Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
System Software for e-STUDIO202L/232/282 V1.0
JISEC-CC-CRP-C0043
Cisco Secure PIX Firewall V6.2(2)
CRP180
name System Software for e-STUDIO202L/232/282 V1.0 Cisco Secure PIX Firewall V6.2(2)
category Other Devices and Systems Boundary Protection Devices and Systems
scheme JP UK
not_valid_after 10.12.2010 27.02.2013
not_valid_before 29.03.2006 01.12.2002
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0043_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP180.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0043_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/stciscofw_v2.pdf
manufacturer Toshiba TEC Corporation Cisco Systems, Inc.
manufacturer_web https://www.toshibatec.co.jp/en/ https://www.cisco.com
security_level EAL3 EAL4
dgst 79cf3cf36c8217af f1c95290c6a8ec32
heuristics/cert_id JISEC-CC-CRP-C0043 CRP180
heuristics/cpe_matches {} cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.3:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.1:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.4:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.2:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.5:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.1:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.1:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.3:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.8:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2.4:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.2:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.6:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*, cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2021-1456, CVE-2020-3557, CVE-2021-1239, CVE-2024-20388, CVE-2022-20740, CVE-2018-0383, CVE-2019-12691, CVE-2021-1457, CVE-2020-3515, CVE-2022-20744, CVE-2022-20835, CVE-2023-20005, CVE-2022-20843, CVE-2023-20114, CVE-2018-0233, CVE-2020-3549, CVE-2021-1238, CVE-2024-20471, CVE-2018-0370, CVE-2018-0278, CVE-2022-20941, CVE-2022-20628, CVE-2020-3320, CVE-2018-0333, CVE-2023-20074, CVE-2019-1699, CVE-2022-20938, CVE-2019-12687, CVE-2024-20410, CVE-2019-12700, CVE-2018-0384, CVE-2019-12688, CVE-2021-1458, CVE-2022-20840, CVE-2019-1833, CVE-2019-15280, CVE-2022-20854, CVE-2022-20872, CVE-2024-20273, CVE-2020-3553, CVE-2023-20063, CVE-2017-6717, CVE-2022-20743, CVE-2024-20386, CVE-2022-20838, CVE-2024-20372, CVE-2021-1455, CVE-2019-16028, CVE-2019-12682, CVE-2020-3550, CVE-2019-1832, CVE-2022-20936, CVE-2022-20833, CVE-2018-0283, CVE-2024-20300, CVE-2022-20905, CVE-2022-20935, CVE-2017-6673, CVE-2022-20831, CVE-2022-20627, CVE-2019-1671, CVE-2022-20932, CVE-2022-20834, CVE-2024-20424, CVE-2018-0281, CVE-2019-12686, CVE-2024-20409, CVE-2024-20403, CVE-2019-12690, CVE-2018-15458, CVE-2023-20155, CVE-2024-20387, CVE-2019-12679, CVE-2022-20629, CVE-2019-1642, CVE-2017-12245, CVE-2024-20269, CVE-2018-15397, CVE-2019-15992, CVE-2019-12680, CVE-2018-0385, CVE-2022-20839, CVE-2019-12685, CVE-2022-20832, CVE-2021-1477, CVE-2020-3558, CVE-2017-12244, CVE-2023-20048, CVE-2024-20415, CVE-2020-3514, CVE-2021-1126, CVE-2022-20836, CVE-2019-12683, CVE-2023-20219, CVE-2018-0365, CVE-2023-20220, CVE-2019-12681, CVE-2020-3499, CVE-2021-1267, CVE-2019-12684, CVE-2019-12689, CVE-2019-1949, CVE-2017-3847
heuristics/extracted_sars ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 ADV_RCR.1, AVA_VLA.2, ADV_HLD.2, AGD_USR.1, AVA_SOF.1, ADV_FSP.2, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1
heuristics/extracted_versions 1.0 6.2
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0043
  • certification_date: 01.03.2006
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cert_link: https://www.ipa.go.jp/en/security/c0043_eimg.pdf
    • description: PRODUCT DESCRIPTION The TOE is the system software of the digital multi function device “ e-STUDIO202L/232/282 ” manufactured by TOSHIBA TEC CORPORATION. The system software provides general functions as a digital multifunction device as well as the function of data overwrite and complete deletion on the user document data deleted from the e-STUDIO202L/232/282 HDD. The function of data overwrite and complete deletion includes the function to collectively and completely delete all user document data from the HDD before the HDD is disposed or replaced. This function also prevents unauthorized restore of data.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc.
    • product: System Software for e-STUDIO202L/232/282
    • product_type: IT Product ( data protection function in Multi Function Device )
    • report_link: https://www.ipa.go.jp/en/security/c0043_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0043_est.pdf
    • toe_version: V1.0
    • vendor: TOSHIBA TEC CORPORATION
  • expiration_date: 01.01.2011
  • supplier: TOSHIBA TEC CORPORATION
  • toe_japan_name: System Software for e-STUDIO202L/232/282 V1.0
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0043_it5057.html
  • toe_overseas_name: System Software for e-STUDIO 202L/232/282 V1.0
pdf_data/report_filename c0043_erpt.pdf CRP180.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0043-01: 1
    • Certification No. C0043: 1
  • UK:
    • CERTIFICATION REPORT No. P180: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL0: 1
    • EAL1: 1
    • EAL4: 24
    • EAL4 augmented: 1
    • EAL7: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR: 2
    • ALC_FLR.1: 45
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_AUD.1: 5
    • FAU_GEN.1: 3
pdf_data/report_keywords/cc_claims
  • T:
    • T.STOREDATA_ACCESS: 1
    • T.TEMPDATA_ACCESS: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 70
    • Cisco Systems: 10
  • Microsoft:
    • Microsoft: 2
    • Microsoft Corporation: 1
pdf_data/report_keywords/symmetric_crypto
  • miscellaneous:
    • Skinny:
      • Skinny: 3
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 4
pdf_data/report_keywords/side_channel_analysis
  • other:
    • reverse engineering: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 2
    • CCIMB-99-033: 2
  • ISO:
    • ISO/IEC 15408:1999: 1
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
pdf_data/report_metadata
  • /Author:
  • /CreationDate: D:20060515142139+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20060515142342+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 546561
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
  • /Author: djgreg1
  • /CreationDate: D:20030106101657Z
  • /Creator: Microsoft Word - CRP180.doc
  • /ModDate: D:20131204151142Z
  • /Producer: Acrobat PDFWriter 4.0 for Windows NT
  • /Title: CRP180.PDF
  • pdf_file_size_bytes: 164944
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename c0043_est.pdf stciscofw_v2.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 1
    • EAL3: 4
  • EAL:
    • EAL 4: 2
    • EAL4: 10
    • EAL4 augmented: 1
  • ITSEC:
    • ITSEC E3 equivalent: 1
    • ITSEC E3 or: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 3
    • ACM_SCP.1: 1
  • ADO:
    • ADO_DEL.1: 3
    • ADO_IGS.1: 3
  • ADV:
    • ADV_FSP.1: 3
    • ADV_HLD.2: 1
    • ADV_RCR.1: 3
  • AGD:
    • AGD_ADM.1: 3
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 3
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 1
    • ATE_FUN.1: 3
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.1: 3
    • AVA_SOF.1: 2
    • AVA_VLA.1: 3
  • ACM:
    • ACM_AUT.1: 3
    • ACM_CAP.4: 3
    • ACM_SCP.2: 3
  • ADO:
    • ADO_DEL.2: 4
    • ADO_IGS.1: 3
  • ADV:
    • ADV_FSP.2: 3
    • ADV_HLD.2: 3
    • ADV_IMP.1: 3
    • ADV_LLD.1: 3
    • ADV_RCR.1: 3
    • ADV_SPM.1: 3
  • AGD:
    • AGD_ADM.1: 3
    • AGD_USR.1: 3
  • ALC:
    • ALC_DVS.1: 3
    • ALC_FLR.1: 10
    • ALC_LCD.1: 3
    • ALC_TAT.1: 3
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 3
    • ATE_FUN.1: 3
    • ATE_IND.2: 3
  • AVA:
    • AVA_MSU.2: 3
    • AVA_SOF.1: 3
    • AVA_VLA.2: 4
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 1
    • FDP_RIP.2: 8
  • FPT:
    • FPT_RVM.1: 12
    • FPT_RVM.1.1: 1
  • FAU:
    • FAU_AUD: 1
    • FAU_AUD.1: 21
    • FAU_AUD.1.1: 1
    • FAU_AUD.1.2: 1
    • FAU_GEN.1: 13
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 14
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 12
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
    • FDP_RIP.1: 7
    • FDP_RIP.1.1: 1
  • FMT:
    • FMT_MSA: 1
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 17
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_RVM.1: 9
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 7
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM.1: 11
    • FPT_STM.1.1: 1
pdf_data/st_keywords/cc_claims
  • O:
    • O.STOREDATA_OVERWRITE: 4
    • O.TEMPDATA_OVERWRITE: 6
  • OE:
    • OE.HDD_ERASE: 3
    • OE.OVERWRITE_COMPLETE: 3
  • T:
    • T.STOREDATA_ACCESS: 3
    • T.TEMPDATA_ACCESS: 4
  • A:
    • A.AUDFUL: 3
    • A.AUDIT: 4
    • A.HOSTILE: 3
    • A.PHYSICAL: 4
    • A.REMOTE: 4
  • O:
    • O.ATTEMPT: 4
    • O.HOSTILE: 5
    • O.PRIVATE: 5
    • O.SECPROC: 4
    • O.VALID: 5
  • OE:
    • OE.AUDIT: 4
  • T:
    • T.EXTERN: 3
    • T.INTERN: 4
    • T.SPOOF: 4
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 137
    • Cisco Systems: 2
  • Microsoft:
    • Microsoft: 1
pdf_data/st_keywords/symmetric_crypto
  • miscellaneous:
    • Skinny:
      • Skinny: 2
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 1
pdf_data/st_keywords/side_channel_analysis
  • other:
    • reverse engineering: 2
pdf_data/st_metadata
  • /CreationDate: D:20060512044538Z
  • /ModDate: D:20060731114807+09'00'
  • /Producer: Acrobat Distiller 5.0 (Windows)
  • /Subject: 2006/7/31 update
  • pdf_file_size_bytes: 741778
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
  • /Author: djgreg1
  • /CreationDate: D:20030106103621
  • /Creator: Microsoft Word - ST v2.4public.doc
  • /Producer: Acrobat PDFWriter 4.0 for Windows NT
  • /Title: ST v2.4public.doc
  • pdf_file_size_bytes: 122661
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 55
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different