This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
| S3SSE2A (S3SSE2A_20240430) ( ANSSI-CC-2024/26) ANSSI-CC-2024/26 |
Cisco Integrated Services Router 4400 Series (ISR-4400), IOS XE 3.13.0 CCEVS-VR-VID-10600-2015 |
|
|---|---|---|
| name | S3SSE2A (S3SSE2A_20240430) ( ANSSI-CC-2024/26) | Cisco Integrated Services Router 4400 Series (ISR-4400), IOS XE 3.13.0 |
| category | ICs, Smart Cards and Smart Card-Related Devices and Systems | Data Protection |
| scheme | FR | US |
| status | active | archived |
| not_valid_after | 22.07.2029 | 12.02.2017 |
| not_valid_before | 22.07.2024 | 12.02.2015 |
| cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2024_26fr.pdf | |
| report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_26fr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10600-vr.pdf |
| st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible-ANSSI-CC-2024_26en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10600-st.pdf |
| manufacturer | Samsung Electronics Co., Ltd. | Cisco Systems, Inc. |
| manufacturer_web | https://www.samsung.com | https://www.cisco.com |
| security_level | EAL6+, ASE_TSS.2 | {} |
| dgst | ec832cac23bb8b42 | 27d44663acfc4c32 |
| heuristics/cert_id | ANSSI-CC-2024/26 | CCEVS-VR-VID-10600-2015 |
| heuristics/cert_lab | [] | US |
| heuristics/cpe_matches | {} | cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*, cpe:2.3:o:cisco:ios_xe:3.13.0as:*:*:*:*:*:*:* |
| heuristics/related_cves | {} | CVE-2024-20312, CVE-2019-1752, CVE-2023-20109, CVE-2023-20097, CVE-2021-34705, CVE-2020-3215, CVE-2017-3850, CVE-2025-20199, CVE-2017-12239, CVE-2016-6386, CVE-2016-6378, CVE-2017-12228, CVE-2016-1409, CVE-2021-34699, CVE-2017-6606, CVE-2021-1620, CVE-2018-0193, CVE-2020-3230, CVE-2023-20076, CVE-2021-34729, CVE-2016-6384, CVE-2020-3209, CVE-2024-20271, CVE-2019-1761, CVE-2025-20174, CVE-2020-3200, CVE-2017-6742, CVE-2022-20920, CVE-2017-6736, CVE-2024-20433, CVE-2023-20056, CVE-2020-3204, CVE-2025-20171, CVE-2016-1384, CVE-2017-3857, CVE-2017-6738, CVE-2025-20201, CVE-2018-0188, CVE-2020-3444, CVE-2021-1616, CVE-2025-20170, CVE-2018-0184, CVE-2020-3213, CVE-2018-0182, CVE-2020-3201, CVE-2018-0185, CVE-2025-20175, CVE-2018-0195, CVE-2016-6381, CVE-2017-6665, CVE-2018-0189, CVE-2021-1384, CVE-2025-20198, CVE-2017-6737, CVE-2018-0186, CVE-2025-20176, CVE-2025-20200, CVE-2024-20414, CVE-2020-3516, CVE-2020-3217, CVE-2017-6739, CVE-2016-6415, CVE-2019-1745, CVE-2017-6741, CVE-2021-1446, CVE-2018-0194, CVE-2021-1625, CVE-2018-0190, CVE-2024-20436, CVE-2020-3226, CVE-2019-16009, CVE-2017-6663, CVE-2016-6393, CVE-2017-3856, CVE-2017-6740, CVE-2025-20173, CVE-2025-20197, CVE-2014-2146, CVE-2023-20186, CVE-2024-20311, CVE-2020-3228, CVE-2017-6770, CVE-2025-20338, CVE-2023-20080, CVE-2021-1382, CVE-2021-1398, CVE-2019-1748, CVE-2025-20169, CVE-2024-20309, CVE-2022-20694, CVE-2025-20172, CVE-2016-6380, CVE-2024-20308, CVE-2014-3409, CVE-2016-6382, CVE-2023-44487, CVE-2019-1737, CVE-2017-3849, CVE-2018-0183, CVE-2017-6743 |
| heuristics/extracted_sars | ASE_CCL.1, ASE_OBJ.2, ALC_CMC.5, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ASE_REQ.2, ATE_FUN.2, ADV_IMP.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ALC_TAT.3, ALC_LCD.1, ALC_DVS.2, ADV_TDS.5, ASE_SPD.1, ATE_COV.3, ADV_INT.3, ASE_TSS.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ADV_SPM.1, ADV_ARC.1 | AGD_PRE.1, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ALC_CMS.1, AVA_VAN.1, ADV_FSP.1 |
| heuristics/extracted_versions | 26, 2024 | 3.13.0 |
| heuristics/report_references/directly_referenced_by | ANSSI-CC-2025/38, ANSSI-CC-2025/20 | {} |
| heuristics/report_references/indirectly_referenced_by | ANSSI-CC-2025/38, ANSSI-CC-2025/20 | {} |
| heuristics/scheme_data |
|
|
| heuristics/st_references/directly_referenced_by | ANSSI-CC-2025/20 | {} |
| heuristics/st_references/indirectly_referenced_by | ANSSI-CC-2025/20 | {} |
| heuristics/protection_profiles | cf0f01bcd7be3e9c | bb67fb1b4f10e7a5, ac9abe3d5c5a31f0 |
| protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_vpn_gw_ep_v1.1.pdf |
| pdf_data/cert_filename | Certificat-ANSSI-CC-2024_26fr.pdf | |
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr | ||
| pdf_data/cert_keywords/cc_claims | ||
| pdf_data/cert_keywords/vendor | ||
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto | ||
| pdf_data/cert_keywords/asymmetric_crypto | ||
| pdf_data/cert_keywords/pq_crypto | ||
| pdf_data/cert_keywords/hash_function | ||
| pdf_data/cert_keywords/crypto_scheme | ||
| pdf_data/cert_keywords/crypto_protocol | ||
| pdf_data/cert_keywords/randomness | ||
| pdf_data/cert_keywords/cipher_mode | ||
| pdf_data/cert_keywords/ecc_curve | ||
| pdf_data/cert_keywords/crypto_engine | ||
| pdf_data/cert_keywords/tls_cipher_suite | ||
| pdf_data/cert_keywords/crypto_library | ||
| pdf_data/cert_keywords/vulnerability | ||
| pdf_data/cert_keywords/side_channel_analysis | ||
| pdf_data/cert_keywords/technical_report_id | ||
| pdf_data/cert_keywords/device_model | ||
| pdf_data/cert_keywords/tee_name | ||
| pdf_data/cert_keywords/os_name | ||
| pdf_data/cert_keywords/cplc_data | ||
| pdf_data/cert_keywords/ic_data_group | ||
| pdf_data/cert_keywords/standard_id | ||
| pdf_data/cert_keywords/javacard_version | ||
| pdf_data/cert_keywords/javacard_api_const | ||
| pdf_data/cert_keywords/javacard_packages | ||
| pdf_data/cert_keywords/certification_process | ||
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename | ANSSI-CC-2024_26fr.pdf | st_vid10600-vr.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_metadata |
|
|
| pdf_data/st_filename | Cible-ANSSI-CC-2024_26en.pdf | st_vid10600-st.pdf |
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
|
|
| pdf_data/st_keywords/cc_sfr |
|
|
| pdf_data/st_keywords/cc_claims |
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_metadata |
|
|
| state/cert/convert_ok | True | False |
| state/cert/download_ok | True | False |
| state/cert/extract_ok | True | False |
| state/cert/pdf_hash | Different | Different |
| state/cert/txt_hash | Different | Different |
| state/report/pdf_hash | Different | Different |
| state/report/txt_hash | Different | Different |
| state/st/pdf_hash | Different | Different |
| state/st/txt_hash | Different | Different |