This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Luna PCI-E Cryptographic Module, Firmware version 6.10.9 NSCIB-CC-38671-CR |
IronPort Email Security Appliances (ESA), comprising the C160, C370, X1060, and X1070 appliance models, running IronPort AsyncOS software, version 7.1, and the C670 appliance model running IronPort AsyncOS version 7.3 CCEVS-VR-VID-10438-2010 |
|
---|---|---|
name | Luna PCI-E Cryptographic Module, Firmware version 6.10.9 | IronPort Email Security Appliances (ESA), comprising the C160, C370, X1060, and X1070 appliance models, running IronPort AsyncOS software, version 7.1, and the C670 appliance model running IronPort AsyncOS version 7.3 |
category | Products for Digital Signatures | Detection Devices and Systems |
scheme | NL | US |
not_valid_after | 30.06.2022 | 01.11.2014 |
not_valid_before | 30.06.2017 | 01.12.2010 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/get%20cert%20CC-17-38671.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CR]%20NSCIB-CC-38671-CR.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10438-vr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST]%20CR-3524_18%20(Release%20Version)%20-%20Security%20Target.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10438-st.pdf |
manufacturer | SafeNet Inc. | Cisco Systems, Inc. |
manufacturer_web | https://www.safenet-inc.com/ | https://www.cisco.com |
security_level | ALC_FLR.2, EAL4+, AVA_VAN.4 | ALC_FLR.2, EAL2+ |
dgst | 6374d454a9a6d7e3 | 8000ecd5144388da |
heuristics/cert_id | NSCIB-CC-38671-CR | CCEVS-VR-VID-10438-2010 |
heuristics/cert_lab | US | |
heuristics/cpe_matches | {} | cpe:2.3:o:cisco:asyncos:7.1.3:*:*:*:*:*:*:*, cpe:2.3:o:cisco:email_security_appliance_firmware:7.1.3:*:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.3.1:hot_patch2:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:7.1.4:*:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:7.3.0:*:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.3.2:hot_patch:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.3.2:-:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.1.5:hot_patch5:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.1.1:*:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.1.5:hot_patch6:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.1.5:hot_patch4:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.3.1:build101:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.1.2:*:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:7.3.2:*:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.1.4:*:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.3.1:build47:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.1.5-102:*:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:7.1.2:*:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:7.1.0:*:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:7.1.3:*:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:7.1.1:*:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.1.5:-:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:7.3.1:*:*:*:*:*:*:*, cpe:2.3:o:cisco:email_security_appliance_firmware:7.1.1:*:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.1.5:hot_patch:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:7.3.2:hot_patch2:*:*:*:*:*:*, cpe:2.3:o:cisco:email_security_appliance_firmware:7.3.1:*:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:7.1.5:*:*:*:*:*:*:* |
heuristics/related_cves | {} | CVE-2021-1566, CVE-2022-20664, CVE-2019-15971, CVE-2023-20009, CVE-2014-3381, CVE-2020-3447, CVE-2022-20798, CVE-2022-20653, CVE-2020-3164, CVE-2020-3568, CVE-2020-3133, CVE-2016-6356, CVE-2020-3132, CVE-2020-3134, CVE-2019-15988, CVE-2019-1983, CVE-2020-3370, CVE-2020-3137, CVE-2019-12706, CVE-2022-20960, CVE-2020-3367, CVE-2020-3181 |
heuristics/extracted_sars | ASE_INT.1, ALC_TAT.1, ALC_FLR.2, ADV_FSP.4, ASE_SPD.1, ASE_CCL.1, ADV_TDS.3, ALC_CMC.4, ALC_LCD.1, ATE_COV.2, ASE_REQ.2, ASE_OBJ.2, ASE_TSS.1, AGD_PRE.1, ASE_ECD.1, ALC_DEL.1, ATE_FUN.1, ADV_IMP.1, AGD_OPE.1, ALC_DVS.1, ADV_ARC.1, ATE_DPT.1, ALC_CMS.4, AVA_VAN.4, ATE_IND.2 | AGD_PRE.1, ALC_DEL.1, ADV_FSP.2, ADV_ARC.1, ATE_FUN.1, AGD_OPE.1, AVA_VAN.2, ALC_FLR.2, ATE_COV.1, ALC_CMC.2, ADV_TDS.1, ATE_IND.2, ALC_CMS.2 |
heuristics/extracted_versions | 6.10.9 | 7.3, 7.1 |
heuristics/report_references/directly_referenced_by | NSCIB-CC-179205-CR | {} |
heuristics/report_references/indirectly_referenced_by | NSCIB-CC-179205-CR | {} |
pdf_data/cert_filename | get cert CC-17-38671.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | [CR] NSCIB-CC-38671-CR.pdf | st_vid10438-vr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | [ST] CR-3524_18 (Release Version) - Security Target.pdf | st_vid10438-st.pdf |
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |