Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Adder AVS-4228, AVS-42216, XDS441, XDS441FXFirmware Version 44404-E7E7 Peripheral Sharing Devices
540-EWA
Logiciel Embarqué dans le multiplexeur 9500 Microwave Packet Radio, version R8.0.1 (version 08.00.1W pour le multiplexeur, version 35.41.20 pour la carte CorEvo)
ANSSI-CC-2020/77
name Adder AVS-4228, AVS-42216, XDS441, XDS441FXFirmware Version 44404-E7E7 Peripheral Sharing Devices Logiciel Embarqué dans le multiplexeur 9500 Microwave Packet Radio, version R8.0.1 (version 08.00.1W pour le multiplexeur, version 35.41.20 pour la carte CorEvo)
category Other Devices and Systems Network and Network-Related Devices and Systems
scheme CA FR
not_valid_after 07.12.2027 09.09.2025
not_valid_before 07.12.2022 09.09.2020
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/540-EWA%20CT.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2020_77.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/540-EWA%20CR.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_77fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Adder_CFG_PSD-KM-VI_Combined_ST_1.6.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_77en.pdf
manufacturer Adder Technology Ltd Nokia Corporation
manufacturer_web https://www.adder.com/ https://www.nokia.com/
security_level {} EAL3+, AVA_VAN.3, ALC_FLR.3
dgst 3120cab383c481d0 9c74ea2fe7fe6d2f
heuristics/cert_id 540-EWA ANSSI-CC-2020/77
heuristics/cert_lab CANADA []
heuristics/cpe_matches {} cpe:2.3:a:nokia:9500:-:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2005-1801
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_REQ.2, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ADV_TDS.2, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1
heuristics/extracted_versions 44404, 42216, 4228 8.0.1, 35.41.20, 08.00.1
heuristics/report_references/directly_referencing {} ANSSI-CC-2017/57
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2017/57
heuristics/scheme_data
  • certification_date: 07.12.2022
  • level: PP_PSD_V4.0 with MOD_KM_V1.0, MOD_VI_V1.0
  • product: Adder AVS-4228, AVS-42216, XDS441, XDS441FX Firmware Version 44404-E7E7 Peripheral Sharing Devices Adder AVS-4228, AVS-42216 Firmware Version 44404-E7E7 Peripheral Sharing Devices (August 2023)
  • vendor: Adder Technology
heuristics/st_references/directly_referencing {} ANSSI-CC-2017/57
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2017/57
heuristics/protection_profiles 42cf355b24450489, 76f8f05a35d87f59, 814f66c77bc7f33b {}
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vi_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_km_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psd_v4.0.pdf {}
pdf_data/cert_filename 540-EWA CT.pdf certificat-2020_77.pdf
pdf_data/cert_keywords/cc_cert_id
  • CA:
    • 540-EWA: 1
  • FR:
    • ANSSI-CC-2020/77: 2
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL3: 2
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 1
  • AVA:
    • AVA_VAN.3: 1
pdf_data/cert_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • AMOSSYS:
    • AMOSSYS: 2
pdf_data/cert_metadata
  • /Author: Morey, Robert B.
  • /Company: CSEC-CSTC
  • /CreationDate: D:20221221095343-05'00'
  • /Creator: Foxit Software Inc.
  • /Keywords:
  • /ModDate: D:20221221095343-05'00'
  • /Producer: Foxit PDF Creator Version 12.0.0.15105
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 393626
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20200914132255+02'00'
  • /ModDate: D:20200914132255+02'00'
  • pdf_file_size_bytes: 135301
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename 540-EWA CR.pdf anssi-cc-2020_77fr.pdf
pdf_data/report_frontpage
  • FR:
  • CA:
    • cert_id: 540-EWA
    • cert_lab: CANADA
  • FR:
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 540-EWA: 1
  • FR:
    • ANSSI-CC-2017/57: 2
    • ANSSI-CC-2020/77: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 3: 3
    • EAL 5: 1
    • EAL 7: 1
    • EAL2: 2
    • EAL3: 1
    • EAL4: 1
  • ITSEC:
    • ITSEC E3 Elémentaire: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_FLR: 2
    • ALC_FLR.3: 2
    • ALC_LCD: 1
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.3: 4
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • AMOSSYS:
    • AMOSSYS: 4
  • CESTI:
    • CESTI: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • RC:
      • RC2: 1
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 2
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
pdf_data/report_metadata
pdf_data/st_filename Adder_CFG_PSD-KM-VI_Combined_ST_1.6.pdf anssi-cible-cc-2020_77en.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2017/57: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 2
    • EAL3+: 68
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 3
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.3: 4
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 5
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 3
  • FDP:
    • FDP_APC_EXT: 25
    • FDP_APC_EXT.1: 17
    • FDP_APC_EXT.1.1: 1
    • FDP_APC_EXT.1.2: 1
    • FDP_APC_EXT.1.3: 1
    • FDP_APC_EXT.1.4: 1
    • FDP_CDS_EXT: 4
    • FDP_CDS_EXT.1: 19
    • FDP_CDS_EXT.1.1: 4
    • FDP_FIL_EXT: 16
    • FDP_FIL_EXT.1: 7
    • FDP_FIL_EXT.1.1: 1
    • FDP_FIL_EXT.1.2: 1
    • FDP_FIL_EXT.1.3: 1
    • FDP_FLS_EXT: 1
    • FDP_IPC_EXT: 4
    • FDP_IPC_EXT.1: 19
    • FDP_IPC_EXT.1.1: 4
    • FDP_IPC_EXT.1.2: 4
    • FDP_PDC_EXT: 30
    • FDP_PDC_EXT.1: 31
    • FDP_PDC_EXT.1.1: 2
    • FDP_PDC_EXT.1.2: 1
    • FDP_PDC_EXT.1.3: 1
    • FDP_PDC_EXT.1.4: 1
    • FDP_PDC_EXT.1.5: 1
    • FDP_PDC_EXT.2: 12
    • FDP_PDC_EXT.2.1: 1
    • FDP_PDC_EXT.2.2: 1
    • FDP_PDC_EXT.3: 12
    • FDP_PDC_EXT.3.1: 1
    • FDP_PDC_EXT.3.2: 1
    • FDP_RDR_EXT: 4
    • FDP_RDR_EXT.1: 15
    • FDP_RDR_EXT.1.1: 2
    • FDP_RIP: 8
    • FDP_RIP.1: 2
    • FDP_RIP_EXT: 4
    • FDP_RIP_EXT.1: 9
    • FDP_RIP_EXT.1.1: 2
    • FDP_SPR_EXT: 18
    • FDP_SPR_EXT.1: 6
    • FDP_SPR_EXT.1.1: 1
    • FDP_SWI_EXT: 4
    • FDP_SWI_EXT.1: 22
    • FDP_SWI_EXT.1.1: 4
    • FDP_SWI_EXT.2: 13
    • FDP_SWI_EXT.2.1: 3
    • FDP_SWI_EXT.2.2: 3
    • FDP_SWI_EXT.3: 16
    • FDP_SWI_EXT.3.1: 3
    • FDP_UDF_EXT: 16
    • FDP_UDF_EXT.1: 6
    • FDP_UDF_EXT.1.1: 1
  • FPT:
    • FPT_FLS_EXT: 3
    • FPT_FLS_EXT.1: 10
    • FPT_FLS_EXT.1.1: 3
    • FPT_NTA_EXT: 4
    • FPT_NTA_EXT.1: 8
    • FPT_NTA_EXT.1.1: 2
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 2
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST_EXT: 4
    • FPT_TST_EXT.1: 20
    • FPT_TST_EXT.1.1: 4
  • FTA:
    • FTA_CIN_EXT: 4
    • FTA_CIN_EXT.1: 14
    • FTA_CIN_EXT.1.1: 3
    • FTA_CIN_EXT.1.2: 3
    • FTA_CIN_EXT.1.3: 3
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 1
    • FAU_STG: 2
    • FAU_STG_EXT: 1
    • FAU_STG_EXT.1: 13
    • FAU_STG_EXT.1.1: 2
    • FAU_STG_EXT.2: 4
    • FAU_STG_EXT.2.1: 1
    • FAU_STG_EXT.3: 9
    • FAU_STG_EXT.3.1: 2
  • FCS:
    • FCS_CKM.1: 7
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 15
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC.1: 16
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 16
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 7
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 1
    • FIA_SSL.3: 1
    • FIA_UAU.1: 3
    • FIA_UAU.2: 12
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 6
    • FIA_UID.2: 14
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.3: 5
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RCV.1: 1
    • FPT_RCV.2: 5
    • FPT_RCV.2.1: 1
    • FPT_RCV.2.2: 1
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TUD_EXT: 4
    • FPT_TUD_EXT.1: 10
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 2
  • FTA:
    • FTA_SSL.3: 4
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 4
    • FTA_SSL.4.1: 1
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_PHYSICAL: 1
    • A.NO_SPECIAL: 1
    • A.NO_SPECIAL_ANALOG: 1
    • A.NO_TEMPEST: 2
    • A.NO_WIRELESS: 1
    • A.NO_WIRELESS_DEVICES: 1
    • A.PHYSICAL: 1
    • A.TRUSTED: 1
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 1
    • A.USER_ALLOWED: 1
    • A.USER_ALLOWED_ACCESS: 1
  • O:
    • O.ANTI_TAMPERING: 2
    • O.AUTHORIZED: 2
    • O.COMPUTER: 5
    • O.EMULATED_INPUT: 3
    • O.LEAK: 1
    • O.LEAK_PREVENTION: 1
    • O.NO_OTHER: 3
    • O.NO_TOE_ACCESS: 2
    • O.NO_USER: 1
    • O.NO_USER_DATA: 1
    • O.PERIPHERAL: 1
    • O.PERIPHERAL_PORTS: 1
    • O.PROTECTED: 1
    • O.PROTECTED_EDID: 3
    • O.REJECT: 4
    • O.SELF_TEST: 4
    • O.SELF_TEST_FAIL: 2
    • O.TAMPER: 1
    • O.TAMPER_EVIDENT: 2
    • O.UNIDIRECTIONAL: 7
    • O.USER_DATA: 2
  • OE:
    • OE.NO_SPECIAL: 1
    • OE.NO_SPECIAL_ANALOG: 1
    • OE.NO_TEMPEST: 2
    • OE.NO_WIRELESS: 1
    • OE.NO_WIRELESS_DEVICES: 1
    • OE.PHYSICAL: 3
    • OE.TRUSTED: 2
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • T:
    • T.DATA_LEAK: 2
    • T.FAILED: 2
    • T.LOGICAL: 1
    • T.LOGICAL_TAMPER: 1
    • T.PHYSICAL: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 2
    • T.RESIDUAL: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 2
    • T.UNAUTHORIZED: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED: 1
    • T.UNINTENDED_USE: 1
  • A:
    • A.GENERAL_PURPOSE: 1
  • O:
    • O.ALARM: 1
    • O.AUDIT: 4
    • O.MANAGEMENT: 1
    • O.RESIDUAL_INFO_CLEARING: 1
    • O.ROLES: 1
    • O.SELF_TEST: 2
  • OE:
    • OE.GENERAL_PURPOSE: 2
    • OE.TRUSTED_ADMIN: 1
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • Intertek:
    • Intertek: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
      • AES-256: 2
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA 4096: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-512: 1
      • SHA512: 2
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 1
  • SSH:
    • SSH: 11
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 4
      • TLS v1.2: 1
  • VPN:
    • VPN: 8
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CTR:
    • CTR: 5
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 6
pdf_data/st_keywords/device_model
  • STM:
    • STM32:
      • STM32F070C6T6: 3
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 180-4: 1
    • FIPS 186-4: 1
    • FIPS 197: 1
  • RFC:
    • RFC 3411: 2
    • RFC 4251: 2
    • RFC 4346: 1
pdf_data/st_metadata
  • /Author: janeau1
  • /CreationDate: D:20200728113642+02'00'
  • /ModDate: D:20200728113642+02'00'
  • /Producer: Microsoft: Print To PDF
  • /Title: Microsoft Word - Security Target Nokia 9500 MPR (QSTD) v1.07.docx
  • pdf_file_size_bytes: 1763088
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 68
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different