{"product_id":11624,"v_id":11624,"product_name":"Apple iPadOS 18: iPad","certification_status":"Certified","certification_date":"2025-12-15T00:00:00Z","tech_type":"Biometrics,Mobility,Network Encryption,Virtual Private Network,Wireless LAN,Wireless PAN","vendor_id":{"name":"Apple Inc.","website":"https://support.apple.com/guide/certifications/welcome/web"},"vendor_poc":"Natalya Robert","vendor_phone":null,"vendor_email":"n_robert@apple.com","assigned_lab":{"cctl_name":"atsec information security corporation"},"product_description":"<p>The Target of Evaluation (TOE) is Apple iPadOS 18: iPad, which is a series of Apple iPad mobile devices running the iPadOS 18 operating system, a Mobile Device Management (MDM) Agent, VPN client, and WLAN client components, which are included on the mobile devices.<s> </s></p>\r\n<p>The TOE operating system manages the device hardware, provides MDM Agent functionality, and provides the technologies required to implement native applications. It provides a built-in MDM framework application programmer interface (API), giving management features that may be utilized by external MDM solutions, allowing enterprises to use profiles to control some of the device settings.</p>\r\n<p>The TOE operating system provides a consistent set of capabilities allowing the supervision of enrolled devices. This includes the preparation of devices for deployment, the subsequent management of the devices, and the termination of management.</p>\r\n<p>The tested version of the TOE is iPadOS 18.3.1 with vulnerabilities patched up to iPadOS 18.7.3.</p>","evaluation_configuration":"<p style=\"text-align: center;\"><strong>Devices Covered by the Evaluation</strong></p>\r\n<div align=\"center\">\r\n<table style=\"width: 100.0%;\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\r\n<tbody>\r\n<tr style=\"height: 23.2pt;\">\r\n<td style=\"width: 23.66%;\">\r\n<p><strong>Processor</strong></p>\r\n</td>\r\n<td style=\"width: 43.88%;\">\r\n<p><strong>Device Name</strong></p>\r\n</td>\r\n<td style=\"width: 32.46%;\">\r\n<p><strong>Model Number</strong></p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 23.66%;\" rowspan=\"4\">\r\n<p>A13 Bionic</p>\r\n</td>\r\n<td style=\"width: 43.88%;\" rowspan=\"4\">\r\n<p>iPad 10.2-inch</p>\r\n<p>(9<sup>th</sup> Gen)</p>\r\n</td>\r\n<td style=\"width: 32.46%;\">\r\n<p>A2602</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A2603</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A2604</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A2605</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 23.66%;\" rowspan=\"7\">\r\n<p>A14 Bionic</p>\r\n</td>\r\n<td style=\"width: 43.88%;\" rowspan=\"4\">\r\n<p>iPad Air</p>\r\n<p>(4<sup>th</sup> Gen)</p>\r\n</td>\r\n<td style=\"width: 32.46%;\">\r\n<p>A2072</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A2316</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A2324</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A2325</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 43.88%;\" rowspan=\"3\">\r\n<p>iPad 10.9 inch</p>\r\n<p>(10<sup>th</sup> Gen)</p>\r\n</td>\r\n<td style=\"width: 32.46%;\">\r\n<p>A2696</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A2757</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A2777</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 23.66%;\" rowspan=\"3\">\r\n<p>A15 Bionic</p>\r\n</td>\r\n<td style=\"width: 43.88%;\" rowspan=\"3\">\r\n<p>iPad mini</p>\r\n<p>(6<sup>th</sup> Gen)</p>\r\n</td>\r\n<td style=\"width: 32.46%;\">\r\n<p>A2567</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A2568</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A2569</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 23.66%;\" rowspan=\"3\">\r\n<p>A17 Pro</p>\r\n</td>\r\n<td style=\"width: 43.88%;\" rowspan=\"3\" valign=\"top\">\r\n<p>iPad mini</p>\r\n<p>(7<sup>th</sup> Gen)</p>\r\n</td>\r\n<td style=\"width: 32.46%;\">\r\n<p>A2995</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A2993</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A2996</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 23.66%;\" rowspan=\"11\">\r\n<p>M1</p>\r\n</td>\r\n<td style=\"width: 43.88%;\" rowspan=\"4\">\r\n<p>iPad Pro 11-inch</p>\r\n<p>(3<sup>rd</sup> Gen)</p>\r\n</td>\r\n<td style=\"width: 32.46%;\">\r\n<p>A2301</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 17.95pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A2377</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 17.95pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A2459</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A2460</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 43.88%;\" rowspan=\"4\">\r\n<p>iPad Pro 12.9-inch</p>\r\n<p>(5<sup>th</sup> Gen)</p>\r\n</td>\r\n<td style=\"width: 32.46%;\">\r\n<p>A2378</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A2379</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A2461</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A2462</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 43.88%;\" rowspan=\"3\">\r\n<p>iPad Air</p>\r\n<p>(5<sup>th</sup> Gen)</p>\r\n</td>\r\n<td style=\"width: 32.46%;\">\r\n<p>A2588</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A2589</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A2591</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 23.66%;\" rowspan=\"8\">\r\n<p>M2</p>\r\n</td>\r\n<td style=\"width: 43.88%;\" rowspan=\"4\">\r\n<p>iPad Pro 11-inch</p>\r\n<p>(4<sup>th</sup> Gen)</p>\r\n</td>\r\n<td style=\"width: 32.46%;\">\r\n<p>A2435</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A2759</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A2761</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A2762</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 43.88%;\" rowspan=\"4\">\r\n<p>iPad Pro 12.9-inch</p>\r\n<p>(6<sup>th</sup> Gen)</p>\r\n</td>\r\n<td style=\"width: 32.46%;\">\r\n<p>A2436</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A2437</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A2764</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A2766</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 23.66%;\" rowspan=\"6\" valign=\"top\">\r\n<p>M4</p>\r\n</td>\r\n<td style=\"width: 43.88%;\" rowspan=\"3\" valign=\"top\">\r\n<p>iPad Pro 13-inch (M4)</p>\r\n</td>\r\n<td style=\"width: 32.46%;\">\r\n<p>A2926</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A2925</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A3007</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 43.88%;\" rowspan=\"3\" valign=\"top\">\r\n<p>iPad Pro 11-inch (M4)</p>\r\n</td>\r\n<td style=\"width: 32.46%;\">\r\n<p>A2837</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A2836</p>\r\n</td>\r\n</tr>\r\n<tr style=\"height: 15.85pt;\">\r\n<td style=\"width: 32.46%;\">\r\n<p>A3006</p>\r\n</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n</div>","security_evaluation_summary":"<p>The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process. The criteria against which the Apple iPadOS 18: iPad TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1 R5. The evaluation methodology used by the evaluation team to conduct the evaluation was the Common Methodology for Information Technology Security Evaluation, Version 3.1, R5 supplemented by that found in the Protection Profiles cited above. The product, when delivered and configured as specified in the <em>Apple iOS 18: iPhone and Apple iPadOS 18: iPad Common Criteria Configuration Guide document, version 1.1</em>, satisfies all the security functional requirements stated in the <em>Apple iPadOS 18: iPad</em><em> Security Target, version </em><em>1.1</em>. The evaluation was completed in December&nbsp; 2025. Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report number CCEVS-VR-VID11624-2025 prepared by CCEVS.</p>","environmental_strengths":"<h3>Security Audit</h3>\r\n<p>The TOE provides the ability for responses to be sent from the MDM Device Agent to the MDM Server. These responses are configurable by the organization.</p>\r\n<h3>Cryptographic Support</h3>\r\n<p>The TOE provides cryptographic services via the following cryptographic modules for the encryption of data at rest, for secure communication channels, and for use by applications. In addition, the TOE implements a number of cryptographic protocols that can be used to establish a trusted channel to other IT entities.</p>\r\n<ul>\r\n<li>Apple corecrypto Module v18 [Apple silicon, User, Software, SL1] (User Space)</li>\r\n<li>Apple corecrypto Module v18 [Apple silicon, Kernel, Software, SL1] (Kernel Space)</li>\r\n<li>Apple corecrypto Module v18 [Apple silicon, Secure Key Store, Hardware, SL2] (SKS)</li>\r\n</ul>\r\n<h3>User Data Protection</h3>\r\n<p>The TOE protects user data in files using cryptographic functions, ensuring this data remains protected even if the device gets lost or is stolen. Critical data (like passcodes used by apps or application-defined cryptographic keys) can be stored in the keychain, which provides additional protection. Passcode protection and encryption ensure that data at rest remains protected even in the case of the device being lost or stolen.</p>\r\n<p>The TOE includes the Secure Enclave Processor (SEP), a separate CPU that executes a stand-alone operating system and has separate memory, provides protection for critical security data such as keys.</p>\r\n<p>The TOE protects data such that only the app that owns the data can access it.</p>\r\n<h3>Identification and Authentication</h3>\r\n<p>The TOE provides user authentication using a passcode or biometric (fingerprint or face) except for accessing Medical ID information, answering calls, making emergency calls, using the cameras, flashlight, control center or notification center, viewing widgets in Today View and search.</p>\r\n<p>The passcode can be configured for a minimum length, for dedicated passcode policies, and for a maximum lifetime. When entered, passcodes are obscured and the frequency of entering passcodes is limited as well as the number of consecutive failed attempts of entering the passcode.</p>\r\n<p>The TOE also enters a locked state after a (configurable) time of user inactivity and the user is required to either enter his passcode or use biometric authentication (fingerprint or face) to unlock the TOE</p>\r\n<p>External entities connecting to the TOE via a secure protocol (e.g., Transport Layer Security (TLS), Extensible Authentication Protocol Transport Layer Security (EAP-TLS), IPsec) can be authenticated using X.509 certificates. The TOE also supports the usage of Post-quantum Preshared Keys in&nbsp;the IKEv2 protocol.</p>\r\n<h3>Security Management</h3>\r\n<p>The security functions listed in the Security Target can be managed either by the user or by an authorized administrator through a Mobile Device Management (MDM) system. The Security Target identifies the functions that can be managed and indicates if the management can be performed by the user, by the authorized administrator, or both.</p>\r\n<h3>TOE Security Functionality (TSF) Protection</h3>\r\n<p>The TOE implements the following protection of TSF and TSF data:</p>\r\n<ul>\r\n<li>Protection of cryptographic keys&mdash;keys used for TOE internal key wrapping and for the protection of data at rest are not exportable. There are provisions for fast and secure wiping of key material</li>\r\n<li>Use of memory protection and processor states to separate apps and protect the TSF from unauthorized access to TSF resources&mdash;in addition, each device includes a separate system called the SEP which is the only system that can use the Root Encryption Key (REK). The SEP is a separate CPU that executes a stand-alone operating system and has separate memory.</li>\r\n<li>Digital signature protection of the TSF image&mdash;all updates to the TSF need to be digitally signed</li>\r\n<li>Software/firmware integrity self-test upon start-up&mdash;the TOE will not go operational when this test fails.</li>\r\n<li>Digital signature verification for apps</li>\r\n<li>Access to defined TSF data and TSF services only when the TOE is unlocked</li>\r\n</ul>\r\n<h3>TOE Access</h3>\r\n<p>The TSF provides functions to lock the TOE upon request and after an administrator-configurable time of inactivity. Access to the TOE via a wireless network is controlled by user/administrator defined policy.</p>\r\n<p><strong>Trusted Path/Channels</strong></p>\r\n<p>The TOE supports the use of the following cryptographic protocols that define a trusted channel between itself and another trusted IT product:</p>\r\n<ul>\r\n<li>IEEE 802.11-2012</li>\r\n<li>IEEE 802.11ac-2013 (a.k.a. Wi-Fi 5)</li>\r\n<li>IEEE 802.11ax (a.k.a. Wi-Fi 6)</li>\r\n<li>EE 802.11be (a.k.a. Wi-Fi 7)</li>\r\n<li>IEEE 802.1X</li>\r\n<li>EAP-TLS</li>\r\n<li>TLS</li>\r\n<li>IPsec</li>\r\n<li>Bluetooth</li>\r\n<li>HTTPS</li>\r\n</ul>","features":[{"id":2147,"feature_name":"Asymmetric Key Generation"},{"id":2994,"feature_name":"Auditing"},{"id":2159,"feature_name":"Biometrics"},{"id":2164,"feature_name":"Bluetooth"},{"id":2146,"feature_name":"Certificate Authentication"},{"id":2145,"feature_name":"Certificate Validation"},{"id":2149,"feature_name":"Cryptographic Hashing"},{"id":2148,"feature_name":"Cryptographic Key Establishment"},{"id":2151,"feature_name":"Cryptographic Signature Generation"},{"id":2152,"feature_name":"Cryptographic Signature Verification"},{"id":2141,"feature_name":"DRBG"},{"id":2142,"feature_name":"EAP-TLS"},{"id":2143,"feature_name":"HTTPS Client"},{"id":2167,"feature_name":"IKEv2"},{"id":2166,"feature_name":"IPsec"},{"id":2995,"feature_name":"Key Destruction"},{"id":2150,"feature_name":"Keyed-hash message authentication"},{"id":2155,"feature_name":"MDM-Agent"},{"id":17,"feature_name":"Mobile Device"},{"id":2144,"feature_name":"Multifactor Authentication"},{"id":2156,"feature_name":"TLS 1.2"},{"id":2157,"feature_name":"TLS Client"},{"id":2165,"feature_name":"VPN Client"},{"id":2161,"feature_name":"Wi-Fi 6"},{"id":2160,"feature_name":"WLAN Client"},{"id":2163,"feature_name":"WPA2"},{"id":2162,"feature_name":"WPA3"}]}