Assurance Continuity - Cisco CUBE on Cloud Services Router 1000V running IOS-XE 16.12
Date of Maintenance Completion: 2020.01.28CC Certificate Validation Report Assurance Activity
Product Type: Network Device
Conformance Claim: Protection Profile Compliant
PP Identifier: collaborative Protection Profile for Network Devices Version 2.0 + Errata 20180314
Extended Package for Session Border Controller Version 1.1
Original Evaluated TOE: 2019.06.14 - Cisco CUBE on Cloud Services Router 1000V running IOS-XE 16.9
Please note: The above files are for the Original Evaluated TOE. Consequently, they do not refer to this maintained version, although they apply to the maintained version.
Security Target * Assurance Continuity Maintenance Report Administrative Guide
Please note: This serves as an addendum to the VR for the Original Evaluated TOE.
* This is the Security Target (ST) associated with this latest Maintenance Release. To view previous STs for this TOE, click here.
Readers are reminded that the certification of this product (TOE) is the result of maintenance, rather than an actual re-evaluation of the product. Maintenance only considers the affect of TOE changes on the assurance baseline (i.e. the original evaluated TOE); maintenance is not intended to provide assurance in regard to the resistance of the TOE to new vulnerabilities or attack methods discovered since the date of the initial certificate. Such assurance can only be gained through re-evaluation.
Using a security impact analysis of the changes made to the TOE, which was provided by the developer, the CCEVS has determined that the impact of changes on the TOE are considered minor and that independent evaluator analysis was not necessary. A summary of the results can be found in the Maintenance Report, which is written in relation to the product's original validation report and Security Target. Readers are therefore reminded to read the Security Target, Validation Report, and the Assurance Maintenance Report to fully understand the meaning of what a maintained certificate represents.
The changes are divided into two categories: new features and bugfixes.
The following new features in the product were analyzed and determined to be minor with minor security relevance.
Bug Fixes — Vulnerability Analysis
The developer searched for publicly disclosed cybersecurity vulnerabilities applicable to versions of the TOE on 16 December 2019. The search resulted in 14 CVEs that were relevant to the TOE. All 14 CVEs have been mitigated in the release of IOS-XE 16.12.1 by the Vendor.
The following national sites was searched:
- National Vulnerability Database: https://nvd.nist.gov
- Security Focus: www.securityfocus.com
The following key words, product, and vendor were each selected for search criteria:
• Cisco Cloud Services Router 1000V (CSR1000V)
• Cisco CUBE
• Cisco IOS-XE 16.9
• IOS-XE SSH
• IOS-XE IPsec
• Secure Boot
• Intel Xeon Scalable
The IOS-XE 16.12 software image has had a limited amount of automated regression testing covering all major areas of baseline client functionality. Testing was completed by Cisco Business Unit engineers and developers. There were no changes to any SFR or SAR therefore full regression testing was not required
NIST CAVP Certificates
The developer confirmed the changed TOE conforms to NIAP Policy 5. The operational environment under which the validated cryptographic algorithm implementation was tested is the same as the operational
Cisco Systems, Inc.