Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Cisco Web Security Appliance with AsyncOS 11.8
567-LSS
Cisco Firepower Threat Defense (FTD) 6.4 with FMC and AnyConnect
NSCIB-CC-22-0259553-CR
name Cisco Web Security Appliance with AsyncOS 11.8 Cisco Firepower Threat Defense (FTD) 6.4 with FMC and AnyConnect
category Network and Network-Related Devices and Systems Boundary Protection Devices and Systems
scheme CA NL
not_valid_after 21.05.2027 07.10.2027
not_valid_before 21.05.2022 07.10.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/567-LSS%20CT%20v1.3%20Eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-22-0259553-Cert.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/567-LSS%20CR%20v1.3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0259553-CR-1.0.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cisco_WSA11.8_Security_Target_v0.13.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-0259553-st-v1.0.pdf
manufacturer Cisco Systems, Inc. Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134-1706 USA
security_level {} EAL4+, ALC_FLR.2
dgst 68a4bb5619d6b24a 202ed3e27c6dde49
heuristics/cert_id 567-LSS NSCIB-CC-22-0259553-CR
heuristics/cpe_matches cpe:2.3:o:cisco:asyncos:11.8:*:*:*:*:*:*:*, cpe:2.3:a:cisco:web_security_appliance:11.8.0:*:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:11.8.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.13:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.16:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.17:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.18:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.9:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.10:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.15:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.8:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.11:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.1:*:*:*:*:*:*:*, cpe:2.3:o:cisco:firepower_threat_defense:6.4.0.10:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.4:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.12:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.3:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.7:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.6:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower:6.4.0:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.14:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.5:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.2:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.1:*:*:*:*:*:*:*
heuristics/related_cves CVE-2021-1359, CVE-2021-1566, CVE-2021-1490, CVE-2020-3568, CVE-2022-20653, CVE-2020-3164, CVE-2018-0093, CVE-2021-1129, CVE-2020-3367, CVE-2023-20032 CVE-2023-44487, CVE-2024-20388, CVE-2020-3555, CVE-2020-3259, CVE-2021-34790, CVE-2020-3563, CVE-2019-1669, CVE-2021-1493, CVE-2022-20745, CVE-2020-3549, CVE-2022-20947, CVE-2019-12676, CVE-2021-34781, CVE-2022-20760, CVE-2024-20359, CVE-2020-3254, CVE-2024-20353, CVE-2020-3304, CVE-2020-3285, CVE-2019-12698, CVE-2023-20256, CVE-2022-20928, CVE-2021-34783, CVE-2022-20854, CVE-2019-12678, CVE-2021-1573, CVE-2021-34763, CVE-2023-20247, CVE-2019-12673, CVE-2019-1978, CVE-2020-3561, CVE-2023-20083, CVE-2021-40125, CVE-2023-20063, CVE-2020-3303, CVE-2021-40117, CVE-2022-20946, CVE-2021-34794, CVE-2020-3550, CVE-2020-3315, CVE-2023-20095, CVE-2020-3191, CVE-2020-3554, CVE-2020-3317, CVE-2021-34756, CVE-2022-20949, CVE-2023-20245, CVE-2022-20730, CVE-2019-12674, CVE-2021-1501, CVE-2021-34755, CVE-2019-12695, CVE-2020-3195, CVE-2021-34793, CVE-2022-20757, CVE-2021-40114, CVE-2022-20767, CVE-2021-34764, CVE-2020-3179, CVE-2020-3255, CVE-2022-20742, CVE-2020-3580, CVE-2020-3188, CVE-2020-3305, CVE-2022-20934, CVE-2021-34791, CVE-2020-3572, CVE-2021-1223, CVE-2020-3186, CVE-2022-20729, CVE-2020-3253, CVE-2023-20086, CVE-2020-3529, CVE-2021-1495, CVE-2022-20713, CVE-2021-34754, CVE-2019-12675, CVE-2020-3306, CVE-2020-3565, CVE-2020-3196, CVE-2021-1224, CVE-2022-20746, CVE-2021-1256, CVE-2020-3577, CVE-2023-20269, CVE-2019-1981, CVE-2020-3452, CVE-2019-1980, CVE-2022-20759, CVE-2021-34761, CVE-2020-3514, CVE-2021-34792, CVE-2021-40118, CVE-2020-3533, CVE-2022-20940, CVE-2020-3564, CVE-2019-1970, CVE-2022-20715, CVE-2020-3352, CVE-2020-3528, CVE-2021-1236, CVE-2020-3436, CVE-2021-34787, CVE-2020-3187, CVE-2021-34762, CVE-2023-20275, CVE-2019-12694, CVE-2021-44228, CVE-2021-40116
heuristics/extracted_sars {} ALC_FLR.2
heuristics/extracted_versions 11.8 6.4
heuristics/scheme_data
  • certification_date: 28.02.2022
  • level: CPP_ND_v2.2E
  • product: Cisco Web Security Appliance with AsyncOS 11.8
  • vendor: Cisco Systems, Inc.
heuristics/protection_profiles 89f2a255423f4a20 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf {}
pdf_data/cert_filename 567-LSS CT v1.3 Eng.pdf NSCIB-CC-22-0259553-Cert.pdf
pdf_data/report_filename 567-LSS CR v1.3.pdf NSCIB-CC-0259553-CR-1.0.pdf
pdf_data/st_filename Cisco_WSA11.8_Security_Target_v0.13.pdf nscib-cc-0259553-st-v1.0.pdf