Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Cisco Web Security Appliance with AsyncOS 11.8
567-LSS
SUSE Linux Enterprise Server 11 Service Pack 2 including KVM virtualization
None
name Cisco Web Security Appliance with AsyncOS 11.8 SUSE Linux Enterprise Server 11 Service Pack 2 including KVM virtualization
category Network and Network-Related Devices and Systems Operating Systems
scheme CA DE
status active archived
not_valid_after 21.05.2027 01.09.2019
not_valid_before 21.05.2022 27.02.2013
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/567-LSS%20CT%20v1.3%20Eng.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/567-LSS%20CR%20v1.3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0787a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cisco_WSA11.8_Security_Target_v0.13.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0787b_pdf.pdf
manufacturer Cisco Systems, Inc. SUSE Linux Products Gmbh
manufacturer_web https://www.cisco.com https://www.suse.com/
security_level {} EAL4+, ALC_FLR.3
dgst 68a4bb5619d6b24a cac91660b0d1f7c7
heuristics/cert_id 567-LSS
heuristics/cpe_matches cpe:2.3:o:cisco:asyncos:11.8:*:*:*:*:*:*:*, cpe:2.3:a:cisco:web_security_appliance:11.8.0:*:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:11.8.0:*:*:*:*:*:*:* cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp2:*:*:*:-:*:*, cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*, cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp2:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:-:*:*:*, cpe:2.3:o:suse:linux_enterprise_sdk:11:sp2:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*, cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:-:*:*, cpe:2.3:o:suse:linux_enterprise_java:11:sp2:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise:11.0:sp2:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:-:*:*, cpe:2.3:o:suse:linux_enterprise_sdk:11:sp3:*:*:*:*:*:*
heuristics/related_cves CVE-2021-1359, CVE-2021-1566, CVE-2021-1490, CVE-2020-3568, CVE-2022-20653, CVE-2020-3164, CVE-2018-0093, CVE-2021-1129, CVE-2020-3367, CVE-2023-20032 CVE-2012-5838, CVE-2013-0769, CVE-2012-5841, CVE-2015-8778, CVE-2013-0745, CVE-2014-1504, CVE-2015-8779, CVE-2014-7169, CVE-2013-5616, CVE-2012-4204, CVE-2014-2494, CVE-2012-4185, CVE-2012-5835, CVE-2012-4217, CVE-2011-3970, CVE-2016-3715, CVE-2014-1947, CVE-2013-3812, CVE-2012-3961, CVE-2013-3794, CVE-2014-1483, CVE-2022-27239, CVE-2015-2695, CVE-2012-0507, CVE-2012-1717, CVE-2013-5618, CVE-2014-9761, CVE-2012-4209, CVE-2015-0797, CVE-2015-4495, CVE-2012-3976, CVE-2015-5154, CVE-2014-1498, CVE-2012-4195, CVE-2012-3972, CVE-2012-3957, CVE-2012-5836, CVE-2014-1485, CVE-2015-7976, CVE-2012-4187, CVE-2012-4214, CVE-2012-5833, CVE-2014-3469, CVE-2020-15705, CVE-2014-1508, CVE-2016-4953, CVE-2014-2484, CVE-2013-4480, CVE-2016-4957, CVE-2012-4212, CVE-2013-0760, CVE-2014-1493, CVE-2014-1511, CVE-2013-1690, CVE-2013-0800, CVE-2017-13077, CVE-2014-1512, CVE-2012-3956, CVE-2015-0505, CVE-2021-45082, CVE-2013-0750, CVE-2017-13086, CVE-2015-0484, CVE-2018-10195, CVE-2015-5239, CVE-2014-0181, CVE-2016-1286, CVE-2017-13078, CVE-2014-1513, CVE-2016-0651, CVE-2016-1285, CVE-2013-0746, CVE-2014-2497, CVE-2015-2576, CVE-2017-1000366, CVE-2018-19052, CVE-2017-13079, CVE-2018-19541, CVE-2016-1000030, CVE-2013-2465, CVE-2014-9854, CVE-2013-6673, CVE-2014-1481, CVE-2015-4902, CVE-2014-9853, CVE-2014-1482, CVE-2015-4106, CVE-2012-5829, CVE-2012-4208, CVE-2013-0752, CVE-2013-0762, CVE-2015-1781, CVE-2012-3967, CVE-2014-1739, CVE-2012-4184, CVE-2012-3982, CVE-2014-4260, CVE-2013-3809, CVE-2020-15706, CVE-2013-6672, CVE-2012-4188, CVE-2014-1488, CVE-2012-3515, CVE-2017-17806, CVE-2011-3172, CVE-2018-18873, CVE-2012-3960, CVE-2015-2568, CVE-2015-2575, CVE-2012-1976, CVE-2012-4180, CVE-2012-3985, CVE-2013-0744, CVE-2017-18017, CVE-2015-0441, CVE-2014-1738, CVE-2013-5611, CVE-2015-0272, CVE-2015-5006, CVE-2012-4216, CVE-2015-2737, CVE-2013-0757, CVE-2012-6639, CVE-2015-1931, CVE-2013-5619, CVE-2014-2706, CVE-2012-4186, CVE-2012-1823, CVE-2014-1487, CVE-2017-13087, CVE-2013-0766, CVE-2012-3989, CVE-2014-3601, CVE-2016-4956, CVE-2014-1509, CVE-2012-4196, CVE-2017-5753, CVE-2013-3805, CVE-2013-0761, CVE-2012-4215, CVE-2014-4943, CVE-2012-3991, CVE-2017-15115, CVE-2014-5077, CVE-2015-4830, CVE-2014-1510, CVE-2012-4194, CVE-2013-3793, CVE-2012-1974, CVE-2012-3963, CVE-2017-17805, CVE-2017-17558, CVE-2012-4193, CVE-2014-1491, CVE-2013-5610, CVE-2012-5842, CVE-2013-3808, CVE-2015-2571, CVE-2012-3992, CVE-2013-3802, CVE-2014-1494, CVE-2012-4205, CVE-2015-5300, CVE-2012-1097, CVE-2014-1490, CVE-2015-1283, CVE-2012-3984, CVE-2017-13081, CVE-2012-3988, CVE-2015-3209, CVE-2016-0264, CVE-2013-5613, CVE-2014-3153, CVE-2014-1497, CVE-2014-1500, CVE-2016-0718, CVE-2016-5772, CVE-2018-19542, CVE-2014-4038, CVE-2013-6501, CVE-2014-1514, CVE-2013-0170, CVE-2013-0770, CVE-2012-4218, CVE-2014-4214, CVE-2015-2573, CVE-2015-0499, CVE-2013-3783, CVE-2014-1496, CVE-2013-0755, CVE-2013-0764, CVE-2012-0879, CVE-2012-4182, CVE-2012-4207, CVE-2013-0747, CVE-2015-7547, CVE-2014-6271, CVE-2014-4027, CVE-2013-0771, CVE-2015-8776, CVE-2018-6556, CVE-2012-5830, CVE-2012-1146, CVE-2012-3990, CVE-2013-0756, CVE-2012-5843, CVE-2013-5609, CVE-2012-3983, CVE-2013-0759, CVE-2017-14798, CVE-2016-2782, CVE-2013-5612, CVE-2020-15707, CVE-2015-0433, CVE-2014-1489, CVE-2013-5615, CVE-2016-5244, CVE-2013-0749, CVE-2018-19655, CVE-2014-3468, CVE-2018-17962, CVE-2014-0196, CVE-2012-4213, CVE-2014-1505, CVE-2017-13082, CVE-2014-1501, CVE-2013-0748, CVE-2015-8551, CVE-2012-1972, CVE-2018-19539, CVE-2012-4201, CVE-2012-3994, CVE-2012-5840, CVE-2012-1970, CVE-2013-4002, CVE-2014-1502, CVE-2015-8567, CVE-2012-5839, CVE-2016-4955, CVE-2013-0767, CVE-2017-13084, CVE-2013-0753, CVE-2013-3301, CVE-2012-3986, CVE-2012-4202, CVE-2014-4667, CVE-2014-4243, CVE-2013-1861, CVE-2015-5041, CVE-2016-0642, CVE-2014-4258, CVE-2014-1737, CVE-2013-0754, CVE-2016-3718, CVE-2012-3968, CVE-2013-0758, CVE-2013-0763, CVE-2013-3801, CVE-2014-1477, CVE-2017-14491, CVE-2012-1090, CVE-2015-2738, CVE-2011-1083, CVE-2012-1973, CVE-2018-19208, CVE-2012-4183, CVE-2013-3804, CVE-2014-1499, CVE-2015-5707, CVE-2017-13088, CVE-2018-19540, CVE-2015-0501, CVE-2012-5612, CVE-2012-3959, CVE-2015-2734, CVE-2018-19543, CVE-2014-0069, CVE-2014-1480, CVE-2012-3867, CVE-2014-1484, CVE-2015-0492, CVE-2012-4179, CVE-2012-1975, CVE-2020-8013, CVE-2014-4207, CVE-2014-1486, CVE-2014-1479, CVE-2016-3427, CVE-2012-3995, CVE-2014-4039, CVE-2016-4954, CVE-2013-5614, CVE-2017-13080, CVE-2014-3467, CVE-2013-0768
heuristics/extracted_sars {} ALC_FLR.3
heuristics/extracted_versions 11.8 11, 2
heuristics/scheme_data
  • certification_date: 28.02.2022
  • level: CPP_ND_v2.2E
  • product: Cisco Web Security Appliance with AsyncOS 11.8
  • vendor: Cisco Systems, Inc.
heuristics/protection_profiles 89f2a255423f4a20 70cdc8b0cf910af7
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0067b_pdf.pdf
pdf_data/cert_filename 567-LSS CT v1.3 Eng.pdf
pdf_data/report_filename 567-LSS CR v1.3.pdf 0787a_pdf.pdf
pdf_data/st_filename Cisco_WSA11.8_Security_Target_v0.13.pdf 0787b_pdf.pdf
state/cert/convert_garbage True False
state/cert/download_ok True False
state/cert/pdf_hash Different Different