This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Lexmark CX622 and CX625 Multi-Function Printers with firmware version CXTZJ.052.025 & Lexmark Secure Element (P/N 57X0185) 383-4-465 |
Owl XDE Radium v1.3 CSEC2021009 |
|
---|---|---|
name | Lexmark CX622 and CX625 Multi-Function Printers with firmware version CXTZJ.052.025 & Lexmark Secure Element (P/N 57X0185) | Owl XDE Radium v1.3 |
category | Multi-Function Devices | Boundary Protection Devices and Systems |
scheme | CA | SE |
status | archived | active |
not_valid_after | 28.01.2024 | 19.09.2027 |
not_valid_before | 28.01.2019 | 19.09.2022 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-465%20CT%20v1.0e%20-%20original%20signed.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed%20Certification%20XDE%20Radium%20v13%20-%20CCRA-CSEC.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-465%20CR%201.0e.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20Owl%20XDE%20Radium%20v13.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Lexmark%20NoHD%20CXTZJ%20Security%20Target%2014.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Owl%20XDE%20Radium_SecurityTarget_EAL4%20plus_V1.3.pdf |
manufacturer | Lexmark International, Inc. | Owl Cyber Defense Solutions, LLC |
manufacturer_web | https://www.lexmark.com/ | https://www.owlcyberdefense.com/ |
security_level | {} | EAL4+, AVA_VAN.4 |
dgst | 1643a151b97f352d | c96efa0dc4969d08 |
heuristics/cert_id | 383-4-465 | CSEC2021009 |
heuristics/cpe_matches | cpe:2.3:o:lexmark:cx622_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx625:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx622:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:cx625_firmware:-:*:*:*:*:*:*:* | {} |
heuristics/related_cves | CVE-2022-29850, CVE-2021-44737, CVE-2021-44735, CVE-2023-23560, CVE-2021-44738, CVE-2021-44734, CVE-2023-22960 | {} |
heuristics/extracted_sars | AGD_PRE.1, ASE_CCL.1, ASE_INT.1, ADV_FSP.1, ALC_CMS.1, AVA_VAN.1, ASE_OBJ.1, ASE_SPD.1, ASE_ECD.1, ATE_IND.1, ASE_REQ.1, ASE_TSS.1, ALC_CMC.1, AGD_OPE.1 | ADV_ARC.1, ATE_COV.2, ASE_TSS.1, AGD_OPE.1, ATE_DPT.1, ADV_IMP.1, ALC_CMS.1, ALC_DVS.1, ASE_REQ.2, ALC_TAT.1, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ADV_TDS.3, ALC_DEL.1, ASE_OBJ.2, AVA_VAN.4, ADV_FSP.4, ASE_INT.1, ASE_SPD.1, ATE_FUN.1, ALC_CMC.4, ALC_LCD.1 |
heuristics/extracted_versions | 052.025 | 1.3 |
heuristics/protection_profiles | b2cfec7a92fa2940 | {} |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf | {} |
pdf_data/cert_filename | 383-4-465 CT v1.0e - original signed.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level | ||
pdf_data/cert_keywords/cc_sar | ||
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | 383-4-465 CR 1.0e.pdf | Certification Report - Owl XDE Radium v13.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | Lexmark NoHD CXTZJ Security Target 14.pdf | Owl XDE Radium_SecurityTarget_EAL4 plus_V1.3.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |