Assurance Continuity - Ultra 3eTI WiFiProtect 3e-525/523 Series and PacStar 464 Secure Wi-Fi Access Points
Date of Maintenance Completion: 2021.06.08CC Certificate Validation Report Assurance Activity
Product Type: Wireless LAN
Conformance Claim: Protection Profile Compliant
PP Identifier: collaborative Protection Profile for Network Devices Version 2.2e
Extended Package for Wireless LAN Access System
Original Evaluated TOE: 2020.12.21 - Ultra 3eTI WiFiProtect 3e-525/523 Series Wireless Access Points
Please note: The above files are for the Original Evaluated TOE. Consequently, they do not refer to this maintained version, although they apply to the maintained version.
Security Target * Assurance Continuity Maintenance Report Administrative Guide
Please note: This serves as an addendum to the VR for the Original Evaluated TOE.
* This is the Security Target (ST) associated with this latest Maintenance Release. To view previous STs for this TOE, click here.
Readers are reminded that the certification of this product (TOE) is the result of maintenance, rather than an actual re-evaluation of the product. Maintenance only considers the affect of TOE changes on the assurance baseline (i.e. the original evaluated TOE); maintenance is not intended to provide assurance in regard to the resistance of the TOE to new vulnerabilities or attack methods discovered since the date of the initial certificate. Such assurance can only be gained through re-evaluation.
Using a security impact analysis of the changes made to the TOE, which was provided by the developer, the CCEVS has determined that the impact of changes on the TOE are considered minor and that independent evaluator analysis was not necessary. A summary of the results can be found in the Maintenance Report, which is written in relation to the product's original validation report and Security Target. Readers are therefore reminded to read the Security Target, Validation Report, and the Assurance Maintenance Report to fully understand the meaning of what a maintained certificate represents.
A new hardware platform has been added to the configuration. The new hardware is the PacStar 464 Secure Wi-Fi Access Point. The platform is a new enclosure containing unmodified 3eTI technology.
This change is not a security relevant. It doesn’t modify the security claims in the evaluated ST. It permits the evaluated TOE to be marketed by two different vendors.
In addition, the software was updated to address the following: CVE-2021-23840 (https://nvd.nist.gov/vuln/detail/CVE-2021-23840).
There were no new features added or bug fixes other than addressing the CVE.
The changes fell into the following categorization:
· The PacStar 464 Secure WI-FI Access Point uses the Freescale MPC8378E CPU. This is the same hardware as in the evaluated models. The new hardware runs the exact same software configuration (5.1) as the evaluated product. All security functions remain unchanged for the evaluated product.
The hardware CAVP certificates remain valid.
· CVE-2021-23840: Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissible length. This could cause applications to behave incorrectly or crash.
The update was to upgrade the OpenSSL version to 1.1.1j. This upgrade addresses the vulnerability while still maintaining the CAVP certificates. The upgrade deals with SSL/TLS code and not algorithm changes.
Ana Maria Montalvo