Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
VMware Carbon Black Endpoint Detection and Response (EDR) Windows Sensor 7.2
CCEVS-VR-VID-11155-2021
Huawei CX600 and PTN 6900 Series Routers running VRP software version V800R021C00SPC100
2020-49-INF-4353
name VMware Carbon Black Endpoint Detection and Response (EDR) Windows Sensor 7.2 Huawei CX600 and PTN 6900 Series Routers running VRP software version V800R021C00SPC100
category Other Devices and Systems Network and Network-Related Devices and Systems
scheme US ES
status archived active
not_valid_after 28.07.2023 31.07.2029
not_valid_before 28.07.2021 31.07.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11155-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-49_Certificado.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11155-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-49%20INF-4353.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11155-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-49%20ST.pdf
manufacturer VMware Inc. Huawei Technologies España, SL
manufacturer_web https://www.vmware.com https://www.huawei.com/es/
dgst 8129b9e38f61ae35 0ee5a8bce7d2c1b7
heuristics/cert_id CCEVS-VR-VID-11155-2021 2020-49-INF-4353
heuristics/cert_lab US []
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1
heuristics/extracted_versions 7.2 6900
heuristics/scheme_data
  • category: Application Software
  • certification_date: 28.07.2021
  • evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
  • expiration_date: 28.07.2023
  • id: CCEVS-VR-VID11155
  • product: VMware Carbon Black Endpoint Detection and Response (EDR) Windows Sensor 7.2
  • scheme: US
  • url: https://www.niap-ccevs.org/product/11155
  • vendor: VMware, LLC
  • category: Routers
  • certification_date: 31.07.2024
  • enhanced:
    • category: Routers
    • cc_version: Common Methodology for Information Technology Security Evaluation/Common Criteria for Information Technology Security Evaluation version 3.1 release 5
    • cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2026
    • certification_date: 31.07.2024
    • description: The TOE is CX600&PTN 6900 Series Routers running VRP software comprised of both software and hardware. The software is comprised of Versatile Routing Platform (VRP) software, VRP is a network OS incorporating Huawei's proprietary intellectual properties and capable of supporting various network systems of Huawei. The hardware is comprised of the following: CX600-M2K, CX600-M2K-B, CX600-X8A, CX600-X16A, PTN 6900-M2K, PTN 6900-M2K-B, PTN 6900-2-M8C, PTN 6900-2-M14. The Huawei CX600&PTN 6900 Series Routers running VRP software use the same VRP version. TSF relevant functions depend on software implementation. The physical scope comprises the following hardware appliances and the TOE software: Appliances: CX600-M2K, CX600-M2K-B, CX600-X8A, CX600-X16A, PTN 6900-M2K, PTN 6900-M2K-B, PTN 6900-2-M8C, PTN 6900-2-M14 Software: CX600&PTN 6900 Router V800R021C00SPC100, CX600-M2K-B, CX600-X8A, CX600-X16A, PTN 6900-M2K, PTN 6900-M2K-B, PTN 6900-2-M8C, PTN 6900-2-M14
    • evaluation_facility: Applus Laboratories
    • level: PP Compliant
    • manufacturer: Huawei Technologies España, S.L.
    • report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2027
    • status: Certified
    • target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2025
    • type: Product
  • manufacturer: Huawei Technologies España, S.L.
  • product: Huawei CX600 and PTN 6900 Series Routers running VRP software version V800R021C00SPC100
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/1015-huawei-cx600-and-ptn-6900-series-routers-running-vrp-software-version-v800r021c00spc100
heuristics/protection_profiles a1cc4a4e079f4d1f {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_APP_v1.3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf
pdf_data/cert_filename st_vid11155-ci.pdf 2020-49_Certificado.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11155-2021: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
  • ALC:
    • ALC_FLR: 2
pdf_data/cert_keywords/cc_claims
  • O:
    • O.E: 1
pdf_data/cert_keywords/vendor
  • Huawei:
    • Huawei: 2
    • Huawei Technologies: 1
pdf_data/cert_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
  • Applus:
    • Applus Laboratories: 1
pdf_data/cert_metadata
  • /CreationDate: D:20210803124126-04'00'
  • /ModDate: D:20210803124126-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 183258
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20240718133923+02'00'
  • /ModDate: D:20240718133923+02'00'
  • /Producer: GPL Ghostscript 9.27
  • pdf_file_size_bytes: 898419
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename st_vid11155-vr.pdf 2020-49 INF-4353.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID11155-2021
    • cert_item: VMware Carbon Black Endpoint Detection and Response (EDR) Windows Sensor 7.2
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11155-2021: 1
  • ES:
    • 2020-49-INF-4353- v1: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_TSU_EXT.1: 1
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_FLR: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 4
  • Huawei:
    • Huawei: 29
    • Huawei Technologies: 3
pdf_data/report_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 3
  • Applus:
    • Applus Laboratories: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DHE: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 1
      • TLS v1.2: 1
  • SSH:
    • SSH: 8
  • TLS:
    • TLS:
      • TLS: 5
pdf_data/report_keywords/standard_id
  • X509:
    • X.509: 1
pdf_data/report_metadata
pdf_data/st_filename st_vid11155-st.pdf 2020-49 ST.pdf
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 9
  • AGD:
    • AGD_OPE.1: 12
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.1: 6
    • ALC_CMS.1: 7
    • ALC_TSU_EXT.1: 8
  • ASE:
    • ASE_CCL.1: 16
    • ASE_ECD.1: 12
    • ASE_INT.1: 14
    • ASE_OBJ.1: 6
    • ASE_REQ.1: 12
    • ASE_TSS.1: 7
  • ATE:
    • ATE_IND.1: 7
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 9
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM_EXT.1: 4
    • FCS_CKM_EXT.1.1: 1
    • FCS_COP: 1
    • FCS_RBG_EXT.1: 6
    • FCS_RBG_EXT.1.1: 2
    • FCS_STO_EXT.1: 7
    • FCS_STO_EXT.1.1: 1
  • FDP:
    • FDP_DAR_EXT: 1
    • FDP_DAR_EXT.1: 5
    • FDP_DEC_EXT.1: 5
    • FDP_DEC_EXT.1.1: 2
    • FDP_DEC_EXT.1.2: 2
    • FDP_NET_EXT.1: 5
    • FDP_NET_EXT.1.1: 1
  • FMT:
    • FMT_CFG_EXT.1: 5
    • FMT_CFG_EXT.1.1: 1
    • FMT_CFG_EXT.1.2: 1
    • FMT_MEC_EXT.1: 8
    • FMT_MEC_EXT.1.1: 1
    • FMT_SMF.1: 4
    • FMT_SMF.1.1: 1
  • FPR:
    • FPR_ANO_EXT.1: 4
    • FPR_ANO_EXT.1.1: 1
  • FPT:
    • FPT_AEX_EXT.1: 4
    • FPT_AEX_EXT.1.1: 2
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.1.3: 2
    • FPT_AEX_EXT.1.4: 2
    • FPT_AEX_EXT.1.5: 1
    • FPT_API_EXT.1: 4
    • FPT_API_EXT.1.1: 1
    • FPT_IDV_EXT.1: 4
    • FPT_IDV_EXT.1.1: 1
    • FPT_LIB_EXT.1: 4
    • FPT_LIB_EXT.1.1: 1
    • FPT_TUD_EXT.1: 6
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 2
    • FPT_TUD_EXT.1.4: 1
    • FPT_TUD_EXT.1.5: 1
    • FPT_TUD_EXT.2: 7
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
  • FTP:
    • FTP_DIT_EXT.1: 6
    • FTP_DIT_EXT.1.1: 1
  • FAU:
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_STG: 8
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG_EXT.1: 8
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
  • FCS:
    • FCS_CKM.1: 19
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 14
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 17
    • FCS_CKM.4.1: 1
    • FCS_COP: 63
    • FCS_COP.1: 5
    • FCS_RBG_EXT: 7
    • FCS_RBG_EXT.1: 7
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHC_EXT.1: 8
    • FCS_SSHC_EXT.1.1: 3
    • FCS_SSHC_EXT.1.2: 3
    • FCS_SSHC_EXT.1.3: 3
    • FCS_SSHC_EXT.1.4: 3
    • FCS_SSHC_EXT.1.5: 4
    • FCS_SSHC_EXT.1.6: 3
    • FCS_SSHC_EXT.1.7: 3
    • FCS_SSHC_EXT.1.8: 3
    • FCS_SSHC_EXT.1.9: 3
    • FCS_SSHS_EXT.1: 8
    • FCS_SSHS_EXT.1.1: 3
    • FCS_SSHS_EXT.1.2: 3
    • FCS_SSHS_EXT.1.3: 3
    • FCS_SSHS_EXT.1.4: 3
    • FCS_SSHS_EXT.1.5: 3
    • FCS_SSHS_EXT.1.6: 3
    • FCS_SSHS_EXT.1.7: 3
    • FCS_SSHS_EXT.1.8: 3
    • FCS_TLSC_EXT.1: 8
    • FCS_TLSC_EXT.1.1: 3
    • FCS_TLSC_EXT.1.2: 3
    • FCS_TLSC_EXT.1.3: 3
    • FCS_TLSC_EXT.1.4: 3
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PMG_EXT.1: 8
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.7: 7
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.2: 8
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT.1: 13
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
    • FIA_UID.1: 2
  • FMT:
    • FMT_MOF: 21
    • FMT_MOF.1: 3
    • FMT_MTD: 12
    • FMT_MTD.1: 2
    • FMT_SMF.1: 20
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 5
    • FMT_SMR.2: 7
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT.1: 8
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_SKP_EXT.1: 8
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM.1: 2
    • FPT_STM_EXT.1: 8
    • FPT_STM_EXT.1.1: 1
    • FPT_STM_EXT.1.2: 1
    • FPT_TST_EXT.1: 8
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT.1: 8
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL.3: 7
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 7
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT.1: 8
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB.1: 10
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 23
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_ITC.2: 6
    • FTP_TRP: 10
    • FTP_TRP.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • O:
    • O.INTEGRITY: 1
    • O.MANAGEMENT: 1
    • O.PROTECTED_COMMS: 1
    • O.PROTECTED_STORAGE: 1
    • O.QUALITY: 1
  • OE:
    • OE.PLATFORM: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
  • T:
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
    • T.PHYSICAL_ACCESS: 1
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 2
    • A.LIMITED_FUNCTIONALITY: 2
    • A.NO_THRU_TRAFFIC_PROTECTION: 2
    • A.PHYSICAL_PROTECTION: 2
    • A.REGULAR_UPDATES: 2
    • A.RESIDUAL_INFORMATION: 2
    • A.TRUSTED_ADMINISTRATOR: 2
  • OE:
    • OE.ADMIN_CREDENTIALS_SECURE: 3
    • OE.NO_GENERAL_PURPOSE: 3
    • OE.NO_THRU_TRAFFIC_PROTECTION: 3
    • OE.PHYSICAL: 3
    • OE.RESIDUAL_INFORMATION: 3
    • OE.TRUSTED_ADMIN: 3
    • OE.UPDATES: 3
  • T:
    • T.PASSWORD_CRACKING: 4
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 2
    • T.SECURITY_FUNCTIONALITY_FAILURE: 2
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 2
    • T.UNDETECTED_ACTIVITY: 3
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 4
    • T.UPDATE_COMPROMISE: 2
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 2
    • T.WEAK_CRYPTOGRAPHY: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 9
  • Huawei:
    • Huawei: 88
    • Huawei Technologies Co: 1
pdf_data/st_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
      • AES-: 1
  • AES_competition:
    • AES:
      • AES: 21
      • AES128: 4
      • AES256: 7
  • constructions:
    • MAC:
      • HMAC: 3
      • HMAC-SHA-256: 6
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 15
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 6
  • FF:
    • DH:
      • DHE: 2
pdf_data/st_keywords/hash_function
  • bcrypt:
    • bcrypt: 1
  • SHA:
    • SHA2:
      • SHA-2: 1
      • SHA-256: 9
      • SHA-384: 2
      • SHA256: 1
      • SHA384: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 12
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 7
      • TLS v1.2: 3
  • VPN:
    • VPN: 1
  • PGP:
    • PGP: 2
  • SSH:
    • SSH: 112
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 43
      • TLS 1.2: 1
      • TLS1.2: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 4
  • PRNG:
    • DRBG: 7
  • RNG:
    • RBG: 1
pdf_data/st_keywords/cipher_mode
  • CCM:
    • CCM: 1
  • CTR:
    • CTR: 7
  • GCM:
    • GCM: 12
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 6
    • P-384: 6
    • P-521: 6
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS PUB 186-4: 1
  • RFC:
    • RFC 5280: 3
    • RFC 6960: 2
  • X509:
    • X.509: 8
  • FIPS:
    • FIPS 180-3: 1
    • FIPS 186-4: 1
    • FIPS PUB 186-4: 11
  • ISO:
    • ISO/IEC 10118-3: 1
    • ISO/IEC 14888-3: 3
    • ISO/IEC 18031:2011: 3
    • ISO/IEC 9796-2: 3
    • ISO/IEC 9797-2: 1
  • PKCS:
    • PKCS #1: 1
  • RFC:
    • RFC 2104: 1
    • RFC 4251: 3
    • RFC 4252: 1
    • RFC 4253: 4
    • RFC 4254: 1
    • RFC 5246: 3
    • RFC 5280: 6
    • RFC 5288: 5
    • RFC 5647: 2
    • RFC 5656: 2
    • RFC 6125: 3
    • RFC 6668: 1
  • X509:
    • X.509: 12
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • in the claimed Protection Profile. Therefore, the following product functionality is considered out of scope as there are no SFRs that can be mapped to this functionality: • The functionality of collecting: 1
    • out of scope: 1
pdf_data/st_metadata
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different