This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
OAM (Operation, Administration & Management/Maintenance) Module VCL-MX Version 6 80 E1, 160Mbps Voice & Data Multiplexer IC3S/DEL01/VAlIANT/EAL1/0317/0007 |
Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1 CCEVS-VR-VID-10443-2012 |
|
---|---|---|
name | OAM (Operation, Administration & Management/Maintenance) Module VCL-MX Version 6 80 E1, 160Mbps Voice & Data Multiplexer | Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1 |
category | Access Control Devices and Systems | Detection Devices and Systems |
scheme | IN | US |
not_valid_after | 11.12.2023 | 01.11.2014 |
not_valid_before | 12.12.2018 | 01.10.2012 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/OAM%20Certificate1.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR-OAM_EAL1.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-vr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_version1.4_Valient.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-st.pdf |
manufacturer | Valiant Communications Limited 71/1 Shivaji Marg, New Delhi-110015, India | Tenable Network Security, Inc. |
manufacturer_web | https://valiantcom.com/ | https://www.tenable.com/ |
security_level | EAL1 | EAL2+, ALC_FLR.2 |
dgst | a3049a54b130f82f | 7a9d9dd29e76bfba |
heuristics/cert_id | IC3S/DEL01/VAlIANT/EAL1/0317/0007 | CCEVS-VR-VID-10443-2012 |
heuristics/cert_lab | [] | US |
heuristics/cpe_matches | {} | cpe:2.3:a:tenable:nessus:4.4.1.15078:*:*:*:*:*:x64:* |
heuristics/related_cves | {} | CVE-2022-33757, CVE-2021-45960, CVE-2016-1000028, CVE-2018-1148, CVE-2021-20106, CVE-2022-32973, CVE-2022-22826, CVE-2018-20843, CVE-2018-1147, CVE-2018-1141, CVE-2022-22822, CVE-2022-3499, CVE-2024-0955, CVE-2022-32974, CVE-2019-1559, CVE-2016-1000029, CVE-2022-0778, CVE-2016-4055, CVE-2020-5765, CVE-2022-22825, CVE-2019-3923, CVE-2022-22823, CVE-2021-3449, CVE-2019-3962, CVE-2021-46143, CVE-2021-20079, CVE-2021-20135, CVE-2021-3450, CVE-2018-5407, CVE-2019-3982, CVE-2017-5179, CVE-2024-0971, CVE-2023-3253, CVE-2020-5774, CVE-2023-3252, CVE-2022-28291, CVE-2023-6178, CVE-2022-22824, CVE-2023-3251, CVE-2022-22827, CVE-2023-6062, CVE-2022-4313, CVE-2022-23990, CVE-2016-9260, CVE-2022-23852, CVE-2017-18214, CVE-2019-3961 |
heuristics/extracted_sars | ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 | ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ALC_DEL.1, ATE_IND.2, ATE_COV.1, AVA_VAN.2, ADV_ARC.1, AGD_OPE.1, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1 |
heuristics/extracted_versions | 80, 6 | 4.4, 5.0.1, 2.0.1, 3.6, 2.1 |
heuristics/scheme_data |
|
|
heuristics/protection_profiles | {} | 44cdd911811b36d2 |
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_br_v1.7.pdf |
pdf_data/cert_filename | OAM Certificate1.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar | ||
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | CR-OAM_EAL1.pdf | st_vid10443-vr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | ST_version1.4_Valient.pdf | st_vid10443-st.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|