{"product_id":11577,"v_id":11577,"product_name":"Motorola Mobility LLC Mobile Devices on Android 14","certification_status":"Certified","certification_date":"2025-06-06T00:00:00Z","tech_type":"Biometrics,Mobility,Network Encryption,Wireless LAN","vendor_id":{"name":"Motorola Mobility LLC","website":"www.motorola.com"},"vendor_poc":"Ajit Panda","vendor_phone":"847-208-1820","vendor_email":"security@motorola.com","assigned_lab":{"cctl_name":"Gossamer Security Solutions"},"product_description":"<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\">The Target of Evaluation (TOE) is Motorola Mobility LLC Mobile Devices on Android 14.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Calibri, sans-serif;\"><span style=\"font-family: 'Times New Roman', serif; color: black;\">The Motorola Mobility LLC Devices are end-user mobile devices.&nbsp; The TOE allows basic telephony features (make and receive phone calls, send and receive SMS/MMS messages) as well as advanced network connectivity (allowing connections to both 802.11 Wi-Fi and 2G/3G/4G LTE/5G mobile data networks). The Devices use the Android operating system, providing access to applications from the Google Play store. The TOE supports using client certificates to connect to access points offering WPA2/WPA3 networks with 802.1x/EAP-TLS, or alternatively connecting to cellular base stations when utilizing mobile data.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Calibri, sans-serif;\"><span style=\"font-size: 10.0pt; font-family: Times, serif;\">The TOE offers mobile applications an Application Programming Interface (API) including that provided by the Android framework and supports API calls to the Android Management APIs.</span></p>","evaluation_configuration":"<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Calibri, sans-serif;\"><span style=\"font-family: 'Times New Roman', serif;\">This evaluation includes the following models and versions:</span></p>\r\n<table class=\"MsoNormalTable\" style=\"width: 646px; margin-left: 5.65pt; border-collapse: collapse;\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\r\n<tbody>\r\n<tr style=\"height: 27.8pt;\">\r\n<td style=\"width: 105.0pt; border: solid #C0504D 1.0pt; background: #C0504D; padding: 0in 5.4pt 0in 5.65pt;\" valign=\"top\">\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Calibri, sans-serif;\"><a name=\"_Hlk166668588\"></a><strong><span style=\"color: white;\">Product</span></strong></p>\r\n</td>\r\n<td style=\"width: 69.1pt; border: solid #C0504D 1.0pt; border-left: none; background: #C0504D; padding: 0in .5pt 0in .5pt;\" valign=\"top\">\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Calibri, sans-serif;\"><strong><span style=\"font-size: 9.0pt; color: white;\">Model Number</span></strong></p>\r\n</td>\r\n<td style=\"width: 104.9pt; border: solid #C0504D 1.0pt; border-left: none; background: #C0504D; padding: 0in .5pt 0in .5pt;\" valign=\"top\">\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Calibri, sans-serif;\"><strong><span style=\"font-size: 9.0pt; color: white;\">CPU</span></strong></p>\r\n</td>\r\n<td style=\"width: 43.75pt; border: solid #C0504D 1.0pt; border-left: none; background: #C0504D; padding: 0in .5pt 0in .5pt;\" valign=\"top\">\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Calibri, sans-serif;\"><strong><span style=\"color: white;\">Arch</span></strong></p>\r\n</td>\r\n<td style=\"width: 28.6pt; border: solid #C0504D 1.0pt; border-left: none; background: #C0504D; padding: 0in .5pt 0in .5pt;\" valign=\"top\">\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Calibri, sans-serif;\"><strong><span style=\"color: white;\">Kernel</span></strong></p>\r\n</td>\r\n<td style=\"width: 52.35pt; border: solid #C0504D 1.0pt; border-left: none; background: #C0504D; padding: 0in 5.4pt 0in 5.65pt;\" valign=\"top\">\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Calibri, sans-serif;\"><strong><span style=\"color: white;\">Android OS version</span></strong></p>\r\n</td>\r\n<td style=\"width: 81.05pt; border: solid #C0504D 1.0pt; border-left: none; background: #C0504D; padding: 0in 5.4pt 0in 5.65pt;\" valign=\"top\">\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Calibri, sans-serif;\"><strong><span style=\"color: white;\">Security Patch Level</span></strong></p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 26.95pt;\">\r\n<td style=\"width: 105.0pt; border: solid #C0504D 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.65pt;\" valign=\"top\">\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\">Motorola Edge 2024</p>\r\n</td>\r\n<td style=\"width: 69.1pt; border-top: none; border-left: none; border-bottom: solid #C0504D 1.0pt; border-right: solid #C0504D 1.0pt; padding: 0in .5pt 0in .5pt;\" valign=\"top\">\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\">XT2405-1</p>\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\">XT2405V</p>\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\">XT2307-1</p>\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\">XT2307-2</p>\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\">XT2307-3</p>\r\n</td>\r\n<td style=\"width: 104.9pt; border-top: none; border-left: none; border-bottom: solid #C0504D 1.0pt; border-right: solid #C0504D 1.0pt; padding: 0in .5pt 0in .5pt;\" valign=\"top\">\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\">Qualcomm Snapdragon 7s Gen 2 (SM7435)</p>\r\n</td>\r\n<td style=\"width: 43.75pt; border-top: none; border-left: none; border-bottom: solid #C0504D 1.0pt; border-right: solid #C0504D 1.0pt; padding: 0in .5pt 0in .5pt;\" valign=\"top\">\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\">ARMv8</p>\r\n</td>\r\n<td style=\"width: 28.6pt; border-top: none; border-left: none; border-bottom: solid #C0504D 1.0pt; border-right: solid #C0504D 1.0pt; padding: 0in .5pt 0in .5pt;\" valign=\"top\">\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\">5.10</p>\r\n</td>\r\n<td style=\"width: 52.35pt; border-top: none; border-left: none; border-bottom: solid #C0504D 1.0pt; border-right: solid #C0504D 1.0pt; padding: 0in 5.4pt 0in 5.65pt;\" valign=\"top\">\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\">Android 14</p>\r\n</td>\r\n<td style=\"width: 81.05pt; border-top: none; border-left: none; border-bottom: solid #C0504D 1.0pt; border-right: solid #C0504D 1.0pt; padding: 0in 5.4pt 0in 5.65pt;\" valign=\"top\">\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\">May 2025</p>\r\n</td>\r\n</tr>\r\n</tbody>\r\n</table>","security_evaluation_summary":"<p><span style=\"font-size: 10.0pt; font-family: Times, serif;\">The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) requirements and guidance.&nbsp; The evaluation demonstrated that the TOE<em> </em>meets the security requirements contained in the Security Target.&nbsp; The criteria against which the TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5, April 2017. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Evaluation Methodology, Version 3.1, Revision 5, April 2017.&nbsp; The product, when delivered and configured as identified in the Motorola Mobility LLC Mobile Devices on Android 14 Administrator Guidance Documentation, Version 0.2 June 3, 2025, satisfies all of the security functional requirements stated in the Motorola Mobility LLC Mobile Devices on Android 14 Security Target, Version 0.4, June 3, 2025.&nbsp; The project underwent CCEVS Validator review.&nbsp; The evaluation was completed in June 2025.&nbsp; Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report (report number CCEVS-VR-VID11577-2025) prepared by CCEVS.</span></p>","environmental_strengths":"<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">The logical boundaries of the Motorola Mobility LLC Mobile Devices on Android 14 are realized in the security functions that it implements. Each of these security functions is summarized below.</p>\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Security audit:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\"><span style=\"color: black;\">The TOE implements a security log and logcat that are each stored in a circular memory buffer.&nbsp; An MDM agent can read/fetch the security logs, can retrieve logcat logs, and then handle appropriately (potentially storing the log to Flash or transmitting its contents to the MDM server).&nbsp; These log methods meet the logging requirements outlined by FAU_GEN.1 in MDFPPv3.3.</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Cryptographic support:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">The TOE includes multiple cryptographic libraries with CAVP certified algorithms for a wide range of cryptographic functions including the following: asymmetric key generation and establishment, symmetric key generation, encryption/decryption, cryptographic hashing and keyed-hash message authentication. These functions are supported with suitable random bit generation, key derivation, salt generation, initialization vector generation, secure key storage, and key and protected data destruction. These primitive cryptographic functions may be used to implement security protocols such as TLS, EAP-TLS, IPsec, and HTTPS and to encrypt the media (including the generation and protection of data and key encryption keys) used by the TOE. Many of these cryptographic functions are also accessible as services to applications running on the TOE <span style=\"color: black;\">allowing application developers to ensure their application meets the required criteria to remain compliant to MDFPP standards.</span></p>\r\n<p style=\"text-align: justify; break-after: avoid; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>User data protection:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\"><span style=\"color: black;\">The TOE controls access to system services by hosted applications, including protection of the Trust Anchor Database. Additionally, the TOE protects user and other sensitive data using File-Based Encryption (FBE) so that even if a device is physically lost, the data remains protected. The TOE&rsquo;s evaluated configuration supports Android Enterprise profiles to provide additional separation between application and application data belonging to the Enterprise profile.&nbsp; Please see the Admin Guide for additional details regarding how to set up and use Enterprise profiles.</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Identification and authentication:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE supports a number of features related to identification and authentication. From a user perspective, except for FCC mandated (making phone calls to an emergency number) or non-sensitive functions (e.g., choosing the keyboard input method or taking screen shots), a password (i.e., Password Authentication Factor) must be correctly entered to unlock the TOE. Also, even when unlocked, the TOE requires the user re-enter the password to change the password.&nbsp; Passwords are obscured when entered so they cannot be read from the TOE's display and the frequency of entering passwords is limited and when a configured number of failures occurs, the TOE will be wiped to protect its contents.&nbsp; Passwords can be constructed using upper and lower cases characters, numbers, and special characters and passwords up to 16 characters are supported.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE can also serve as an 802.1X supplicant and can both use X.509v3 and validate certificates for EAP-TLS, TLS, and HTTPS exchanges.</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Security management:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Calibri, sans-serif;\"><span style=\"font-family: Times, serif; color: black;\">The TOE provides all the interfaces necessary to manage the security functions identified throughout this Security Target as well as other functions commonly found in mobile devices. Many of the available functions are available to users of the TOE while many are restricted to administrators operating through a Mobile Device Management solution once the TOE has been enrolled.</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Protection of the TSF:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Calibri, sans-serif;\"><span style=\"font-family: Times, serif; color: black;\">The TOE implements a number of features to protect itself to ensure the reliability and integrity of its security features. It protects particularly sensitive data such as cryptographic keys so that they are not accessible or exportable through the use of the application processor&rsquo;s hardware.&nbsp; The TOE disallows all read access to the Root Encryption Key and retains all keys derived from the REK within its Trusted Execution Environment (TEE).&nbsp; Application software can only use keys derived from the REK by reference and receive the result.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Calibri, sans-serif;\"><span style=\"font-family: Times, serif; color: black;\">The TOE also provides its own timing mechanism to ensure that reliable time information is available (e.g., for log accountability). It enforces read, write, and execute memory page protections, uses address space layout randomization, and stack-based buffer overflow protections to minimize the potential to exploit application flaws. It also protects itself from modification by applications as well as to isolate the address spaces of applications from one another to protect those applications.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Calibri, sans-serif;\"><span style=\"font-family: Times, serif; color: black;\">The TOE includes functions to perform self-tests and software/firmware integrity checking so that it might detect when it is failing or may be corrupt. If any self-tests fail, the TOE will not go into an operational mode. It also includes mechanisms (i.e., verification of the digital signature of each new image) so that the TOE itself can be updated while ensuring that the updates will not introduce malicious or other unexpected changes in the TOE. Digital signature checking also extends to verifying applications prior to their installation as all applications must have signatures (even if self-signed).</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>TOE access:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Calibri, sans-serif;\"><span style=\"font-family: Times, serif; color: black;\">The TOE can be locked, obscuring its display, by the user or after a configured interval of inactivity. The TOE also has the capability to display an administrator specified (using the TOE&rsquo;s MDM API) advisory message (banner) when the user unlocks the TOE for the first use after reboot.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Calibri, sans-serif;\"><span style=\"font-family: Times, serif; color: black;\">The TOE is also able to attempt to connect to wireless networks as configured.</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Trusted path/channels:</strong></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 10.0pt; font-family: 'Times New Roman', serif; color: black;\">The TOE supports the use of IEEE 802.11-2012, 802.1X, and EAP-TLS and TLS, HTTPS to secure communications channels between itself and other trusted network devices.</span></p>","features":[{"id":2953,"feature_name":"Asymmetric Key Generation"},{"id":2967,"feature_name":"Auditing"},{"id":2965,"feature_name":"Biometrics"},{"id":2966,"feature_name":"Bluetooth"},{"id":2952,"feature_name":"Certificate Authentication"},{"id":2951,"feature_name":"Certificate Validation"},{"id":2955,"feature_name":"Cryptographic Hashing"},{"id":2954,"feature_name":"Cryptographic Key Establishment"},{"id":2957,"feature_name":"Cryptographic Signature Generation"},{"id":2958,"feature_name":"Cryptographic Signature Verification"},{"id":2947,"feature_name":"DRBG"},{"id":2948,"feature_name":"EAP-TLS"},{"id":2949,"feature_name":"HTTPS Client"},{"id":2968,"feature_name":"Key Destruction"},{"id":2956,"feature_name":"Keyed-hash message authentication"},{"id":2946,"feature_name":"Mobile Device"},{"id":2950,"feature_name":"Multifactor Authentication"},{"id":2963,"feature_name":"TLS 1.2"},{"id":2964,"feature_name":"TLS Client"},{"id":2960,"feature_name":"Wi-Fi 6"},{"id":2959,"feature_name":"WLAN Client"},{"id":2962,"feature_name":"WPA2"},{"id":2961,"feature_name":"WPA3"}]}