This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
| Cisco Catalyst 4500 Series switches (4503-E, 4506-E, 4507R+E, 4510R+E, 4500X and 4500X-F) running IOS-XE 3.5.2E CRP276 |
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.1.1) ANSSI-CC-2022/31 |
|
|---|---|---|
| name | Cisco Catalyst 4500 Series switches (4503-E, 4506-E, 4507R+E, 4510R+E, 4500X and 4500X-F) running IOS-XE 3.5.2E | NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.1.1) |
| category | Network and Network-Related Devices and Systems | Trusted Computing |
| scheme | UK | FR |
| status | archived | active |
| not_valid_after | 30.04.2019 | 27.06.2027 |
| not_valid_before | 30.04.2014 | 27.06.2022 |
| cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2022_311.4.1.1.pdf | |
| report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP276%20Cisco%20Cat4K%20v1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_31fr1.4.1.1.pdf |
| st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CAT4K%20NDPP%20ST%2020140207-Final-updated-UPDATED20140410-Final.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_31en.pdf |
| manufacturer | Cisco Systems, Inc. | Nuvoton Technology |
| manufacturer_web | https://www.cisco.com | |
| security_level | {} | EAL4+, AVA_VAN.4, ALC_DVS.2, ALC_FLR.1 |
| dgst | 2ae58c071bd55ee4 | 1f98a4c9f58825c9 |
| heuristics/cert_id | CRP276 | ANSSI-CC-2022/31 |
| heuristics/cpe_matches | cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:* | {} |
| heuristics/related_cves | CVE-2024-20312, CVE-2023-20109, CVE-2023-20097, CVE-2014-3327, CVE-2025-20199, CVE-2016-6386, CVE-2017-12228, CVE-2016-1409, CVE-2021-34699, CVE-2017-6606, CVE-2019-1746, CVE-2018-0193, CVE-2020-3230, CVE-2023-20076, CVE-2021-34729, CVE-2016-6384, CVE-2020-3209, CVE-2024-20271, CVE-2019-1761, CVE-2020-3200, CVE-2017-6742, CVE-2022-20920, CVE-2017-6736, CVE-2024-20433, CVE-2023-20056, CVE-2020-3204, CVE-2025-20171, CVE-2016-1384, CVE-2017-3857, CVE-2017-6738, CVE-2025-20201, CVE-2018-0188, CVE-2020-3444, CVE-2021-1616, CVE-2025-20170, CVE-2018-0184, CVE-2018-0182, CVE-2018-0185, CVE-2025-20175, CVE-2018-0195, CVE-2016-6381, CVE-2016-6392, CVE-2018-0189, CVE-2021-1384, CVE-2017-6737, CVE-2018-0186, CVE-2025-20176, CVE-2025-20200, CVE-2015-0685, CVE-2024-20414, CVE-2020-3516, CVE-2017-6739, CVE-2016-6415, CVE-2013-6981, CVE-2017-3864, CVE-2018-0194, CVE-2021-1625, CVE-2018-0190, CVE-2019-16009, CVE-2016-6393, CVE-2017-3856, CVE-2017-6740, CVE-2025-20173, CVE-2014-2146, CVE-2014-3354, CVE-2023-20186, CVE-2020-3228, CVE-2025-20338, CVE-2023-20080, CVE-2021-1382, CVE-2016-6385, CVE-2019-1748, CVE-2025-20169, CVE-2018-0197, CVE-2025-20172, CVE-2016-6380, CVE-2024-20308, CVE-2014-3409, CVE-2023-44487, CVE-2019-1737, CVE-2018-0183, CVE-2017-6743, CVE-2013-6692, CVE-2025-20352 | {} |
| heuristics/extracted_sars | AGD_PRE.1, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ALC_CMS.1, AVA_VAN.1, ADV_FSP.1 | ALC_FLR.1, AVA_VAN.4, ALC_DVS.2 |
| heuristics/extracted_versions | 3.5.2 | 1.4.1.1, 2.0, 1.59 |
| heuristics/report_references/directly_referencing | {} | ANSSI-CC-2021/52 |
| heuristics/report_references/indirectly_referencing | {} | ANSSI-CC-PP-2018/03, ANSSI-CC-2021/52, ANSSI-CC-2018/61, ANSSI-CC-2020/21 |
| heuristics/protection_profiles | 573e14e647e056f2 | edccaca44d27fedc |
| protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-profil-pp-2021_02en.pdf |
| pdf_data/cert_filename | certificat-2022_311.4.1.1.pdf | |
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id | ||
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr | ||
| pdf_data/cert_keywords/cc_claims | ||
| pdf_data/cert_keywords/vendor | ||
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto | ||
| pdf_data/cert_keywords/asymmetric_crypto | ||
| pdf_data/cert_keywords/pq_crypto | ||
| pdf_data/cert_keywords/hash_function | ||
| pdf_data/cert_keywords/crypto_scheme | ||
| pdf_data/cert_keywords/crypto_protocol | ||
| pdf_data/cert_keywords/randomness | ||
| pdf_data/cert_keywords/cipher_mode | ||
| pdf_data/cert_keywords/ecc_curve | ||
| pdf_data/cert_keywords/crypto_engine | ||
| pdf_data/cert_keywords/tls_cipher_suite | ||
| pdf_data/cert_keywords/crypto_library | ||
| pdf_data/cert_keywords/vulnerability | ||
| pdf_data/cert_keywords/side_channel_analysis | ||
| pdf_data/cert_keywords/technical_report_id | ||
| pdf_data/cert_keywords/device_model | ||
| pdf_data/cert_keywords/tee_name | ||
| pdf_data/cert_keywords/os_name | ||
| pdf_data/cert_keywords/cplc_data | ||
| pdf_data/cert_keywords/ic_data_group | ||
| pdf_data/cert_keywords/standard_id | ||
| pdf_data/cert_keywords/javacard_version | ||
| pdf_data/cert_keywords/javacard_api_const | ||
| pdf_data/cert_keywords/javacard_packages | ||
| pdf_data/cert_keywords/certification_process | ||
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename | CRP276 Cisco Cat4K v1.0.pdf | anssi-cc-2022_31fr1.4.1.1.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_metadata |
|
|
| pdf_data/st_filename | CAT4K NDPP ST 20140207-Final-updated-UPDATED20140410-Final.pdf | anssi-cible-cc-2022_31en.pdf |
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
|
|
| pdf_data/st_keywords/cc_sfr |
|
|
| pdf_data/st_keywords/cc_claims |
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_metadata |
|
|
| state/cert/convert_ok | False | True |
| state/cert/download_ok | False | True |
| state/cert/extract_ok | False | True |
| state/cert/pdf_hash | Different | Different |
| state/cert/txt_hash | Different | Different |
| state/report/pdf_hash | Different | Different |
| state/report/txt_hash | Different | Different |
| state/st/pdf_hash | Different | Different |
| state/st/txt_hash | Different | Different |