Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Sourcefire 3D Sensors (v. 3.2.3): 3D500, 3D1000, 3D2000, 3D2100, 3D3000; Sourcefire Defense Centers: (v. 3.2.3): DC1000, DC3000 (formerly Sourcefire Intrusion Detection Sensors (v. 3.2.3): NS500, NS1000, NS2000, NS2100, NS3000; Sourcefire Management Consoles (v. 3.2.3): MC1000, MC3000)
CCEVS-VR-0102-2005
Symantec™ Endpoint Protection Version 12.1.2
383-4-217
name Sourcefire 3D Sensors (v. 3.2.3): 3D500, 3D1000, 3D2000, 3D2100, 3D3000; Sourcefire Defense Centers: (v. 3.2.3): DC1000, DC3000 (formerly Sourcefire Intrusion Detection Sensors (v. 3.2.3): NS500, NS1000, NS2000, NS2100, NS3000; Sourcefire Management Consoles (v. 3.2.3): MC1000, MC3000) Symantec™ Endpoint Protection Version 12.1.2
category Network and Network-Related Devices and Systems Other Devices and Systems
scheme US CA
not_valid_after 07.09.2012 19.04.2018
not_valid_before 03.05.2005 05.03.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_VID4017-VR.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-217%20CR%20v1.0e.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_VID4017-ST.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-217%20ST%20v08.pdf
manufacturer Sourcefire Inc. Symantec Corporation
manufacturer_web https://www.sourcefire.com/ https://www.symantec.com
security_level EAL2 EAL2+, ALC_FLR.2
dgst e53cc6b38f5c1c8c df6fcbee2a844e67
heuristics/cert_id CCEVS-VR-0102-2005 383-4-217
heuristics/cert_lab US CANADA
heuristics/cpe_matches {} cpe:2.3:a:symantec:endpoint_protection:12.1:-:small_business:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:12.1.2.1:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:12.1:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection_manager:12.1.2:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:12.1.2:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2012-0295, CVE-2014-3439, CVE-2020-5836, CVE-2019-12759, CVE-2013-5014, CVE-2017-6331, CVE-2019-12750, CVE-2014-3437, CVE-2020-5821, CVE-2020-5820, CVE-2014-9229, CVE-2020-5833, CVE-2018-12238, CVE-2020-5828, CVE-2020-5837, CVE-2019-18372, CVE-2012-0294, CVE-2018-5236, CVE-2020-5834, CVE-2016-5311, CVE-2020-5829, CVE-2018-5237, CVE-2020-5830, CVE-2018-12239, CVE-2014-3434, CVE-2020-5823, CVE-2012-4348, CVE-2020-5831, CVE-2020-5822, CVE-2020-5824, CVE-2013-5015, CVE-2014-9227, CVE-2014-3438, CVE-2019-12758, CVE-2018-18368, CVE-2018-12245, CVE-2014-9228, CVE-2016-9094, CVE-2020-5825, CVE-2019-12757, CVE-2020-5835, CVE-2020-5826, CVE-2019-12756, CVE-2020-5827, CVE-2013-1612, CVE-2016-9093
heuristics/extracted_sars ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 3.2.3 12.1.2
heuristics/scheme_data
  • category: Wireless Monitoring
  • certification_date: 03.06.2005
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date:
  • id: CCEVS-VR-VID4017
  • product: Sourcefire 3D Sensors (v. 3.2.3): 3D500, 3D1000, 3D2000, 3D2100, 3D3000; Sourcefire Defense Centers: (v. 3.2.3): DC1000, DC3000 (formerly Sourcefire Intrusion Detection Sensors (v. 3.2.3): NS500, NS1000, NS2000, NS2100, NS3000; Sourcefire Management Consoles (v. 3.2.3): MC1000, MC3000)
  • scheme: US
  • url: https://www.niap-ccevs.org/product/4017
  • vendor: Sourcefire, Inc.
heuristics/protection_profiles 809ce30fff5c61f3 fbbc69dcdf858c77
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_v1.4.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_AV_BR_V1.2.pdf
pdf_data/report_filename ST_VID4017-VR.pdf 383-4-217 CR v1.0e.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-05-0102
    • cert_item: Sourcefire, Incorporated Sourcefire Intrusion Detection System (NS 500, NS 1000, NS 2000, NS 2100, NS 3000, MC 1000, and MC 3000
    • cert_lab: US NIAP
  • CA:
  • US:
  • CA:
    • cert_id: 383-4-217-CR
    • cert_lab: CANADA
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-05-0102: 1
  • CA:
    • 383-4-217-CR: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 2
    • EAL 2+: 3
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_CAP.2: 1
  • ADO:
    • ADO_IGS: 1
    • ADO_IGS.1: 1
  • ASE:
    • ASE_OBJ: 1
    • ASE_REQ: 2
  • AVA:
    • AVA_VLA: 1
  • ALC:
    • ALC_FLR.2: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ASCOPE: 1
    • A.DYNMIC: 1
    • A.LOCATE: 1
    • A.MANAGE: 1
    • A.NOEVIL: 1
    • A.NOTRST: 1
    • A.PROTCT: 1
  • T:
    • T.COMDIS: 1
    • T.COMINT: 1
    • T.EXPOSE: 1
    • T.FACCNT: 1
    • T.FALACT: 1
    • T.FALASC: 1
    • T.FALREC: 1
    • T.IMPCON: 1
    • T.INADVE: 1
    • T.INFLUX: 1
    • T.LOSSOF: 1
    • T.MISACT: 1
    • T.MISUSE: 1
    • T.NOHALT: 1
    • T.PRIVIL: 1
    • T.SCNCFG: 1
    • T.SCNMLC: 1
    • T.SCNVUL: 1
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 4
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-2: 2
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 180-2: 1
  • ISO:
    • ISO/IEC 17025:2005: 1
pdf_data/report_metadata
  • /Author: Vicky Ashby
  • /CreationDate: D:20050526141546-04'00'
  • /Creator: Acrobat PDFMaker 5.0 for Word
  • /ModDate: D:20050526141623-03'00'
  • /Producer: Acrobat Distiller 5.0.5 (Windows)
  • /Title: Validation Report for Sourcefire
  • pdf_file_size_bytes: 384618
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
  • /Author: Cory Clark
  • /CCEF: EWA-Canada
  • /CR date: 20 May 2013
  • /CR version: 1.0
  • /Certificate date: 20 May 2013
  • /CreationDate: D:20130522141026-04'00'
  • /Creator: Acrobat PDFMaker 9.0 for Word
  • /Developer name: Symantec Corporation
  • /Document number: 383-4-217-CR
  • /ETR title, version, date: Evaluation Technical Report for EAL 2+ Common Criteria Evaluation of Symantec Corporation Symantec™ Endpoint Protection Version 12.1.2, Version 1.0, 5 March 2013
  • /Evaluation completion date: 5 March 2013
  • /ModDate: D:20130522141518-04'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /ST Title: Security Target Symantec™ Endpoint Protection Version 12.1.2
  • /ST date: 13 February 2013
  • /ST version: 0.8
  • /SourceModified: D:20130522180951
  • /Sponsor: Symantec Corporation
  • /TOE Version: 12.1.2
  • /TOE name and version: Symantec™ Endpoint Protection Version 12.1.2
  • /TOE short name: SEP v12.1.2
  • /Title: EAL 2 Evaluation of <TOE name and version>
  • pdf_file_size_bytes: 68770
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
pdf_data/st_filename ST_VID4017-ST.pdf 383-4-217 ST v08.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL2: 5
  • EAL:
    • EAL2: 5
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.2: 15
  • ADO:
    • ADO_DEL.1: 7
    • ADO_IGS.1: 8
  • ADV:
    • ADV_FSP.1: 10
    • ADV_HLD.1: 13
    • ADV_RCR.1: 6
  • AGD:
    • AGD_ADM.1: 13
    • AGD_USR.1: 11
  • ATE:
    • ATE_COV.1: 6
    • ATE_FUN.1: 11
    • ATE_IND.2: 9
  • AVA:
    • AVA_SOF.1: 8
    • AVA_VLA.1: 11
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 3
    • ADV_FSP: 1
    • ADV_FSP.2: 4
    • ADV_TDS: 1
    • ADV_TDS.1: 3
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 3
    • AGD_PRE: 1
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.2: 4
    • ALC_CMS: 1
    • ALC_CMS.2: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 4
    • ALC_FLR: 1
    • ALC_FLR.2: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 4
    • ATE_FUN: 1
    • ATE_FUN.1: 2
    • ATE_IND: 1
    • ATE_IND.2: 4
  • AVA:
    • AVA_VAN.2: 5
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 2
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 7
    • FAU_SAR.3.1: 1
    • FAU_SEL.1: 9
    • FAU_SEL.1.1: 1
    • FAU_STG.2: 11
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.4: 9
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC.1: 3
  • FIA:
    • FIA_AFL.1: 1
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 9
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 11
    • FMT_MOF.1.1: 1
    • FMT_MSA: 1
    • FMT_MTD.1: 13
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITA.1: 1
    • FPT_ITC.1: 1
    • FPT_ITI.2: 1
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_RVM.1: 10
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 10
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM.1: 7
    • FPT_STM.1.1: 1
  • FAU:
    • FAU_GEN: 19
    • FAU_GEN.1: 10
    • FAU_GEN.2: 2
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 2
    • FAU_SAR.1.2: 2
    • FAU_STG: 15
    • FAU_STG.1: 8
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.4: 1
    • FCS_COP.1: 7
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
  • FIA:
    • FIA_UAU.1: 1
    • FIA_UAU.1.1: 2
    • FIA_UID.1: 2
  • FMT:
    • FMT_MOF.1: 22
    • FMT_MOF.1.1: 2
    • FMT_MSA.2: 1
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 3
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.ASCOPE: 3
    • A.DYNMIC: 3
    • A.ITNET: 1
    • A.LOCATE: 3
    • A.MANAGE: 2
    • A.NOEVIL: 3
    • A.NOTRST: 2
    • A.NOTRUST: 1
    • A.PROTCT: 3
  • O:
    • O.ACCESS: 10
    • O.AU: 1
    • O.AUDITS: 10
    • O.CREDEN: 4
    • O.E: 2
    • O.EADMIN: 6
    • O.EXPORT: 4
    • O.I: 2
    • O.IDANLZ: 7
    • O.IDAUTH: 21
    • O.IDSCAN: 7
    • O.IDSENS: 7
    • O.INSTAL: 5
    • O.INTEGR: 5
    • O.INTROP: 4
    • O.OFLOWS: 4
    • O.PERSON: 6
    • O.PHYCAL: 8
    • O.PR: 1
    • O.PROTCT: 10
    • O.RESPON: 3
  • T:
    • T.COMDIS: 3
    • T.COMINT: 3
    • T.EXPOSE: 4
    • T.FACCNT: 3
    • T.FALACT: 3
    • T.FALASC: 3
    • T.FALREC: 3
    • T.IMPCON: 3
    • T.INADVE: 3
    • T.INFLUX: 3
    • T.LOSSOF: 3
    • T.MISACT: 3
    • T.MISUSE: 3
    • T.NOHALT: 3
    • T.PRIVIL: 3
    • T.SCNCFG: 3
    • T.SCNMLC: 3
    • T.SCNVUL: 3
  • A:
    • A.AUDIT_ALARM: 1
    • A.AUDIT_BACKUP: 3
    • A.DOMAIN_SEPARATION: 1
    • A.NO_BYPASS: 3
    • A.NO_EVIL: 1
    • A.PHYSICAL: 3
    • A.SECURE_COMMS: 1
    • A.SECURE_UPDATES: 3
  • O:
    • O.ADMIN_GUIDANCE: 5
    • O.ADMIN_ROLE: 4
    • O.AUDIT_GEN: 1
    • O.AUDIT_GENERATION: 5
    • O.AUDIT_PROTECT: 4
    • O.AUDIT_REVIEW: 5
    • O.CONFIGURATION_IDEN: 1
    • O.CONFIGURATION_IDENTIFI-: 1
    • O.CONFIGURATION_IDENTIFICATIO: 3
    • O.CONFIGURATION_IDENTIFICATION: 2
    • O.CORRECT_TSF_OPERATI: 1
    • O.CORRECT_TSF_OPERATION: 5
    • O.CRYPTOGRAPHY: 4
    • O.DOCUMENTED_DESIGN: 7
    • O.MANAGE: 5
    • O.PARTIAL_FUNCTIONAL_: 1
    • O.PARTIAL_FUNCTIONAL_TEST: 3
    • O.PARTIAL_FUNCTIONAL_TESTING: 2
    • O.PARTIAL_SELF_PROTEC: 1
    • O.PARTIAL_SELF_PROTECTION: 4
    • O.VIRUS: 6
    • O.VULNERABILITY_ANALY: 1
    • O.VULNERABILITY_ANALYSIS: 2
    • O.VULNERABILITY_ANALYSIS_TEST: 3
  • OE:
    • OE.AUDIT_ALARM: 4
    • OE.AUDIT_BACKUP: 3
    • OE.AUDIT_STORAGE: 3
    • OE.DISPLAY_BANNER: 3
    • OE.DOMAIN_SEPARATIO: 1
    • OE.DOMAIN_SEPARATION: 4
    • OE.NO_BYPASS: 5
    • OE.NO_EVIL: 3
    • OE.PHYSICAL: 3
    • OE.RESIDUAL_: 1
    • OE.RESIDUAL_INFORMATI: 1
    • OE.RESIDUAL_INFORMATION: 4
    • OE.SECURE_COMMS: 3
    • OE.SECURE_UPDATES: 3
    • OE.TIME_STAMPS: 5
    • OE.TOE_ACCESS: 5
  • T:
    • T.ACCIDENTAL_ADMIN_: 1
    • T.ACCIDENTAL_ADMIN_ERROR: 3
    • T.AUDFUL: 1
    • T.AUDITFUL: 2
    • T.AUDIT_: 2
    • T.MASQUERADE: 1
    • T.POOR_DESIGN: 3
    • T.POOR_IMPLEMENTATIO: 1
    • T.POOR_IMPLEMENTATION: 1
    • T.POOR_TEST: 3
    • T.RESIDUAL_DATA: 1
    • T.TSF_COMPROMISE: 3
    • T.UNATTENDED_: 1
    • T.UNATTENDED_SESSION: 1
    • T.UNIDENTIFIED_ACTIONS: 3
    • T.VIRUS: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
pdf_data/st_keywords/crypto_protocol
  • PGP:
    • PGP: 1
  • TLS:
    • SSL:
      • SSL: 2
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
pdf_data/st_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
  • FIPS:
    • FIPS 140-2: 8
    • FIPS 180-2: 1
  • ISO:
    • ISO/IEC 15408: 2
pdf_data/st_metadata
  • /Author: CCTL
  • /CreationDate: D:20050525111943-04'00'
  • /Creator: Acrobat PDFMaker 5.0 for Word
  • /ModDate: D:20050525112204-03'00'
  • /Producer: Acrobat Distiller 5.0.5 (Windows)
  • /Title: Sourcefire Security Target
  • pdf_file_size_bytes: 1670374
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different