1": 1
        },
        "FTA": {
          "FTA_MCS": 3,
          "FTA_MCS.1": 5,
          "FTA_MCS.1.1": 1,
          "FTA_MCS.1.2": 1,
          "FTA_SSL": 9,
          "FTA_SSL.1": 5,
          "FTA_SSL.1.1": 1,
          "FTA_SSL.1.2": 1,
          "FTA_SSL.2": 5,
          "FTA_SSL.2.1": 1,
          "FTA_SSL.2.2": 1,
          "FTA_SSL.3": 8,
          "FTA_SSL.3.1": 1,
          "FTA_TAB": 2,
          "FTA_TAB.1": 5,
          "FTA_TAB.1.1": 1,
          "FTA_TAH": 3,
          "FTA_TAH.1": 4,
          "FTA_TAH.1.1": 1,
          "FTA_TAH.1.2": 1,
          "FTA_TAH.1.3": 1,
          "FTA_TRP.1": 1,
          "FTA_TSE": 3,
          "FTA_TSE.1": 8,
          "FTA_TSE.1.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 2,
          "FTP_TRP": 3,
          "FTP_TRP.1": 11,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 6
        },
        "CCM": {
          "CCM": 4
        },
        "CFB": {
          "CFB": 2
        },
        "ECB": {
          "ECB": 6
        },
        "GCM": {
          "GCM": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 15
        },
        "IPsec": {
          "IPsec": 5
        },
        "TLS": {
          "SSL": {
            "SSL": 4
          },
          "TLS": {
            "TLS": 4
          }
        },
        "VPN": {
          "VPN": 6
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 5,
          "Key agreement": 2
        },
        "KEX": {
          "Key Exchange": 5
        },
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 14,
          "P-384": 12,
          "P-521": 14
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          },
          "SHA2": {
            "SHA-2": 1,
            "SHA-256": 4,
            "SHA-384": 3,
            "SHA-512": 3,
            "SHA384": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 1
        },
        "RNG": {
          "RBG": 2,
          "RNG": 6
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 26,
          "FIPS 186-2": 5,
          "FIPS 197": 1,
          "FIPS 46-3": 2,
          "FIPS PUB 140-2": 2,
          "FIPS PUB 186-3": 1
        },
        "NIST": {
          "NIST SP 800-56A": 2,
          "NIST SP 800-57": 1,
          "NIST SP 800-90": 1
        },
        "PKCS": {
          "PKCS #7": 3,
          "PKCS#7": 1
        },
        "RFC": {
          "RFC 2560": 3,
          "RFC 2797": 2,
          "RFC 3280": 4,
          "RFC 3739": 1,
          "RFC 4120": 1,
          "RFC3280": 1
        },
        "X509": {
          "X.509": 15,
          "x.509": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 9,
            "AES-": 1,
            "AES-256": 2
          },
          "RC": {
            "RC4": 2
          }
        },
        "DES": {
          "3DES": {
            "3DES": 5,
            "TDEA": 1
          },
          "DES": {
            "DES": 3
          }
        },
        "LWC_competition": {
          "Elephant": {
            "Elephant": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Broadcom": {
          "Broadcom": 2
        },
        "Cisco": {
          "Cisco": 4
        },
        "Microsoft": {
          "Microsoft": 231,
          "Microsoft Corporation": 3
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Mike Grimm",
      "/CreationDate": "D:20110330133045",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20110330133045",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "pdf_file_size_bytes": 2425180,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.microsoft.com/technet/security/bulletin/MS10-085.mspx",
          "http://www.microsoft.com/technet/security/bulletin/MS10-073.mspx",
          "http://support.microsoft.com/kb/309408",
          "http://technet.microsoft.com/en-us/library/cc739804(WS.10).aspx",
          "http://msdn.microsoft.com/en-us/library/cc223122(PROT.10).aspx",
          "http://msdn.microsoft.com/en-us/library/dd207968(PROT.10).aspx",
          "http://msdn.microsoft.com/en-us/library/cc227906(PROT.10).aspx",
          "http://creativecommons.org/licenses/by-nd-nc/1.0/",
          "http://support.microsoft.com/kb/2492505",
          "http://msdn.microsoft.com/en-us/library/cc233855(PROT.10).aspx",
          "http://msdn.microsoft.com/en-us/library/cc233219(PROT.10).aspx"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 190
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp_gpospp_v1.0.pdf",
        "pp_name": "U.S. Government Protection Profile for General-Purpose Operating Systems in a Networked Environment, ..."
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid10390-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_FLR.3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid10390-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "69044a45799e992d1473a17c7c028add89ca57f694f46bbbae6fdeafcb00fe0e",
      "txt_hash": "21be91723dc5514c2468cb7bfd4067d4952641c50c165624188ed06d3c0780b2"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "b679b459790fa490704bedaf9ad05b7c627271d2083713c6333b87eeb6368dce",
      "txt_hash": "3f28a5a8f4e08bc1795602ed7a33a555ce9ccac4f1ec33343410e835ecc10d03"
    }
  },
  "status": "archived"
}