NIAP: Assurance Continuity
  NIAP  »»  Product Compliant List  »»  Product Entry  »»  Assurance Continuity  
Assurance Continuity - Maintenance Update of Extreme Networks Summit Series Switches

Date of Maintenance Completion:  2018.03.27

Product Type:    Network Device

Conformance Claim:  Protection Profile Compliant

PP Identifier:    collaborative Protection Profile for Network Devices Version 2.0

Original Evaluated TOE:  2017.12.20 - Extreme Networks Summit Series Switches EXOS v22.3

CC Certificate [PDF] Validation Report [PDF] Assurance Activity [PDF]

Administrative Guide [PDF]

Please note:  The above files are for the Original Evaluated TOE.  Consequently, they do not refer to this maintained version, although they apply to the maintained version. 

Security Target [PDF] * Assurance Continuity Maintenance Report [PDF]

Please note:  This serves as an addendum to the VR for the Original Evaluated TOE. 

* This is the Security Target (ST) associated with this latest Maintenance Release.  To view previous STs for this TOE, click here.

Readers are reminded that the certification of this product (TOE) is the result of maintenance, rather than an actual re-evaluation of the product.  Maintenance only considers the affect of TOE changes on the assurance baseline (i.e. the original evaluated TOE); maintenance is not intended to provide assurance in regard to the resistance of the TOE to new vulnerabilities or attack methods discovered since the date of the initial certificate.  Such assurance can only be gained through re-evaluation. 

Using a security impact analysis of the changes made to the TOE, which was provided by the developer, the CCEVS has determined that the impact of changes on the TOE are considered minor and that independent evaluator analysis was not necessary.  A summary of the results can be found in the Maintenance Report, which is written in relation to the product's original validation report and Security Target.  Readers are therefore reminded to read the Security Target, Validation Report, and the Assurance Maintenance Report to fully understand the meaning of what a maintained certificate represents. 

Product Description

Extreme Networks, Inc., submitted an Impact Analysis Report (IAR) to the Common Criteria Evaluation Validation Scheme (CCEVS) for approval on 21 March 2018. The IAR is intended to satisfy requirements outlined in Common Criteria Evaluation and Validation Scheme Publication #6, Assurance Continuity: Guidance for Maintenance and Re-evaluation, version 2.0. In accordance with those requirements, the IAR describes the changes made to the certified TOE, the evidence updated because of the changes, and the security impact of the changes. 

The IAR identifies the changes to the TOE with respect to the Spectre and Meltdown vulnerabilities. No changes to the TOE were required to address those vulnerabilities because it is infeasible to exploit them in the evaluated configuration. The exploitation of Spectre and Meltdown requires both access to the TOE and the ability to run arbitrary code to perform side-channel analysis. The TOE, a discrete hardware network switch, does not offer any users (administrators or otherwise) the ability to execute arbitrary code. The TOE’s management interface is a CLI that implements a known list of management commands. Therefore, it is not possible to carry out the attack (side-channel analysis) described by CVE-2017-5754, CVE-2017-5753, CVE-2017-5715 (i.e., Meltdown and Spectre).  

This Assurance Continuity action also addresses the release of EXOS v22.5 (the original evaluated version was EXOS v22.3). EXOS v22.5 is a minor release mainly consisting of various, non-security relevant, bug fixes. There were no Security Relevant changes made to the TOE, including: no changes to hardware, no model version identification changes, and no additional platforms are claimed as part of this maintenance.

The evaluation evidence consists of the Security Target, the Guidance Document and the Impact Analysis Report (IAR). The Security Target and Guidance Documents were revised to reflect the new TOE version number. The IAR was new.

The evaluation was done against the collaborative Protection Profile for Network Devices Version 2.0 and the ST referenced validated CAVP certificates. No changes were made in the processor and no modifications were required in any of the valid NIST certificates.

Vendor Information

Extreme Networks, Inc.
Craig Ficik
+1 888-257-3000
Site Map              Contact Us              Home