name |
System Software for e-STUDIO202L/232/282 V1.0 |
Symantec™ Endpoint Protection Version 12.1.2 |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
JP |
CA |
status |
archived |
archived |
not_valid_after |
10.12.2010 |
19.04.2018 |
not_valid_before |
29.03.2006 |
05.03.2013 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0043_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-217%20CR%20v1.0e.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0043_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-217%20ST%20v08.pdf |
manufacturer |
Toshiba TEC Corporation |
Symantec Corporation |
manufacturer_web |
https://www.toshibatec.co.jp/en/ |
https://www.symantec.com |
security_level |
EAL3 |
EAL2+, ALC_FLR.2 |
dgst |
79cf3cf36c8217af |
df6fcbee2a844e67 |
heuristics/cert_id |
JISEC-CC-CRP-C0043 |
383-4-217 |
heuristics/cert_lab |
[] |
CANADA |
heuristics/cpe_matches |
{} |
cpe:2.3:a:symantec:endpoint_protection:12.1:-:small_business:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:12.1.2.1:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:12.1:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection_manager:12.1.2:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:12.1.2:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2012-0295, CVE-2014-3439, CVE-2020-5836, CVE-2019-12759, CVE-2013-5014, CVE-2017-6331, CVE-2019-12750, CVE-2014-3437, CVE-2020-5821, CVE-2020-5820, CVE-2014-9229, CVE-2020-5833, CVE-2018-12238, CVE-2020-5828, CVE-2020-5837, CVE-2019-18372, CVE-2012-0294, CVE-2018-5236, CVE-2020-5834, CVE-2016-5311, CVE-2020-5829, CVE-2018-5237, CVE-2020-5830, CVE-2018-12239, CVE-2014-3434, CVE-2020-5823, CVE-2012-4348, CVE-2020-5831, CVE-2020-5822, CVE-2020-5824, CVE-2013-5015, CVE-2014-9227, CVE-2014-3438, CVE-2019-12758, CVE-2018-18368, CVE-2018-12245, CVE-2014-9228, CVE-2016-9094, CVE-2020-5825, CVE-2019-12757, CVE-2020-5835, CVE-2020-5826, CVE-2019-12756, CVE-2020-5827, CVE-2013-1612, CVE-2016-9093 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
1.0 |
12.1.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0043
- certification_date: 01.03.2006
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0043_eimg.pdf
- description: PRODUCT DESCRIPTION The TOE is the system software of the digital multi function device “ e-STUDIO202L/232/282 ” manufactured by TOSHIBA TEC CORPORATION. The system software provides general functions as a digital multifunction device as well as the function of data overwrite and complete deletion on the user document data deleted from the e-STUDIO202L/232/282 HDD. The function of data overwrite and complete deletion includes the function to collectively and completely delete all user document data from the HDD before the HDD is disposed or replaced. This function also prevents unauthorized restore of data.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc.
- product: System Software for e-STUDIO202L/232/282
- product_type: IT Product ( data protection function in Multi Function Device )
- report_link: https://www.ipa.go.jp/en/security/c0043_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0043_est.pdf
- toe_version: V1.0
- vendor: TOSHIBA TEC CORPORATION
- expiration_date: 01.01.2011
- supplier: TOSHIBA TEC CORPORATION
- toe_japan_name: System Software for e-STUDIO202L/232/282 V1.0
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0043_it5057.html
- toe_overseas_name: System Software for e-STUDIO 202L/232/282 V1.0
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
fbbc69dcdf858c77 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_AV_BR_V1.2.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0043_erpt.pdf |
383-4-217 CR v1.0e.pdf |
pdf_data/report_frontpage |
|
- CA:
- cert_id: 383-4-217-CR
- cert_lab: CANADA
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0043-01: 1
- Certification No. C0043: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 2: 3
- EAL 2 augmented: 2
- EAL 2+: 3
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- T:
- T.STOREDATA_ACCESS: 1
- T.TEMPDATA_ACCESS: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 2
- CCIMB-99-033: 2
- ISO:
|
- FIPS:
- FIPS 140-2: 1
- FIPS 180-2: 1
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20060515142139+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20060515142342+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title:
- pdf_file_size_bytes: 546561
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
- /Author: Cory Clark
- /CCEF: EWA-Canada
- /CR date: 20 May 2013
- /CR version: 1.0
- /Certificate date: 20 May 2013
- /CreationDate: D:20130522141026-04'00'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /Developer name: Symantec Corporation
- /Document number: 383-4-217-CR
- /ETR title, version, date: Evaluation Technical Report for EAL 2+ Common Criteria Evaluation of Symantec Corporation Symantec™ Endpoint Protection Version 12.1.2, Version 1.0, 5 March 2013
- /Evaluation completion date: 5 March 2013
- /ModDate: D:20130522141518-04'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /ST Title: Security Target Symantec™ Endpoint Protection Version 12.1.2
- /ST date: 13 February 2013
- /ST version: 0.8
- /SourceModified: D:20130522180951
- /Sponsor: Symantec Corporation
- /TOE Version: 12.1.2
- /TOE name and version: Symantec™ Endpoint Protection Version 12.1.2
- /TOE short name: SEP v12.1.2
- /Title: EAL 2 Evaluation of <TOE name and version>
- pdf_file_size_bytes: 68770
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
pdf_data/st_filename |
c0043_est.pdf |
383-4-217 ST v08.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 3
- ACM_SCP.1: 1
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 3
- ADV_HLD.2: 1
- ADV_RCR.1: 3
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 1
- ALC:
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 1
- ATE_FUN.1: 3
- ATE_IND.2: 1
- AVA:
- AVA_MSU.1: 3
- AVA_SOF.1: 2
- AVA_VLA.1: 3
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 3
- ADV_FSP: 1
- ADV_FSP.2: 4
- ADV_TDS: 1
- ADV_TDS.1: 3
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 3
- AGD_PRE: 1
- AGD_PRE.1: 4
- ALC:
- ALC_CMC: 1
- ALC_CMC.2: 4
- ALC_CMS: 1
- ALC_CMS.2: 1
- ALC_DEL: 1
- ALC_DEL.1: 4
- ALC_FLR: 1
- ALC_FLR.2: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 4
- ATE_FUN: 1
- ATE_FUN.1: 2
- ATE_IND: 1
- ATE_IND.2: 4
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_RIP.1: 11
- FDP_RIP.1.1: 1
- FDP_RIP.2: 8
- FPT:
- FPT_RVM.1: 12
- FPT_RVM.1.1: 1
|
- FAU:
- FAU_GEN: 19
- FAU_GEN.1: 10
- FAU_GEN.2: 2
- FAU_SAR.1: 11
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 2
- FAU_STG: 15
- FAU_STG.1: 8
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.4: 1
- FCS_COP.1: 7
- FCS_COP.1.1: 1
- FDP:
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FIA:
- FIA_UAU.1: 1
- FIA_UAU.1.1: 2
- FIA_UID.1: 2
- FMT:
- FMT_MOF.1: 22
- FMT_MOF.1.1: 2
- FMT_MSA.2: 1
- FMT_MTD.1: 12
- FMT_MTD.1.1: 3
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
|
pdf_data/st_keywords/cc_claims |
- O:
- O.STOREDATA_OVERWRITE: 4
- O.TEMPDATA_OVERWRITE: 6
- OE:
- OE.HDD_ERASE: 3
- OE.OVERWRITE_COMPLETE: 3
- T:
- T.STOREDATA_ACCESS: 3
- T.TEMPDATA_ACCESS: 4
|
- A:
- A.AUDIT_ALARM: 1
- A.AUDIT_BACKUP: 3
- A.DOMAIN_SEPARATION: 1
- A.NO_BYPASS: 3
- A.NO_EVIL: 1
- A.PHYSICAL: 3
- A.SECURE_COMMS: 1
- A.SECURE_UPDATES: 3
- O:
- O.ADMIN_GUIDANCE: 5
- O.ADMIN_ROLE: 4
- O.AUDIT_GEN: 1
- O.AUDIT_GENERATION: 5
- O.AUDIT_PROTECT: 4
- O.AUDIT_REVIEW: 5
- O.CONFIGURATION_IDEN: 1
- O.CONFIGURATION_IDENTIFI-: 1
- O.CONFIGURATION_IDENTIFICATIO: 3
- O.CONFIGURATION_IDENTIFICATION: 2
- O.CORRECT_TSF_OPERATI: 1
- O.CORRECT_TSF_OPERATION: 5
- O.CRYPTOGRAPHY: 4
- O.DOCUMENTED_DESIGN: 7
- O.MANAGE: 5
- O.PARTIAL_FUNCTIONAL_: 1
- O.PARTIAL_FUNCTIONAL_TEST: 3
- O.PARTIAL_FUNCTIONAL_TESTING: 2
- O.PARTIAL_SELF_PROTEC: 1
- O.PARTIAL_SELF_PROTECTION: 4
- O.VIRUS: 6
- O.VULNERABILITY_ANALY: 1
- O.VULNERABILITY_ANALYSIS: 2
- O.VULNERABILITY_ANALYSIS_TEST: 3
- OE:
- OE.AUDIT_ALARM: 4
- OE.AUDIT_BACKUP: 3
- OE.AUDIT_STORAGE: 3
- OE.DISPLAY_BANNER: 3
- OE.DOMAIN_SEPARATIO: 1
- OE.DOMAIN_SEPARATION: 4
- OE.NO_BYPASS: 5
- OE.NO_EVIL: 3
- OE.PHYSICAL: 3
- OE.RESIDUAL_: 1
- OE.RESIDUAL_INFORMATI: 1
- OE.RESIDUAL_INFORMATION: 4
- OE.SECURE_COMMS: 3
- OE.SECURE_UPDATES: 3
- OE.TIME_STAMPS: 5
- OE.TOE_ACCESS: 5
- T:
- T.ACCIDENTAL_ADMIN_: 1
- T.ACCIDENTAL_ADMIN_ERROR: 3
- T.AUDFUL: 1
- T.AUDITFUL: 2
- T.AUDIT_: 2
- T.MASQUERADE: 1
- T.POOR_DESIGN: 3
- T.POOR_IMPLEMENTATIO: 1
- T.POOR_IMPLEMENTATION: 1
- T.POOR_TEST: 3
- T.RESIDUAL_DATA: 1
- T.TSF_COMPROMISE: 3
- T.UNATTENDED_: 1
- T.UNATTENDED_SESSION: 1
- T.UNIDENTIFIED_ACTIONS: 3
- T.VIRUS: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS 140-2: 8
- FIPS 180-2: 1
- ISO:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /CreationDate: D:20060512044538Z
- /ModDate: D:20060731114807+09'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Subject: 2006/7/31 update
- pdf_file_size_bytes: 741778
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |