Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
BorderWare MXtreme Mail Firewall Version 3.1
CRP204
McAfee VirusScan Enterprise v8.5i and McAfee ePolicy Orchestrator v3.6
CCEVS-VR-0047-2007
name BorderWare MXtreme Mail Firewall Version 3.1 McAfee VirusScan Enterprise v8.5i and McAfee ePolicy Orchestrator v3.6
category Boundary Protection Devices and Systems Other Devices and Systems
scheme UK US
not_valid_after 05.03.2013 06.09.2012
not_valid_before 30.07.2004 22.06.2007
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP204.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10166-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/borderware_3.0Final.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10166-st.pdf
manufacturer Borderware Technologies McAfee, Inc.
manufacturer_web https://www.borderware.com/ https://www.mcafee.com/
security_level AVA_VLA.3, EAL4+, ALC_FLR.1 EAL2+, ALC_FLR.2
dgst 02140ad16c37fee4 d51744cd80325e5d
heuristics/cert_id CRP204 CCEVS-VR-0047-2007
heuristics/cert_lab [] US
heuristics/cpe_matches {} cpe:2.3:a:mcafee:epolicy_orchestrator:3.6.0:*:*:*:*:*:*:*, cpe:2.3:a:mcafee:virusscan_enterprise:8.5i:*:*:*:*:*:*:*, cpe:2.3:a:mcafee:epolicy_orchestrator:3.6.1:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2021-23889, CVE-2020-13938, CVE-2007-1498, CVE-2023-3946, CVE-2021-31834, CVE-2013-0141, CVE-2022-3338, CVE-2021-2432, CVE-2017-3980, CVE-2020-7317, CVE-2010-3496, CVE-2015-0922, CVE-2006-5274, CVE-2019-3604, CVE-2023-5444, CVE-2022-0862, CVE-2015-8577, CVE-2022-0858, CVE-2021-3712, CVE-2020-7337, CVE-2009-1348, CVE-2015-8765, CVE-2013-0140, CVE-2021-30639, CVE-2015-0921, CVE-2022-0861, CVE-2021-23840, CVE-2021-2161, CVE-2004-0095, CVE-2009-5118, CVE-2013-4882, CVE-2015-4559, CVE-2021-23890, CVE-2022-0842, CVE-2023-5445, CVE-2014-2205, CVE-2022-0859, CVE-2021-31835, CVE-2021-33037, CVE-2012-4594, CVE-2022-0857, CVE-2007-1538, CVE-2022-3339, CVE-2010-5143, CVE-2013-4883, CVE-2021-23888
heuristics/extracted_sars ADV_RCR.1, ADV_HLD.2, AGD_USR.1, AVA_SOF.1, ADV_FSP.2, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, AVA_VLA.3, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ATE_COV.1, ATE_IND.2, ADV_HLD.1, AVA_SOF.1, ALC_FLR.2
heuristics/extracted_versions 3.1 3.6, 8.5
heuristics/scheme_data
  • category: AntiVirus
  • certification_date: 22.06.2007
  • evaluation_facility: COACT, Inc. Labs
  • expiration_date:
  • id: CCEVS-VR-VID10166
  • product: McAfee VirusScan Enterprise v8.5i and McAfee ePolicy Orchestrator v3.6
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10166
  • vendor: McAfee, LLC
heuristics/protection_profiles {} 778d5ae70dd6435b
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_AV_BR_V1.1.pdf
pdf_data/report_filename CRP204.pdf st_vid10166-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-07-0047
    • cert_item: McAfee VirusScan 8.5i and ePolicy Orchestrator 3.6.1
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • UK:
    • CERTIFICATION REPORT No. P204: 1
  • US:
    • CCEVS-VR-07-0047: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL1: 1
    • EAL4: 25
    • EAL4 augmented: 18
    • EAL7: 1
  • EAL:
    • EAL 2: 2
    • EAL 2 augmented: 2
    • EAL 4: 1
    • EAL2: 3
    • EAL2 augmented: 3
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 39
  • AVA:
    • AVA_VLA.2: 1
    • AVA_VLA.3: 42
  • ALC:
    • ALC_FLR.2: 5
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_IFF.1.2: 1
  • FPT:
    • FPT_RIP.1: 1
    • FPT_RVM.1: 1
    • FPT_SEP.1: 1
    • FPT_STM.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.PHYSICAL: 1
  • T:
    • T.ACCIDENTAL_ADMIN_ERROR: 1
    • T.AUDIT_: 1
    • T.MASQUERADE: 1
    • T.POOR_DESIGN: 1
    • T.POOR_IMPLEMENTATION: 1
    • T.POOR_TEST: 1
    • T.RESIDUAL_DATA: 1
    • T.TSF_COMPROMISE: 1
    • T.UNATTENDED_SESSION: 1
    • T.UNIDENTIFIED_ACTIONS: 1
    • T.VIRUS: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 10
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • RC:
      • RC2: 1
  • DES:
    • 3DES:
      • 3DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 1
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 3
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 3
    • TLS:
      • TLS: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCIMB-2004-01-004: 1
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • The SMTP server accepts clear text and TLS encrypted connections on port 25, although the latter is out of scope of the evaluation. ii. The MCS may be configured to accept connections on ports 80 and 443: 1
    • of the firewall via the MCS and allows users to access their mailboxes, although the latter is out of scope. v. The Authentication server authenticates administrators before they are able to access the MCS: 1
    • out of scope: 2
pdf_data/report_metadata
  • /Author: racook
  • /CreationDate: D:20040804100821Z
  • /Creator: Borderware MXtreme Mail Firewall CR1.0 - Microsoft Word
  • /ModDate: D:20131119171800Z
  • /Producer: Acrobat PDFWriter 5.0 for Windows NT
  • /Title: Borderware MXtreme Mail Firewall CR1.0.doc
  • pdf_file_size_bytes: 186048
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
  • /Author: Jerome F. Myers
  • /Company: The Aerospace Corporation
  • /CreationDate: D:20070717151740-04'00'
  • /Creator: Acrobat PDFMaker 7.0 for Word
  • /ModDate: D:20070717151821-04'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /SourceModified: D:20070717191708
  • /Title: National Information Assurance Partnership
  • /_AdHocReviewCycleID: -2067643838
  • /_AuthorEmail: [email protected]
  • /_AuthorEmailDisplayName: Dignan, David M.
  • /_EmailSubject: Validation Report for vid10166
  • /_PreviousAdHocReviewCycleID: 819936599
  • pdf_file_size_bytes: 174038
  • pdf_hyperlinks: http://www.osvdb.org/, http://nvd.nist.gov/, http://www.securityfocus.com/, http://archives.neohapsis.com/, http://www.cert.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename borderware_3.0Final.pdf st_vid10166-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 10
  • EAL:
    • EAL2: 6
    • EAL2 augmented: 5
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.2: 1
    • ADV_HLD.2: 1
    • ADV_IMP.1: 1
    • ADV_LLD.1: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 2
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_FLR.1: 7
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.2: 1
    • AVA_SOF: 1
    • AVA_SOF.1: 1
    • AVA_VLA.3: 7
  • ACM:
    • ACM_CAP.2: 5
  • ADO:
    • ADO_DEL.1: 5
    • ADO_IGS.1: 4
  • ADV:
    • ADV_FSP.1: 4
    • ADV_HLD.1: 4
    • ADV_RCR.1: 5
  • AGD:
    • AGD_ADM.1: 5
    • AGD_USR.1: 3
  • ALC:
    • ALC_FLR.2: 10
  • ATE:
    • ATE_COV.1: 5
    • ATE_FUN.1: 3
    • ATE_IND.2: 5
  • AVA:
    • AVA_MSU.1: 5
    • AVA_SOF.1: 2
    • AVA_VLA.1: 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 6
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FDP:
    • FDP_ACC.1: 7
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 5
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 7
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 9
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
    • FDP_IFF.1.6: 1
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 1
    • FDP_RVM.1: 2
    • FDP_SEP.1: 2
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 9
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 10
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 4
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 7
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM.1: 7
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 7
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
  • FAU:
    • FAU_ARP.1: 1
    • FAU_GEN: 21
    • FAU_GEN.1: 5
    • FAU_GEN.2: 1
    • FAU_SAR.1: 13
    • FAU_SAR.1.1: 2
    • FAU_SAR.1.2: 2
    • FAU_SAR.2: 8
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 10
    • FAU_SAR.3.1: 1
    • FAU_STG: 29
    • FAU_STG.1: 6
    • FAU_STG.4: 1
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 2
    • FCS_COP.1: 8
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACF: 1
    • FDP_ACT: 1
    • FDP_IFF: 2
    • FDP_ITC.1: 2
    • FDP_ITC.2: 1
    • FDP_RIP.1: 3
    • FDP_RIP.1.1: 1
    • FDP_RIP.2: 1
  • FIA:
    • FIA_AFL.1: 4
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS.1: 4
    • FIA_SOS.1.1: 1
    • FIA_UAU.2: 4
    • FIA_UAU.2.1: 1
    • FIA_UAU.6: 4
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 2
    • FIA_UID.2: 4
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 13
    • FMT_MOF.1.1: 2
    • FMT_MSA.2: 2
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 3
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
  • FPT:
    • FPT_ITT.1: 4
    • FPT_RVM.1: 3
    • FPT_SEP: 5
    • FPT_SEP.1: 4
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_SEP_EXP: 1
    • FPT_SEP_EXP.1: 10
    • FPT_SEP_EXP.1.2: 1
    • FPT_STM.1: 5
  • FTA:
    • FTA_SSL.1: 4
    • FTA_SSL.1.1: 1
    • FTA_SSL.1.2: 1
    • FTA_TAB.1: 4
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITT.1.1: 1
    • FTP_RVM.1: 1
    • FTP_RVM.1.1: 1
    • FTP_STM.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.PHYSICAL: 2
    • A.TRANSFER: 2
    • A.TRUSTED: 2
    • A.USEAGE: 2
  • O:
    • O.ADDRESS: 10
    • O.ADMIN: 7
    • O.ATTEMPT: 4
    • O.AUDREC: 4
    • O.DIRECT: 5
    • O.GW: 4
    • O.LIMEXT: 4
    • O.MAILCTL: 6
    • O.MEDIATE: 10
    • O.NOREP: 3
    • O.PORT: 1
    • O.PORTS: 10
    • O.SELPRO: 5
  • T:
    • T.CONFIG: 2
    • T.CONN: 1
    • T.DETECT: 2
    • T.MEDIAT: 2
    • T.OLDINF: 2
    • T.OPEN_RELAY: 2
    • T.OS_FAC: 2
    • T.REM_CONN: 2
    • T.REPEAT: 2
    • T.SELPRO: 2
    • T.SOURCE: 2
    • T.UNSOLICITED: 2
  • A:
    • A.AUDIT_BACKUP: 3
    • A.NO_EVIL: 1
    • A.PHYSICAL: 3
    • A.SECURE_COMMS: 2
    • A.SECURE_UPDATES: 3
  • O:
    • O.ADMIN_GUIDANCE: 5
    • O.ADMIN_ROLE: 4
    • O.AUDIT_GEN: 1
    • O.AUDIT_GENERATION: 5
    • O.AUDIT_PROTECT: 2
    • O.AUDIT_PROTECTIO: 1
    • O.AUDIT_PROTECTION: 1
    • O.AUDIT_REVIEW: 5
    • O.CONFIGURATION_I: 1
    • O.CONFIGURATION_IDEN: 2
    • O.CONFIGURATION_IDENTIF: 1
    • O.CONFIGURATION_IDENTIFICATION: 3
    • O.CORRECT_TSF_OP: 1
    • O.CORRECT_TSF_OPERAT: 2
    • O.CORRECT_TSF_OPERATIO: 1
    • O.CORRECT_TSF_OPERATION: 4
    • O.CRYPTOGRAPHY: 4
    • O.DOCUMENTED_DES: 1
    • O.DOCUMENTED_DESIGN: 7
    • O.MANAGE: 5
    • O.PARTIAL_FUNCTIO: 1
    • O.PARTIAL_FUNCTIONAL: 2
    • O.PARTIAL_FUNCTIONAL_TE: 1
    • O.PARTIAL_FUNCTIONAL_TEST: 2
    • O.PARTIAL_FUNCTIONAL_TESTING: 2
    • O.PARTIAL_SELF_PR: 1
    • O.PARTIAL_SELF_PROTEC: 2
    • O.PARTIAL_SELF_PROTECTI: 1
    • O.PARTIAL_SELF_PROTECTION: 3
    • O.VIRUS: 6
    • O.VULNERABILITY_A: 1
    • O.VULNERABILITY_ANALY: 3
    • O.VULNERABILITY_ANALYSI: 1
    • O.VULNERABILITY_ANALYSIS: 1
    • O.VULNERABILITY_ANALYSIS_TEST: 3
  • OE:
    • OE.AUDIT_BACKUP: 3
    • OE.AUDIT_SEARCH: 8
    • OE.AUDIT_STORAGE: 4
    • OE.DISPLAY_BANNER: 5
    • OE.DOMAIN_SEPARATIO: 3
    • OE.DOMAIN_SEPARATION: 6
    • OE.NO_BYPASS: 7
    • OE.NO_EVIL: 3
    • OE.PHYSICAL: 3
    • OE.RESIDUAL_: 1
    • OE.RESIDUAL_INFORMAT: 2
    • OE.RESIDUAL_INFORMATI: 1
    • OE.RESIDUAL_INFORMATIO: 1
    • OE.RESIDUAL_INFORMATION: 4
    • OE.SECURE_COMMS: 5
    • OE.SECURE_UPDATES: 3
    • OE.TIME_STAMPS: 5
    • OE.TOE_ACCESS: 6
    • OE.TRUST_IT: 1
  • T:
    • T.ACCIDENTAL_ADMIN_: 1
    • T.ACCIDENTAL_ADMIN_ERROR: 3
    • T.AUDIT_: 3
    • T.MASQUERADE: 2
    • T.POOR_DESIGN: 2
    • T.POOR_IMPLEMENTATION: 3
    • T.POOR_TEST: 2
    • T.RESIDUAL_DATA: 3
    • T.TSF_COMPROMISE: 2
    • T.UNATTENDED_: 1
    • T.UNATTENDED_SESSION: 2
    • T.UNIDENTIFIED_ACTIONS: 2
    • T.VIRUS: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 8
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • RC:
      • RC2: 1
  • DES:
    • 3DES:
      • 3DES: 1
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 3
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 5
    • FIPS 180-2: 1
pdf_data/st_metadata
  • /Author: BorderWare Technologies Inc
  • /CreationDate: D:20040804110458Z
  • /Creator: SecurityTarget3.0Final - Microsoft Word
  • /ModDate: D:20040804134352+02'00'
  • /Producer: Acrobat PDFWriter 5.0 for Windows NT
  • /Title: MXtreme V3.0 Security Target
  • pdf_file_size_bytes: 165061
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 54
  • /Author: User
  • /CreationDate: D:20070619111903-07'00'
  • /Creator: Acrobat PDFMaker 7.0.7 for Word
  • /ModDate: D:20070619144257-04'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /SourceModified: D:20070619181729
  • /Title: SECURITY TARGET
  • pdf_file_size_bytes: 781280
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 65
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different