This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
| Cisco Catalyst 4500 Series switches (4503-E, 4506-E, 4507R+E, 4510R+E, 4500X and 4500X-F) running IOS-XE 3.5.2E CRP276 |
Hewlett Packard Enterprise StoreOnce System Version 3.13 383-4-364 |
|
|---|---|---|
| name | Cisco Catalyst 4500 Series switches (4503-E, 4506-E, 4507R+E, 4510R+E, 4500X and 4500X-F) running IOS-XE 3.5.2E | Hewlett Packard Enterprise StoreOnce System Version 3.13 |
| scheme | UK | CA |
| not_valid_after | 30.04.2019 | 13.10.2021 |
| not_valid_before | 30.04.2014 | 13.10.2016 |
| cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-364%20ctv1.0e.docx | |
| report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP276%20Cisco%20Cat4K%20v1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-364%20CR%20v1.0e.pdf |
| st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CAT4K%20NDPP%20ST%2020140207-Final-updated-UPDATED20140410-Final.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-364%20Security%20Target%20-%20HPE%20StoreOnce%20Backup%20System%203.13%20-%20v1.2.pdf |
| manufacturer | Cisco Systems, Inc. | Hewlett Packard Enterprise |
| manufacturer_web | https://www.cisco.com | https://www.hpe.com/ |
| security_level | {} | EAL2+, ALC_FLR.2 |
| dgst | 2ae58c071bd55ee4 | ee85115b3a1d657b |
| heuristics/cert_id | CRP276 | 383-4-364 |
| heuristics/cpe_matches | cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:* | {} |
| heuristics/related_cves | CVE-2024-20312, CVE-2023-20109, CVE-2023-20097, CVE-2014-3327, CVE-2025-20199, CVE-2016-6386, CVE-2017-12228, CVE-2016-1409, CVE-2021-34699, CVE-2017-6606, CVE-2019-1746, CVE-2018-0193, CVE-2020-3230, CVE-2023-20076, CVE-2021-34729, CVE-2016-6384, CVE-2020-3209, CVE-2024-20271, CVE-2019-1761, CVE-2020-3200, CVE-2017-6742, CVE-2022-20920, CVE-2017-6736, CVE-2024-20433, CVE-2023-20056, CVE-2020-3204, CVE-2025-20171, CVE-2016-1384, CVE-2017-3857, CVE-2017-6738, CVE-2025-20201, CVE-2018-0188, CVE-2020-3444, CVE-2021-1616, CVE-2025-20170, CVE-2018-0184, CVE-2018-0182, CVE-2018-0185, CVE-2025-20175, CVE-2018-0195, CVE-2016-6381, CVE-2016-6392, CVE-2018-0189, CVE-2021-1384, CVE-2017-6737, CVE-2018-0186, CVE-2025-20176, CVE-2025-20200, CVE-2015-0685, CVE-2024-20414, CVE-2020-3516, CVE-2017-6739, CVE-2016-6415, CVE-2013-6981, CVE-2017-3864, CVE-2018-0194, CVE-2021-1625, CVE-2018-0190, CVE-2019-16009, CVE-2016-6393, CVE-2017-3856, CVE-2017-6740, CVE-2025-20173, CVE-2014-2146, CVE-2014-3354, CVE-2023-20186, CVE-2020-3228, CVE-2025-20338, CVE-2023-20080, CVE-2021-1382, CVE-2016-6385, CVE-2019-1748, CVE-2025-20169, CVE-2018-0197, CVE-2025-20172, CVE-2016-6380, CVE-2024-20308, CVE-2014-3409, CVE-2023-44487, CVE-2019-1737, CVE-2018-0183, CVE-2017-6743, CVE-2013-6692, CVE-2025-20352 | {} |
| heuristics/extracted_sars | AGD_PRE.1, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ALC_CMS.1, AVA_VAN.1, ADV_FSP.1 | ALC_FLR.2 |
| heuristics/extracted_versions | 3.5.2 | 3.13 |
| heuristics/protection_profiles | 573e14e647e056f2 | {} |
| protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.0.pdf | {} |
| pdf_data/cert_filename | 383-4-364 ctv1.0e.docx | |
| pdf_data/report_filename | CRP276 Cisco Cat4K v1.0.pdf | 383-4-364 CR v1.0e.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_metadata |
|
|
| pdf_data/st_filename | CAT4K NDPP ST 20140207-Final-updated-UPDATED20140410-Final.pdf | |
| pdf_data/st_keywords/cc_cert_id | ||
| pdf_data/st_keywords/cc_protection_profile_id | ||
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
|
|
| pdf_data/st_keywords/cc_sfr |
|
|
| pdf_data/st_keywords/cc_claims |
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility | ||
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto | ||
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve | ||
| pdf_data/st_keywords/crypto_engine | ||
| pdf_data/st_keywords/tls_cipher_suite | ||
| pdf_data/st_keywords/crypto_library | ||
| pdf_data/st_keywords/vulnerability | ||
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id | ||
| pdf_data/st_keywords/device_model | ||
| pdf_data/st_keywords/tee_name | ||
| pdf_data/st_keywords/os_name | ||
| pdf_data/st_keywords/cplc_data | ||
| pdf_data/st_keywords/ic_data_group | ||
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_keywords/javacard_version | ||
| pdf_data/st_keywords/javacard_api_const | ||
| pdf_data/st_keywords/javacard_packages | ||
| pdf_data/st_keywords/certification_process | ||
| pdf_data/st_metadata |
|
|
| state/cert/download_ok | False | True |
| state/cert/pdf_hash | Different | Different |
| state/report/pdf_hash | Different | Different |
| state/report/txt_hash | Different | Different |
| state/st/convert_ok | True | False |
| state/st/download_ok | True | False |
| state/st/extract_ok | True | False |
| state/st/pdf_hash | Different | Different |
| state/st/txt_hash | Different | Different |