Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Vertiv CYBEX™ SCUSBHIDFILTER Firmware Version 40404-0E7 and Vertiv CYBEX™ SCKM140PP4 KM Switch Firmware Version 40404-0E7
CCEVS-VR-VID-11254-2022
McAfee VirusScan Enterprise v8.8 and ePolicy Orchestrator v4.5
CCEVS-VR-VID-10421-2011
name Vertiv CYBEX™ SCUSBHIDFILTER Firmware Version 40404-0E7 and Vertiv CYBEX™ SCKM140PP4 KM Switch Firmware Version 40404-0E7 McAfee VirusScan Enterprise v8.8 and ePolicy Orchestrator v4.5
status active archived
not_valid_after 31.01.2027 01.11.2014
not_valid_before 31.01.2022 17.10.2011
report_link https://www.commoncriteriaportal.org/files/epfiles/st_vid11254-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10421-vr.pdf
st_link https://www.commoncriteriaportal.org/files/epfiles/st_vid11254-st1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10421-st.pdf
manufacturer Vertiv IT Systems McAfee, Inc.
manufacturer_web https://www.mcafee.com/
security_level {} EAL2+, ALC_FLR.2
dgst cae7cbcadc444d12 aa36b2db508ea7e7
heuristics/cert_id CCEVS-VR-VID-11254-2022 CCEVS-VR-VID-10421-2011
heuristics/cpe_matches {} cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.5:*:*:*:*:*:*:*, cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.0:*:*:*:*:*:*:*, cpe:2.3:a:mcafee:virusscan:4.5:*:*:*:*:*:*:*, cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.4:*:*:*:*:*:*:*, cpe:2.3:a:mcafee:virusscan_enterprise:8.8.1000:*:*:*:*:*:*:*, cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.6:*:*:*:*:*:*:*, cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.7:*:*:*:*:*:*:*, cpe:2.3:a:mcafee:virusscan_enterprise:8.8:*:*:*:*:*:*:*, cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.3:*:*:*:*:*:*:*, cpe:2.3:a:mcafee:virusscan:4.5.1:*:*:*:*:*:*:*, cpe:2.3:a:mcafee:virusscan_enterprise:8.8.0:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2021-23889, CVE-2020-13938, CVE-2023-3946, CVE-2021-31834, CVE-2013-0141, CVE-2022-3338, CVE-2021-2432, CVE-2017-3980, CVE-2020-7317, CVE-2015-0922, CVE-2019-3604, CVE-2023-5444, CVE-2000-0119, CVE-2022-0862, CVE-2015-8577, CVE-2002-2282, CVE-2022-0858, CVE-2021-3712, CVE-2009-1348, CVE-2015-8765, CVE-2013-0140, CVE-2021-30639, CVE-2015-0921, CVE-2022-0861, CVE-2021-23840, CVE-2021-2161, CVE-2000-1128, CVE-2013-4882, CVE-2015-4559, CVE-2021-23890, CVE-2022-0842, CVE-2023-5445, CVE-2015-2859, CVE-2014-2205, CVE-2022-0859, CVE-2006-5417, CVE-2004-0831, CVE-2021-31835, CVE-2021-33037, CVE-2012-4594, CVE-2022-0857, CVE-2022-3339, CVE-2013-4883, CVE-2021-23888
heuristics/extracted_sars AGD_PRE.1, ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_CCL.1, ASE_ECD.1, ASE_REQ.2 ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ALC_DEL.1, ATE_IND.2, ATE_COV.1, AVA_VAN.2, ADV_ARC.1, AGD_OPE.1, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1
heuristics/extracted_versions 40404 8.8, 4.5
heuristics/scheme_data
  • category: AntiVirus
  • certification_date: 17.10.2011
  • evaluation_facility: COACT, Inc. Labs
  • expiration_date: 01.11.2014
  • id: CCEVS-VR-VID10421
  • product: McAfee VirusScan Enterprise v8.8 and ePolicy Orchestrator v4.5
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10421
  • vendor: McAfee, LLC
protection_profile_links {} {}
pdf_data/report_filename st_vid11254-vr.pdf st_vid10421-vr.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID11254-2022
    • cert_item: for the Vertiv CYBEX™ SCUSBHIDFILTER Firmware Version 40404-0E7 and Vertiv CYBEX™ SCKM140PP4 KM Switch Firmware Version 40404-0E7 Peripheral Sharing Devices Version 1.0
    • cert_lab: US NIAP
  • US:
    • cert_id: CCEVS-VR-VID10421-2011
    • cert_item: McAfee VirusScan Enterprise 8.8 and ePolicy Orchestrator 4.5
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11254-2022: 1
  • US:
    • CCEVS-VR-VID10421-2011: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 6
  • EAL:
    • EAL 2: 2
    • EAL 4: 1
    • EAL2: 3
    • EAL2 augmented: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_STG: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_TEMPEST: 1
    • A.NO_WIRELESS_DEVICES: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
    • A.TRUSTED_CONFIG: 1
    • A.USER_ALLOWED_ACCESS: 1
  • T:
    • T.DATA_LEAK: 1
    • T.FAILED: 1
    • T.LOGICAL_TAMPER: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED_USE: 1
  • A:
    • A.AUDIT_BACKUP: 1
    • A.NO_EVIL: 1
    • A.PHYSICAL: 1
    • A.SECURE_COMMS: 1
    • A.SECURE_UPDATES: 1
  • OSP:
    • OSP: 1
  • T:
    • T.ACCIDENTAL_ADMIN_: 1
    • T.AUDIT_: 1
    • T.MASQUERADE: 1
    • T.POOR_DESIGN: 1
    • T.POOR_IMPLEMENTATION: 1
    • T.POOR_TEST: 1
    • T.RESIDUAL_DATA: 1
    • T.TSF_COMPROMISE: 1
    • T.UNATTENDED_: 1
    • T.UNIDENTIFIED_ACTIONS: 1
    • T.VIRUS: 1
pdf_data/report_keywords/vendor
  • STMicroelectronics:
    • STMicroelectronics: 1
  • Microsoft:
    • Microsoft: 36
pdf_data/report_keywords/eval_facility
  • Acumen:
    • Acumen Security: 6
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
pdf_data/report_metadata
  • /Author: ppatin
  • /CreationDate: D:20220131200223-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20220131200223-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 459318
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
  • /Author: Jerome F. Myers
  • /CreationDate: D:20111021162531
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20111021162531
  • /Producer: Microsoft® Office Word 2007
  • /Title: National Information Assurance Partnership
  • pdf_file_size_bytes: 407159
  • pdf_hyperlinks: http://www.niap-ccevs.org/cc-scheme/pp/pp_av_br_v1.2.pdf
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 26
pdf_data/st_filename st_vid11254-st1.pdf st_vid10421-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 6
    • EAL2 augmented: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 3
    • ADV_FSP: 1
    • ADV_FSP.2: 3
    • ADV_TDS: 1
    • ADV_TDS.1: 4
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 4
    • AGD_PRE: 1
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.2: 4
    • ALC_CMS: 1
    • ALC_CMS.2: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 3
    • ALC_FLR.2: 7
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 4
    • ATE_FUN: 1
    • ATE_FUN.1: 2
    • ATE_IND: 1
    • ATE_IND.2: 4
  • AVA:
    • AVA_VAN.2: 5
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 3
  • FDP:
    • FDP_APC_EXT: 15
    • FDP_APC_EXT.1: 10
    • FDP_APC_EXT.1.1: 1
    • FDP_APC_EXT.1.2: 1
    • FDP_APC_EXT.1.3: 1
    • FDP_APC_EXT.1.4: 1
    • FDP_FIL_EXT: 15
    • FDP_FIL_EXT.1: 7
    • FDP_FIL_EXT.1.1: 1
    • FDP_FIL_EXT.1.2: 1
    • FDP_FIL_EXT.1.3: 1
    • FDP_FLS_EXT: 1
    • FDP_PDC_EXT: 16
    • FDP_PDC_EXT.1: 25
    • FDP_PDC_EXT.1.1: 2
    • FDP_PDC_EXT.1.2: 1
    • FDP_PDC_EXT.1.3: 1
    • FDP_PDC_EXT.1.4: 1
    • FDP_PDC_EXT.1.5: 1
    • FDP_PDC_EXT.2: 6
    • FDP_PDC_EXT.2.1: 1
    • FDP_PDC_EXT.2.2: 1
    • FDP_PDC_EXT.3: 7
    • FDP_PDC_EXT.3.1: 1
    • FDP_PDC_EXT.3.2: 1
    • FDP_RDR_EXT: 4
    • FDP_RDR_EXT.1: 14
    • FDP_RDR_EXT.1.1: 2
    • FDP_RIP_EXT: 4
    • FDP_RIP_EXT.1: 8
    • FDP_RIP_EXT.1.1: 2
    • FDP_SWI_EXT: 4
    • FDP_SWI_EXT.1: 10
    • FDP_SWI_EXT.1.1: 2
    • FDP_UDF_EXT: 10
    • FDP_UDF_EXT.1: 5
    • FDP_UDF_EXT.1.1: 1
  • FPT:
    • FPT_FLS_EXT: 3
    • FPT_FLS_EXT.1: 9
    • FPT_FLS_EXT.1.1: 3
    • FPT_NTA_EXT: 4
    • FPT_NTA_EXT.1: 8
    • FPT_NTA_EXT.1.1: 2
    • FPT_PHP.1: 6
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 2
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST_EXT: 4
    • FPT_TST_EXT.1: 10
    • FPT_TST_EXT.1.1: 2
  • FTA:
    • FTA_CIN_EXT: 1
  • FAU:
    • FAU_GEN: 17
    • FAU_GEN.1: 7
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 2
    • FAU_SAR.1.2: 2
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 4
    • FAU_STG: 23
    • FAU_STG.1: 2
    • FAU_STG.4: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.4: 1
    • FCS_COP.1: 6
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
  • FIA:
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.1.1: 2
    • FIA_UID.1: 2
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 2
    • FMT_MSA.2: 1
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 4
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 2
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_STM.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_PHYSICAL: 1
    • A.NO_TEMPEST: 2
    • A.NO_WIRELESS: 1
    • A.NO_WIRELESS_DEVICES: 1
    • A.PHYSICAL: 1
    • A.TRUSTED: 1
    • A.TRUSTED_ADMIN: 2
    • A.TRUSTED_CONFIG: 1
    • A.USER_ALLOWED: 1
    • A.USER_ALLOWED_ACCESS: 1
  • O:
    • O.ANTI_TAMPERING: 2
    • O.AUTHORIZED: 2
    • O.COMPUTER: 5
    • O.EMULATED_INPUT: 3
    • O.LEAK: 1
    • O.LEAK_PREVENTION: 1
    • O.NO_OTHER: 3
    • O.NO_TOE_ACCESS: 2
    • O.NO_USER: 1
    • O.NO_USER_DATA: 1
    • O.PERIPHERAL: 1
    • O.PERIPHERAL_PORTS: 1
    • O.REJECT: 4
    • O.SELF_TEST: 4
    • O.SELF_TEST_FAIL: 2
    • O.TAMPER: 1
    • O.TAMPER_EVIDENT: 2
    • O.UNIDIRECTIONAL: 3
    • O.USER_DATA: 2
  • OE:
    • OE.NO_TEMPEST: 2
    • OE.NO_WIRELESS: 1
    • OE.NO_WIRELESS_DEVICES: 1
    • OE.PHYSICAL: 3
    • OE.TRUSTED: 2
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • T:
    • T.DATA_LEAK: 2
    • T.FAILED: 2
    • T.LOGICAL: 1
    • T.LOGICAL_TAMPER: 1
    • T.PHYSICAL: 1
    • T.PHYSICAL_TAMPER: 1
    • T.REPLACEMENT: 2
    • T.RESIDUAL: 1
    • T.RESIDUAL_LEAK: 1
    • T.SIGNAL_LEAK: 2
    • T.UNAUTHORIZED: 1
    • T.UNAUTHORIZED_DEVICES: 1
    • T.UNINTENDED: 1
    • T.UNINTENDED_USE: 1
  • A:
    • A.AUDIT_BACKUP: 2
    • A.NO_EVIL: 1
    • A.PHYSICAL: 1
    • A.SECURE_COMMS: 1
    • A.SECURE_UPDATES: 1
  • O:
    • O.ADMIN_GUIDANCE: 4
    • O.ADMIN_ROLE: 5
    • O.AUDIT_GEN: 1
    • O.AUDIT_GENERATION: 5
    • O.AUDIT_PROTECT: 4
    • O.AUDIT_REVIEW: 5
    • O.CONFIGURATION_IDEN: 1
    • O.CONFIGURATION_IDENTIFI-: 1
    • O.CONFIGURATION_IDENTIFICA: 1
    • O.CONFIGURATION_IDENTIFICATIO: 1
    • O.CONFIGURATION_IDENTIFICATION: 1
    • O.CORRECT_TSF_OPERAT: 1
    • O.CORRECT_TSF_OPERATION: 4
    • O.CRYPTOGRAPHY: 4
    • O.DOCUMENTED_DESIGN: 5
    • O.MANAGE: 5
    • O.PARTIAL_FUNCTIONAL: 1
    • O.PARTIAL_FUNCTIONAL_TEST: 3
    • O.PARTIAL_FUNCTIONAL_TESTING: 2
    • O.PARTIAL_SELF_PROTEC: 1
    • O.PARTIAL_SELF_PROTECTION: 4
    • O.VIRUS: 5
    • O.VULNERABILITY_ANALY: 1
    • O.VULNERABILITY_ANALYSIS: 3
    • O.VULNERABILITY_ANALYSIS_TEST: 3
  • OE:
    • OE.AUDIT_BACKUP: 3
    • OE.AUDIT_SEARCH: 5
    • OE.AUDIT_STORAGE: 3
    • OE.DISPLAY_BANNER: 3
    • OE.DOMAIN_SEPARATION: 5
    • OE.NO_BYPASS: 5
    • OE.NO_EVIL: 3
    • OE.PHYSICAL: 3
    • OE.RESIDUAL_: 1
    • OE.RESIDUAL_INFORMATION: 5
    • OE.SECURE_COMMS: 3
    • OE.SECURE_UPDATES: 3
    • OE.TIME_STAMPS: 4
    • OE.TOE_ACCESS: 4
  • T:
    • T.ACCIDENTAL_ADMIN_: 1
    • T.ACCIDENTAL_ADMIN_ERROR: 2
    • T.AUDIT: 2
    • T.AUDIT_: 2
    • T.MASQUERADE: 2
    • T.POOR_DESIGN: 3
    • T.POOR_IMPLEMENTATIO: 1
    • T.POOR_IMPLEMENTATION: 3
    • T.POOR_TEST: 1
    • T.RESIDUAL_DATA: 3
    • T.TSF_COMPROMISE: 3
    • T.UNATTENDED_: 1
    • T.UNATTENDED_SESSION: 3
    • T.UNIDENTIFIED_ACTIONS: 4
    • T.VIRUS: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 36
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • Intertek:
    • Intertek: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Physical Tampering: 1
    • physical tampering: 6
pdf_data/st_keywords/device_model
  • STM:
    • STM32:
      • STM32F070C6T6: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 140-2: 5
    • FIPS 180-2: 1
pdf_data/st_metadata
  • /Author: Teresa MacArthur
  • /Client Full Name: Vertiv
  • /Client Short Name: Vertiv
  • /Comments: CC V3.1 Security Target Template Version 1_0
  • /Company: EWA-Canada
  • /CreationDate: D:20220105170543+01'00'
  • /Creator: Acrobat PDFMaker 17 for Word
  • /Document Number: 2149-001-D102C4B
  • /ModDate: D:20220105170614+01'00'
  • /Producer: Adobe PDF Library 17.11.238
  • /Product_Name: Vertiv Secure USB HID Filter
  • /ST_Date: 5 January 2022
  • /ST_Version: 1.15
  • /SourceModified: D:20220105160457
  • /Title: Security Target
  • pdf_file_size_bytes: 763032
  • pdf_hyperlinks: mailto:[email protected], http://www.vertiv.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 44
  • /AAPL:Keywords: []
  • /Author: Ray Potter
  • /CreationDate: D:20111028143706Z00'00'
  • /Creator: Word
  • /Keywords:
  • /ModDate: D:20111028143706Z00'00'
  • /Producer: Mac OS X 10.7.2 Quartz PDFContext
  • /Title: Microsoft Word - MFE VSE 8-8 EAL2 Security Target v1-3.doc
  • pdf_file_size_bytes: 845415
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 69
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/convert_garbage False True
state/st/pdf_hash Different Different
state/st/txt_hash Different Different