Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Cisco AnyConnect Secure Mobility Desktop Client Version: 4.1
Certificate Number: 2015/96
TOSHIBA e-STUDIO2555C/3055C/3555C/4555C/5055C/2555CSE/3055CSE/3555CSE/4555CSE/5055CSE MULTIFUNCTIONAL DIGITAL SYSTEMS Version: SYS V1.0
JISEC-CC-CRP-C0388
name Cisco AnyConnect Secure Mobility Desktop Client Version: 4.1 TOSHIBA e-STUDIO2555C/3055C/3555C/4555C/5055C/2555CSE/3055CSE/3555CSE/4555CSE/5055CSE MULTIFUNCTIONAL DIGITAL SYSTEMS Version: SYS V1.0
category Data Protection Multi-Function Devices
scheme AU JP
not_valid_after 14.04.2021 01.05.2018
not_valid_before 08.10.2015 26.04.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cisco_Anyconnect_4_1_CR.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0388_erpt2.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cisco_Anyconnect_4_1_ST.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0388_est.pdf
manufacturer Cisco Systems, Inc. Toshiba TEC Corporation
manufacturer_web https://www.cisco.com https://www.toshibatec.co.jp/en/
security_level {} EAL3+, ALC_FLR.2
dgst 7ed62a23c0dd8a9d a7263024c5c36e3f
heuristics/cert_id Certificate Number: 2015/96 JISEC-CC-CRP-C0388
heuristics/cpe_matches cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.1.06013:*:*:*:*:*:*:*, cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.1.04011:*:*:*:*:*:*:*, cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.1.08005:*:*:*:*:*:*:*, cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.1.06020:*:*:*:*:*:*:*, cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.1.00028:*:*:*:*:*:*:*, cpe:2.3:a:cisco:anyconnect_secure_mobility_client:4.1.02011:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2017-6638, CVE-2017-3813, CVE-2018-0100, CVE-2021-1519 {}
heuristics/extracted_sars AGD_PRE.1, ALC_CMS.1, ADV_FSP.1, AVA_VAN.1, ATE_IND.1, ALC_CMC.1, AGD_OPE.1 ALC_CMC.3, ADV_ARC.1, ATE_COV.2, ASE_TSS.1, AGD_OPE.1, ATE_DPT.1, ALC_FLR.2, ALC_DVS.1, ASE_REQ.2, ADV_TDS.2, ALC_CMS.3, AVA_VAN.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ALC_DEL.1, ADV_FSP.3, ASE_OBJ.2, ASE_INT.1, ASE_SPD.1, ATE_FUN.1, ALC_LCD.1
heuristics/extracted_versions 4.1 1.0
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0388
  • certification_date: 01.04.2013
  • claim: EAL3+ ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL3 Augmented with ALC_FLR.2
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0388_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Peripheral (MFP) that has the functions, such as copy, print, scan, filing, and internet fax. In general office environment, it is assumed that MFPs are utilized from the control panel of the TOE or the user terminal connected to LAN or USB with the TOE. TOE Security functions The TOE provides the following security features: - User Authentication function Function that allows the use of the TOE to only users who succeeded in the identification and authentication. - User Access Control function Function to perform the control of permit/ deny for the operation of various functions and user data, based on the privileges granted to the users who are identified and authenticated. - Secure Erase function Function to erase and overwrite the area in the HDD, where the document data has been stored, upon completion of copy function, etc. - Secure Channel function Function to protect communication data using the SSL protocol when the TOE communicates with the various servers or client PC. - Data Encryption function Function to encrypt and decrypt the document data stored in the HDD of the TOE. - Audit Data Generation and Review function Function to generate security audit log when security events occurred to be audited, and to allow only specific administrators to view that log. - TSF Data Protection function Function that allows the change of TOE configuration information only to the TOE administrator. - TSF Self Protection function Function to verify the integrity of the executable code of the security features. If any abnormalities are detected TOE will be unusable.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: TOSHIBA e-STUDIO2555C/3055C/ 3555C/4555C/5055C/2555CSE/3055CSE/ 3555CSE/4555CSE/5055CSE MULTIFUNCTIONAL DIGITAL SYSTEMS
    • product_type: Multifunction Peripheral
    • protection_profile: IEEE Std 2600.1-2009
    • report_link: https://www.ipa.go.jp/en/security/c0388_erpt2.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0388_est.pdf
    • toe_version: SYS V1.0
    • vendor: Toshiba Tec Corporation
  • expiration_date: 01.05.2018
  • supplier: Toshiba Tec Corporation
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0388_it2432.html
  • toe_overseas_name: TOSHIBA e-STUDIO 2555C/3055C/3555C/ 4555C/5055C/2555CSE/3055CSE/3555CSE/ 4555CSE/5055CSE MULTIFUNCTIONAL DIGITAL SYSTEMS SYS V1.0
heuristics/protection_profiles db7434eb64f09c94 32475ccb695b1644
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_vpn_ipsec_client_v1.4.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf
pdf_data/report_filename Cisco_Anyconnect_4_1_CR.pdf c0388_erpt2.pdf
pdf_data/report_keywords/cc_cert_id
  • AU:
    • Certification Report 2015/96: 1
  • FR:
    • Certification Report 2015/96: 1
  • JP:
    • CRP-C0388-02: 1
    • Certification No. C0388: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
    • EAL3 augmented: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • D:
    • D.CONF: 1
    • D.DOC: 2
    • D.FUNC: 1
    • D.PROT: 2
  • T:
    • T.CONF: 4
    • T.DOC: 4
    • T.FUNC: 2
    • T.PROT: 2
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 32
    • Cisco Systems, Inc: 1
  • Microsoft:
    • Microsoft: 2
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 1
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 2
    • IKEv2: 2
  • IPsec:
    • IPsec: 23
  • VPN:
    • VPN: 44
  • TLS:
    • SSL:
      • SSL: 8
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
  • RNG:
    • RBG: 3
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-20012-09-003: 1
    • CCMB-2012-09-002: 1
  • FIPS:
    • FIPS 140-2: 4
  • ISO:
    • ISO/IEC 17025: 2
  • X509:
    • X.509: 2
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • FIPS:
    • FIPS PUB 197: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • a user to create an e-Filing Box. Specific users or TOE administrators can save, print and edit confidential documents. Internet Fax function A function that allows scanned document data to be sent as a TIFF-FX: 1
  • OutOfScope:
    • out of scope: 1
    • that the reliability of the hardware and the cooperating software shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. CRP-C0388-02 12 4.3 Clarification of Scope: 1
pdf_data/report_metadata
  • /Author:
  • /CreationDate: D:20151009122140+11'00'
  • /Creator: Acrobat PDFMaker 9.0 for Word
  • /ModDate: D:20151009122146+11'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 265095
  • pdf_hyperlinks: http://www.cisco.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
  • /CreationDate: D:20130619094434+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130619094506+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 367918
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 37
pdf_data/st_filename Cisco_Anyconnect_4_1_ST.pdf c0388_est.pdf
pdf_data/st_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10340-2009: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 1
    • EAL 3 augmented: 1
    • EAL3: 2
    • EAL3 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_OPR: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN.1: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 4
    • ALC_LCD.1: 1
  • APE:
    • APE_REQ: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 6
    • FCS_CKM.1.1: 1
    • FCS_CKM.1.2: 1
    • FCS_CKM_EXT.2: 3
    • FCS_CKM_EXT.2.1: 1
    • FCS_CKM_EXT.4: 3
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP.1: 12
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT.1: 5
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
  • FDP:
    • FDP_RIP.2: 3
    • FDP_RIP.2.1: 1
  • FMT:
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 2
  • FPT:
    • FPT_TST_EXT: 1
    • FPT_TST_EXT.1: 2
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.1.2: 2
    • FPT_TUD_EXT.1: 2
  • FTP:
    • FTP_ITC.1: 3
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 18
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 11
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 9
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 2
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 37
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 29
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC: 1
    • FDP_IFC.1: 2
    • FDP_IFF: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 10
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 13
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 10
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 19
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 8
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 12
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 22
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 26
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 2
    • FPT_FDI_EXP.1: 14
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 9
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_TOE_BYPASS: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_CONFIG: 1
  • O:
    • O.RESIDUAL_INFORMATION_CLEARING: 1
    • O.TOE_ADMINISTRATION: 1
    • O.TSF_SELF_TEST: 1
    • O.VERIFIABLE_UPDATES: 1
    • O.VPN_TUNNEL: 1
  • OE:
    • OE.NO_TOE_BYPASS: 1
    • OE.PHYSICAL: 1
    • OE.TRUSTED_CONFIG: 1
  • T:
    • T.TSF_CONFIGURATION: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
    • T.USER_DATA_REUSE: 1
  • A:
    • A: 2
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.USER: 3
  • D:
    • D.CONF: 7
    • D.DOC: 48
    • D.FUNC: 12
    • D.PROT: 6
  • O:
    • O.AUDIT: 7
    • O.AUDIT_ACCESS: 5
    • O.AUDIT_ACCESS_AUTHORIZED: 1
    • O.AUDIT_STORAGE: 6
    • O.AUDIT_STORAGE_PROTECTED: 1
    • O.CONF: 14
    • O.CRYPTOGRAPHY: 7
    • O.DOC: 23
    • O.FUNC: 7
    • O.INTERFACE: 7
    • O.PROT: 7
    • O.SOFTWARE: 5
    • O.USER: 11
  • OE:
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 1
    • OE.AUDIT_STRAGE: 1
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
    • OE.PHYSICAL: 2
    • OE.USER: 12
  • T:
    • T.CONF: 6
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 18
    • Cisco Systems, Inc: 7
  • Microsoft:
    • Microsoft: 2
  • Microsoft:
    • Microsoft: 4
    • Microsoft Corporation: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 9
      • AES-: 1
  • constructions:
    • MAC:
      • HMAC: 4
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 15
  • FF:
    • DH:
      • DH: 12
      • Diffie-Hellman: 5
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-2: 1
      • SHA-256: 9
      • SHA-384: 7
      • SHA-512: 5
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 18
    • IKEv1: 4
    • IKEv2: 21
  • IPsec:
    • IPsec: 55
  • VPN:
    • VPN: 67
  • TLS:
    • SSL:
      • SSL: 15
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 4
  • RNG:
    • RBG: 4
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • GCM:
    • GCM: 4
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 8
    • P-384: 8
    • P-521: 8
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-20012-09-001: 1
    • CCMB-20012-09-003: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 140: 1
    • FIPS 140-2: 5
    • FIPS 180-4: 1
    • FIPS 186-3: 1
    • FIPS PUB 186-4: 5
    • FIPS PUB 197: 1
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-38D: 2
    • NIST SP 800-56A: 1
    • NIST SP 800-57: 1
  • RFC:
    • RFC 2560: 1
    • RFC 3602: 1
    • RFC 4106: 1
    • RFC 4301: 2
    • RFC 4303: 1
    • RFC 4945: 1
    • RFC 5280: 3
    • RFC 5282: 1
    • RFC 5759: 1
    • RFC 6379: 1
  • X509:
    • X.509: 6
  • FIPS:
    • FIPS PUB 197: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • e-Filing that each user can create. It is suitable for specific users or U.ADMINISTRATOR to store confidential documents. In addition user can operate various functions to the document such as print/edit/manage, etc. (5: 1
pdf_data/st_metadata
  • /Author: Cisco Systems, Inc.
  • /CreationDate: D:20150916165431-04'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20150916165431-04'00'
  • /Producer: Microsoft® Word 2010
  • /Title: 1
  • pdf_file_size_bytes: 866861
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 31
  • /Author: TOSHIBA TEC CORPORATION
  • /CreationDate: D:20130417131602+09'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: IEEE 2600.1™-2009 EAL3+ALC_FLR.2
  • /ModDate: D:20130417135319+09'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Security Target
  • /Title: SecurityTarget
  • pdf_file_size_bytes: 1417924
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 65
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different