NIAP: Assurance Continuity
NIAP/CCEVS
  NIAP  »»  Product Compliant List  »»  Product Entry  »»  Assurance Continuity  
Assurance Continuity - Palo Alto Networks WF-500 and WF-500-B WildFire 10.2

Date of Maintenance Completion:  2023.05.31

Product Type:    Network Device

Conformance Claim:  Protection Profile Compliant

PP Identifier:    collaborative Protection Profile for Network Devices Version 2.2e

Original Evaluated TOE:  2022.08.04 - Palo Alto Networks WF-500 WildFire 10.1

CC Certificate [PDF] Validation Report [PDF] Assurance Activity [PDF]

Administrative Guide [PDF]

Administrative Guide [PDF]

Administrative Guide [PDF]

Please note:  The above files are for the Original Evaluated TOE.  Consequently, they do not refer to this maintained version, although they apply to the maintained version. 

Security Target [PDF] * Assurance Continuity Maintenance Report [PDF] Administrative Guide [PDF]

Please note:  This serves as an addendum to the VR for the Original Evaluated TOE. 

* This is the Security Target (ST) associated with the latest Maintenance Release.  To view previous STs for this TOE, click here.

Readers are reminded that the certification of this product (TOE) is the result of maintenance, rather than an actual re-evaluation of the product.  Maintenance only considers the affect of TOE changes on the assurance baseline (i.e. the original evaluated TOE); maintenance is not intended to provide assurance in regard to the resistance of the TOE to new vulnerabilities or attack methods discovered since the date of the initial certificate.  Such assurance can only be gained through re-evaluation. 

Using a security impact analysis of the changes made to the TOE, which was provided by the developer, the CCEVS has determined that the impact of changes on the TOE are considered minor and that independent evaluator analysis was not necessary.  A summary of the results can be found in the Maintenance Report, which is written in relation to the product's original validation report and Security Target.  Readers are therefore reminded to read the Security Target, Validation Report, and the Assurance Maintenance Report to fully understand the meaning of what a maintained certificate represents. 

Product Description

The TOE changes consist of:

Introduction of the WF-500-B hardware appliance running 10.2.3-h2 to the TOE.

Updating the firmware running on the Palo Alto Networks WF-500 hardware appliance from version 10.1.6-h4 to version 10.2.3-h2. The updates included new non-security relevant features and bug fixes. The updates and their effects and relevance are summarized below.

Palo Alto Networks obtained updated CAVP certificates covering the updated algorithm implementation for both the WF-500 and WF-500-B appliances (CAVP A2906).

 

Category

Number of Changes

Applicability to New Firmware Versions

New Features and Feature Enhancements

1

The software updates of the PAN-OS 10.1 to PAN-OS 10.2.3 were non-security relevant features and enhancements. The addition of the WF-500-B appliance was the only new feature applicable to the Wildfire.

Bug Fixes

27

27 Bug Fixes were applicable to Wildfire of which 2 were security relevant (CVE) Fixes and 25 were behavioral Bug Fixes. The bug-fixes did not result in changes to the ST or guidance documentation and had no effect on the result of any Assurance Activity test.

 

NIST CAVP Certificates:

Palo Alto Networks obtained updated CAVP certificates covering the updated algorithm implementation for both the WF-500 and WF-500-B appliances (CAVP A2906).

The Palo Alto Networks Crypto Module included with PAN-OS is substantially the same between versions 10.1 and 10.2. The only differences are patches made to address specific published vulnerabilities. The CAVP certificates for v10.2 of the Palo Alto Networks Crypto Module that is included with PAN-OS 10.2 cover the same set of functions and algorithms as obtained for v10.1.

The evaluation evidence presented by Palo Alto Networks for the CAVP certificates from the TOE’s original ETR and the evidence for the CAVP certificates for the updated TOE provided equivalence rationale to address any apparent differences between the two sets of certificates.

NIAP reviewed and verified that the CAVP cert changes are not considered major changes and they are the same in the relevant areas to the original certificates. The changes that resulted in the need for new crypto certs do not require a rerun in any of the testing assurance activities.

Vendor Information


Palo Alto Networks, Inc.
Jake Bajic
408-753-3901
jbajic@paloaltonetworks.com

www.paloaltonetworks.com
Site Map              Contact Us              Home