Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
BAE Systems Secure KVM Gen2 8560943-2
CCEVS-VR-11304-2023
Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4(watchOS 10.4 (build 21T216))
ANSSI-CC-2024/41
name BAE Systems Secure KVM Gen2 8560943-2 Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4(watchOS 10.4 (build 21T216))
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US FR
not_valid_after 12.01.2028 08.01.2030
not_valid_before 12.01.2023 08.01.2025
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11304-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2024_41fr.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11304-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_41fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11304-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2024_41en.pdf
manufacturer BAE Systems Information and Electronic Systems, Inc. Apple Inc.
manufacturer_web https://www.baesystems.com https://www.apple.com/
security_level {} EAL2+, ADV_FSP.3, ALC_FLR.3
dgst 9674e40d5815c857 e5bae93bf2719158
heuristics/cert_id CCEVS-VR-11304-2023 ANSSI-CC-2024/41
heuristics/cert_lab US []
heuristics/cpe_matches {} cpe:2.3:o:apple:watchos:10.4:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2024-44255, CVE-2024-54534, CVE-2024-44302, CVE-2024-27801, CVE-2024-54502, CVE-2025-24160, CVE-2024-44192, CVE-2024-54542, CVE-2024-44225, CVE-2024-44254, CVE-2024-27805, CVE-2024-40850, CVE-2024-54514, CVE-2024-40784, CVE-2024-54525, CVE-2024-27821, CVE-2024-44278, CVE-2024-27834, CVE-2024-40806, CVE-2024-44191, CVE-2025-24123, CVE-2024-54551, CVE-2024-44269, CVE-2024-27808, CVE-2025-24117, CVE-2024-44183, CVE-2024-40822, CVE-2024-44198, CVE-2024-27840, CVE-2024-40793, CVE-2024-44194, CVE-2024-40795, CVE-2024-40824, CVE-2024-40835, CVE-2024-54530, CVE-2024-27880, CVE-2024-27830, CVE-2024-44244, CVE-2024-44297, CVE-2024-27851, CVE-2024-40774, CVE-2024-44296, CVE-2024-54468, CVE-2024-44290, CVE-2024-54479, CVE-2025-24137, CVE-2024-54517, CVE-2024-27826, CVE-2024-27811, CVE-2024-54499, CVE-2024-40857, CVE-2024-44240, CVE-2024-40818, CVE-2025-24158, CVE-2024-44187, CVE-2025-24086, CVE-2024-44233, CVE-2024-44170, CVE-2024-54497, CVE-2024-27838, CVE-2024-54527, CVE-2024-40779, CVE-2024-54523, CVE-2024-27823, CVE-2024-27815, CVE-2024-40813, CVE-2024-40788, CVE-2024-40776, CVE-2024-54494, CVE-2025-24124, CVE-2024-54500, CVE-2024-27814, CVE-2024-44144, CVE-2024-54538, CVE-2024-27816, CVE-2024-27884, CVE-2024-44215, CVE-2024-40815, CVE-2025-24131, CVE-2024-54560, CVE-2024-27820, CVE-2024-44176, CVE-2024-40785, CVE-2024-44282, CVE-2025-24159, CVE-2024-44273, CVE-2024-54543, CVE-2024-54501, CVE-2024-27806, CVE-2025-24162, CVE-2024-44155, CVE-2024-27832, CVE-2025-24126, CVE-2024-23282, CVE-2025-24161, CVE-2024-54478, CVE-2024-54486, CVE-2024-27800, CVE-2024-27810, CVE-2024-27804, CVE-2024-54522, CVE-2024-40812, CVE-2024-54513, CVE-2024-54512, CVE-2024-54508, CVE-2024-54510, CVE-2024-40777, CVE-2024-54467, CVE-2024-44212, CVE-2024-40787, CVE-2024-40805, CVE-2024-44185, CVE-2024-40799, CVE-2024-40829, CVE-2024-27828, CVE-2024-44285, CVE-2024-54535, CVE-2024-44239, CVE-2024-44234, CVE-2025-24163, CVE-2025-24129, CVE-2024-44274, CVE-2024-40782, CVE-2024-44171, CVE-2024-54505, CVE-2024-40809, CVE-2024-27863, CVE-2024-23251, CVE-2024-44169, CVE-2024-54526, CVE-2024-27856, CVE-2024-54541, CVE-2024-40780, CVE-2025-24085, CVE-2024-54518, CVE-2025-24149, CVE-2025-24107, CVE-2024-40836, CVE-2024-40789, CVE-2024-44232
heuristics/extracted_sars AGD_PRE.1, ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_CCL.1, ASE_ECD.1, ASE_REQ.2 ASE_INT.1, AVA_VAN.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ADV_FSP.3, ASE_CCL.1
heuristics/extracted_versions 8560943, 2 10.4
heuristics/scheme_data
heuristics/protection_profiles 42cf355b24450489, 76f8f05a35d87f59, 814f66c77bc7f33b {}
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vi_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_km_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psd_v4.0.pdf {}
pdf_data/cert_filename st_vid11304-ci.pdf Certificat-ANSSI-CC-2024_41fr.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11304-2023: 1
  • FR:
    • ANSSI-CC-2024/41: 2
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 2
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR.3: 1
pdf_data/cert_keywords/eval_facility
  • Leidos:
    • Leidos: 1
pdf_data/cert_metadata
  • /CreationDate: D:20230124105725-05'00'
  • /ModDate: D:20230124105725-05'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 180693
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20250110100051+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20250110101612+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 144030
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename st_vid11304-vr.pdf ANSSI-CC-2024_41fr.pdf
pdf_data/report_frontpage
  • FR:
  • US:
    • cert_id: CCEVS-VR-11304-2023
    • cert_item: for BAE Systems Secure KVM Gen2 8560943-2
    • cert_lab: US NIAP
  • FR:
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-11304-2023: 1
  • FR:
    • ANSSI-CC-2024/41: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 3
    • EAL4: 1
  • ITSEC:
    • ITSEC E3 Elémentaire: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.3: 2
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_APC_EXT.1: 1
    • FDP_CDS_EXT.1: 1
    • FDP_FIL_EXT: 1
    • FDP_IPC_EXT.1: 2
    • FDP_RIP: 1
    • FDP_SPR_EXT: 1
    • FDP_SWI_EXT.3: 1
  • FTA:
    • FTA_CIN_EXT.1: 2
pdf_data/report_keywords/eval_facility
  • Leidos:
    • Leidos: 10
  • CESTI:
    • CESTI: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2022-11-001: 1
    • CCMB-2022-11-002: 1
    • CCMB-2022-11-003: 1
    • CCMB-2022-11-005: 1
    • CCMB-2022-11-006: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • using a USB connector. This device is not switched and does not use the KVM. The handgrip is out of scope and not part of the TOE. Host PC1 and Host PC2 output HDMI using the DisplayPort dual mode feature: 2
pdf_data/report_metadata
pdf_data/st_filename st_vid11304-st.pdf ANSSI-Cible-CC-2024_41en.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.1: 2
    • ADV_FSP.2: 4
    • ADV_FSP.3: 3
    • ADV_TDS.1: 4
  • AGD:
    • AGD_OPE.1: 4
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
    • ALC_FLR: 1
    • ALC_FLR.3: 3
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 2
    • ASE_OBJ.2: 2
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 1
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 4
    • ATE_FUN.1: 3
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_AFL_EXT.1: 1
    • FDP_APC_EXT: 4
    • FDP_APC_EXT.1: 14
    • FDP_CDS_EXT.1: 9
    • FDP_CDS_EXT.1.1: 2
    • FDP_FIL_EXT: 9
    • FDP_FIL_EXT.1: 3
    • FDP_IPC_EXT.1: 10
    • FDP_IPC_EXT.1.1: 1
    • FDP_IPC_EXT.1.2: 1
    • FDP_PDC_EXT: 28
    • FDP_PDC_EXT.1: 7
    • FDP_PDC_EXT.1.1: 1
    • FDP_PDC_EXT.1.2: 1
    • FDP_PDC_EXT.1.3: 1
    • FDP_PDC_EXT.1.4: 1
    • FDP_PDC_EXT.1.5: 1
    • FDP_PDC_EXT.2: 4
    • FDP_PDC_EXT.3: 4
    • FDP_RIP: 8
    • FDP_RIP.1: 1
    • FDP_RIP_EXT.1: 7
    • FDP_RIP_EXT.1.1: 1
    • FDP_SPR_EXT: 9
    • FDP_SPR_EXT.1: 1
    • FDP_SWI_EXT.1: 7
    • FDP_SWI_EXT.1.1: 1
    • FDP_SWI_EXT.2: 9
    • FDP_SWI_EXT.2.1: 1
    • FDP_SWI_EXT.2.2: 1
    • FDP_SWI_EXT.3: 8
    • FDP_SWI_EXT.3.1: 1
    • FDP_UDF_EXT: 14
    • FDP_UDF_EXT.1: 2
  • FPT:
    • FPT_FLS_EXT.1: 7
    • FPT_FLS_EXT.1.1: 1
    • FPT_NTA_EXT.1: 7
    • FPT_NTA_EXT.1.1: 1
    • FPT_PHP.1: 6
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 2
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST_EXT.1: 7
    • FPT_TST_EXT.1.1: 1
  • FTA:
    • FTA_CIN_EXT.1: 11
    • FTA_CIN_EXT.1.1: 1
    • FTA_CIN_EXT.1.2: 1
    • FTA_CIN_EXT.1.3: 1
  • FDP:
    • FDP_ACC: 22
    • FDP_ACC.1: 10
    • FDP_ACC.2: 6
    • FDP_ACF: 20
    • FDP_ACF.1: 16
    • FDP_DAU.1: 4
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ETC: 7
    • FDP_ETC.2: 10
    • FDP_IFC.1: 8
    • FDP_ITC.1: 5
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_RIP.1: 12
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 9
    • FDP_SDI.1.1: 1
    • FDP_UCT: 10
    • FDP_UCT.1: 2
    • FDP_UIT: 10
    • FDP_UIT.1: 4
  • FIA:
    • FIA_AFL: 11
    • FIA_AFL.1: 4
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 2
    • FIA_SOS.2: 4
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 2
    • FIA_UID.1: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 14
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 4
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 12
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_ITC.1: 4
    • FPT_ITC.1.1: 1
    • FPT_RPL: 8
    • FPT_RPL.1: 6
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 10
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.NO_SPECIAL_ANALOG_CAPABILITIES: 1
    • OE.NO_WIRELESS_DEVICES: 1
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • A:
    • A.CDCVM: 4
    • A.DE-: 2
    • A.DEVICE_AUTH: 1
    • A.IPH-: 2
    • A.IPHONE_USER: 1
    • A.PERSO: 4
  • D:
    • D.OS: 16
    • D.SEP_SE: 3
  • OE:
    • OE.CDCVM: 3
  • T:
    • T.CORRUPT: 4
    • T.PHYSICAL: 2
    • T.RECOVER: 4
    • T.REPLAY: 2
    • T.SILENT: 3
    • T.SKIMMING: 3
    • T.USURP: 4
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 3
  • STMicroelectronics:
    • STM: 1
pdf_data/st_keywords/eval_facility
  • Leidos:
    • Leidos: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS 1.2: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 3
  • SCA:
    • side channel: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 4
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 140-3: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
    • out of scope: 2
    • pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.Card_Data D.Unlock_Secret* D.SEP_iPhone* T.RECOVER Card Recovery An attacker: 1
pdf_data/st_metadata
  • /CreationDate: D:20230124105039-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20230124105039-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 771042
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 46
  • /CreationDate: D:20241014150418Z
  • /Creator: Word
  • /ModDate: D:20241014160450+01'00'
  • /Producer: Adobe Mac PDF Plug-in
  • /Title: Microsoft Word - [ST] Watch_S9_watchOS10_SecurityTarget_v5.0.docx
  • pdf_file_size_bytes: 2646136
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 54
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different