Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Vertiv CYBEX™ SCUSBHIDFILTER Firmware Version 40404-0E7 and Vertiv CYBEX™ SCKM140PP4 KM Switch Firmware Version 40404-0E7
CCEVS-VR-VID-11254-2022
SQL Server 2016 Database Engine Enterprise Edition x64 (English) 13.0.4001.0 (including Service Pack 1)
JISEC-CC-CRP-C0537
name Vertiv CYBEX™ SCUSBHIDFILTER Firmware Version 40404-0E7 and Vertiv CYBEX™ SCKM140PP4 KM Switch Firmware Version 40404-0E7 SQL Server 2016 Database Engine Enterprise Edition x64 (English) 13.0.4001.0 (including Service Pack 1)
category Other Devices and Systems Databases
scheme US JP
status active archived
not_valid_after 31.01.2027 15.02.2022
not_valid_before 31.01.2022 15.02.2017
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0537_eimg.pdf
report_link https://www.commoncriteriaportal.org/files/epfiles/st_vid11254-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0537_erpt.pdf
st_link https://www.commoncriteriaportal.org/files/epfiles/st_vid11254-st1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0537_est.pdf
manufacturer Vertiv IT Systems Microsoft Corporation
manufacturer_web https://www.microsoft.com
security_level {} EAL2+, ALC_FLR.2
dgst cae7cbcadc444d12 a43cc3e7f97cf843
heuristics/cert_id CCEVS-VR-VID-11254-2022 JISEC-CC-CRP-C0537
heuristics/cert_lab US []
heuristics/cpe_matches {} cpe:2.3:a:microsoft:sql_server_2016:13.0.4001.0:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2024-37320, CVE-2024-35272, CVE-2024-38087, CVE-2024-37329, CVE-2024-37328, CVE-2024-35271, CVE-2024-35256, CVE-2024-37331, CVE-2024-37318, CVE-2024-21449, CVE-2024-37336, CVE-2024-37324, CVE-2024-37333, CVE-2024-37330, CVE-2024-38088, CVE-2024-37321, CVE-2024-37322, CVE-2024-37332, CVE-2024-37326, CVE-2024-37323, CVE-2024-37327, CVE-2024-37319
heuristics/extracted_sars AGD_PRE.1, ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_CCL.1, ASE_ECD.1, ASE_REQ.2 ALC_FLR.2
heuristics/extracted_versions 40404 13.0.4001.0
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0537
  • certification_date: 01.02.2017
  • claim: EAL2+ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.2
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0537_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the database engine of SQL Server 2016. SQL Server is a Database Management System (DBMS). The TOE has been developed as the core module of the DBMS to store and manage data in a secure way. TOE security functionality This TOE provides the following security functionality: - The Access Control function of the TOE controls the access of users to user data and metadata stored in the TOE. - The Session Handling function of the TOE limits the possibilities of users to establish sessions with the TOE. - The Security Audit function of the TOE produces log files about all security relevant events. - The Security Management function allows authorized administrators to manage the behavior of the security functionality of the TOE. - The Identification and Authentication function of the TOE is able to identify and authenticate users. - The Residual Information Protection function of the TOE overwrites the residual information on the memory that will be used for user sessions.
    • evaluation_facility: TÜV Informationstechnik GmbH, Evaluation Body for IT-Security
    • product: SQL Server 2016 Database Engine Enterprise Edition x64 (English)
    • product_type: Database Management System (DBMS)
    • protection_profile: Base Protection Profile for Database Management Systems (DBMS PP), Version 2.07
    • report_link: https://www.ipa.go.jp/en/security/c0537_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0537_est.pdf
    • toe_version: 13.0.4001.0 (including Service Pack 1)
    • vendor: Microsoft Corporation
  • expiration_date: 01.03.2022
  • supplier: Microsoft Corporation
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0537_it5563.html
  • toe_overseas_name: SQL Server 2016 Database Engine Enterprise Edition x64 (English)13.0.4001.0 (including Service Pack 1)
heuristics/protection_profiles {} 3f6ac99252bbf14e
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0088b_pdf.pdf
pdf_data/cert_filename c0537_eimg.pdf
pdf_data/cert_keywords/cc_cert_id
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
  • Microsoft:
    • Microsoft Corporation: 1
pdf_data/cert_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20170316155916+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20170316160045+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 415538
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid11254-vr.pdf c0537_erpt.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID11254-2022
    • cert_item: for the Vertiv CYBEX™ SCUSBHIDFILTER Firmware Version 40404-0E7 and Vertiv CYBEX™ SCKM140PP4 KM Switch Firmware Version 40404-0E7 Peripheral Sharing Devices Version 1.0
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11254-2022: 1
  • JP:
    • CRP-C0537-01: 1
    • Certification No. C0537: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 6
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 3
    • EAL2+: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_TEMPEST: 1
    • A.NO_WIRELESS_DEVICES: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
    • A.TRUSTED_CONFIG: 1
    • A.USER_ALLOWED_ACCESS: 1
  • T:
    • T.DATA_LEAK: 1
    • T.FAILED: 1
    • T.LOGICAL_TAMPER: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED_USE: 1
  • A:
    • A.AUTHUSER: 1
    • A.CONNECT: 1
    • A.MANAGE: 1
    • A.NO_GENERAL_: 1
    • A.PHYSICAL: 1
    • A.SUPPORT: 1
    • A.TRAINEDUSER: 1
  • T:
    • T.ACCESS_TSFDATA: 1
    • T.ACCESS_TSFFUNC: 1
    • T.IA_MASQUERADE: 1
    • T.IA_USER: 1
    • T.RESIDUAL_DATA: 1
    • T.TSF_COMPROMISE: 1
    • T.UNAUTHORIZED_: 1
pdf_data/report_keywords/vendor
  • STMicroelectronics:
    • STMicroelectronics: 1
  • Microsoft:
    • Microsoft: 5
    • Microsoft Corporation: 7
pdf_data/report_keywords/eval_facility
  • Acumen:
    • Acumen Security: 6
  • TUV:
    • TÜV Informationstechnik: 4
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
pdf_data/report_metadata
  • /Author: ppatin
  • /CreationDate: D:20220131200223-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20220131200223-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 459318
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
  • /CreationDate: D:20170316160424+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20170316160534+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 240723
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 33
pdf_data/st_filename st_vid11254-st1.pdf c0537_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 1
    • EAL2: 1
    • EAL2 augmented: 1
    • EAL2+: 66
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • AGD:
    • AGD_ADD: 3
  • ALC:
    • ALC_FLR.2: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 3
  • FDP:
    • FDP_APC_EXT: 15
    • FDP_APC_EXT.1: 10
    • FDP_APC_EXT.1.1: 1
    • FDP_APC_EXT.1.2: 1
    • FDP_APC_EXT.1.3: 1
    • FDP_APC_EXT.1.4: 1
    • FDP_FIL_EXT: 15
    • FDP_FIL_EXT.1: 7
    • FDP_FIL_EXT.1.1: 1
    • FDP_FIL_EXT.1.2: 1
    • FDP_FIL_EXT.1.3: 1
    • FDP_FLS_EXT: 1
    • FDP_PDC_EXT: 16
    • FDP_PDC_EXT.1: 25
    • FDP_PDC_EXT.1.1: 2
    • FDP_PDC_EXT.1.2: 1
    • FDP_PDC_EXT.1.3: 1
    • FDP_PDC_EXT.1.4: 1
    • FDP_PDC_EXT.1.5: 1
    • FDP_PDC_EXT.2: 6
    • FDP_PDC_EXT.2.1: 1
    • FDP_PDC_EXT.2.2: 1
    • FDP_PDC_EXT.3: 7
    • FDP_PDC_EXT.3.1: 1
    • FDP_PDC_EXT.3.2: 1
    • FDP_RDR_EXT: 4
    • FDP_RDR_EXT.1: 14
    • FDP_RDR_EXT.1.1: 2
    • FDP_RIP_EXT: 4
    • FDP_RIP_EXT.1: 8
    • FDP_RIP_EXT.1.1: 2
    • FDP_SWI_EXT: 4
    • FDP_SWI_EXT.1: 10
    • FDP_SWI_EXT.1.1: 2
    • FDP_UDF_EXT: 10
    • FDP_UDF_EXT.1: 5
    • FDP_UDF_EXT.1.1: 1
  • FPT:
    • FPT_FLS_EXT: 3
    • FPT_FLS_EXT.1: 9
    • FPT_FLS_EXT.1.1: 3
    • FPT_NTA_EXT: 4
    • FPT_NTA_EXT.1: 8
    • FPT_NTA_EXT.1.1: 2
    • FPT_PHP.1: 6
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 2
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST_EXT: 4
    • FPT_TST_EXT.1: 10
    • FPT_TST_EXT.1.1: 2
  • FTA:
    • FTA_CIN_EXT: 1
  • FAU:
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SEL.1: 7
    • FAU_SEL.1.1: 1
  • FDP:
    • FDP_ACC.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_ATD.1: 15
    • FIA_ATD.1.1: 3
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 14
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 5
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 7
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 1
    • FMT_REV.1: 12
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT.1: 1
    • FPT_STM.1: 1
    • FPT_TRC.1: 6
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
  • FTA:
    • FTA_MCS.1: 7
    • FTA_MCS.1.1: 1
    • FTA_MCS.1.2: 1
    • FTA_TAH: 1
    • FTA_TSE.1: 6
    • FTA_TSE.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_PHYSICAL: 1
    • A.NO_TEMPEST: 2
    • A.NO_WIRELESS: 1
    • A.NO_WIRELESS_DEVICES: 1
    • A.PHYSICAL: 1
    • A.TRUSTED: 1
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 1
    • A.USER_ALLOWED: 1
    • A.USER_ALLOWED_ACCESS: 1
  • O:
    • O.ANTI_TAMPERING: 2
    • O.AUTHORIZED: 2
    • O.COMPUTER: 5
    • O.EMULATED_INPUT: 3
    • O.LEAK: 1
    • O.LEAK_PREVENTION: 1
    • O.NO_OTHER: 3
    • O.NO_TOE_ACCESS: 2
    • O.NO_USER: 1
    • O.NO_USER_DATA: 1
    • O.PERIPHERAL: 1
    • O.PERIPHERAL_PORTS: 1
    • O.REJECT: 4
    • O.SELF_TEST: 4
    • O.SELF_TEST_FAIL: 2
    • O.TAMPER: 1
    • O.TAMPER_EVIDENT: 2
    • O.UNIDIRECTIONAL: 3
    • O.USER_DATA: 2
  • OE:
    • OE.NO_TEMPEST: 2
    • OE.NO_WIRELESS: 1
    • OE.NO_WIRELESS_DEVICES: 1
    • OE.PHYSICAL: 3
    • OE.TRUSTED: 2
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • T:
    • T.DATA_LEAK: 2
    • T.FAILED: 2
    • T.LOGICAL: 1
    • T.LOGICAL_TAMPER: 1
    • T.PHYSICAL: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 2
    • T.RESIDUAL: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 2
    • T.UNAUTHORIZED: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED: 1
    • T.UNINTENDED_USE: 1
  • A:
    • A.AUTHUSER: 3
    • A.CONNECT: 4
    • A.MANAGE: 3
    • A.NO_GENERAL_PURPOSE: 3
    • A.PHYSICAL: 3
    • A.SUPPORT: 4
    • A.TRAINEDUSER: 3
  • O:
    • O.ACCESS_HISTORY: 9
    • O.ADMIN_ROLE: 8
    • O.AUDIT_GENERATI: 1
    • O.AUDIT_GENERATION: 6
    • O.DISCRETIONARY_: 1
    • O.DISCRETIONARY_ACCESS: 5
    • O.MANAGE: 11
    • O.MEDIATE: 8
    • O.RESIDUAL_INFOR: 1
    • O.RESIDUAL_INFORMATION: 8
    • O.TOE_ACCESS: 18
  • OE:
    • OE.ADMIN: 12
    • OE.INFO_PROTECT: 19
    • OE.IT_REMOTE: 10
    • OE.IT_TRUSTED_SYSTEM: 9
    • OE.NO_GENERAL_: 2
    • OE.NO_GENERAL_PURPOSE: 6
    • OE.PHYSICAL: 8
  • T:
    • T.ACCESS_TSFDATA: 3
    • T.ACCESS_TSFFUNC: 3
    • T.IA_MASQUERADE: 4
    • T.IA_USER: 3
    • T.RESIDUAL_DATA: 3
    • T.TSF_COMPROMISE: 4
    • T.UNAUTHORIZED_ACCESS: 4
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 10
    • Microsoft Corporation: 3
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • Intertek:
    • Intertek: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Physical Tampering: 1
    • physical tampering: 6
pdf_data/st_keywords/device_model
  • STM:
    • STM32:
      • STM32F070C6T6: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 3
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/st_metadata
  • /Author: Teresa MacArthur
  • /Client Full Name: Vertiv
  • /Client Short Name: Vertiv
  • /Comments: CC V3.1 Security Target Template Version 1_0
  • /Company: EWA-Canada
  • /CreationDate: D:20220105170543+01'00'
  • /Creator: Acrobat PDFMaker 17 for Word
  • /Document Number: 2149-001-D102C4B
  • /ModDate: D:20220105170614+01'00'
  • /Producer: Adobe PDF Library 17.11.238
  • /Product_Name: Vertiv Secure USB HID Filter
  • /ST_Date: 5 January 2022
  • /ST_Version: 1.15
  • /SourceModified: D:20220105160457
  • /Title: Security Target
  • pdf_file_size_bytes: 763032
  • pdf_hyperlinks: mailto:[email protected], http://www.vertiv.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 44
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different