Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Symantec Data Center Security: Server Advanced 6.7
Certificate Number: 2019/121
Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4(watchOS 10.4 (build 21T216))
ANSSI-CC-2024/41
name Symantec Data Center Security: Server Advanced 6.7 Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4(watchOS 10.4 (build 21T216))
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme AU FR
status archived active
not_valid_after 20.06.2024 08.01.2030
not_valid_before 21.06.2019 08.01.2025
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cert_2019_121_org_signed.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2024_41fr.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ACSC%20Certifcation%20Report%20EFS-T048_v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_41fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Symantec%20Data%20Center%20Securityv6.7%20ST_v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2024_41en.pdf
manufacturer Symantec Corporation Apple Inc.
manufacturer_web https://www.symantec.com https://www.apple.com/
security_level EAL2+, ALC_FLR.1 EAL2+, ALC_FLR.3, ADV_FSP.3
dgst cac80e95c695f77d e5bae93bf2719158
heuristics/cert_id Certificate Number: 2019/121 ANSSI-CC-2024/41
heuristics/cpe_matches {} cpe:2.3:o:apple:watchos:10.4:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2024-27863, CVE-2025-24163, CVE-2024-44144, CVE-2024-40813, CVE-2025-24137, CVE-2024-27840, CVE-2024-44255, CVE-2024-54502, CVE-2025-31241, CVE-2025-24223, CVE-2024-54543, CVE-2024-54478, CVE-2024-44185, CVE-2024-40799, CVE-2024-40777, CVE-2025-24159, CVE-2025-31215, CVE-2024-40812, CVE-2024-44169, CVE-2024-44274, CVE-2024-27804, CVE-2024-44155, CVE-2024-44187, CVE-2024-40815, CVE-2025-24123, CVE-2024-44240, CVE-2024-27856, CVE-2024-40809, CVE-2025-31257, CVE-2024-44239, CVE-2024-27821, CVE-2025-24184, CVE-2024-40822, CVE-2025-24085, CVE-2024-44170, CVE-2025-31222, CVE-2024-27801, CVE-2025-24086, CVE-2025-31217, CVE-2024-54510, CVE-2024-27832, CVE-2024-54500, CVE-2024-40776, CVE-2024-44198, CVE-2024-27820, CVE-2024-40805, CVE-2024-40806, CVE-2024-27816, CVE-2024-44194, CVE-2024-54542, CVE-2024-27815, CVE-2024-44269, CVE-2024-54527, CVE-2024-40793, CVE-2025-31206, CVE-2024-40850, CVE-2024-27806, CVE-2024-27826, CVE-2024-23282, CVE-2024-54505, CVE-2024-27823, CVE-2024-44191, CVE-2024-54523, CVE-2025-31221, CVE-2024-40835, CVE-2025-31212, CVE-2024-27828, CVE-2024-54514, CVE-2025-24149, CVE-2024-54468, CVE-2024-54499, CVE-2024-40836, CVE-2024-44278, CVE-2025-24124, CVE-2025-24117, CVE-2024-27810, CVE-2024-27800, CVE-2024-54560, CVE-2024-54512, CVE-2024-54494, CVE-2024-27851, CVE-2024-44212, CVE-2025-24161, CVE-2024-40824, CVE-2024-54530, CVE-2024-44285, CVE-2024-40780, CVE-2024-40787, CVE-2024-23251, CVE-2024-40788, CVE-2025-24189, CVE-2024-44183, CVE-2025-31204, CVE-2024-44232, CVE-2024-54517, CVE-2025-24126, CVE-2024-54525, CVE-2024-27814, CVE-2024-54513, CVE-2025-31233, CVE-2024-40795, CVE-2025-31209, CVE-2024-44290, CVE-2024-54526, CVE-2024-54486, CVE-2024-54508, CVE-2025-24251, CVE-2025-31226, CVE-2024-54522, CVE-2025-31223, CVE-2025-31238, CVE-2024-40818, CVE-2024-54501, CVE-2024-40829, CVE-2024-44244, CVE-2025-31208, CVE-2025-24158, CVE-2024-40785, CVE-2024-54467, CVE-2025-31205, CVE-2024-27808, CVE-2024-27884, CVE-2024-44233, CVE-2024-54497, CVE-2024-40857, CVE-2024-40774, CVE-2024-54538, CVE-2024-54535, CVE-2024-44171, CVE-2024-44176, CVE-2024-54518, CVE-2025-31239, CVE-2024-40779, CVE-2024-44254, CVE-2024-44273, CVE-2024-54551, CVE-2025-31219, CVE-2024-44192, CVE-2024-54479, CVE-2024-44302, CVE-2024-40784, CVE-2024-44282, CVE-2025-24144, CVE-2024-44297, CVE-2024-44234, CVE-2024-27880, CVE-2024-27830, CVE-2025-24162, CVE-2024-44225, CVE-2025-24107, CVE-2024-27838, CVE-2024-44215, CVE-2024-40782, CVE-2024-54534, CVE-2025-31203, CVE-2025-24129, CVE-2024-40789, CVE-2025-31262, CVE-2024-54541, CVE-2025-24131, CVE-2024-44296, CVE-2025-24160, CVE-2025-31251, CVE-2024-27805, CVE-2025-24111, CVE-2024-27811, CVE-2024-27834
heuristics/extracted_sars ADV_ARC.1, ATE_COV.1, ALC_CMS.2, ADV_FSP.2, ALC_CMC.2, ASE_OBJ.2, ALC_FLR.1, ASE_SPD.1, ATE_IND.2, AGD_PRE.1, ALC_DEL.1, ATE_FUN.1, AVA_VAN.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1, ASE_INT.1, ASE_CCL.1, ADV_TDS.1, AGD_OPE.1 ADV_ARC.1, ATE_COV.1, ALC_CMS.2, ALC_CMC.2, ASE_OBJ.2, ALC_FLR.3, ASE_SPD.1, ATE_IND.2, AGD_PRE.1, ALC_DEL.1, ATE_FUN.1, AVA_VAN.2, ADV_FSP.3, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1, ASE_INT.1, ASE_CCL.1, ADV_TDS.1, AGD_OPE.1
heuristics/extracted_versions 6.7 10.4
pdf_data/cert_filename Cert_2019_121_org_signed.pdf Certificat-ANSSI-CC-2024_41fr.pdf
pdf_data/cert_keywords/cc_cert_id
  • AU:
    • Certificate Number: 2019/121: 1
  • FR:
    • ANSSI-CC-2024/41: 2
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
  • EAL:
    • EAL2: 2
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 1
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR.3: 1
pdf_data/cert_metadata
  • /CreationDate: D:20190627145718+10'00'
  • /Creator: ACA75945.dpe.protected.mil.au
  • /ModDate: D:20190627170723+10'00'
  • /Producer: KONICA MINOLTA bizhub C308
  • /Title: SACA75945.d19062714571
  • pdf_file_size_bytes: 811208
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20250110100051+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20250110101612+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 144030
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename ACSC Certifcation Report EFS-T048_v1.0.pdf ANSSI-CC-2024_41fr.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2024/41: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL1: 1
    • EAL2: 3
    • EAL2 augmented: 1
  • EAL:
    • EAL2: 3
    • EAL4: 1
  • ITSEC:
    • ITSEC E3 Elémentaire: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 2
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.3: 2
pdf_data/report_keywords/eval_facility
  • BAE:
    • BAE Applied Intelligence: 4
  • CESTI:
    • CESTI: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 3
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 2
  • CC:
    • CCMB-2022-11-001: 1
    • CCMB-2022-11-002: 1
    • CCMB-2022-11-003: 1
    • CCMB-2022-11-005: 1
    • CCMB-2022-11-006: 1
pdf_data/report_metadata
pdf_data/st_filename Symantec Data Center Securityv6.7 ST_v1.0.pdf ANSSI-Cible-CC-2024_41en.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 4
    • EAL 2 augmented: 1
    • EAL2: 1
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 11
    • ADV_FSP.2: 12
    • ADV_TDS.1: 12
  • AGD:
    • AGD_OPE.1: 11
    • AGD_PRE.1: 7
  • ALC:
    • ALC_CMC.2: 9
    • ALC_CMS.2: 7
    • ALC_DEL.1: 6
    • ALC_FLR.1: 10
  • ASE:
    • ASE_CCL.1: 15
    • ASE_ECD.1: 11
    • ASE_INT.1: 13
    • ASE_OBJ.2: 11
    • ASE_REQ.2: 14
    • ASE_SPD.1: 8
    • ASE_TSS.1: 6
  • ATE:
    • ATE_COV.1: 5
    • ATE_FUN.1: 9
    • ATE_IND.2: 8
  • AVA:
    • AVA_VAN.2: 8
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.1: 2
    • ADV_FSP.2: 4
    • ADV_FSP.3: 3
    • ADV_TDS.1: 4
  • AGD:
    • AGD_OPE.1: 4
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
    • ALC_FLR: 1
    • ALC_FLR.3: 3
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 2
    • ASE_OBJ.2: 2
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 1
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 4
    • ATE_FUN.1: 3
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 6
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 5
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 6
    • FAU_SAR.3.1: 1
    • FAU_STG: 2
    • FAU_STG.1: 5
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FCS:
    • FCS_COP.1: 2
    • FCS_COP.1.1: 1
  • FIA:
    • FIA_ATD: 2
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_SOS: 2
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU: 4
    • FIA_UAU.1: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 6
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 9
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 8
    • FMT_SMF: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 8
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT: 2
    • FPT_ITT.1: 6
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 2
  • FTA:
    • FTA_SSL: 4
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 6
    • FTA_SSL.4.1: 1
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 2
    • FTP_TRP.1: 6
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FDP:
    • FDP_ACC: 22
    • FDP_ACC.1: 10
    • FDP_ACC.2: 6
    • FDP_ACF: 20
    • FDP_ACF.1: 16
    • FDP_DAU.1: 4
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ETC: 7
    • FDP_ETC.2: 10
    • FDP_IFC.1: 8
    • FDP_ITC.1: 5
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_RIP.1: 12
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 9
    • FDP_SDI.1.1: 1
    • FDP_UCT: 10
    • FDP_UCT.1: 2
    • FDP_UIT: 10
    • FDP_UIT.1: 4
  • FIA:
    • FIA_AFL: 11
    • FIA_AFL.1: 4
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 2
    • FIA_SOS.2: 4
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 2
    • FIA_UID.1: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 14
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 4
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 12
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_ITC.1: 4
    • FPT_ITC.1.1: 1
    • FPT_RPL: 8
    • FPT_RPL.1: 6
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 10
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.MANAGE: 2
    • A.PLATFORM: 2
    • A.PROTECT: 3
  • O:
    • O.AUDIT: 6
    • O.AUDIT_REVIEW: 3
    • O.INTRUSION: 5
    • O.I_AND_A: 5
    • O.PASSWORD_CONTROLS: 4
    • O.PROTECTED: 1
    • O.PROTECTED_COMMS: 2
    • O.RESPONSE: 5
    • O.REVIEW: 3
    • O.SECURITY_MANAGEMENT: 4
    • O.SESSION_TERMINATION: 3
    • O.STORAGE: 4
  • OE:
    • OE.PERSONNEL: 2
    • OE.PHYSICAL: 2
    • OE.PLATFORM: 2
    • OE.TIME: 3
  • T:
    • T.BRUTE_FORCE: 3
    • T.INTEGRITY_COMPROMISE: 2
    • T.INTRUSION_ATTEMPT: 3
    • T.NETWORK_COMPROMISE: 2
    • T.NO_ACCOUNTABILITY: 3
    • T.UNATTENDED_SESSION: 2
    • T.UNAUTHORIZED_ACCESS: 2
    • T.UNAUTHORIZED_ACTIVITY: 3
    • T.UNDETECTED_THREATS: 2
  • A:
    • A.CDCVM: 4
    • A.DE-: 2
    • A.DEVICE_AUTH: 1
    • A.IPH-: 2
    • A.IPHONE_USER: 1
    • A.PERSO: 4
  • D:
    • D.OS: 16
    • D.SEP_SE: 3
  • OE:
    • OE.CDCVM: 3
  • T:
    • T.CORRUPT: 4
    • T.PHYSICAL: 2
    • T.RECOVER: 4
    • T.REPLAY: 2
    • T.SILENT: 3
    • T.SKIMMING: 3
    • T.USURP: 4
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 6
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 8
      • TLS v1.0: 2
      • TLS v1.1: 2
      • TLS v1.2: 2
  • TLS:
    • TLS:
      • TLS 1.2: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 4
pdf_data/st_keywords/standard_id
  • X509:
    • X.509: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 140-3: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
    • out of scope: 2
    • pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.Card_Data D.Unlock_Secret* D.SEP_iPhone* T.RECOVER Card Recovery An attacker: 1
pdf_data/st_metadata
  • /CreationDate: D:20190625154034+10'00'
  • /ModDate: D:20190625154034+10'00'
  • pdf_file_size_bytes: 1604103
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 55
  • /CreationDate: D:20241014150418Z
  • /Creator: Word
  • /ModDate: D:20241014160450+01'00'
  • /Producer: Adobe Mac PDF Plug-in
  • /Title: Microsoft Word - [ST] Watch_S9_watchOS10_SecurityTarget_v5.0.docx
  • pdf_file_size_bytes: 2646136
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 54
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different