Cryptographic Module Validation Program CMVP

Certificate #3478

Details

Module Name
WildFire WF-500
Standard
FIPS 140-2
Status
Active
Sunset Date
6/26/2024
Validation Dates
06/27/2019;02/21/2020
Overall Level
2
Caveat
When operated in FIPS mode and with the tamper evident seals and opacity shields installed as indicated in the Security Policy
Security Level Exceptions
  • Roles, Services, and Authentication: Level 3
  • Design Assurance: Level 3
  • Mitigation of Other Attacks: N/A
Module Type
Hardware
Embodiment
Multi-Chip Stand Alone
Description
WildFire WF-500 identifies unknown malware, zero-day exploits, and Advanced Persistent Threats (APTs) through dynamic analysis, and automatically disseminates protection in near real-time to help security teams meet the challenge of advanced cyber-attacks.
Tested Configuration(s)
  • N/A
FIPS Algorithms
AES Cert. #5890
CKG vendor affirmed
CVL Certs. #2119, #2120, #2121 and #2122
DRBG Cert. #2451
DSA Cert. #1485
ECDSA Cert. #1570
HMAC Cert. #3865
KAS SP 800-56Arev2 with CVL Certs. #2119 and #2120, vendor affirmed
KTS AES Cert. #5890; key establishment methodology provides 128 or 256 bits of encryption strength
KTS AES Cert. #5890 and HMAC Cert. #3865; key establishment methodology provides between 128 and 256 bits of encryption strength
RSA Cert. #3086
SHS Cert. #4641
Allowed Algorithms
Diffie-Hellman (CVL Cert. #2119 with CVL Cert. #2120, key agreement; key establishment methodology provides 112 bits of encryption strength); MD5; NDRNG; RSA (CVL Cert. #2121, key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength)
Hardware Versions
910-000097-00G; FIPS Kit P/N: 920-000145-00A
Firmware Versions
8.1.6

Vendor

Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
USA

Jake Bajic
certifications@paloaltonetworks.com
Phone: 408-753-4000

Lab

UL VERIFICATION SERVICES INC
NVLAP Code: 100432-0