This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Hillstone SG-6000 A-Series NGFW and StoneOS 5.5R9 NSCIB-CC-0476172-CR |
Lexmark MX522 and MX622h Multi-Function Printers with firmware version MXTGM.052.025 & Lexmark Secure Element (P/N 57X0185) 383-4-463 |
|
---|---|---|
name | Hillstone SG-6000 A-Series NGFW and StoneOS 5.5R9 | Lexmark MX522 and MX622h Multi-Function Printers with firmware version MXTGM.052.025 & Lexmark Secure Element (P/N 57X0185) |
category | Boundary Protection Devices and Systems | Multi-Function Devices |
scheme | NL | CA |
status | active | archived |
not_valid_after | 27.09.2027 | 05.03.2024 |
not_valid_before | 27.09.2022 | 05.03.2019 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-22-0476172-cert.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-463%20CT%20v1.1e%20-%20original%20signed.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0476172-CR-1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-463%20CR%201.0e.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0476172-ST_V1.1.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Lexmark%20HD%20MXTGM%20Security%20Target%2015.pdf |
manufacturer | Hillstone Network Corp. | Lexmark International, Inc. |
manufacturer_web | https://www.hillstonenet.com | https://www.lexmark.com/ |
security_level | ALC_FLR.1, EAL4 | {} |
dgst | 52ad5a3336fe5581 | 7049a80999dc6757 |
heuristics/cert_id | NSCIB-CC-0476172-CR | 383-4-463 |
heuristics/cert_lab | [] | |
heuristics/cpe_matches | {} | cpe:2.3:h:lexmark:mx622:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx522:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx522_firmware:-:*:*:*:*:*:*:* |
heuristics/related_cves | {} | CVE-2021-44735, CVE-2021-44737, CVE-2023-23560, CVE-2021-44738, CVE-2021-44734, CVE-2022-29850, CVE-2023-22960 |
heuristics/extracted_sars | ASE_INT.1, ALC_TAT.1, ADV_FSP.4, ASE_SPD.1, ASE_CCL.1, ADV_TDS.3, ALC_CMC.4, ALC_LCD.1, ATE_COV.2, ASE_REQ.2, ASE_OBJ.2, ASE_TSS.1, AGD_PRE.1, ASE_ECD.1, ALC_DEL.1, ATE_FUN.1, ADV_IMP.1, AGD_OPE.1, AVA_VAN.3, ALC_FLR.1, ALC_DVS.1, ADV_ARC.1, ATE_DPT.1, ALC_CMS.4, ATE_IND.2 | {} |
heuristics/extracted_versions | 5.5 | 052.025 |
heuristics/scheme_data |
|
|
heuristics/protection_profiles | {} | b2cfec7a92fa2940 |
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
pdf_data/cert_filename | NSCIB-CC-22-0476172-cert.pdf | 383-4-463 CT v1.1e - original signed.pdf |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | NSCIB-CC-0476172-CR-1.0.pdf | 383-4-463 CR 1.0e.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | NSCIB-CC-0476172-ST_V1.1.pdf | |
pdf_data/st_keywords/cc_cert_id | ||
pdf_data/st_keywords/cc_protection_profile_id | ||
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility | ||
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto | ||
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness | ||
pdf_data/st_keywords/cipher_mode | ||
pdf_data/st_keywords/ecc_curve | ||
pdf_data/st_keywords/crypto_engine | ||
pdf_data/st_keywords/tls_cipher_suite | ||
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability | ||
pdf_data/st_keywords/side_channel_analysis | ||
pdf_data/st_keywords/technical_report_id | ||
pdf_data/st_keywords/device_model | ||
pdf_data/st_keywords/tee_name | ||
pdf_data/st_keywords/os_name | ||
pdf_data/st_keywords/cplc_data | ||
pdf_data/st_keywords/ic_data_group | ||
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version | ||
pdf_data/st_keywords/javacard_api_const | ||
pdf_data/st_keywords/javacard_packages | ||
pdf_data/st_keywords/certification_process | ||
pdf_data/st_metadata |
|
|
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/convert_ok | True | False |
state/st/download_ok | True | False |
state/st/extract_ok | True | False |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |