This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
| Samsung Multifunction MultiXpress X3220, X3280, K3250, K3300 Series KECS-CISS-0690-2016 |
Lexmark MX721h, MX722h, MX822 and MX826 Multi-Function Printers with firmware version MXTGW.052.025 with Lexmark Secure Element (P/N 57X0185 383-4-464 |
|
|---|---|---|
| name | Samsung Multifunction MultiXpress X3220, X3280, K3250, K3300 Series | Lexmark MX721h, MX722h, MX822 and MX826 Multi-Function Printers with firmware version MXTGW.052.025 with Lexmark Secure Element (P/N 57X0185 |
| scheme | KR | CA |
| not_valid_after | 21.01.2021 | 21.01.2024 |
| not_valid_before | 21.01.2016 | 21.01.2019 |
| cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-464%20CT%20v1.1e%20-%20original%20signed.pdf | |
| report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CR-16-09%20Certification%20Report.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-464%20CR%201.0e.pdf |
| st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST]%20Samsung%20Multifunction%20MultiXpress%20X3220_v1.1_20160104_???_???.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Lexmark%20HD%20MXTGW%20Security%20Target%2014.pdf |
| manufacturer | HP Inc. | Lexmark International, Inc. |
| manufacturer_web | https://www8.hp.com/hpnext/tags/hp-inc#.Vjdf803sn4g | https://www.lexmark.com/ |
| security_level | EAL2+, ALC_FLR.2 | {} |
| dgst | b624e9417c192323 | f9ea05e0e8584782 |
| heuristics/cert_id | KECS-CISS-0690-2016 | 383-4-464 |
| heuristics/cpe_matches | {} | cpe:2.3:h:lexmark:mx722:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx826:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx826_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx721:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx822_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx822:-:*:*:*:*:*:*:* |
| heuristics/related_cves | {} | CVE-2023-22960, CVE-2021-44734, CVE-2021-44738, CVE-2021-44735, CVE-2022-29850, CVE-2021-44737, CVE-2023-23560 |
| heuristics/extracted_sars | ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 | {} |
| heuristics/extracted_versions | - | 052.025 |
| heuristics/scheme_data |
|
|
| heuristics/protection_profiles | 43ce79b420f23a00 | b2cfec7a92fa2940 |
| maintenance_updates |
|
|
| protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
| pdf_data/cert_filename | 383-4-464 CT v1.1e - original signed.pdf | |
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id | ||
| pdf_data/cert_keywords/cc_security_level | ||
| pdf_data/cert_keywords/cc_sar | ||
| pdf_data/cert_keywords/cc_sfr | ||
| pdf_data/cert_keywords/cc_claims | ||
| pdf_data/cert_keywords/vendor | ||
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto | ||
| pdf_data/cert_keywords/asymmetric_crypto | ||
| pdf_data/cert_keywords/pq_crypto | ||
| pdf_data/cert_keywords/hash_function | ||
| pdf_data/cert_keywords/crypto_scheme | ||
| pdf_data/cert_keywords/crypto_protocol | ||
| pdf_data/cert_keywords/randomness | ||
| pdf_data/cert_keywords/cipher_mode | ||
| pdf_data/cert_keywords/ecc_curve | ||
| pdf_data/cert_keywords/crypto_engine | ||
| pdf_data/cert_keywords/tls_cipher_suite | ||
| pdf_data/cert_keywords/crypto_library | ||
| pdf_data/cert_keywords/vulnerability | ||
| pdf_data/cert_keywords/side_channel_analysis | ||
| pdf_data/cert_keywords/technical_report_id | ||
| pdf_data/cert_keywords/device_model | ||
| pdf_data/cert_keywords/tee_name | ||
| pdf_data/cert_keywords/os_name | ||
| pdf_data/cert_keywords/cplc_data | ||
| pdf_data/cert_keywords/ic_data_group | ||
| pdf_data/cert_keywords/standard_id | ||
| pdf_data/cert_keywords/javacard_version | ||
| pdf_data/cert_keywords/javacard_api_const | ||
| pdf_data/cert_keywords/javacard_packages | ||
| pdf_data/cert_keywords/certification_process | ||
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename | KECS-CR-16-09 Certification Report.pdf | 383-4-464 CR 1.0e.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_metadata |
|
|
| state/cert/convert_ok | False | True |
| state/cert/download_ok | False | True |
| state/cert/extract_ok | False | True |
| state/cert/pdf_hash | Different | Different |
| state/cert/txt_hash | Different | Different |
| state/report/pdf_hash | Different | Different |
| state/report/txt_hash | Different | Different |