This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
EMC Avamar® v7.2.1 383-4-347 |
Lexmark MS822 and MS826 Single-Function Printers with firmware version MSTGW.052.025 with Lexmark Secure Element (P/N 57X0185) 383-4-472 |
|
---|---|---|
name | EMC Avamar® v7.2.1 | Lexmark MS822 and MS826 Single-Function Printers with firmware version MSTGW.052.025 with Lexmark Secure Element (P/N 57X0185) |
category | Other Devices and Systems | Multi-Function Devices |
not_valid_after | 15.06.2021 | 24.01.2024 |
not_valid_before | 15.06.2016 | 24.01.2019 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-347%20ct%20v1.0e.docx | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-472%20CT%20v1.1e%20-%20original%20signed.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-347%20CR%20v1.0e.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-472%20CR%201.0e.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-347%20EMC%20Avamar%20ST%20v05.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Lexmark%20SFP%20MSTGW%20Security%20Target%2014.pdf |
manufacturer | EMC Corporation | Lexmark International, Inc. |
manufacturer_web | https://www.emc.com/ | https://www.lexmark.com/ |
security_level | EAL2+, ALC_FLR.2 | {} |
dgst | 8c6a7c47735fa8ce | 4f3bb38002e116ad |
heuristics/cert_id | 383-4-347 | 383-4-472 |
heuristics/cpe_matches | cpe:2.3:a:emc:avamar:7.2.1:*:*:*:*:*:*:*, cpe:2.3:a:emc:avamar_server:7.2.1-31:*:*:*:*:*:*:*, cpe:2.3:a:emc:avamar_server:7.2.1-32:*:*:*:*:*:*:* | cpe:2.3:h:lexmark:ms826:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:ms822_firmware:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:ms826_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:ms822:-:*:*:*:*:*:*:* |
heuristics/related_cves | CVE-2016-0920, CVE-2016-0906, CVE-2016-0904, CVE-2017-4989, CVE-2016-0903, CVE-2016-0905, CVE-2016-0921 | CVE-2021-44738, CVE-2023-23560, CVE-2021-44734, CVE-2022-29850, CVE-2021-44737, CVE-2021-44735, CVE-2023-22960 |
heuristics/extracted_sars | ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 | ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
heuristics/extracted_versions | 7.2.1 | 052.025 |
heuristics/protection_profiles | {} | b2cfec7a92fa2940 |
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
pdf_data/cert_filename | 383-4-347 ct v1.0e.docx | 383-4-472 CT v1.1e - original signed.pdf |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level | ||
pdf_data/cert_keywords/cc_sar | ||
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | 383-4-347 CR v1.0e.pdf | 383-4-472 CR 1.0e.pdf |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | 383-4-347 EMC Avamar ST v05.pdf | Lexmark SFP MSTGW Security Target 14.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |