NIAP: Assurance Continuity
NIAP/CCEVS
  NIAP  »»  Product Compliant List  »»  Product Entry  »»  Assurance Continuity  
Assurance Continuity - Xerox® AltaLink™ C8130, C8135, C8145, C8155, C8170 & B8145, B8155, B8170 with SSD

Date of Maintenance Completion:  2023.08.03

Product Type:    Multi Function Device

Conformance Claim:  Protection Profile Compliant

PP Identifier:    Protection Profile for Hardcopy Devices Version 1.0

Original Evaluated TOE:  2021.08.20 - Xerox® AltaLink™ C8130, C8135, C8145, C8155, C8170 & B8145, B8155, B8170 with SSD

CC Certificate [PDF] Validation Report [PDF] Assurance Activity [PDF]

Administrative Guide [PDF]

Please note:  The above files are for the Original Evaluated TOE.  Consequently, they do not refer to this maintained version, although they apply to the maintained version. 

Security Target [PDF] * Assurance Continuity Maintenance Report [PDF]

Please note:  This serves as an addendum to the VR for the Original Evaluated TOE. 

* This is the Security Target (ST) associated with this latest Maintenance Release.  To view previous STs for this TOE, click here.

Readers are reminded that the certification of this product (TOE) is the result of maintenance, rather than an actual re-evaluation of the product.  Maintenance only considers the affect of TOE changes on the assurance baseline (i.e. the original evaluated TOE); maintenance is not intended to provide assurance in regard to the resistance of the TOE to new vulnerabilities or attack methods discovered since the date of the initial certificate.  Such assurance can only be gained through re-evaluation. 

Using a security impact analysis of the changes made to the TOE, which was provided by the developer, the CCEVS has determined that the impact of changes on the TOE are considered minor and that independent evaluator analysis was not necessary.  A summary of the results can be found in the Maintenance Report, which is written in relation to the product's original validation report and Security Target.  Readers are therefore reminded to read the Security Target, Validation Report, and the Assurance Maintenance Report to fully understand the meaning of what a maintained certificate represents. 

Product Description

The changes made to the Xerox® AltaLink™ C8130, C8135, C8145, C8155, C8170 & B8145, B8155, B8170 with SSD since the previous Assurance Maintenance Activity in September 2021 (CCEVS-VR-VID11149-2021) are described here.

o    The Xerox® AltaLink™ C8130, C8135, C8145, C8155, C8170 & B8145, B8155, B8170 with SSD system software was updated from versions 111.011.011.12103 and 111.013.011.12103 to versions 111.009.003.11600, 111.010.003.11600, 111.011.003.11600, 111.013.003.11600, and 111.014.003.11600.

o   The software updates included non-security relevant features and bug fixes that have no design or functional impact. The software updates and their effects and relevance are summarized below.

o    ST updated to show the full breakdown of firmware versions, to include added reference to firmware versions for AltaLink™ C8130 / C8135 (111.009.003.11600), AltaLink™ C8145 / C8155 (111.010.003.11600), and AltaLink™ B8170 (111.014.003.11600). (See section Equivalency Discussion)

Changes to the TOE

The software update address non-security relevant aspects of the Multi-Function Devices (MFDs) described in the table below.

Xerox Ref

Summary

TSF Impact

DAR-719947

 

SB20-286 CVE-2020-25641- A flaw was found in the Linux kernel's implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service.

Vulnerability patch. No design or functional impact.

DAR-719948,

DAR-719949

SB20-342 CVE-2020-29369
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.

SB20-139  CVE-2019-20795 Detail
iproute2 before 5.1.0 has a use-after-free in get netnsid_from_name in ip/ipnetns.c.

 

Vulnerability patch. No design or functional impact.

DAR-719952

 

SB21-144 Security (NIST 2.9) SB21-144 CVE-2020-24588 CVE-2020-24587 (WiFi)

CVE-2020-24588
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
CVE-2020-24587
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.

Vulnerability patch. No design or functional impact.

Wireless is disabled.

DAR-720730

 

Statuses are set and not cleared after clearing the Jam by IIT.

When a jam occurs in the top of the DADH for Corvo/Kiska mid/Low, LUI graphics are displayed same as high. Mid/Low devices are displaying High machine graphics in LUI.

 

Bug fix. No design or functional impact.

DAR-720732

 

"Doorbell failure" and "Doorbell reject",triggers incorrect faults.

While referring RAP manual for Verifying the Fault Codes Specific to CORVO/KISKA in eDoc, RAP is incorrect for "62.792.00: Side 1 doorbell failure", "62.790.00: Side 1 doorbell reject". The fix is to correct that.

 

Bug fix. No design or functional impact.

DAR-721216

 

Security Fixes for web injection defect.

EIP iconUri parameters were not validated.

Vulnerability patch. No design or functional impact.

DAR-722129

 

Due to component shortage we need to enable Realtek RTL8211F-CG for Corvo/Kiska Cougar v1.6.5
Impacted S/S OS team -- OS has to enable the Driver.
Ensure we can detect which chip is installed and load the correct driver.

Replacement of physical layer Ethernet chip.

No design or functional impact.

DAR-723511

Port to D.5.1 SWUP (software upgrade) code to support Scanner Maxim chip. Part of Maxim chip support.

 

Scanner chip software update – no TSF relevance. No design or functional impact.

DAR-726052

 

Security fix for unauthenticated access to the Properties Page which was possible for the Guest User via Cross-site request forgery.

Vulnerability patch. No design or functional impact.

Note: Guest User is disabled in the evaluated configuration.

DAR-728065

Add the HW Configuration (Maxim, Realtek) info to SBC Name. This information is included in the ConfigSettings.xml retrieved by Remote Services.

No impact. Remotes Services (SMart eSolutions) is disabled in the evaluated configuration.

DAR-734982

 

Security LDAP Password not Expunged so it can be stolen (Secure LDAP (LDAP over TLS is OK)

Fix is to expunge password when new credentials entered.

Vulnerability patch. No design or functional impact.

Evaluated configuration uses LDAP over TLS which was not affected.

DAR-735333

The ECDSA Xerox Generic Root CA is not displaying under Server validation for IPSec IKE auth with Digital Certs.

None – evaluated configuration on supports RSA and Pre-shared leys.

DAR-737423

Support Cudy WiFi dongle. The change involves adding the Cudy vendor and product ID to connControl and OS udev rule, so that the dongle can be recognized.

No impact – dongle use outside of the evaluated configuration.

DAR-737741

 

Normal print Job went for Paused state. LUI didn’t prompted to replace a Magenta toner, but in EWIS notified that" The Magenta Toner (M) is empty. User intervention is required to replace the Magenta Toner (M).

LUI must display the prompt to replace toner.
" The Magenta Toner (M) is empty. User intervention is required to replace the Magenta Toner (M).

Bug fix. No design or functional impact.

DAR-737753

 

20us ARM reset done by Copy Controller Software when it starts up.

During PowerOn assert iitPltnReset for 3 seconds to remove 24V power

Bug fix. No TSF impact - The ARM auxiliary processor manages the scanner portion of the image path.

DAR-746336

 

HTML injection Vulnerability found in Workflow scanning/ Header tag should not reflect in the browser, and it should not accept the invalid charters.

Burpsuite, webinspect detected.

Vulnerability patch. No design or functional impact.

 

DAR-746405

 

https:///web_srvc/applicationTestResults.php is vulnerable to XSS

 

Vulnerability patch. No design or functional impact.

 

 

Vendor Information


Xerox
Mike Kirby
5854276774
michael.kirby@xerox.com

www.xerox.com
Site Map              Contact Us              Home