This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Lexmark CX622 and CX625 Multi-Function Printers with firmware version CXTZJ.052.025 & Lexmark Secure Element (P/N 57X0185) 383-4-465 |
Samsung Galaxy Devices on Android 12 - Spring CCEVS-VR-VID-11228-2022 |
|
---|---|---|
name | Lexmark CX622 and CX625 Multi-Function Printers with firmware version CXTZJ.052.025 & Lexmark Secure Element (P/N 57X0185) | Samsung Galaxy Devices on Android 12 - Spring |
category | Multi-Function Devices | Mobility |
scheme | CA | US |
not_valid_after | 28.01.2024 | 25.05.2024 |
not_valid_before | 28.01.2019 | 25.05.2022 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-465%20CT%20v1.0e%20-%20original%20signed.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11228-ci.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-465%20CR%201.0e.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11228-vr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Lexmark%20NoHD%20CXTZJ%20Security%20Target%2014.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11228-st.pdf |
manufacturer | Lexmark International, Inc. | Samsung Electronics Co., Ltd. |
manufacturer_web | https://www.lexmark.com/ | https://www.samsung.com |
dgst | 1643a151b97f352d | a5d5bc8a08fcbe07 |
heuristics/cert_id | 383-4-465 | CCEVS-VR-VID-11228-2022 |
heuristics/cert_lab | [] | US |
heuristics/cpe_matches | cpe:2.3:o:lexmark:cx622_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx625:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx622:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:cx625_firmware:-:*:*:*:*:*:*:* | cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-jan-2025-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-nov-2024-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr_sep-2024-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-dec-2024-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-oct-2024-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-jul-2024-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-aug-2024-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:* |
heuristics/related_cves | CVE-2022-29850, CVE-2021-44737, CVE-2021-44735, CVE-2023-23560, CVE-2021-44738, CVE-2021-44734, CVE-2023-22960 | CVE-2023-42559, CVE-2023-30692, CVE-2024-20833, CVE-2024-34604, CVE-2024-34641, CVE-2024-34678, CVE-2025-20884, CVE-2023-30664, CVE-2024-34647, CVE-2023-42566, CVE-2024-34616, CVE-2024-20804, CVE-2023-42557, CVE-2024-34592, CVE-2023-21461, CVE-2024-20812, CVE-2024-34639, CVE-2023-30707, CVE-2023-30715, CVE-2023-30669, CVE-2024-34677, CVE-2024-34618, CVE-2023-21493, CVE-2024-20849, CVE-2024-20881, CVE-2025-20887, CVE-2023-30717, CVE-2024-34655, CVE-2023-21445, CVE-2023-21490, CVE-2023-21422, CVE-2023-42537, CVE-2024-34587, CVE-2024-34648, CVE-2023-30646, CVE-2024-20846, CVE-2023-21430, CVE-2023-30660, CVE-2024-49410, CVE-2025-20907, CVE-2023-42563, CVE-2023-42533, CVE-2023-21425, CVE-2023-21487, CVE-2024-34637, CVE-2023-30656, CVE-2023-42538, CVE-2023-30645, CVE-2024-20858, CVE-2024-20836, CVE-2023-21427, CVE-2023-21457, CVE-2023-30685, CVE-2023-21486, CVE-2023-21491, CVE-2023-30720, CVE-2024-20896, CVE-2023-30666, CVE-2023-30687, CVE-2024-20810, CVE-2024-34673, CVE-2023-21485, CVE-2024-49411, CVE-2023-42564, CVE-2024-34588, CVE-2024-34595, CVE-2023-30691, CVE-2024-20806, CVE-2024-34651, CVE-2023-30652, CVE-2023-30696, CVE-2023-42536, CVE-2024-20894, CVE-2024-34666, CVE-2023-21512, CVE-2023-21454, CVE-2024-34590, CVE-2024-34668, CVE-2024-20844, CVE-2023-21424, CVE-2023-21452, CVE-2024-20901, CVE-2023-30657, CVE-2024-34594, CVE-2023-21496, CVE-2023-30668, CVE-2023-30680, CVE-2023-30643, CVE-2025-20883, CVE-2023-21456, CVE-2024-20843, CVE-2023-21429, CVE-2023-30665, CVE-2024-34589, CVE-2023-30671, CVE-2023-42528, CVE-2024-20891, CVE-2024-34612, CVE-2023-30711, CVE-2023-30648, CVE-2023-42529, CVE-2024-34619, CVE-2023-21446, CVE-2024-34593, CVE-2023-42535, CVE-2024-20879, CVE-2023-21435, CVE-2024-20888, CVE-2024-20848, CVE-2024-20875, CVE-2024-34640, CVE-2024-20831, CVE-2024-20866, CVE-2024-34614, CVE-2023-21439, CVE-2024-20835, CVE-2024-34607, CVE-2025-20888, CVE-2023-21458, CVE-2023-42530, CVE-2023-30713, CVE-2023-30662, CVE-2023-30661, CVE-2025-20934, CVE-2024-34609, CVE-2024-20882, CVE-2023-21489, CVE-2023-30721, CVE-2024-20830, CVE-2024-34652, CVE-2024-20890, CVE-2023-30642, CVE-2023-30689, CVE-2023-21436, CVE-2023-30653, CVE-2024-49415, CVE-2023-30709, CVE-2024-20898, CVE-2024-34602, CVE-2025-20890, CVE-2023-42569, CVE-2023-21437, CVE-2024-20895, CVE-2023-30727, CVE-2025-20885, CVE-2023-30670, CVE-2025-20886, CVE-2023-30693, CVE-2024-34610, CVE-2023-30710, CVE-2023-30688, CVE-2024-34653, CVE-2023-30731, CVE-2023-21502, CVE-2024-20876, CVE-2024-20816, CVE-2024-34645, CVE-2023-21438, CVE-2023-30681, CVE-2024-20815, CVE-2024-20811, CVE-2023-21492, CVE-2023-30655, CVE-2024-34676, CVE-2024-34665, CVE-2023-30640, CVE-2023-21488, CVE-2023-21423, CVE-2025-20905, CVE-2024-34680, CVE-2023-30712, CVE-2023-42568, CVE-2023-30714, CVE-2024-20834, CVE-2023-21504, CVE-2023-30708, CVE-2024-34583, CVE-2024-20847, CVE-2023-42527, CVE-2024-20878, CVE-2023-21441, CVE-2023-42570, CVE-2024-20897, CVE-2023-21451, CVE-2024-20813, CVE-2023-30649, CVE-2023-42532, CVE-2024-20842, CVE-2023-30644, CVE-2024-20889, CVE-2023-42531, CVE-2024-20880, CVE-2025-20891, CVE-2024-20899, CVE-2023-21428, CVE-2023-30718, CVE-2024-34605, CVE-2024-34674, CVE-2024-34662, CVE-2023-30651, CVE-2023-30654, CVE-2024-20859, CVE-2024-34606, CVE-2023-21442, CVE-2023-30679, CVE-2024-20819, CVE-2024-20814, CVE-2025-20889, CVE-2024-34669, CVE-2024-20805, CVE-2023-42562, CVE-2024-20818, CVE-2024-20892, CVE-2023-42561, CVE-2024-20862, CVE-2024-34585, CVE-2023-21449, CVE-2024-34611, CVE-2023-42534, CVE-2024-20832, CVE-2023-30699, CVE-2023-30700, CVE-2024-20900, CVE-2023-21460, CVE-2023-21513, CVE-2024-20861, CVE-2024-34667, CVE-2023-30650, CVE-2024-20803, CVE-2023-30719, CVE-2023-21421, CVE-2024-20893, CVE-2023-42556, CVE-2024-34642, CVE-2023-30716, CVE-2024-34591, CVE-2023-30697, CVE-2025-20881, CVE-2024-34638, CVE-2023-30701, CVE-2023-30706, CVE-2024-34646, CVE-2024-34615, CVE-2024-20857, CVE-2023-42560, CVE-2024-20865, CVE-2024-20817, CVE-2025-20882, CVE-2023-30694, CVE-2024-49414, CVE-2023-21484, CVE-2024-20877, CVE-2023-30663, CVE-2023-30739, CVE-2023-30690, CVE-2024-34608, CVE-2023-30686, CVE-2023-30733, CVE-2023-21495, CVE-2024-34586, CVE-2023-30647, CVE-2025-20904, CVE-2024-20863, CVE-2024-20845, CVE-2024-20820 |
heuristics/extracted_sars | AGD_PRE.1, ASE_CCL.1, ASE_INT.1, ADV_FSP.1, ALC_CMS.1, AVA_VAN.1, ASE_OBJ.1, ASE_SPD.1, ASE_ECD.1, ATE_IND.1, ASE_REQ.1, ASE_TSS.1, ALC_CMC.1, AGD_OPE.1 | ALC_CMS.1, AGD_PRE.1, ADV_FSP.1, AVA_VAN.1, ALC_TSU_EXT.1, ATE_IND.1, ALC_CMC.1, AGD_OPE.1 |
heuristics/extracted_versions | 052.025 | 12 |
heuristics/protection_profiles | b2cfec7a92fa2940 | c88af12926be2779, 83014eb399a802f3, c40ae795865a0dba, 731bdcc989507942, 0525a97b2c253a6b |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_BT_V1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MDF_V3.2.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_VPN_CLI_v2.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf |
pdf_data/cert_filename | 383-4-465 CT v1.0e - original signed.pdf | st_vid11228-ci.pdf |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | 383-4-465 CR 1.0e.pdf | st_vid11228-vr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | Lexmark NoHD CXTZJ Security Target 14.pdf | st_vid11228-st.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | False | True |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |