Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
VMware Carbon Black Endpoint Detection and Response (EDR) Windows Sensor 7.2
CCEVS-VR-VID-11155-2021
Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4(watchOS 10.4 (build 21T216))
ANSSI-CC-2024/41
name VMware Carbon Black Endpoint Detection and Response (EDR) Windows Sensor 7.2 Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4(watchOS 10.4 (build 21T216))
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US FR
status archived active
not_valid_after 28.07.2023 08.01.2030
not_valid_before 28.07.2021 08.01.2025
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11155-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2024_41fr.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11155-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_41fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11155-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2024_41en.pdf
manufacturer VMware Inc. Apple Inc.
manufacturer_web https://www.vmware.com https://www.apple.com/
security_level {} EAL2+, ADV_FSP.3, ALC_FLR.3
dgst 8129b9e38f61ae35 e5bae93bf2719158
heuristics/cert_id CCEVS-VR-VID-11155-2021 ANSSI-CC-2024/41
heuristics/cert_lab US []
heuristics/cpe_matches {} cpe:2.3:o:apple:watchos:10.4:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2024-44255, CVE-2024-54534, CVE-2024-44302, CVE-2024-27801, CVE-2024-54502, CVE-2025-24160, CVE-2024-44192, CVE-2024-54542, CVE-2024-44225, CVE-2024-44254, CVE-2024-27805, CVE-2024-40850, CVE-2024-54514, CVE-2024-40784, CVE-2024-54525, CVE-2024-27821, CVE-2024-44278, CVE-2024-27834, CVE-2024-40806, CVE-2024-44191, CVE-2025-24123, CVE-2024-54551, CVE-2024-44269, CVE-2024-27808, CVE-2025-24117, CVE-2024-44183, CVE-2024-40822, CVE-2024-44198, CVE-2024-27840, CVE-2024-40793, CVE-2024-44194, CVE-2024-40795, CVE-2024-40824, CVE-2024-40835, CVE-2024-54530, CVE-2024-27880, CVE-2024-27830, CVE-2024-44244, CVE-2024-44297, CVE-2024-27851, CVE-2024-40774, CVE-2024-44296, CVE-2024-54468, CVE-2024-44290, CVE-2024-54479, CVE-2025-24137, CVE-2024-54517, CVE-2024-27826, CVE-2024-27811, CVE-2024-54499, CVE-2024-40857, CVE-2024-44240, CVE-2024-40818, CVE-2025-24158, CVE-2024-44187, CVE-2025-24086, CVE-2024-44233, CVE-2024-44170, CVE-2024-54497, CVE-2024-27838, CVE-2024-54527, CVE-2024-40779, CVE-2024-54523, CVE-2024-27823, CVE-2024-27815, CVE-2024-40813, CVE-2024-40788, CVE-2024-40776, CVE-2024-54494, CVE-2025-24124, CVE-2024-54500, CVE-2024-27814, CVE-2024-44144, CVE-2024-54538, CVE-2024-27816, CVE-2024-27884, CVE-2024-44215, CVE-2024-40815, CVE-2025-24131, CVE-2024-54560, CVE-2024-27820, CVE-2024-44176, CVE-2024-40785, CVE-2024-44282, CVE-2025-24159, CVE-2024-44273, CVE-2024-54543, CVE-2024-54501, CVE-2024-27806, CVE-2025-24162, CVE-2024-44155, CVE-2024-27832, CVE-2025-24126, CVE-2024-23282, CVE-2025-24161, CVE-2024-54478, CVE-2024-54486, CVE-2024-27800, CVE-2024-27810, CVE-2024-27804, CVE-2024-54522, CVE-2024-40812, CVE-2024-54513, CVE-2024-54512, CVE-2024-54508, CVE-2024-54510, CVE-2024-40777, CVE-2024-54467, CVE-2024-44212, CVE-2024-40787, CVE-2024-40805, CVE-2024-44185, CVE-2024-40799, CVE-2024-40829, CVE-2024-27828, CVE-2024-44285, CVE-2024-54535, CVE-2024-44239, CVE-2024-44234, CVE-2025-24163, CVE-2025-24129, CVE-2024-44274, CVE-2024-40782, CVE-2024-44171, CVE-2024-54505, CVE-2024-40809, CVE-2024-27863, CVE-2024-23251, CVE-2024-44169, CVE-2024-54526, CVE-2024-27856, CVE-2024-54541, CVE-2024-40780, CVE-2025-24085, CVE-2024-54518, CVE-2025-24149, CVE-2025-24107, CVE-2024-40836, CVE-2024-40789, CVE-2024-44232
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 ASE_INT.1, AVA_VAN.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ADV_FSP.3, ASE_CCL.1
heuristics/extracted_versions 7.2 10.4
heuristics/scheme_data
  • category: Application Software
  • certification_date: 28.07.2021
  • evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
  • expiration_date: 28.07.2023
  • id: CCEVS-VR-VID11155
  • product: VMware Carbon Black Endpoint Detection and Response (EDR) Windows Sensor 7.2
  • scheme: US
  • url: https://www.niap-ccevs.org/product/11155
  • vendor: VMware, LLC
heuristics/protection_profiles a1cc4a4e079f4d1f {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_APP_v1.3.pdf {}
pdf_data/cert_filename st_vid11155-ci.pdf Certificat-ANSSI-CC-2024_41fr.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11155-2021: 1
  • FR:
    • ANSSI-CC-2024/41: 2
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
  • EAL:
    • EAL2: 2
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR.3: 1
pdf_data/cert_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
pdf_data/cert_metadata
  • /CreationDate: D:20210803124126-04'00'
  • /ModDate: D:20210803124126-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 183258
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20250110100051+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20250110101612+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 144030
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename st_vid11155-vr.pdf ANSSI-CC-2024_41fr.pdf
pdf_data/report_frontpage
  • FR:
  • US:
    • cert_id: CCEVS-VR-VID11155-2021
    • cert_item: VMware Carbon Black Endpoint Detection and Response (EDR) Windows Sensor 7.2
    • cert_lab: US NIAP
  • FR:
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11155-2021: 1
  • FR:
    • ANSSI-CC-2024/41: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 3
    • EAL4: 1
  • ITSEC:
    • ITSEC E3 Elémentaire: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_TSU_EXT.1: 1
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.3: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 4
pdf_data/report_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 3
  • CESTI:
    • CESTI: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 1
      • TLS v1.2: 1
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/report_keywords/standard_id
  • X509:
    • X.509: 1
  • CC:
    • CCMB-2022-11-001: 1
    • CCMB-2022-11-002: 1
    • CCMB-2022-11-003: 1
    • CCMB-2022-11-005: 1
    • CCMB-2022-11-006: 1
pdf_data/report_metadata
pdf_data/st_filename st_vid11155-st.pdf ANSSI-Cible-CC-2024_41en.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 9
  • AGD:
    • AGD_OPE.1: 12
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.1: 6
    • ALC_CMS.1: 7
    • ALC_TSU_EXT.1: 8
  • ASE:
    • ASE_CCL.1: 16
    • ASE_ECD.1: 12
    • ASE_INT.1: 14
    • ASE_OBJ.1: 6
    • ASE_REQ.1: 12
    • ASE_TSS.1: 7
  • ATE:
    • ATE_IND.1: 7
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 9
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.1: 2
    • ADV_FSP.2: 4
    • ADV_FSP.3: 3
    • ADV_TDS.1: 4
  • AGD:
    • AGD_OPE.1: 4
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
    • ALC_FLR: 1
    • ALC_FLR.3: 3
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 2
    • ASE_OBJ.2: 2
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 1
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 4
    • ATE_FUN.1: 3
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM_EXT.1: 4
    • FCS_CKM_EXT.1.1: 1
    • FCS_COP: 1
    • FCS_RBG_EXT.1: 6
    • FCS_RBG_EXT.1.1: 2
    • FCS_STO_EXT.1: 7
    • FCS_STO_EXT.1.1: 1
  • FDP:
    • FDP_DAR_EXT: 1
    • FDP_DAR_EXT.1: 5
    • FDP_DEC_EXT.1: 5
    • FDP_DEC_EXT.1.1: 2
    • FDP_DEC_EXT.1.2: 2
    • FDP_NET_EXT.1: 5
    • FDP_NET_EXT.1.1: 1
  • FMT:
    • FMT_CFG_EXT.1: 5
    • FMT_CFG_EXT.1.1: 1
    • FMT_CFG_EXT.1.2: 1
    • FMT_MEC_EXT.1: 8
    • FMT_MEC_EXT.1.1: 1
    • FMT_SMF.1: 4
    • FMT_SMF.1.1: 1
  • FPR:
    • FPR_ANO_EXT.1: 4
    • FPR_ANO_EXT.1.1: 1
  • FPT:
    • FPT_AEX_EXT.1: 4
    • FPT_AEX_EXT.1.1: 2
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.1.3: 2
    • FPT_AEX_EXT.1.4: 2
    • FPT_AEX_EXT.1.5: 1
    • FPT_API_EXT.1: 4
    • FPT_API_EXT.1.1: 1
    • FPT_IDV_EXT.1: 4
    • FPT_IDV_EXT.1.1: 1
    • FPT_LIB_EXT.1: 4
    • FPT_LIB_EXT.1.1: 1
    • FPT_TUD_EXT.1: 6
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 2
    • FPT_TUD_EXT.1.4: 1
    • FPT_TUD_EXT.1.5: 1
    • FPT_TUD_EXT.2: 7
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
  • FTP:
    • FTP_DIT_EXT.1: 6
    • FTP_DIT_EXT.1.1: 1
  • FDP:
    • FDP_ACC: 22
    • FDP_ACC.1: 10
    • FDP_ACC.2: 6
    • FDP_ACF: 20
    • FDP_ACF.1: 16
    • FDP_DAU.1: 4
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ETC: 7
    • FDP_ETC.2: 10
    • FDP_IFC.1: 8
    • FDP_ITC.1: 5
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_RIP.1: 12
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 9
    • FDP_SDI.1.1: 1
    • FDP_UCT: 10
    • FDP_UCT.1: 2
    • FDP_UIT: 10
    • FDP_UIT.1: 4
  • FIA:
    • FIA_AFL: 11
    • FIA_AFL.1: 4
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 2
    • FIA_SOS.2: 4
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 2
    • FIA_UID.1: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 14
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 4
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 12
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_ITC.1: 4
    • FPT_ITC.1.1: 1
    • FPT_RPL: 8
    • FPT_RPL.1: 6
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 10
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • O:
    • O.INTEGRITY: 1
    • O.MANAGEMENT: 1
    • O.PROTECTED_COMMS: 1
    • O.PROTECTED_STORAGE: 1
    • O.QUALITY: 1
  • OE:
    • OE.PLATFORM: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
  • T:
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
    • T.PHYSICAL_ACCESS: 1
  • A:
    • A.CDCVM: 4
    • A.DE-: 2
    • A.DEVICE_AUTH: 1
    • A.IPH-: 2
    • A.IPHONE_USER: 1
    • A.PERSO: 4
  • D:
    • D.OS: 16
    • D.SEP_SE: 3
  • OE:
    • OE.CDCVM: 3
  • T:
    • T.CORRUPT: 4
    • T.PHYSICAL: 2
    • T.RECOVER: 4
    • T.REPLAY: 2
    • T.SILENT: 3
    • T.SKIMMING: 3
    • T.USURP: 4
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 9
pdf_data/st_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
      • AES-: 1
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/st_keywords/hash_function
  • bcrypt:
    • bcrypt: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 7
      • TLS v1.2: 3
  • VPN:
    • VPN: 1
  • TLS:
    • TLS:
      • TLS 1.2: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 4
pdf_data/st_keywords/cipher_mode
  • CCM:
    • CCM: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 4
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS PUB 186-4: 1
  • RFC:
    • RFC 5280: 3
    • RFC 6960: 2
  • X509:
    • X.509: 8
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 140-3: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • in the claimed Protection Profile. Therefore, the following product functionality is considered out of scope as there are no SFRs that can be mapped to this functionality: • The functionality of collecting: 1
    • out of scope: 1
  • OutOfScope:
    • Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
    • out of scope: 2
    • pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.Card_Data D.Unlock_Secret* D.SEP_iPhone* T.RECOVER Card Recovery An attacker: 1
pdf_data/st_metadata
  • /CreationDate: D:20241014150418Z
  • /Creator: Word
  • /ModDate: D:20241014160450+01'00'
  • /Producer: Adobe Mac PDF Plug-in
  • /Title: Microsoft Word - [ST] Watch_S9_watchOS10_SecurityTarget_v5.0.docx
  • pdf_file_size_bytes: 2646136
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 54
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different