Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Cisco Web Security Appliance with AsyncOS 11.8
567-LSS
VMware ESXi 7.0 Update 3d
None
name Cisco Web Security Appliance with AsyncOS 11.8 VMware ESXi 7.0 Update 3d
category Network and Network-Related Devices and Systems Other Devices and Systems
scheme CA US
status active archived
not_valid_after 21.05.2027 06.09.2024
not_valid_before 21.05.2022 06.09.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/567-LSS%20CT%20v1.3%20Eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11249-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/567-LSS%20CR%20v1.3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11249-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cisco_WSA11.8_Security_Target_v0.13.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11249-st.pdf
manufacturer Cisco Systems, Inc. VMware Inc.
manufacturer_web https://www.cisco.com https://www.vmware.com
dgst 68a4bb5619d6b24a eea19bafd2daa311
heuristics/cert_id 567-LSS
heuristics/cpe_matches cpe:2.3:o:cisco:asyncos:11.8:*:*:*:*:*:*:*, cpe:2.3:a:cisco:web_security_appliance:11.8.0:*:*:*:*:*:*:*, cpe:2.3:o:cisco:asyncos:11.8.0:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3l:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3m:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3k:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3o:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3j:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0.0:-:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3p:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0.0:update_1b:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0.0:b:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3s:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3r:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3q:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0.0:update_1a:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3n:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3i:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0.0:update_1:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:*
heuristics/related_cves CVE-2021-1359, CVE-2021-1566, CVE-2021-1490, CVE-2020-3568, CVE-2022-20653, CVE-2020-3164, CVE-2018-0093, CVE-2021-1129, CVE-2020-3367, CVE-2023-20032 CVE-2020-3992, CVE-2022-21125, CVE-2021-21994, CVE-2022-23825, CVE-2020-3967, CVE-2021-21974, CVE-2020-4005, CVE-2022-31699, CVE-2024-22273, CVE-2020-3968, CVE-2020-3970, CVE-2020-3982, CVE-2021-22043, CVE-2021-22045, CVE-2020-3999, CVE-2020-3965, CVE-2020-3963, CVE-2025-22225, CVE-2021-22040, CVE-2025-22226, CVE-2020-3976, CVE-2022-29901, CVE-2024-37085, CVE-2024-22252, CVE-2022-31681, CVE-2021-22050, CVE-2022-21166, CVE-2022-31696, CVE-2020-3966, CVE-2021-22042, CVE-2020-3981, CVE-2020-3964, CVE-2025-22224, CVE-2020-3962, CVE-2021-21995, CVE-2022-21123, CVE-2020-3969, CVE-2021-22041, CVE-2022-31705, CVE-2020-4004
heuristics/extracted_versions 11.8 7.0
heuristics/scheme_data
  • certification_date: 28.02.2022
  • level: CPP_ND_v2.2E
  • product: Cisco Web Security Appliance with AsyncOS 11.8
  • vendor: Cisco Systems, Inc.
  • category: Virtualization
  • certification_date: 06.09.2022
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 06.09.2024
  • id: CCEVS-VR-VID11249
  • product: VMware ESXi 7.0 Update 3d
  • scheme: US
  • url: https://www.niap-ccevs.org/product/11249
  • vendor: VMware, LLC
heuristics/protection_profiles 89f2a255423f4a20 e80eb1652a0e6f6a, c40ae795865a0dba, deb6fe6c7a4a2306
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_SV_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_VIRTUALIZATION_BASE_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf
pdf_data/cert_filename 567-LSS CT v1.3 Eng.pdf st_vid11249-ci.pdf
pdf_data/report_filename 567-LSS CR v1.3.pdf st_vid11249-vr.pdf
pdf_data/st_filename Cisco_WSA11.8_Security_Target_v0.13.pdf st_vid11249-st.pdf