This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Kyocera ECOSYS MA4000cifx/MA4000cifxG/ MA3500cifx/MA3500cifxG, Kyocera TASKalfa MA4500ci/MA3500ci, Copystar CS MA4500ci, TA Triumph Adler P-C4067i MFP/P3567i MFP/458ci/358ci, UTAX P-C4067i MFP/P3567i MFP/458ci/358ci with SSD and with system firmware: 2Z7_S0IS.C03.002: CSEC2021010 |
Microsoft Windows Server 2008 Hyper-V Role with HotFix KB950050 BSI-DSZ-CC-0570-2009 |
|
---|---|---|
name | Kyocera ECOSYS MA4000cifx/MA4000cifxG/ MA3500cifx/MA3500cifxG, Kyocera TASKalfa MA4500ci/MA3500ci, Copystar CS MA4500ci, TA Triumph Adler P-C4067i MFP/P3567i MFP/458ci/358ci, UTAX P-C4067i MFP/P3567i MFP/458ci/358ci with SSD and with system firmware: 2Z7_S0IS.C03.002: | Microsoft Windows Server 2008 Hyper-V Role with HotFix KB950050 |
category | Multi-Function Devices | Operating Systems |
scheme | SE | DE |
status | active | archived |
not_valid_after | 14.09.2028 | 01.09.2019 |
not_valid_before | 14.09.2023 | 24.07.2009 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CCRAcertificate_KyoceraMA4000.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20Kyocera%20MA4000_1-0_21FMV6803-26.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0570a_pdf.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_ECOSYS_MA4000cifx_v102.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0570b_pdf.pdf |
manufacturer | KYOCERA Document Solutions Inc. | Microsoft Corporation |
manufacturer_web | https://www.kyoceradocumentsolutions.com/ | https://www.microsoft.com |
security_level | EAL2+, ALC_FLR.2 | EAL4+, ALC_FLR.3 |
dgst | ad39419f023e12f9 | 4f57d0ebb73a69ed |
heuristics/cert_id | CSEC2021010 | BSI-DSZ-CC-0570-2009 |
heuristics/cert_lab | [] | BSI |
heuristics/direct_transitive_cves | {} | CVE-2008-4036, CVE-2017-0175, CVE-2018-0968, CVE-2018-0971, CVE-2010-3227, CVE-2018-0960, CVE-2017-11831, CVE-2024-29056, CVE-2009-2493, CVE-2009-0568, CVE-2018-0973, CVE-2018-0970, CVE-2010-0719, CVE-2018-0887, CVE-2008-4269, CVE-2009-0078, CVE-2009-1216, CVE-2018-0975, CVE-2018-0972, CVE-2009-2526, CVE-2011-1229, CVE-2009-0231, CVE-2008-3013, CVE-2010-4669, CVE-2009-1536, CVE-2009-0094, CVE-2008-2250, CVE-2009-3103, CVE-2008-4268, CVE-2009-0083, CVE-2009-0082, CVE-2009-0093, CVE-2009-0233, CVE-2009-0086, CVE-2009-0230, CVE-2010-0025, CVE-2008-1084, CVE-2010-0024, CVE-2008-1441, CVE-2008-4038, CVE-2008-2252, CVE-2009-0320, CVE-2018-8641, CVE-2010-4398, CVE-2007-6753, CVE-2008-2251, CVE-2009-0081, CVE-2012-1194, CVE-2018-0974, CVE-2018-0969, CVE-2009-0080, CVE-2017-11852, CVE-2009-0234, CVE-2009-2532, CVE-2010-4562, CVE-2009-0085 |
heuristics/indirect_transitive_cves | {} | CVE-2008-4036, CVE-2017-0175, CVE-2018-0968, CVE-2018-0971, CVE-2010-3227, CVE-2018-0960, CVE-2017-11831, CVE-2024-29056, CVE-2009-2493, CVE-2009-0568, CVE-2018-0973, CVE-2018-0970, CVE-2010-0719, CVE-2018-0887, CVE-2008-4269, CVE-2009-0078, CVE-2009-1216, CVE-2018-0975, CVE-2018-0972, CVE-2009-2526, CVE-2011-1229, CVE-2009-0231, CVE-2008-3013, CVE-2010-4669, CVE-2009-1536, CVE-2009-0094, CVE-2008-2250, CVE-2009-3103, CVE-2008-4268, CVE-2009-0083, CVE-2009-0082, CVE-2009-0093, CVE-2009-0233, CVE-2009-0086, CVE-2009-0230, CVE-2010-0025, CVE-2008-1084, CVE-2010-0024, CVE-2008-1441, CVE-2008-4038, CVE-2008-2252, CVE-2009-0320, CVE-2018-8641, CVE-2010-4398, CVE-2007-6753, CVE-2008-2251, CVE-2009-0081, CVE-2012-1194, CVE-2018-0974, CVE-2018-0969, CVE-2009-0080, CVE-2017-11852, CVE-2009-0234, CVE-2009-2532, CVE-2010-4562, CVE-2009-0085 |
heuristics/extracted_sars | ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 | ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
heuristics/extracted_versions | 03.002 | 2008 |
heuristics/report_references/directly_referenced_by | {} | BSI-DSZ-CC-0755-2012 |
heuristics/report_references/indirectly_referenced_by | {} | BSI-DSZ-CC-0755-2012 |
pdf_data/cert_filename | CCRAcertificate_KyoceraMA4000.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | Certification Report Kyocera MA4000_1-0_21FMV6803-26.pdf | 0570a_pdf.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | ST_ECOSYS_MA4000cifx_v102.pdf | 0570b_pdf.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |