NIAP: Assurance Continuity
NIAP/CCEVS
  NIAP  »»  Product Compliant List  »»  Product Entry  »»  Assurance Continuity  
Assurance Continuity - Cisco CUBE on Cloud Services Router 1000V running IOS-XE 16.12

Date of Maintenance Completion:  2020.01.28

Product Type:    Network Device

Conformance Claim:  Protection Profile Compliant

PP Identifier:    collaborative Protection Profile for Network Devices Version 2.0 + Errata 20180314
  Extended Package for Session Border Controller Version 1.1

Original Evaluated TOE:  2019.06.14 - Cisco CUBE on Cloud Services Router 1000V running IOS-XE 16.9

CC Certificate [PDF] Validation Report [PDF] Assurance Activity [PDF]

Administrative Guide [PDF]

Please note:  The above files are for the Original Evaluated TOE.  Consequently, they do not refer to this maintained version, although they apply to the maintained version. 

Security Target [PDF] * Assurance Continuity Maintenance Report [PDF] Administrative Guide [PDF]

Please note:  This serves as an addendum to the VR for the Original Evaluated TOE. 

* This is the Security Target (ST) associated with this latest Maintenance Release.  To view previous STs for this TOE, click here.

Readers are reminded that the certification of this product (TOE) is the result of maintenance, rather than an actual re-evaluation of the product.  Maintenance only considers the affect of TOE changes on the assurance baseline (i.e. the original evaluated TOE); maintenance is not intended to provide assurance in regard to the resistance of the TOE to new vulnerabilities or attack methods discovered since the date of the initial certificate.  Such assurance can only be gained through re-evaluation. 

Using a security impact analysis of the changes made to the TOE, which was provided by the developer, the CCEVS has determined that the impact of changes on the TOE are considered minor and that independent evaluator analysis was not necessary.  A summary of the results can be found in the Maintenance Report, which is written in relation to the product's original validation report and Security Target.  Readers are therefore reminded to read the Security Target, Validation Report, and the Assurance Maintenance Report to fully understand the meaning of what a maintained certificate represents. 

Product Description

The changes are divided into two categories:  new features and bugfixes.

New Features

The following new features in the product were analyzed and determined to be minor with minor security relevance.

 

Feature

Analysis and Supporting Rational

Support for L2 Extension for Public Cloud

Enable enterprise and cloud providers to deploy a secure hybrid cloud extension with CSR 1000V instances.

Support for Cloud services is not being claimed nor supported in Common Criteria certifications.

Using custom data for Day 0 configuration

When a Cisco CSR 1000v VM instance is deployed on Google Cloud Platform, you can choose to either use the console to access the startup script or use the CLI to access the custom data to achieve a variety of automation goals.

Support for Cloud services is not being claimed nor supported in Common Criteria certifications.

Support for IPv6 for CSR 1000v instance running on AWS

IPv6 addressing is supported for CSR 1000v instances running on Amazon Web Services.

Support for Cloud services is not being claimed nor supported in Common Criteria certifications.

IPv6 support for Encrypted Traffic Analytics

Encrypted Traffic Analytics (ETA) uses passive monitoring, extraction of relevant data elements, and supervised machine learning with cloud-based global visibility. ETA is now extended to IPv6 addresses to identify malware communications in encrypted traffic.

Support for ETA is not being claimed nor supported in the evaluated configuration.

VNF Secure Boot

The secure boot feature prevents malicious software applications and unauthorized operating systems from loading into the system during the system start up process.

The only software and/or operating system running on the TOE is the TOE software.  In addition, the TOE software is verified prior to installing to ensure the software image has not been tampered.

Unclassified-mac initiator with IANA

The Unclassified Mac Initiator with IANA (Internet Assigned Numbers Authority) feature supports ISG (Industry Specification Group) IPv6 sessions based on the unclassified mac address of the subscriber. If subscriber uses DHCPv6 for getting IPv6 addresses, ISG supports creation of subscriber sessions based on DHCPv6 packets with the IANA option.

There are no specific claims based on unclassified mac address, ISG IPv6 sessions or DHCPv6.

PFS for GIKEv2

If a Group Member (GM) is compromised, an attacker may access saved long-term keys and messages. Use Perfect Forward Secrecy (PFS) for GETVPN so that the attacker cannot use the keys and messages to obtain the keys of past or future sessions to decrypt recorded or future communication.

The PFS for GETVPN not being claimed nor supported in the Evaluated Configuration.

Show commands updates for SRTP Rollover Counter (ROC)

The output of the following commands is enhanced to display SRTP ROC information: show voip fpi calls, show voip fpi stats, show voip rtp connections.

The FPI and RTP calls are not being claimed nor supported in the Evaluated Configuration.

Support for SVTI multi-SA

Define and associate an Access Control List (ACL) with an SVTI (static virtual tunnel interface) to select traffic between specific source and destination proxies. By associating the ACL, you are modifying the default configuration that uses a single any-any traffic selector and for every non-any-any traffic selector, IPSec SAs are created so that multiple SAs can be attached to an SVTI.

The SVTI is not being claimed nor supported in the Evaluated Configuration.

 

Bug Fixes — Vulnerability Analysis

The developer searched for publicly disclosed cybersecurity vulnerabilities applicable to versions of the TOE on 16 December 2019. The search resulted in 14 CVEs that were relevant to the TOE. All 14 CVEs have been mitigated in the release of IOS-XE 16.12.1 by the Vendor.

The following national sites was searched:

- National Vulnerability Database:  https://nvd.nist.gov

- US-CERT:  https://www.us-cert.gov

- Security Focus:  www.securityfocus.com

The following key words, product, and vendor were each selected for search criteria:

Product:

      Cisco Cloud Services Router 1000V (CSR1000V)

      Cisco CUBE

      IOS-XE

      Cisco IOS-XE 16.9

      IOS-XE SSH

      IOS-XE IPsec

      Secure Boot

      IC2M

      Intel Xeon Scalable

      Cisco

 

Regression Testing:

 

The IOS-XE 16.12 software image has had a limited amount of automated regression testing covering all major areas of baseline client functionality. Testing was completed by Cisco Business Unit engineers and developers. There were no changes to any SFR or SAR therefore full regression testing was not required

 

NIST CAVP Certificates

The developer confirmed the changed TOE conforms to NIAP Policy 5.  The operational environment under which the validated cryptographic algorithm implementation was tested is the same as the operational

 

Vendor Information


Cisco Systems, Inc.
Cert Team
410-309-4862
certteam@cisco.com

www.cisco.com
Site Map              Contact Us              Home