This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Lexmark MX421, MX521 and MX622 Multi-Function Printers with firmware version MXTGM.052.025 with Lexmark Secure Element (P/N 57X0185 383-4-469 |
Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.010 or v1.02.013 or v2.00.002, EC v1.02.010 or v1.02.013 or v2.00.002 and Toolbox v1.02.010 or v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software BSI-DSZ-CC-0926-2014 |
|
---|---|---|
name | Lexmark MX421, MX521 and MX622 Multi-Function Printers with firmware version MXTGM.052.025 with Lexmark Secure Element (P/N 57X0185 | Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.010 or v1.02.013 or v2.00.002, EC v1.02.010 or v1.02.013 or v2.00.002 and Toolbox v1.02.010 or v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software |
category | Multi-Function Devices | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | CA | DE |
not_valid_after | 24.01.2024 | 01.09.2019 |
not_valid_before | 24.01.2019 | 04.04.2014 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-469%20CT%20v1.1e%20-%20original%20signed.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-469%20CR%201.0e.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0926a_pdf.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Lexmark%20NoHD%20MXTGM%20Security%20Target%2014.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0926b_pdf.pdf |
manufacturer | Lexmark International, Inc. | Infineon Technologies AG |
manufacturer_web | https://www.lexmark.com/ | https://www.infineon.com/ |
security_level | {} | ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst | a273f14321538e4c | 02c1c81d0bf1270c |
heuristics/cert_id | 383-4-469 | BSI-DSZ-CC-0926-2014 |
heuristics/cert_lab | [] | BSI |
heuristics/cpe_matches | cpe:2.3:h:lexmark:mx622:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx421:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx421_firmware:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx521_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx521:-:*:*:*:*:*:*:* | cpe:2.3:a:infineon:rsa_library:1.02.013:*:*:*:*:*:*:* |
heuristics/related_cves | CVE-2022-29850, CVE-2021-44737, CVE-2021-44735, CVE-2023-23560, CVE-2021-44738, CVE-2021-44734, CVE-2023-22960 | CVE-2017-15361 |
heuristics/direct_transitive_cves | {} | CVE-2017-15361 |
heuristics/indirect_transitive_cves | {} | CVE-2017-15361 |
heuristics/extracted_sars | AGD_PRE.1, ASE_CCL.1, ASE_INT.1, ADV_FSP.1, ALC_CMS.1, AVA_VAN.1, ASE_OBJ.1, ASE_SPD.1, ASE_ECD.1, ATE_IND.1, ASE_REQ.1, ASE_TSS.1, ALC_CMC.1, AGD_OPE.1 | AVA_VAN.5, ADV_ARC.1, ATE_COV.2, ADV_FSP.5, ASE_TSS.1, AGD_OPE.1, ATE_DPT.3, ALC_FLR.3, ADV_IMP.1, ADV_TDS.4, APE_SPD.1, ASE_REQ.2, ADV_SPM.1, APE_REQ.2, APE_INT.1, ALC_DVS.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ALC_DEL.1, APE_CCL.1, ASE_OBJ.2, ASE_INT.1, APE_ECD.1, ADV_INT.2, ALC_TAT.2, ASE_SPD.1, ATE_FUN.1, APE_OBJ.2, ALC_CMS.5, ALC_CMC.4, ALC_LCD.1 |
heuristics/extracted_versions | 052.025 | 2.00.002, 1.02.013, 1.02.010 |
heuristics/report_references/directly_referenced_by | {} | ANSSI-CC-2015/73, BSI-DSZ-CC-0926-V2-2017 |
heuristics/report_references/directly_referencing | {} | BSI-DSZ-CC-0907-2013 |
heuristics/report_references/indirectly_referenced_by | {} | ANSSI-CC-2016/23, ANSSI-CC-2016/24, ANSSI-CC-2015/73, ANSSI-CC-2016/06, BSI-DSZ-CC-0926-V2-2017 |
heuristics/report_references/indirectly_referencing | {} | BSI-DSZ-CC-0757-2011, BSI-DSZ-CC-0907-2013 |
heuristics/st_references/directly_referenced_by | {} | ANSSI-CC-2016/24, ANSSI-CC-2015/73, ANSSI-CC-2016/23 |
heuristics/st_references/indirectly_referenced_by | {} | ANSSI-CC-2016/24, ANSSI-CC-2015/73, ANSSI-CC-2016/23 |
heuristics/protection_profiles | b2cfec7a92fa2940 | f6d23054061d72ba |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename | 383-4-469 CT v1.1e - original signed.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level | ||
pdf_data/cert_keywords/cc_sar | ||
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | 383-4-469 CR 1.0e.pdf | 0926a_pdf.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | Lexmark NoHD MXTGM Security Target 14.pdf | 0926b_pdf.pdf |
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |