NIAP: Assurance Continuity
  NIAP  »»  Product Compliant List  »»  Product Entry  »»  Assurance Continuity  
Assurance Continuity - Cisco Aggregation Services Router (ASR) 1000 Series, Integrated Services Router (ISR) 4000 Series

Date of Maintenance Completion:  2018.09.13

Product Type:    Virtual Private Network
   Network Device

Conformance Claim:  Protection Profile Compliant

PP Identifier:    collaborative Protection Profile for Network Devices Version 1.0
  Extended Package for VPN Gateways Version 2.1
  Extended Package for MACsec Ethernet Encryption Version 1.2

Original Evaluated TOE:  2018.02.06 - Cisco Aggregation Services Router (ASR) 1000 Series, Integrated Services Router (ISR) 4000 Series

CC Certificate [PDF] Validation Report [PDF] Assurance Activity [PDF]

Administrative Guide 1 [PDF]

Administrative Guide 2 [PDF]

Administrative Guide 3 [PDF]

Please note:  The above files are for the Original Evaluated TOE.  Consequently, they do not refer to this maintained version, although they apply to the maintained version. 

Security Target [PDF] * Assurance Continuity Maintenance Report [PDF]

Please note:  This serves as an addendum to the VR for the Original Evaluated TOE. 

* This is the Security Target (ST) associated with this latest Maintenance Release.  To view previous STs for this TOE, click here.

Readers are reminded that the certification of this product (TOE) is the result of maintenance, rather than an actual re-evaluation of the product.  Maintenance only considers the affect of TOE changes on the assurance baseline (i.e. the original evaluated TOE); maintenance is not intended to provide assurance in regard to the resistance of the TOE to new vulnerabilities or attack methods discovered since the date of the initial certificate.  Such assurance can only be gained through re-evaluation. 

Using a security impact analysis of the changes made to the TOE, which was provided by the developer, the CCEVS has determined that the impact of changes on the TOE are considered minor and that independent evaluator analysis was not necessary.  A summary of the results can be found in the Maintenance Report, which is written in relation to the product's original validation report and Security Target.  Readers are therefore reminded to read the Security Target, Validation Report, and the Assurance Maintenance Report to fully understand the meaning of what a maintained certificate represents. 

Product Description
  • SHA-384 was included in the original evaluation but was not included in the ST due to an oversight. A correction was made to FCS_COP.1/Hash and its corresponding TSS section in the ST. The TOE leverages the IOS Common Criteria Module (IC2M) Rel5 and this implementation has been validated in the original evaluation as conforming to FIPS 180-4, Secure Hash Standard. The CAVP Cert # 3760 already lists SHA-384 as one of the capabilities of this implementation. This change is judged as minor as it does not have a security impact on the evaluated TOE as it is merely updating the evidence to correct an oversight.
  • Software changes to the TOE involve updating IOS-XE to version 16.3.6 to accommodate bug fixes and vulnerabilities outlined below. 
  • Twenty-two CVEs were found during a recent search for known vulnerabilities. Eighteen CVEs related to Denial of Service, elevated privileges, remote code execution, and unauthorized access were patched by the vendor. Two CVEs related to Denial of Service and remote code execution do not apply to the TOE.  The last two CVEs are related to the IOS Autonomic Networking feature which cannot be deployed with the TOE. 

Regression Testing:
There was no regression testing necessary to address the changes since there were no changes to any SFR functionality. The patches to address the eighteen applicable CVEs were considered to be minor bug fixes, and product testing was done after the fixes for the CVEs were implemented.

Vendor Information

Cisco Systems, Inc.
Marek Radomski
Site Map              Contact Us              Home