Assurance Continuity - Xerox® AltaLink™ C8130, C8135, C8145, C8155, C8170 & B8145, B8155, B8170 with SSD
CC Certificate
Validation Report
Assurance Activity
Administrative Guide
Please note:
The above files are for the Original Evaluated TOE.
Consequently, they do not refer to this maintained version, although they apply to the maintained version.
Security Target
*
Assurance Continuity Maintenance Report
Please note:
This serves as an addendum to the VR for the Original Evaluated TOE.
*
This is the Security Target (ST) associated with this latest Maintenance Release.
To view previous STs for this TOE, click here.
Readers are reminded that the certification of this product (TOE) is the result of maintenance, rather than an actual re-evaluation of the product.
Maintenance only considers the affect of TOE changes on the assurance baseline (i.e. the original evaluated TOE);
maintenance is not intended to provide assurance in regard to the resistance of the TOE to new vulnerabilities or attack methods discovered since the date of the initial certificate.
Such assurance can only be gained through re-evaluation.
Using a security impact analysis of the changes made to the TOE, which was provided by the developer, the CCEVS has determined that the impact of changes on the TOE are considered minor and that independent evaluator analysis was not necessary.
A summary of the results can be found in the Maintenance Report, which is written in relation to the product's original validation report and Security Target.
Readers are therefore reminded to read the Security Target, Validation Report, and the Assurance Maintenance Report to fully understand the meaning of what a maintained certificate represents.
Product Description
The changes made to the Xerox® AltaLink™ C8130, C8135, C8145, C8155, C8170 & B8145, B8155, B8170 with SSD since the previous Assurance Maintenance Activity in September 2021 (CCEVS-VR-VID11149-2021) are described here.
o The Xerox® AltaLink™ C8130, C8135, C8145, C8155, C8170 & B8145, B8155, B8170 with SSD system software was updated from versions 111.011.011.12103 and 111.013.011.12103 to versions 111.009.003.11600, 111.010.003.11600, 111.011.003.11600, 111.013.003.11600, and 111.014.003.11600.
o The software updates included non-security relevant features and bug fixes that have no design or functional impact. The software updates and their effects and relevance are summarized below.
o ST updated to show the full breakdown of firmware versions, to include added reference to firmware versions for AltaLink™ C8130 / C8135 (111.009.003.11600), AltaLink™ C8145 / C8155 (111.010.003.11600), and AltaLink™ B8170 (111.014.003.11600). (See section Equivalency Discussion)
Changes to the TOE
The software update address non-security relevant aspects of the Multi-Function Devices (MFDs) described in the table below.
Xerox Ref
|
Summary
|
TSF Impact
|
DAR-719947
|
SB20-286 CVE-2020-25641- A flaw was found in the Linux kernel's implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service.
|
Vulnerability patch. No design or functional impact.
|
DAR-719948,
DAR-719949
|
SB20-342 CVE-2020-29369 CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
SB20-139 CVE-2019-20795 Detail iproute2 before 5.1.0 has a use-after-free in get netnsid_from_name in ip/ipnetns.c.
|
Vulnerability patch. No design or functional impact.
|
DAR-719952
|
SB21-144 Security (NIST 2.9) SB21-144 CVE-2020-24588 CVE-2020-24587 (WiFi)
CVE-2020-24588 The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. CVE-2020-24587 The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.
|
Vulnerability patch. No design or functional impact.
Wireless is disabled.
|
DAR-720730
|
Statuses are set and not cleared after clearing the Jam by IIT.
When a jam occurs in the top of the DADH for Corvo/Kiska mid/Low, LUI graphics are displayed same as high. Mid/Low devices are displaying High machine graphics in LUI.
|
Bug fix. No design or functional impact.
|
DAR-720732
|
"Doorbell failure" and "Doorbell reject",triggers incorrect faults.
While referring RAP manual for Verifying the Fault Codes Specific to CORVO/KISKA in eDoc, RAP is incorrect for "62.792.00: Side 1 doorbell failure", "62.790.00: Side 1 doorbell reject". The fix is to correct that.
|
Bug fix. No design or functional impact.
|
DAR-721216
|
Security Fixes for web injection defect.
EIP iconUri parameters were not validated.
|
Vulnerability patch. No design or functional impact.
|
DAR-722129
|
Due to component shortage we need to enable Realtek RTL8211F-CG for Corvo/Kiska Cougar v1.6.5 Impacted S/S OS team -- OS has to enable the Driver. Ensure we can detect which chip is installed and load the correct driver.
|
Replacement of physical layer Ethernet chip.
No design or functional impact.
|
DAR-723511
|
Port to D.5.1 SWUP (software upgrade) code to support Scanner Maxim chip. Part of Maxim chip support.
|
Scanner chip software update – no TSF relevance. No design or functional impact.
|
DAR-726052
|
Security fix for unauthenticated access to the Properties Page which was possible for the Guest User via Cross-site request forgery.
|
Vulnerability patch. No design or functional impact.
Note: Guest User is disabled in the evaluated configuration.
|
DAR-728065
|
Add the HW Configuration (Maxim, Realtek) info to SBC Name. This information is included in the ConfigSettings.xml retrieved by Remote Services.
|
No impact. Remotes Services (SMart eSolutions) is disabled in the evaluated configuration.
|
DAR-734982
|
Security LDAP Password not Expunged so it can be stolen (Secure LDAP (LDAP over TLS is OK)
Fix is to expunge password when new credentials entered.
|
Vulnerability patch. No design or functional impact.
Evaluated configuration uses LDAP over TLS which was not affected.
|
DAR-735333
|
The ECDSA Xerox Generic Root CA is not displaying under Server validation for IPSec IKE auth with Digital Certs.
|
None – evaluated configuration on supports RSA and Pre-shared leys.
|
DAR-737423
|
Support Cudy WiFi dongle. The change involves adding the Cudy vendor and product ID to connControl and OS udev rule, so that the dongle can be recognized.
|
No impact – dongle use outside of the evaluated configuration.
|
DAR-737741
|
Normal print Job went for Paused state. LUI didn’t prompted to replace a Magenta toner, but in EWIS notified that" The Magenta Toner (M) is empty. User intervention is required to replace the Magenta Toner (M).
LUI must display the prompt to replace toner. " The Magenta Toner (M) is empty. User intervention is required to replace the Magenta Toner (M).
|
Bug fix. No design or functional impact.
|
DAR-737753
|
20us ARM reset done by Copy Controller Software when it starts up.
During PowerOn assert iitPltnReset for 3 seconds to remove 24V power
|
Bug fix. No TSF impact - The ARM auxiliary processor manages the scanner portion of the image path.
|
DAR-746336
|
HTML injection Vulnerability found in Workflow scanning/ Header tag should not reflect in the browser, and it should not accept the invalid charters.
Burpsuite, webinspect detected.
|
Vulnerability patch. No design or functional impact.
|
DAR-746405
|
https:///web_srvc/applicationTestResults.php is vulnerable to XSS
|
Vulnerability patch. No design or functional impact.
|
Vendor Information
Xerox
Mike Kirby 5854276774
michael.kirby@xerox.com
www.xerox.com
|