This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
| Lexmark MX521, MX931, CX730, CX930, and CX931 MFPs with Trusted Platform Module without Fax and Hard Drive and with Firmware Version 081.234 589-EWA |
Timestamp Server Version 2.0.2 Patch 1 Certificate Number: 2003/25 |
|
|---|---|---|
| name | Lexmark MX521, MX931, CX730, CX930, and CX931 MFPs with Trusted Platform Module without Fax and Hard Drive and with Firmware Version 081.234 | Timestamp Server Version 2.0.2 Patch 1 |
| category | Multi-Function Devices | Key Management Systems |
| scheme | CA | AU |
| status | active | archived |
| not_valid_after | 23.06.2028 | 01.09.2019 |
| not_valid_before | 23.06.2023 | 01.05.2003 |
| cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/589-EWA%20CT.pdf | |
| report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/589%20EWA%20CR.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TimestampCR.pdf |
| st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/589-EWA_Lexmark_TPM_noFax_noHD_ST_112.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TimestampST.pdf |
| manufacturer | Lexmark International, Inc. | Baltimore Technologies Pty Limited |
| manufacturer_web | https://www.lexmark.com/ | https://baltimore.edo.ie |
| security_level | {} | EAL3 |
| dgst | c6f126baeb1591a3 | fe21e4e5c3c4edc8 |
| heuristics/cert_id | 589-EWA | Certificate Number: 2003/25 |
| heuristics/cert_lab | CANADA | [] |
| heuristics/cpe_matches | cpe:2.3:h:lexmark:mx521:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx931:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx521_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx930:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx931:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx730:-:*:*:*:*:*:*:* | {} |
| heuristics/related_cves | CVE-2023-22960, CVE-2021-44734, CVE-2021-44738, CVE-2021-44735, CVE-2022-29850, CVE-2021-44737, CVE-2023-23560 | {} |
| heuristics/extracted_sars | ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, ASE_SPD.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1 | ATE_FUN.1, ADV_RCR.1, ASE_INT.1, ASE_ENV.1, ATE_IND.2, ATE_DPT.1, AGD_USR.1, ASE_REQ.1, ASE_SRE.1, AVA_VLA.1, ADV_HLD.2, ATE_COV.2, ASE_PPC.1, ALC_DVS.1, ASE_DES.1, AVA_MSU.1, AGD_ADM.1, AVA_SOF.1, ASE_OBJ.1, ASE_TSS.1, ADV_FSP.1 |
| heuristics/extracted_versions | 081.234 | 2.0.2 |
| heuristics/scheme_data |
|
|
| heuristics/protection_profiles | b2cfec7a92fa2940 | {} |
| protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf | {} |
| pdf_data/cert_filename | 589-EWA CT.pdf | |
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id | ||
| pdf_data/cert_keywords/cc_security_level | ||
| pdf_data/cert_keywords/cc_sar | ||
| pdf_data/cert_keywords/cc_sfr | ||
| pdf_data/cert_keywords/cc_claims | ||
| pdf_data/cert_keywords/vendor | ||
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto | ||
| pdf_data/cert_keywords/asymmetric_crypto | ||
| pdf_data/cert_keywords/pq_crypto | ||
| pdf_data/cert_keywords/hash_function | ||
| pdf_data/cert_keywords/crypto_scheme | ||
| pdf_data/cert_keywords/crypto_protocol | ||
| pdf_data/cert_keywords/randomness | ||
| pdf_data/cert_keywords/cipher_mode | ||
| pdf_data/cert_keywords/ecc_curve | ||
| pdf_data/cert_keywords/crypto_engine | ||
| pdf_data/cert_keywords/tls_cipher_suite | ||
| pdf_data/cert_keywords/crypto_library | ||
| pdf_data/cert_keywords/vulnerability | ||
| pdf_data/cert_keywords/side_channel_analysis | ||
| pdf_data/cert_keywords/technical_report_id | ||
| pdf_data/cert_keywords/device_model | ||
| pdf_data/cert_keywords/tee_name | ||
| pdf_data/cert_keywords/os_name | ||
| pdf_data/cert_keywords/cplc_data | ||
| pdf_data/cert_keywords/ic_data_group | ||
| pdf_data/cert_keywords/standard_id | ||
| pdf_data/cert_keywords/javacard_version | ||
| pdf_data/cert_keywords/javacard_api_const | ||
| pdf_data/cert_keywords/javacard_packages | ||
| pdf_data/cert_keywords/certification_process | ||
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename | 589 EWA CR.pdf | TimestampCR.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_metadata |
|
|
| pdf_data/st_filename | 589-EWA_Lexmark_TPM_noFax_noHD_ST_112.pdf | TimestampST.pdf |
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
|
|
| pdf_data/st_keywords/cc_sfr |
|
|
| pdf_data/st_keywords/cc_claims |
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_metadata |
|
|
| state/cert/convert_ok | True | False |
| state/cert/download_ok | True | False |
| state/cert/extract_ok | True | False |
| state/cert/pdf_hash | Different | Different |
| state/cert/txt_hash | Different | Different |
| state/report/pdf_hash | Different | Different |
| state/report/txt_hash | Different | Different |
| state/st/pdf_hash | Different | Different |
| state/st/txt_hash | Different | Different |