This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Lexmark CX622h, CX625h, CX921, CX922, CX923, CX924, MX522, MX622h, MX721h, MX722h, MX822, and MX826 with HD CSEC2017017 |
Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4(watchOS 10.4 (build 21T216)) ANSSI-CC-2024/41 |
|
---|---|---|
name | Lexmark CX622h, CX625h, CX921, CX922, CX923, CX924, MX522, MX622h, MX721h, MX722h, MX822, and MX826 with HD | Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4(watchOS 10.4 (build 21T216)) |
category | Multi-Function Devices | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | SE | FR |
status | archived | active |
not_valid_after | 19.06.2024 | 08.01.2030 |
not_valid_before | 19.06.2019 | 08.01.2025 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificate%20Lexmark%20MFP%20wHD%202017%20CCRA.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2024_41fr.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20Lexmark%202017%20MFD%20wHD.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_41fr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Lexmark%20HD%20Security%20Target%20111.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2024_41en.pdf |
manufacturer | Lexmark International, Inc. | Apple Inc. |
manufacturer_web | https://www.lexmark.com/ | https://www.apple.com/ |
security_level | EAL3, ALC_FLR.3 | EAL2+, ADV_FSP.3, ALC_FLR.3 |
dgst | 44e6981b1653ed8b | e5bae93bf2719158 |
heuristics/cert_id | CSEC2017017 | ANSSI-CC-2024/41 |
heuristics/cpe_matches | cpe:2.3:h:lexmark:mx522:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx822:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx924:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx923:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx921:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx826:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx622:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx922:-:*:*:*:*:*:*:* | cpe:2.3:o:apple:watchos:10.4:*:*:*:*:*:*:* |
heuristics/related_cves | {} | CVE-2024-44255, CVE-2024-54534, CVE-2024-44302, CVE-2024-27801, CVE-2024-54502, CVE-2025-24160, CVE-2024-44192, CVE-2024-54542, CVE-2024-44225, CVE-2024-44254, CVE-2024-27805, CVE-2024-40850, CVE-2024-54514, CVE-2024-40784, CVE-2024-54525, CVE-2024-27821, CVE-2024-44278, CVE-2024-27834, CVE-2024-40806, CVE-2024-44191, CVE-2025-24123, CVE-2024-54551, CVE-2024-44269, CVE-2024-27808, CVE-2025-24117, CVE-2024-44183, CVE-2024-40822, CVE-2024-44198, CVE-2024-27840, CVE-2024-40793, CVE-2024-44194, CVE-2024-40795, CVE-2024-40824, CVE-2024-40835, CVE-2024-54530, CVE-2024-27880, CVE-2024-27830, CVE-2024-44244, CVE-2024-44297, CVE-2024-27851, CVE-2024-40774, CVE-2024-44296, CVE-2024-54468, CVE-2024-44290, CVE-2024-54479, CVE-2025-24137, CVE-2024-54517, CVE-2024-27826, CVE-2024-27811, CVE-2024-54499, CVE-2024-40857, CVE-2024-44240, CVE-2024-40818, CVE-2025-24158, CVE-2024-44187, CVE-2025-24086, CVE-2024-44233, CVE-2024-44170, CVE-2024-54497, CVE-2024-27838, CVE-2024-54527, CVE-2024-40779, CVE-2024-54523, CVE-2024-27823, CVE-2024-27815, CVE-2024-40813, CVE-2024-40788, CVE-2024-40776, CVE-2024-54494, CVE-2025-24124, CVE-2024-54500, CVE-2024-27814, CVE-2024-44144, CVE-2024-54538, CVE-2024-27816, CVE-2024-27884, CVE-2024-44215, CVE-2024-40815, CVE-2025-24131, CVE-2024-54560, CVE-2024-27820, CVE-2024-44176, CVE-2024-40785, CVE-2024-44282, CVE-2025-24159, CVE-2024-44273, CVE-2024-54543, CVE-2024-54501, CVE-2024-27806, CVE-2025-24162, CVE-2024-44155, CVE-2024-27832, CVE-2025-24126, CVE-2024-23282, CVE-2025-24161, CVE-2024-54478, CVE-2024-54486, CVE-2024-27800, CVE-2024-27810, CVE-2024-27804, CVE-2024-54522, CVE-2024-40812, CVE-2024-54513, CVE-2024-54512, CVE-2024-54508, CVE-2024-54510, CVE-2024-40777, CVE-2024-54467, CVE-2024-44212, CVE-2024-40787, CVE-2024-40805, CVE-2024-44185, CVE-2024-40799, CVE-2024-40829, CVE-2024-27828, CVE-2024-44285, CVE-2024-54535, CVE-2024-44239, CVE-2024-44234, CVE-2025-24163, CVE-2025-24129, CVE-2024-44274, CVE-2024-40782, CVE-2024-44171, CVE-2024-54505, CVE-2024-40809, CVE-2024-27863, CVE-2024-23251, CVE-2024-44169, CVE-2024-54526, CVE-2024-27856, CVE-2024-54541, CVE-2024-40780, CVE-2025-24085, CVE-2024-54518, CVE-2025-24149, CVE-2025-24107, CVE-2024-40836, CVE-2024-40789, CVE-2024-44232 |
heuristics/extracted_sars | ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 | ASE_INT.1, AVA_VAN.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
heuristics/extracted_versions | - | 10.4 |
pdf_data/cert_filename | Certificate Lexmark MFP wHD 2017 CCRA.pdf | Certificat-ANSSI-CC-2024_41fr.pdf |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | Certification Report Lexmark 2017 MFD wHD.pdf | ANSSI-CC-2024_41fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | Lexmark HD Security Target 111.pdf | ANSSI-Cible-CC-2024_41en.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |