This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
| E.siqia SignCubes, Version 1.5 BSI-DSZ-CC-0252-2004 |
Cisco Catalyst 3850 Series Switches running IOS-XE 3.6.0E and Catalyst 6500 Series Switches running IOS 15.1(2)SY3 NSCIB-CC-14-39582-CR |
|
|---|---|---|
| name | E.siqia SignCubes, Version 1.5 | Cisco Catalyst 3850 Series Switches running IOS-XE 3.6.0E and Catalyst 6500 Series Switches running IOS 15.1(2)SY3 |
| category | Products for Digital Signatures | Network and Network-Related Devices and Systems |
| scheme | DE | NL |
| not_valid_after | 01.09.2019 | 27.11.2019 |
| not_valid_before | 22.07.2004 | 27.11.2014 |
| report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0252.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CR]%20NSCIB-CC-14-39582-CR.pdf |
| st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST]%20Cisco_Cat3850Cat6500_ST_v1.0_Final.pdf | |
| manufacturer | e.Siqia Informationstechnologien GMBH | Cisco Systems, Inc. |
| manufacturer_web | https://www.esiqia.com/ | https://www.cisco.com |
| dgst | 30e5fb9138d6a202 | ee9e51c93091fca8 |
| heuristics/cert_id | BSI-DSZ-CC-0252-2004 | NSCIB-CC-14-39582-CR |
| heuristics/cert_lab | BSI | |
| heuristics/cpe_matches | {} | cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:* |
| heuristics/related_cves | {} | CVE-2019-1750, CVE-2024-20312, CVE-2023-20109, CVE-2023-20097, CVE-2017-3861, CVE-2025-20199, CVE-2016-6386, CVE-2017-12228, CVE-2016-1409, CVE-2021-34699, CVE-2017-6606, CVE-2019-1746, CVE-2018-0193, CVE-2020-3230, CVE-2023-20076, CVE-2021-34729, CVE-2016-6384, CVE-2020-3209, CVE-2024-20271, CVE-2019-1761, CVE-2020-3200, CVE-2017-6742, CVE-2022-20920, CVE-2017-6736, CVE-2024-20433, CVE-2023-20056, CVE-2020-3204, CVE-2025-20171, CVE-2016-1384, CVE-2017-3857, CVE-2017-6738, CVE-2025-20201, CVE-2018-0188, CVE-2020-3444, CVE-2021-1616, CVE-2025-20170, CVE-2018-0184, CVE-2018-0182, CVE-2018-0185, CVE-2025-20175, CVE-2018-0195, CVE-2016-6381, CVE-2018-0189, CVE-2021-1384, CVE-2017-6737, CVE-2018-0186, CVE-2017-3862, CVE-2025-20176, CVE-2025-20200, CVE-2015-0685, CVE-2024-20414, CVE-2020-3516, CVE-2017-6739, CVE-2016-6415, CVE-2013-6981, CVE-2017-3864, CVE-2018-0194, CVE-2021-1625, CVE-2018-0190, CVE-2019-16009, CVE-2016-6393, CVE-2017-3856, CVE-2017-6740, CVE-2025-20173, CVE-2014-2146, CVE-2023-20186, CVE-2020-3228, CVE-2017-6770, CVE-2025-20338, CVE-2023-20080, CVE-2021-1382, CVE-2016-6385, CVE-2019-1748, CVE-2025-20169, CVE-2018-0197, CVE-2025-20172, CVE-2016-6380, CVE-2017-3860, CVE-2024-20308, CVE-2014-3409, CVE-2016-6382, CVE-2023-44487, CVE-2019-1737, CVE-2018-0183, CVE-2017-6743, CVE-2017-3863, CVE-2013-6692, CVE-2025-20352 |
| heuristics/extracted_sars | ADV_LLD.1, ALC_TAT.1, AVA_VLA.4, AVA_MSU.3, ADV_IMP.1 | ALC_LCD.1, ALC_CMS.3, AGD_PRE.1, ATE_FUN.1, ATE_IND.2, ATE_DPT.1, AGD_OPE.1, ATE_COV.2, ALC_CMC.3, AVA_VAN.2, ADV_TDS.2, ALC_DEL.1, ADV_FSP.3, ADV_ARC.1, ALC_DVS.1 |
| heuristics/extracted_versions | 1.5 | 15.1, 3.6.0 |
| pdf_data/report_filename | 0252.pdf | [CR] NSCIB-CC-14-39582-CR.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_metadata |
|
|
| pdf_data/st_filename | [ST] Cisco_Cat3850Cat6500_ST_v1.0_Final.pdf | |
| pdf_data/st_keywords/cc_cert_id | ||
| pdf_data/st_keywords/cc_protection_profile_id | ||
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
|
|
| pdf_data/st_keywords/cc_sfr |
|
|
| pdf_data/st_keywords/cc_claims |
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility | ||
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto | ||
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve | ||
| pdf_data/st_keywords/crypto_engine | ||
| pdf_data/st_keywords/tls_cipher_suite | ||
| pdf_data/st_keywords/crypto_library | ||
| pdf_data/st_keywords/vulnerability | ||
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id | ||
| pdf_data/st_keywords/device_model | ||
| pdf_data/st_keywords/tee_name | ||
| pdf_data/st_keywords/os_name | ||
| pdf_data/st_keywords/cplc_data | ||
| pdf_data/st_keywords/ic_data_group | ||
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_keywords/javacard_version | ||
| pdf_data/st_keywords/javacard_api_const | ||
| pdf_data/st_keywords/javacard_packages | ||
| pdf_data/st_keywords/certification_process | ||
| pdf_data/st_metadata |
|
|
| state/report/pdf_hash | Different | Different |
| state/report/txt_hash | Different | Different |
| state/st/convert_ok | False | True |
| state/st/download_ok | False | True |
| state/st/extract_ok | False | True |
| state/st/pdf_hash | Different | Different |
| state/st/txt_hash | Different | Different |