name |
System Software for e-STUDIO202L/232/282 V1.0 |
SonicWall SonicOS Enhanced V6.2.5 on NSA, SM, and TZ Appliances |
category |
Other Devices and Systems |
Boundary Protection Devices and Systems |
scheme |
JP |
CA |
status |
archived |
archived |
not_valid_after |
10.12.2010 |
13.06.2022 |
not_valid_before |
29.03.2006 |
13.06.2017 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-393%20CT%20v1.0e.docx |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0043_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-393%20CR%20v1.0e.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0043_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-393%20ST%20v1.15.pdf |
manufacturer |
Toshiba TEC Corporation |
SonicWALL, Inc |
manufacturer_web |
https://www.toshibatec.co.jp/en/ |
https://www.sonicwall.com/ |
security_level |
EAL3 |
{} |
dgst |
79cf3cf36c8217af |
965224ea737162a9 |
heuristics/cert_id |
JISEC-CC-CRP-C0043 |
383-4-393 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
heuristics/extracted_versions |
1.0 |
6.2.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0043
- certification_date: 01.03.2006
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0043_eimg.pdf
- description: PRODUCT DESCRIPTION The TOE is the system software of the digital multi function device “ e-STUDIO202L/232/282 ” manufactured by TOSHIBA TEC CORPORATION. The system software provides general functions as a digital multifunction device as well as the function of data overwrite and complete deletion on the user document data deleted from the e-STUDIO202L/232/282 HDD. The function of data overwrite and complete deletion includes the function to collectively and completely delete all user document data from the HDD before the HDD is disposed or replaced. This function also prevents unauthorized restore of data.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc.
- product: System Software for e-STUDIO202L/232/282
- product_type: IT Product ( data protection function in Multi Function Device )
- report_link: https://www.ipa.go.jp/en/security/c0043_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0043_est.pdf
- toe_version: V1.0
- vendor: TOSHIBA TEC CORPORATION
- expiration_date: 01.01.2011
- supplier: TOSHIBA TEC CORPORATION
- toe_japan_name: System Software for e-STUDIO202L/232/282 V1.0
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0043_it5057.html
- toe_overseas_name: System Software for e-STUDIO 202L/232/282 V1.0
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
865e804e52aa8986 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_FW_V1.0.pdf |
pdf_data/cert_filename |
|
383-4-393 CT v1.0e.docx |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0043_erpt.pdf |
383-4-393 CR v1.0e.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0043-01: 1
- Certification No. C0043: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- T:
- T.STOREDATA_ACCESS: 1
- T.TEMPDATA_ACCESS: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 2
- CCIMB-99-033: 2
- ISO:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20060515142139+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20060515142342+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title:
- pdf_file_size_bytes: 546561
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
- /Author: Clark, Cory P.
- /Company: CSEC
- /CreationDate: D:20170615132914-04'00'
- /Creator: Acrobat PDFMaker 11 for Word
- /ModDate: D:20170615132941-04'00'
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20170615155901
- /Title: 383-4-XXX CR v0.1
- pdf_file_size_bytes: 255541
- pdf_hyperlinks: mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
pdf_data/st_filename |
c0043_est.pdf |
383-4-393 ST v1.15.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 3
- ACM_SCP.1: 1
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 3
- ADV_HLD.2: 1
- ADV_RCR.1: 3
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 1
- ALC:
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 1
- ATE_FUN.1: 3
- ATE_IND.2: 1
- AVA:
- AVA_MSU.1: 3
- AVA_SOF.1: 2
- AVA_VLA.1: 3
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 3
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_RIP.1: 11
- FDP_RIP.1.1: 1
- FDP_RIP.2: 8
- FPT:
- FPT_RVM.1: 12
- FPT_RVM.1.1: 1
|
- FAU:
- FAU_GEN: 14
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 2
- FAU_STG_EXT.1: 9
- FAU_STG_EXT.1.1: 2
- FAU_STG_EXT.1.2: 2
- FAU_STG_EXT.1.3: 2
- FAU_STG_EXT.2: 3
- FAU_STG_EXT.3: 3
- FCS:
- FCS_CKM.1: 26
- FCS_CKM.1.1: 1
- FCS_CKM.2: 9
- FCS_CKM.2.1: 1
- FCS_CKM.4: 14
- FCS_CKM.4.1: 1
- FCS_COP.1: 50
- FCS_COP.1.1: 4
- FCS_RBG_EXT: 3
- FCS_RBG_EXT.1: 16
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_TLSS_EXT: 3
- FCS_TLSS_EXT.1: 9
- FCS_TLSS_EXT.1.1: 2
- FCS_TLSS_EXT.1.2: 2
- FCS_TLSS_EXT.1.3: 2
- FCS_TLSS_EXT.2: 3
- FCS_TLS_EXT.1: 2
- FDP:
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_RIP.1: 1
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FIA:
- FIA_PMG_EXT: 3
- FIA_PMG_EXT.1: 10
- FIA_PMG_EXT.1.1: 2
- FIA_UAU.1: 4
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 3
- FIA_UAU_EXT.2: 11
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT: 3
- FIA_UIA_EXT.1: 11
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FIA_UID.1: 4
- FIA_UID_EXT.1: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 9
- FMT_SMF.1.1: 2
- FMT_SMR.1: 6
- FMT_SMR.2: 7
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 2
- FPT_APW_EXT.1: 9
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_SKP_EXT: 3
- FPT_SKP_EXT.1: 9
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TST_EXT: 3
- FPT_TST_EXT.1: 9
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 9
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FTA:
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 5
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 3
- FTA_SSL_EXT.1: 9
- FTA_SSL_EXT.1.1: 2
- FTA_TAB.1: 10
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 9
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- O:
- O.STOREDATA_OVERWRITE: 4
- O.TEMPDATA_OVERWRITE: 6
- OE:
- OE.HDD_ERASE: 3
- OE.OVERWRITE_COMPLETE: 3
- T:
- T.STOREDATA_ACCESS: 3
- T.TEMPDATA_ACCESS: 4
|
- A:
- A.ADMIN_CREDENTIALS_: 1
- A.ENTROPY: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.TRUSTED_ADMINISTRATOR: 1
- OE:
- OE.ADMIN_CREDENTIALS_: 1
- OE.NO_GENERAL_: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_: 1
- OE.UPDATES: 1
- T:
- T.MALICIOUS_TRAFFIC: 1
- T.NETWORK_ACCESS: 1
- T.NETWORK_DISCLOSURE: 1
- T.NETWORK_MISUSE: 1
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_: 2
- T.UNAUTHORIZED_: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 15
- AES-: 1
- AES-128: 6
- AES-256: 5
- constructions:
- MAC:
- HMAC: 5
- HMAC-SHA-256: 3
- HMAC-SHA-384: 3
- HMAC-SHA-512: 3
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-256: 9
- SHA-384: 6
- SHA-512: 7
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 25
- IKEv1: 25
- IKEv2: 9
- IPsec:
- SSH:
- TLS:
- SSL:
- SSL: 2
- SSL 1.0: 2
- SSL 2.0: 2
- SSL 3.0: 2
- TLS:
- TLS: 44
- TLS 1.0: 2
- TLS 1.1: 5
- TLS 1.2: 5
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_RSA_WITH_AES_256_CBC_SHA: 3
- TLS_RSA_WITH_AES_256_CBC_SHA256: 3
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- ISO:
- ISO/IEC 18031:2011: 5
- ISO/IEC 9796-2: 1
- NIST:
- NIST SP 800-56B: 1
- NIST SP 800-90: 1
- PKCS:
- RFC:
- RFC 2560: 2
- RFC 2818: 3
- RFC 2986: 2
- RFC 3268: 2
- RFC 3513: 1
- RFC 3602: 4
- RFC 4106: 2
- RFC 4109: 2
- RFC 4301: 2
- RFC 4303: 2
- RFC 4304: 1
- RFC 4346: 2
- RFC 4868: 2
- RFC 4945: 2
- RFC 5246: 4
- RFC 5280: 5
- RFC 5282: 1
- RFC 5735: 1
- RFC 5759: 1
- RFC 5996: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /CreationDate: D:20060512044538Z
- /ModDate: D:20060731114807+09'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Subject: 2006/7/31 update
- pdf_file_size_bytes: 741778
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /Author: Teresa MacArthur
- /Client Full Name: SonicWall, Inc.
- /Client Short Name: SonicWall
- /Comments: CC V3.1 Security Target
Template Version 1_0
- /Company: EWA-Canada
- /CreationDate: D:20170615105605-04'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Document Number: 1959-000-D102
- /ModDate: D:20170615105618-04'00'
- /Producer: Adobe PDF Library 10.0
- /ST_Date: 12 June 2017
- /ST_Title: SonicWall SonicOS Enhanced V6.2 on NSA, SM, and TZ Appliances
- /ST_Version: 1.15
- /SourceModified: D:20170615145544
- /Title: Security Target
- pdf_file_size_bytes: 755401
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 98
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |