This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Fortinet Fortiweb 5.6 383-4-425 |
ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC with PACE configuration (Version 4.0.1.52) ANSSI-CC-2023/11 |
|
---|---|---|
name | Fortinet Fortiweb 5.6 | ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC with PACE configuration (Version 4.0.1.52) |
category | Network and Network-Related Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | CA | FR |
status | archived | active |
not_valid_after | 05.12.2022 | 01.03.2028 |
not_valid_before | 05.12.2017 | 01.03.2023 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-425%20CT%20v1.0e.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2023_11cdv4eacpace.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-425%20CR%20v1.0e.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2023_11_eac_pace.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-425%20ST%20v1.10.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2023_11en.pdf |
manufacturer | Fortinet, Inc. | NXP Semiconductors |
manufacturer_web | https://www.fortinet.com/ | https://www.nxp.com/ |
security_level | {} | EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst | 2f43218020fc327c | ada28370064d4e9b |
heuristics/cert_id | 383-4-425 | ANSSI-CC-2023/11 |
heuristics/cpe_matches | cpe:2.3:a:fortinet:fortiweb:5.6.1:*:*:*:*:*:*:*, cpe:2.3:a:fortinet:fortiweb:5.6.0:*:*:*:*:*:*:*, cpe:2.3:a:fortinet:fortiweb:5.6.2:*:*:*:*:*:*:* | {} |
heuristics/related_cves | CVE-2017-7736, CVE-2019-16157, CVE-2021-22122, CVE-2017-3129, CVE-2017-7737, CVE-2020-29019, CVE-2023-25602, CVE-2019-5590, CVE-2021-36182, CVE-2021-42756, CVE-2020-29015, CVE-2021-36193, CVE-2021-42757, CVE-2020-29016, CVE-2021-42761, CVE-2021-36179, CVE-2020-6646, CVE-2017-14191 | {} |
heuristics/extracted_sars | ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 | ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions | 5.6 | 4.0.1.52, 4.5 |
heuristics/report_references/directly_referencing | {} | NSCIB-CC-0313985-CR, BSI-DSZ-CC-1149-2022 |
heuristics/report_references/indirectly_referencing | {} | NSCIB-CC-0313985-CR, BSI-DSZ-CC-1149-2022 |
heuristics/st_references/directly_referencing | {} | BSI-DSZ-CC-1149-2022 |
heuristics/st_references/indirectly_referencing | {} | BSI-DSZ-CC-1149-2022 |
heuristics/protection_profiles | c7cf611c6bb1e4b0 | a33327d40f253f46, b380aabf93b29692 |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf |
pdf_data/cert_filename | 383-4-425 CT v1.0e.pdf | certificat-2023_11cdv4eacpace.pdf |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | 383-4-425 CR v1.0e.pdf | anssi-cc-2023_11_eac_pace.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | 383-4-425 ST v1.10.pdf | anssi-cible-cc-2023_11en.pdf |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/extract_ok | True | False |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/extract_ok | True | False |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |