name |
Xerox VersaLink C7020/C7025/C7030 Color Multifunction Printer models with Hard Disk, FaxController ROM Ver. 1.11.33, FAX ROM Ver. 2.0.8 |
HP PageWide Enterprise Color Flow MFP 785, HP PageWide Enterprise Color MFP 586, HP LaserJet Enterprise MFP M528, HP PageWide Managed Color Flow MFP E77650, HP PageWide Managed Color Flow MFP E77660, HP Color LaserJet Managed MFP E57540, HP LaserJet Managed MFP E52545, and HP LaserJet Managed MFP E52645 multifunction printers (MFPs) with HP FutureSmart 4.11.0.1 Firmware |
category |
Multi-Function Devices |
Multi-Function Devices |
scheme |
JP |
IT |
status |
archived |
active |
not_valid_after |
22.05.2023 |
19.07.2026 |
not_valid_before |
22.05.2018 |
19.07.2021 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0599_eimg.pdf |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0599_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_hp_mfp_fs411_v1.1_en.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0599_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_hp_mfp_3bcf_hcdpp_v1.2.pdf |
manufacturer |
Xerox Corporation |
HP Inc. |
manufacturer_web |
https://www.xerox.com |
https://www8.hp.com/hpnext/tags/hp-inc#.Vjdf803sn4g |
security_level |
ALC_FLR.2, EAL2+ |
{} |
dgst |
7d51d4eb214d84b7 |
91ae91434a998300 |
heuristics/cert_id |
JISEC-CC-CRP-C0599-01-2018 |
OCSI/CERT/ATS/11/2020/RC |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
cpe:2.3:h:xerox:versalink_c7030:-:*:*:*:*:*:*:*, cpe:2.3:h:xerox:versalink_c7020:-:*:*:*:*:*:*:*, cpe:2.3:h:xerox:versalink_c7025:-:*:*:*:*:*:*:* |
cpe:2.3:h:hp:pagewide_enterprise_color_mfp_586:-:*:*:*:*:*:*:*, cpe:2.3:h:hp:laserjet_4:-:*:*:*:*:*:*:*, cpe:2.3:o:hp:pagewide_enterprise_color_mfp_586_firmware:-:*:*:*:*:*:*:*, cpe:2.3:o:hp:futuresmart_4:-:*:*:*:*:*:*:* |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_TDS.1, ATE_FUN.1, ADV_ARC.1, ASE_ECD.1, AVA_VAN.2, ATE_IND.2, ASE_OBJ.2, AGD_PRE.1, ASE_CCL.1, ASE_SPD.1, ALC_FLR.2, AGD_OPE.1, ALC_CMS.2, ALC_DEL.1, ADV_FSP.2, ATE_COV.1, ASE_REQ.2, ASE_INT.1, ALC_CMC.2 |
ALC_CMS.1, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1, ATE_IND.1, AVA_VAN.1, ASE_INT.1, ASE_OBJ.1, ALC_CMC.1, ASE_REQ.1, ADV_FSP.1, ASE_ECD.1, ASE_SPD.1, AGD_OPE.1 |
heuristics/extracted_versions |
2.0.8, 1.11.33 |
4.11.0.1 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2021-39238, CVE-2021-39237, CVE-2019-6318, CVE-2009-0941, CVE-2021-3662, CVE-2009-0940 |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: C0599
- certification_date: 2018-05
- claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- enhanced:
- assurance_level: EAL2 Augmented by ALC_FLR.2
- cc_version: 3.1 Release4
- cert_id: JISEC-C0599
- cert_link: https://www.ipa.go.jp/en/security/c0599_eimg.pdf
- certification_date: 2018-05-22
- description: PRODUCT DESCRIPTION
Description of TOE
The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, network scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE.
TOE security functionality
To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions:
-
Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD.
-
Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD.
-
User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data.
-
System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions.
-
Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations.
-
Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them.
-
Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols.
-
Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network.
-
Self testA function to verify the integrity of TSF executable code and TOE setting data.
- evaluation_facility: Information Technology Security Center
Evaluation Department
- product: Xerox VersaLink C7020/C7025/C7030 Color Multifunction Printer models with Hard Disk, Fax
- product_type: Multi-Function Device
- protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- report_link: https://www.ipa.go.jp/en/security/c0599_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0599_est.pdf
- toe_version: Controller ROM Ver. 1.11.33, FAX ROM Ver. 2.0.8
- vendor: Xerox Corporation
- expiration_date: 2023-06
- supplier: Xerox Corporation
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0599_it7628.html
- toe_overseas_name: Xerox VersaLink C7020/C7025/C7030 Color Multifunction Printer models with Hard Disk, Fax
Controller ROM Ver. 1.11.33, FAX ROM Ver. 2.0.8
|
- certification_date: 19 luglio
2021
- level: conforme a
PP_HCD_V1.0
- report_link_en: https://www.ocsi.gov.it/documenti/certificazioni/hp/cr_hp_mfp_fs411_v1.1_en.pdf
- report_link_it: https://www.ocsi.gov.it/documenti/certificazioni/hp/rc_hp_mfp_fs411_v1.1_it.pdf
- revision_date: 25 ottobre 2021
- supplier: HP, Inc.
- target_link: https://www.ocsi.gov.it/documenti/certificazioni/hp/st_hp_mfp_3bcf_hcdpp_v1.2.pdf
- title: HP PageWide Enterprise Color Flow MFP 785, HP PageWide Enterprise Color
MFP 586, HP LaserJet Enterprise MFP M528, HP PageWide Managed Color
Flow MFP E77650, HP PageWide Managed Color Flow MFP E77660, HP Color
LaserJet Managed MFP E57540, HP LaserJet Managed MFP E52545,
and HP LaserJet Managed MFP E52645 multifunction printers (MFPs)
with HP FutureSmart 4.11.0.1 Firmware
- vulnerability_note_link: https://www.ocsi.gov.it/documenti/certificazioni/hp/nota_ocsi_cve_2021_39238.pdf
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
c0599_eimg.pdf |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0599-01-2018: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20180608153951+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20180608154115+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 86425
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
c0599_erpt.pdf |
cr_hp_mfp_fs411_v1.1_en.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0599-01-2018: 1
|
- IT:
- OCSI/CERT/ATS/11/2020/RC: 34
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 2
|
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.1: 3
- ALC_CMS.1: 3
- ALC_FLR: 1
- ASE:
- ASE_CCL.1: 3
- ASE_ECD.1: 3
- ASE_INT.1: 3
- ASE_OBJ.1: 3
- ASE_REQ.1: 3
- ASE_SPD.1: 3
- ASE_TSS.1: 3
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- T:
- T.CONF: 4
- T.DOC: 4
- T.FUNC: 2
- T.PROT: 2
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 4
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
- NIST:
- P-256: 4
- P-384: 4
- P-521: 2
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- ISO:
- PKCS:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described: 1
- out of scope: 1
|
|
pdf_data/report_metadata |
- /CreationDate: D:20180723133907+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20180723133922+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 430190
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 37
|
- /Author: OCSI
- /CreationDate: D:20211025090419+02'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20211025090419+02'00'
- /Producer: Microsoft® Word 2010
- /Title: Certification Report "HP Multifunction Printers (MFPs) with HP FutureSmart 4.11.0.1 Firmware"
- pdf_file_size_bytes: 853608
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
pdf_data/st_filename |
c0599_est.pdf |
st_hp_mfp_3bcf_hcdpp_v1.2.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL2: 2
- EAL2 augmented: 1
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 2
- ASE_INT.1: 2
- ASE_OBJ.1: 2
- ASE_REQ.1: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 2
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 15
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FAU_SAR: 1
- FAU_SAR.1: 10
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 9
- FAU_SAR.2.1: 1
- FAU_STG: 1
- FAU_STG.1: 11
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 9
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 2
- FCS_COP: 1
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 75
- FDP_ACC.1.1: 6
- FDP_ACF.1: 68
- FDP_ACF.1.1: 6
- FDP_ACF.1.2: 6
- FDP_ACF.1.3: 6
- FDP_ACF.1.4: 6
- FDP_IFC: 1
- FDP_IFC.1: 6
- FDP_IFF: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 19
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 16
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 10
- FIA_UAU.7.1: 1
- FIA_UID.1: 22
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 1
- FIA_USB.1: 9
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 11
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 75
- FMT_MSA.1.1: 6
- FMT_MSA.3: 68
- FMT_MSA.3.1: 6
- FMT_MSA.3.2: 6
- FMT_MTD.1: 23
- FMT_MTD.1.1: 2
- FMT_SMF.1: 34
- FMT_SMF.1.1: 1
- FMT_SMR.1: 39
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FDI_EXP: 3
- FPT_FDI_EXP.1: 16
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 10
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 19
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAR.1: 1
- FAU_SAR.2: 1
- FAU_STG: 2
- FAU_STG.1: 1
- FAU_STG.4: 1
- FAU_STG_EXT.1: 11
- FAU_STG_EXT.1.1: 3
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 48
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 24
- FCS_CKM.4.1: 3
- FCS_CKM_EXT.4: 20
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 109
- FCS_COP.1.1: 4
- FCS_KDF_EXT.1: 4
- FCS_KYC: 2
- FCS_KYC_EXT: 1
- FCS_KYC_EXT.1: 25
- FCS_KYC_EXT.1.1: 2
- FCS_PCC_EXT.1: 2
- FCS_RBG: 2
- FCS_RBG_EXT.1: 34
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 3
- FCS_SMC_EXT.1: 4
- FCS_SNI_EXT.1: 2
- FCS_SSH_EXT.1: 1
- FCS_SSH_EXT.1.5: 1
- FCS_SSH_EXT.1.7: 1
- FCS_TLS_EXT.1: 4
- FDP:
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF.1: 17
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DSK: 2
- FDP_DSK_EXT.1: 15
- FDP_DSK_EXT.1.1: 2
- FDP_DSK_EXT.1.2: 4
- FDP_FXS: 2
- FDP_FXS_EXT: 1
- FDP_FXS_EXT.1: 14
- FDP_FXS_EXT.1.1: 2
- FDP_FXS_EXT.1.2: 1
- FDP_IFC.1: 1
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FDP_RIP.1: 13
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 17
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 15
- FIA_ATD.1.1: 1
- FIA_PMG: 2
- FIA_PMG_EXT: 1
- FIA_PMG_EXT.1: 20
- FIA_PMG_EXT.1.1: 2
- FIA_PSK: 2
- FIA_PSK_EXT: 1
- FIA_PSK_EXT.1: 23
- FIA_PSK_EXT.1.1: 2
- FIA_PSK_EXT.1.2: 2
- FIA_PSK_EXT.1.3: 3
- FIA_UAU.1: 16
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UID.1: 16
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 18
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 19
- FMT_MOF.1.1: 1
- FMT_MSA.1: 20
- FMT_MSA.1.1: 1
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 2
- FMT_MTD.1: 22
- FMT_MTD.1.1: 1
- FMT_SMF.1: 16
- FMT_SMF.1.1: 1
- FMT_SMR.1: 20
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_KYP: 2
- FPT_KYP_EXT: 1
- FPT_KYP_EXT.1: 13
- FPT_KYP_EXT.1.1: 2
- FPT_SKP: 2
- FPT_SKP_EXT: 1
- FPT_SKP_EXT.1: 13
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 16
- FPT_STM.1.1: 1
- FPT_TST: 2
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 19
- FPT_TST_EXT.1.1: 2
- FPT_TUD: 2
- FPT_TUD_EXT: 1
- FPT_TUD_EXT.1: 19
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FTA:
- FTA_SSL.3: 11
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 16
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 24
- FTP_TRP.1.1: 2
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.ADMIN: 6
- A.USER: 3
- D:
- D.CONF: 13
- D.DOC: 41
- D.FUNC: 19
- D.PROT: 4
- O:
- O.AUDIT: 8
- O.AUDIT_ACCESS: 10
- O.AUDIT_STORAGE: 10
- O.CIPHER: 8
- O.CONF: 16
- O.DOC: 16
- O.FUNC: 8
- O.INTERFACE: 8
- O.PROT: 8
- O.SOFTWARE: 8
- O.USER: 14
- OE:
- OE.ADMIN: 6
- OE.AUDIT: 3
- OE.AUDIT_ACCESS: 2
- OE.AUDIT_STORAGE: 2
- OE.INTERFACE: 3
- OE.PHYISCAL: 1
- OE.PHYSICAL: 2
- OE.USER: 12
- T:
- T.CONF: 6
- T.DOC: 6
- T.FUNC: 3
- T.PROT: 3
|
- A:
- A.NETWORK: 3
- A.PHYSICAL: 3
- A.TRAINED_USERS: 4
- A.TRUSTED_ADMIN: 3
- D:
- O:
- O.ACCESS_CONTROL: 21
- O.ADMIN_ROLES: 15
- O.AUDIT: 16
- O.COMMS_PROTECTION: 39
- O.FAX_NET_SEPARATION: 7
- O.IMAGE_OVERWRITE: 9
- O.KEY_MATERIAL: 7
- O.PURGE_DATA: 1
- O.STORAGE_ENCRYPTION: 17
- O.TSF_SELF_TEST: 7
- O.UPDATE_VERIFICATION: 11
- O.USER: 4
- O.USER_AUTHORIZATION: 18
- OE:
- OE.ADMIN_TRAINING: 3
- OE.ADMIN_TRUST: 3
- OE.NETWORK_PROTECTION: 3
- OE.PHYSICAL_PROTECTION: 3
- OE.USER_TRAINING: 3
- T:
- T.NET_COMPROMISE: 3
- T.TSF_COMPROMISE: 2
- T.TSF_FAILURE: 3
- T.UNAUTHORIZED_ACCESS: 5
- T.UNAUTHORIZED_UPDATE: 3
|
pdf_data/st_keywords/vendor |
|
- Microsoft:
- Microsoft: 6
- Microsoft Corporation: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- AES:
- AES: 55
- AES-: 1
- AES-128: 1
- AES-256: 6
- constructions:
- MAC:
- HMAC: 23
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 3
- SHA256: 7
- SHA384: 2
- SHA512: 2
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
- SHA3:
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 17
- IKEv1: 41
- IKEv2: 5
- IPsec:
- SSH:
- TLS:
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 14
- P-384: 14
- P-521: 14
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- malfunction: 2
- physical tampering: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS PUB 180-2: 2
- FIPS PUB 197: 1
- RFC:
- X509:
|
- FIPS:
- FIPS 140-2: 7
- FIPS 180-3: 1
- FIPS PUB 180-3: 1
- FIPS PUB 186-4: 2
- FIPS PUB 197: 1
- FIPS180-4: 5
- FIPS186-4: 9
- FIPS197: 5
- FIPS198-1: 3
- ISO:
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-90A: 2
- PKCS:
- RFC:
- RFC 3602: 6
- RFC 4106: 2
- RFC 4109: 2
- RFC 4301: 3
- RFC 4303: 2
- RFC 4304: 1
- RFC 4868: 3
- RFC 5282: 1
- RFC2407: 2
- RFC2408: 2
- RFC2409: 2
- RFC3526: 3
- RFC3602: 2
- RFC4109: 2
- RFC4301: 3
- RFC4303: 2
- RFC4868: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- is set to [authority of user to only Store Print], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. Embedded Web Server Embedded Web Server is a: 1
|
|
pdf_data/st_metadata |
- /CreationDate: D:20180712133520+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20180712143347+09'00'
- /Producer: Acrobat Distiller 10.1.16 (Windows)
- /Subject: Security Target
- /Title: Xerox VersaLink C7020/C7025/C7030 Color Multifunction Printer
- pdf_file_size_bytes: 684900
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 121
|
- /Author: Anthony J Peterson;[email protected]
- /Comments:
- /Company:
- /ContentTypeId: 0x0101004FF4B889DDA4C643B09D6F0293167C5E
- /CreationDate: D:20211007081120-06'00'
- /Creator: Acrobat PDFMaker 11 for Word
- /Keywords:
- /ModDate: D:20211007081247-06'00'
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20210824183044
- /Subject:
- /Title: HP 3BCF HCDPP Security Target
- pdf_file_size_bytes: 1508538
- pdf_hyperlinks: https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=1929, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/Details?validation=17215, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=8574, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=30955, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=22432, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=23804, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=12290, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=3946, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=6765, https://csrc.nist.gov/Projects/Cryptographic-Module-Validation-Program/Certificate/3252, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=21159, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=24416, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=13816, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=1871
- pdf_is_encrypted: False
- pdf_number_of_pages: 164
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |