This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Memory Management Unit des microcontrôleurs SAMSUNG S3FT9KF/ S3FT9KT/ S3FT9KS en révision 1 ANSSI-CC-2013/12 |
Cisco Identity Services Engine (ISE) v1.2 CCEVS-VR-VID-10521-2014 |
|
---|---|---|
name | Memory Management Unit des microcontrôleurs SAMSUNG S3FT9KF/ S3FT9KT/ S3FT9KS en révision 1 | Cisco Identity Services Engine (ISE) v1.2 |
category | ICs, Smart Cards and Smart Card-Related Devices and Systems | Network and Network-Related Devices and Systems |
scheme | FR | US |
not_valid_after | 01.09.2019 | 30.01.2016 |
not_valid_before | 29.03.2013 | 30.01.2014 |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2013_12_fr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10521-vr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-cible2013_12.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10521-st.pdf |
manufacturer | Samsung Electronics Co., Ltd. / Trusted Labs | Cisco Systems, Inc. |
manufacturer_web | https://www.samsung.com | https://www.cisco.com |
security_level | EAL7 | {} |
dgst | 41aca82318ab31a2 | 37f4d6d0594d9d39 |
heuristics/cert_id | ANSSI-CC-2013/12 | CCEVS-VR-VID-10521-2014 |
heuristics/cert_lab | [] | US |
heuristics/cpe_matches | {} | cpe:2.3:a:cisco:identity_services_engine:1.2\(1.199\):*:*:*:*:*:*:*, cpe:2.3:a:cisco:identity_services_engine:1.2.1:*:*:*:*:*:*:*, cpe:2.3:a:cisco:identity_services_engine:1.2:*:*:*:*:*:*:*, cpe:2.3:a:cisco:identity_services_engine_software:1.2:*:*:*:*:*:*:*, cpe:2.3:a:cisco:identity_services_engine_software:1.2.1:*:*:*:*:*:*:* |
heuristics/related_cves | {} | CVE-2025-20125, CVE-2020-3149, CVE-2023-20087, CVE-2025-20124, CVE-2023-20174, CVE-2013-5525, CVE-2021-40123, CVE-2019-12638, CVE-2021-1605, CVE-2023-20077, CVE-2020-3157, CVE-2022-20965, CVE-2014-3275, CVE-2019-12631, CVE-2021-34706, CVE-2014-0681, CVE-2015-6323, CVE-2021-1604, CVE-2021-1416, CVE-2021-44228, CVE-2021-1606, CVE-2020-3340, CVE-2019-12637, CVE-2021-1412, CVE-2019-12644, CVE-2023-20030, CVE-2022-20961, CVE-2019-1941, CVE-2023-20111, CVE-2013-5530, CVE-2023-20194, CVE-2014-3276, CVE-2024-20251, CVE-2022-20963, CVE-2021-34759, CVE-2023-20193, CVE-2019-1942, CVE-2021-1607, CVE-2015-4182, CVE-2021-1603, CVE-2023-20167, CVE-2023-20173, CVE-2022-20967, CVE-2019-15282, CVE-2019-15281, CVE-2024-20476, CVE-2021-40121, CVE-2020-27122, CVE-2022-20819, CVE-2022-20937, CVE-2013-5523, CVE-2018-0091, CVE-2023-20163, CVE-2020-3467, CVE-2022-20966, CVE-2022-20964, CVE-2023-20164, CVE-2013-5524, CVE-2021-1306, CVE-2021-34738 |
heuristics/extracted_sars | ADV_ARC.1, ATE_COV.3, ALC_DVS.2, ADV_TDS.6, ASE_OBJ.2, ASE_SPD.1, AGD_PRE.1, ALC_DEL.1, ADV_FSP.6, ALC_TAT.3, ADV_IMP.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1, ASE_INT.1, AVA_VAN.5, ALC_LCD.2, ALC_CMS.5, ALC_CMC.5, ASE_CCL.1, ATE_DPT.4, ADV_INT.3, ATE_FUN.2, ATE_IND.3, ADV_SPM.1, AGD_OPE.1 | ADV_FSP.1, AGD_PRE.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_CMC.1 |
heuristics/extracted_versions | 1 | 1.2 |
heuristics/report_references/directly_referencing | ANSSI-CC-2012/27 | {} |
heuristics/report_references/indirectly_referencing | ANSSI-CC-2012/27 | {} |
heuristics/protection_profiles | {} | ac9abe3d5c5a31f0 |
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
pdf_data/report_filename | ANSSI-CC-2013_12_fr.pdf | st_vid10521-vr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | anssi-cc-cible2013_12.pdf | st_vid10521-st.pdf |
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |