This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
ECOSYS M3860idnf, ECOSYS M3860idnfG(KYOCERA), P-6038ifMFP(TA Triumph-Adler/UTAX), with HDD None |
Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T-Series Core Routers and EX-Series Ethernet Switches Running Junos 12.1R3.5 CCEVS-VR-VID-10517-2014 |
|
---|---|---|
name | ECOSYS M3860idnf, ECOSYS M3860idnfG(KYOCERA), P-6038ifMFP(TA Triumph-Adler/UTAX), with HDD | Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T-Series Core Routers and EX-Series Ethernet Switches Running Junos 12.1R3.5 |
category | Multi-Function Devices | Network and Network-Related Devices and Systems |
scheme | SE | US |
status | active | archived |
not_valid_after | 26.05.2025 | 07.05.2016 |
not_valid_before | 26.05.2020 | 07.03.2014 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Kyocera%20ECOSYS%20with%20HDD%20-%20Certifikat%20CCRA_signerat.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Kyocera%20ECOSYS%20with%20HDD%20-%20Certification%20Report.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10517-vr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Kyocera%20ECOSYS%20with%20HDD%20-%20ST%20v.%20104.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10517-st.pdf |
manufacturer | KYOCERA Document Solutions Inc. | Juniper Networks, Inc. |
manufacturer_web | https://www.kyoceradocumentsolutions.com/ | https://www.juniper.net/ |
security_level | ALC_FLR.2, EAL2+ | {} |
dgst | 52f7856d28ac37d9 | c99465e61767d10a |
heuristics/cert_id | CCEVS-VR-VID-10517-2014 | |
heuristics/cert_lab | [] | US |
heuristics/cpe_matches | {} | cpe:2.3:o:juniper:junos:12.1:r11:*:*:*:*:*:* |
heuristics/related_cves | {} | CVE-2022-22173, CVE-2022-22238, CVE-2023-44201, CVE-2022-22156, CVE-2024-39517, CVE-2023-44175, CVE-2023-4481, CVE-2022-22163, CVE-2023-22406, CVE-2021-31362, CVE-2013-7313, CVE-2022-22181, CVE-2013-6014, CVE-2014-6379, CVE-2004-0468, CVE-2014-3818, CVE-2023-44184, CVE-2023-36840, CVE-2024-30397, CVE-2024-39558, CVE-2023-36839, CVE-2023-22395, CVE-2024-39555, CVE-2023-28963, CVE-2022-22244, CVE-2023-44178, CVE-2021-31372, CVE-2022-22245, CVE-2022-22215, CVE-2022-22214, CVE-2023-44177, CVE-2023-44176, CVE-2022-22242, CVE-2023-44197, CVE-2014-2711, CVE-2024-39549, CVE-2023-44182, CVE-2023-36842, CVE-2022-22243, CVE-2019-0036, CVE-2014-2712, CVE-2022-22162, CVE-2022-22241, CVE-2022-22224, CVE-2023-28975, CVE-2022-22246, CVE-2024-39511, CVE-2023-28964, CVE-2024-39514, CVE-2023-44194, CVE-2024-30380, CVE-2024-39528, CVE-2013-4689, CVE-2023-36843, CVE-2023-22407, CVE-2023-44186, CVE-2023-44185, CVE-2014-3819, CVE-2023-28962, CVE-2013-4686, CVE-2023-22391, CVE-2024-39556, CVE-2023-36841, CVE-2024-21591, CVE-2004-0230, CVE-2022-22208, CVE-2014-2714, CVE-2024-21594, CVE-2022-22220, CVE-2023-28979, CVE-2014-2713, CVE-2014-3816, CVE-2014-6380, CVE-2022-22197, CVE-2013-6618 |
heuristics/extracted_sars | ALC_FLR.2 | ASE_ECD.1, ASE_TSS.1, ADV_FSP.1, ASE_CCL.1, ALC_CMS.1, ASE_REQ.1, ALC_CMC.1, AGD_OPE.1, AVA_VAN.1, ASE_INT.1, AGD_PRE.1, ATE_IND.1, ASE_OBJ.1 |
heuristics/extracted_versions | - | 3.5, 12.1 |
heuristics/scheme_data |
|
|
heuristics/protection_profiles | {} | ac9abe3d5c5a31f0 |
maintenance_updates |
|
|
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
pdf_data/report_filename | st_vid10517-vr.pdf | |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id | ||
pdf_data/report_keywords/cc_security_level | ||
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr | ||
pdf_data/report_keywords/cc_claims | ||
pdf_data/report_keywords/vendor | ||
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto | ||
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto | ||
pdf_data/report_keywords/hash_function | ||
pdf_data/report_keywords/crypto_scheme | ||
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness | ||
pdf_data/report_keywords/cipher_mode | ||
pdf_data/report_keywords/ecc_curve | ||
pdf_data/report_keywords/crypto_engine | ||
pdf_data/report_keywords/tls_cipher_suite | ||
pdf_data/report_keywords/crypto_library | ||
pdf_data/report_keywords/vulnerability | ||
pdf_data/report_keywords/side_channel_analysis | ||
pdf_data/report_keywords/technical_report_id | ||
pdf_data/report_keywords/device_model | ||
pdf_data/report_keywords/tee_name | ||
pdf_data/report_keywords/os_name | ||
pdf_data/report_keywords/cplc_data | ||
pdf_data/report_keywords/ic_data_group | ||
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version | ||
pdf_data/report_keywords/javacard_api_const | ||
pdf_data/report_keywords/javacard_packages | ||
pdf_data/report_keywords/certification_process | ||
pdf_data/report_metadata |
|
|
pdf_data/st_filename | st_vid10517-st.pdf | |
pdf_data/st_keywords/cc_cert_id | ||
pdf_data/st_keywords/cc_protection_profile_id | ||
pdf_data/st_keywords/cc_security_level | ||
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor | ||
pdf_data/st_keywords/eval_facility | ||
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto | ||
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve | ||
pdf_data/st_keywords/crypto_engine | ||
pdf_data/st_keywords/tls_cipher_suite | ||
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability | ||
pdf_data/st_keywords/side_channel_analysis | ||
pdf_data/st_keywords/technical_report_id | ||
pdf_data/st_keywords/device_model | ||
pdf_data/st_keywords/tee_name | ||
pdf_data/st_keywords/os_name | ||
pdf_data/st_keywords/cplc_data | ||
pdf_data/st_keywords/ic_data_group | ||
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version | ||
pdf_data/st_keywords/javacard_api_const | ||
pdf_data/st_keywords/javacard_packages | ||
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/report/convert_ok | False | True |
state/report/download_ok | False | True |
state/report/extract_ok | False | True |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/convert_ok | False | True |
state/st/download_ok | False | True |
state/st/extract_ok | False | True |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |