Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Vertiv CYBEX™ SCUSBHIDFILTER Firmware Version 40404-0E7 and Vertiv CYBEX™ SCKM140PP4 KM Switch Firmware Version 40404-0E7
CCEVS-VR-VID-11254-2022
EnterpriseDB Postgres Plus Advanced Server 8.4
CCEVS-VR-VID-10412-2011
name Vertiv CYBEX™ SCUSBHIDFILTER Firmware Version 40404-0E7 and Vertiv CYBEX™ SCKM140PP4 KM Switch Firmware Version 40404-0E7 EnterpriseDB Postgres Plus Advanced Server 8.4
category Other Devices and Systems Databases
status active archived
not_valid_after 31.01.2027 01.11.2014
not_valid_before 31.01.2022 29.07.2011
report_link https://www.commoncriteriaportal.org/files/epfiles/st_vid11254-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10412-vr.pdf
st_link https://www.commoncriteriaportal.org/files/epfiles/st_vid11254-st1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10412-st.pdf
manufacturer Vertiv IT Systems EnterpriseDB Corporation
manufacturer_web https://www.enterprisedb.com/
security_level {} EAL2+, ALC_FLR.2
dgst cae7cbcadc444d12 711c094f140cc311
heuristics/cert_id CCEVS-VR-VID-11254-2022 CCEVS-VR-VID-10412-2011
heuristics/extracted_sars AGD_PRE.1, ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_CCL.1, ASE_ECD.1, ASE_REQ.2 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 40404 8.4
heuristics/scheme_data
  • category: DBMS
  • certification_date: 29.07.2011
  • evaluation_facility: CygnaCom Solutions, Inc
  • expiration_date: 01.11.2014
  • id: CCEVS-VR-VID10412
  • product: EnterpriseDB Postgres Plus Advanced Server 8.4
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10412
  • vendor: EnterpriseDB Corporation
heuristics/protection_profiles {} 110f0820b080edc2
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_DBMS_BR_V1.2.pdf
pdf_data/report_filename st_vid11254-vr.pdf st_vid10412-vr.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID11254-2022
    • cert_item: for the Vertiv CYBEX™ SCUSBHIDFILTER Firmware Version 40404-0E7 and Vertiv CYBEX™ SCKM140PP4 KM Switch Firmware Version 40404-0E7 Peripheral Sharing Devices Version 1.0
    • cert_lab: US NIAP
  • US:
    • cert_id: CCEVS-VR-VID10412-2011
    • cert_item: Postgres Plus Advanced Server v8.4
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11254-2022: 1
  • US:
    • CCEVS-VR-VID10412-2011: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 6
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 2
    • EAL2: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 3
  • ATE:
    • ATE_FUN.1: 1
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.2: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
  • FMT:
    • FMT_REV.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_TEMPEST: 1
    • A.NO_WIRELESS_DEVICES: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
    • A.TRUSTED_CONFIG: 1
    • A.USER_ALLOWED_ACCESS: 1
  • T:
    • T.DATA_LEAK: 1
    • T.FAILED: 1
    • T.LOGICAL_TAMPER: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED_USE: 1
  • A:
    • A.NO_EVIL: 1
    • A.NO_GENERAL_PURPOSE: 1
    • A.OS_PP_VALIDATED: 1
    • A.PHYSICAL: 1
  • T:
    • T.DENIAL_OF_SERVICE: 1
    • T.MASQUERADE: 1
    • T.POOR_DESIGN: 1
    • T.POOR_IMPLEMENTATION: 1
    • T.POOR_TEST: 1
    • T.RESIDUAL_DATA: 1
    • T.TSF_COMPROMISE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNIDENTIFIED_ACTIONS: 1
pdf_data/report_keywords/vendor
  • STMicroelectronics:
    • STMicroelectronics: 1
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • Acumen:
    • Acumen Security: 6
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 5
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 5
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2007-09-003: 2
  • RFC:
    • RFC 1321: 2
    • RFC 1413: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • TOE within its Operational Environment. 5.2. Clarification of Scope Configuration Options that are Out of Scope: “Trust” authentication option (not in TOE) When the trust authentication option is specified: 1
pdf_data/report_metadata
  • /Author: ppatin
  • /CreationDate: D:20220131200223-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20220131200223-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 459318
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
pdf_data/st_filename st_vid11254-st1.pdf st_vid10412-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 3
    • EAL2 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 7
    • ADV_FSP.1: 2
    • ADV_FSP.2: 6
    • ADV_TDS.1: 7
  • AGD:
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 8
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 4
    • ALC_DEL.1: 4
    • ALC_FLR.2: 9
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 5
    • ATE_FUN.1: 6
    • ATE_IND.2: 4
  • AVA:
    • AVA_VAN.2: 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 3
  • FDP:
    • FDP_APC_EXT: 15
    • FDP_APC_EXT.1: 10
    • FDP_APC_EXT.1.1: 1
    • FDP_APC_EXT.1.2: 1
    • FDP_APC_EXT.1.3: 1
    • FDP_APC_EXT.1.4: 1
    • FDP_FIL_EXT: 15
    • FDP_FIL_EXT.1: 7
    • FDP_FIL_EXT.1.1: 1
    • FDP_FIL_EXT.1.2: 1
    • FDP_FIL_EXT.1.3: 1
    • FDP_FLS_EXT: 1
    • FDP_PDC_EXT: 16
    • FDP_PDC_EXT.1: 25
    • FDP_PDC_EXT.1.1: 2
    • FDP_PDC_EXT.1.2: 1
    • FDP_PDC_EXT.1.3: 1
    • FDP_PDC_EXT.1.4: 1
    • FDP_PDC_EXT.1.5: 1
    • FDP_PDC_EXT.2: 6
    • FDP_PDC_EXT.2.1: 1
    • FDP_PDC_EXT.2.2: 1
    • FDP_PDC_EXT.3: 7
    • FDP_PDC_EXT.3.1: 1
    • FDP_PDC_EXT.3.2: 1
    • FDP_RDR_EXT: 4
    • FDP_RDR_EXT.1: 14
    • FDP_RDR_EXT.1.1: 2
    • FDP_RIP_EXT: 4
    • FDP_RIP_EXT.1: 8
    • FDP_RIP_EXT.1.1: 2
    • FDP_SWI_EXT: 4
    • FDP_SWI_EXT.1: 10
    • FDP_SWI_EXT.1.1: 2
    • FDP_UDF_EXT: 10
    • FDP_UDF_EXT.1: 5
    • FDP_UDF_EXT.1.1: 1
  • FPT:
    • FPT_FLS_EXT: 3
    • FPT_FLS_EXT.1: 9
    • FPT_FLS_EXT.1.1: 3
    • FPT_NTA_EXT: 4
    • FPT_NTA_EXT.1: 8
    • FPT_NTA_EXT.1.1: 2
    • FPT_PHP.1: 6
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 2
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST_EXT: 4
    • FPT_TST_EXT.1: 10
    • FPT_TST_EXT.1.1: 2
  • FTA:
    • FTA_CIN_EXT: 1
  • FAU:
    • FAU_GEN: 12
    • FAU_GEN.1: 4
    • FAU_GEN.2: 1
    • FAU_SEL: 10
    • FAU_SEL.1: 2
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACC.1.1: 1
    • FDP_ACF: 7
    • FDP_ACF.1: 5
    • FDP_ITC: 1
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_ATD.1: 14
    • FIA_ATD.1.1: 1
    • FIA_UAU.2: 1
    • FIA_UAU.5: 10
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 6
    • FIA_UID.2: 1
    • FIA_UID_EXT: 2
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA: 1
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 3
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 1
    • FMT_REV.1: 19
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 20
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITA.1: 2
    • FPT_ITT.1: 2
    • FPT_OVR_EXT.1: 1
    • FPT_STM.1: 2
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
  • FTA:
    • FTA_MCS.1: 8
    • FTA_MCS.1.1: 1
    • FTA_MCS.1.2: 1
    • FTA_TSE.1: 8
    • FTA_TSE.1.1: 2
  • FTP:
    • FTP_ITC: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_PHYSICAL: 1
    • A.NO_TEMPEST: 2
    • A.NO_WIRELESS: 1
    • A.NO_WIRELESS_DEVICES: 1
    • A.PHYSICAL: 1
    • A.TRUSTED: 1
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 1
    • A.USER_ALLOWED: 1
    • A.USER_ALLOWED_ACCESS: 1
  • O:
    • O.ANTI_TAMPERING: 2
    • O.AUTHORIZED: 2
    • O.COMPUTER: 5
    • O.EMULATED_INPUT: 3
    • O.LEAK: 1
    • O.LEAK_PREVENTION: 1
    • O.NO_OTHER: 3
    • O.NO_TOE_ACCESS: 2
    • O.NO_USER: 1
    • O.NO_USER_DATA: 1
    • O.PERIPHERAL: 1
    • O.PERIPHERAL_PORTS: 1
    • O.REJECT: 4
    • O.SELF_TEST: 4
    • O.SELF_TEST_FAIL: 2
    • O.TAMPER: 1
    • O.TAMPER_EVIDENT: 2
    • O.UNIDIRECTIONAL: 3
    • O.USER_DATA: 2
  • OE:
    • OE.NO_TEMPEST: 2
    • OE.NO_WIRELESS: 1
    • OE.NO_WIRELESS_DEVICES: 1
    • OE.PHYSICAL: 3
    • OE.TRUSTED: 2
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • T:
    • T.DATA_LEAK: 2
    • T.FAILED: 2
    • T.LOGICAL: 1
    • T.LOGICAL_TAMPER: 1
    • T.PHYSICAL: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 2
    • T.RESIDUAL: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 2
    • T.UNAUTHORIZED: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED: 1
    • T.UNINTENDED_USE: 1
  • A:
    • A.NO_EVIL: 3
    • A.NO_GENERAL_: 1
    • A.NO_GENERAL_PURPOSE: 2
    • A.OS_PP_VALIDA: 1
    • A.OS_PP_VALIDATED: 2
    • A.PHYSICAL: 3
  • O:
    • O.ACCESS_: 2
    • O.ACCESS_HISTORY: 4
    • O.ADMIN_: 3
    • O.ADMIN_GUIDANCE: 11
    • O.ADMIN_ROLE: 3
    • O.AUDIT_: 4
    • O.AUDIT_GENERATION: 4
    • O.AUTH: 8
    • O.AVAIL: 7
    • O.CONFIGURATION_IDEN: 1
    • O.CONFIGURATION_IDENTIFICATI: 4
    • O.CONFIGURATION_IDENTIFICATION: 4
    • O.DOCUMENTED_DESIGN: 9
    • O.INTERNAL_: 2
    • O.INTERNAL_TOE_DOMAINS: 4
    • O.MANAGE: 15
    • O.MEDIATE: 8
    • O.PARTIAL_: 5
    • O.PARTIAL_FUNCTIONAL_TEST: 6
    • O.PARTIAL_SELF_PROTECTION: 6
    • O.PROTCOMM: 7
    • O.RESIDUAL_INFORMATIO: 1
    • O.RESIDUAL_INFORMATION: 7
    • O.TOE_ACCESS: 10
    • O.VULNERABILITY_ANALY: 1
    • O.VULNERABILITY_ANALYSIS: 9
  • OE:
    • OE.AUTH: 7
    • OE.NO_EVIL: 4
    • OE.NO_GENERAL_: 2
    • OE.NO_GENERAL_PURPOSE: 2
    • OE.OS_PP_VALIDATED: 5
    • OE.PHYSICAL: 4
    • OE.PROTCOMM: 8
  • T:
    • T.ACCIDENTAL_ADMIN_ERR: 1
    • T.DENIAL_OF_SERVICE: 5
    • T.MASQUERADE: 3
    • T.POOR_DESIGN: 5
    • T.POOR_IMPLEMENTATION: 3
    • T.POOR_TEST: 3
    • T.RESIDUAL_DATA: 3
    • T.TSF_COMPROMISE: 7
    • T.UNAUTHORIZED_ACCESS: 4
    • T.UNIDENTIFIED_ACTIONS: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 4
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • Intertek:
    • Intertek: 1
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 11
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 40
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Physical Tampering: 1
    • physical tampering: 6
pdf_data/st_keywords/device_model
  • STM:
    • STM32:
      • STM32F070C6T6: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • RFC:
    • RFC 1321: 4
    • RFC 1413: 2
    • RFC 1964: 1
    • RFC 2743: 1
    • RFC 4510: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • PostGIS Spatial Extensions EDB*Plus Slony Replication PG Agent Update Monitor 1.4.7.2 Out of Scope The following components of the PPAS 8.4 product are not included in the TOE: Infinite Cache: 1
    • Bouncer Procedural Language Debugger StackBuilder Plus 1.4.7.3 Configuration Options that are Out of Scope. 1.4.7.3.1 “Trust” authentication option (not in TOE) When the trust authentication option is: 1
    • Out of Scope: 2
    • out of scope: 1
    • platforms are included in the TOE. In addition, the following components in the IT environment are out of scope. Postgres Plus Advanced Server v8.4 Security Target 15 Authenticator servers, if configured : 1
pdf_data/st_metadata
  • /Author: Teresa MacArthur
  • /Client Full Name: Vertiv
  • /Client Short Name: Vertiv
  • /Comments: CC V3.1 Security Target Template Version 1_0
  • /Company: EWA-Canada
  • /CreationDate: D:20220105170543+01'00'
  • /Creator: Acrobat PDFMaker 17 for Word
  • /Document Number: 2149-001-D102C4B
  • /ModDate: D:20220105170614+01'00'
  • /Producer: Adobe PDF Library 17.11.238
  • /Product_Name: Vertiv Secure USB HID Filter
  • /ST_Date: 5 January 2022
  • /ST_Version: 1.15
  • /SourceModified: D:20220105160457
  • /Title: Security Target
  • pdf_file_size_bytes: 763032
  • pdf_hyperlinks: mailto:[email protected], http://www.vertiv.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 44
  • /CreationDate: D:20110812120756
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110812120756
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 1153309
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 94
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different