This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Lexmark MX432, MX522, MX622, MX721, MX722, MX822, MX826, MX931, CX622,CX625, CX730, CX735, CX820, CX825, CX860, CX930, CX931, CX942, CX943, and CX944 MFPs with TPM, Fax and Hard Drive with firmware version 081.234 586-EWA |
Cisco Firepower Threat Defense (FTD) 6.4 with FMC and AnyConnect NSCIB-CC-0259553-CR |
|
---|---|---|
name | Lexmark MX432, MX522, MX622, MX721, MX722, MX822, MX826, MX931, CX622,CX625, CX730, CX735, CX820, CX825, CX860, CX930, CX931, CX942, CX943, and CX944 MFPs with TPM, Fax and Hard Drive with firmware version 081.234 | Cisco Firepower Threat Defense (FTD) 6.4 with FMC and AnyConnect |
category | Multi-Function Devices | Boundary Protection Devices and Systems |
scheme | CA | NL |
not_valid_after | 24.05.2028 | 07.10.2027 |
not_valid_before | 24.05.2023 | 07.10.2022 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/586-EWA%20CT%20v1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-22-0259553-Cert.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/586%20EWA%20CR%20v1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0259553-CR-1.0.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/586%20EWA%20Security%20Target%20v1.19.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-0259553-st-v1.0.pdf |
manufacturer | Lexmark International, Inc. | Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134-1706 USA |
manufacturer_web | https://www.lexmark.com/ | https://www.cisco.com |
security_level | {} | EAL4+, ALC_FLR.2 |
dgst | ef7b2cb152266ca1 | 202ed3e27c6dde49 |
heuristics/cert_id | 586-EWA | NSCIB-CC-0259553-CR |
heuristics/cert_lab | CANADA | |
heuristics/cpe_matches | cpe:2.3:o:lexmark:cx825_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx622:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx722_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx522:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx942:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx730:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx822_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx432:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx822:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx820:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:cx622_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:x860:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx931:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:cx820_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx825:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx826:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx721_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx735:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx722:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx944:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:cx625_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx931:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx522_firmware:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx826_firmware:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:cx860_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx943:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx721:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx930:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx860:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx625:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx86:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx622:-:*:*:*:*:*:*:* | cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.3:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.5:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.9:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.15:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.1:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.8:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.11:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.18:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.10:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.7:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.2:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.1:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.12:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.13:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0:*:*:*:*:*:*:*, cpe:2.3:o:cisco:firepower_threat_defense:6.4.0.10:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.17:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.6:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.14:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.4:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.16:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower:6.4.0:*:*:*:*:*:*:* |
heuristics/related_cves | CVE-2021-44735, CVE-2021-44737, CVE-2021-44734, CVE-2023-22960, CVE-2022-29850, CVE-2021-44738, CVE-2018-15520, CVE-2018-17944, CVE-2023-23560 | CVE-2021-34764, CVE-2021-34762, CVE-2023-20247, CVE-2021-40114, CVE-2021-34793, CVE-2023-20083, CVE-2021-1223, CVE-2021-40117, CVE-2021-1224, CVE-2020-3564, CVE-2020-3533, CVE-2023-20063, CVE-2020-3306, CVE-2020-3514, CVE-2020-3554, CVE-2021-1493, CVE-2021-34756, CVE-2019-12695, CVE-2019-1970, CVE-2022-20746, CVE-2022-20713, CVE-2021-34783, CVE-2023-20245, CVE-2020-3452, CVE-2021-1236, CVE-2022-20854, CVE-2019-12673, CVE-2022-20745, CVE-2020-3254, CVE-2020-3179, CVE-2022-20940, CVE-2022-20742, CVE-2021-34761, CVE-2021-34755, CVE-2022-20934, CVE-2020-3285, CVE-2022-20949, CVE-2020-3550, CVE-2021-34754, CVE-2021-34787, CVE-2023-20256, CVE-2021-1501, CVE-2020-3549, CVE-2020-3305, CVE-2021-40125, CVE-2020-3188, CVE-2023-44487, CVE-2021-34781, CVE-2021-1256, CVE-2022-20730, CVE-2019-1981, CVE-2021-1573, CVE-2019-12674, CVE-2020-3352, CVE-2020-3315, CVE-2021-34763, CVE-2020-3191, CVE-2021-44228, CVE-2020-3580, CVE-2022-20946, CVE-2022-20760, CVE-2023-20269, CVE-2022-20947, CVE-2020-3528, CVE-2024-20353, CVE-2021-34794, CVE-2020-3565, CVE-2020-3555, CVE-2019-12675, CVE-2019-12678, CVE-2019-1978, CVE-2022-20767, CVE-2020-3195, CVE-2023-20275, CVE-2019-12698, CVE-2020-3253, CVE-2020-3304, CVE-2022-20729, CVE-2020-3259, CVE-2021-40116, CVE-2021-34791, CVE-2024-20388, CVE-2020-3436, CVE-2020-3303, CVE-2019-12694, CVE-2022-20759, CVE-2020-3196, CVE-2021-34790, CVE-2019-12676, CVE-2020-3186, CVE-2020-3572, CVE-2019-1980, CVE-2020-3529, CVE-2022-20757, CVE-2020-3187, CVE-2020-3561, CVE-2023-20086, CVE-2020-3577, CVE-2020-3317, CVE-2021-40118, CVE-2021-1495, CVE-2024-20359, CVE-2019-1669, CVE-2020-3255, CVE-2023-20095, CVE-2020-3563, CVE-2022-20715, CVE-2021-34792, CVE-2022-20928 |
heuristics/extracted_sars | ADV_FSP.1, ASE_ECD.1, ASE_TSS.1, ASE_CCL.1, ASE_SPD.1, ALC_CMS.1, ASE_REQ.1, ALC_CMC.1, AGD_OPE.1, ASE_INT.1, AVA_VAN.1, AGD_PRE.1, ATE_IND.1, ASE_OBJ.1 | ALC_FLR.2, ALC_CMC.4, ADV_IMP.1, AVA_VAN.3, ATE_FUN.1, ATE_DPT.2, ALC_LCD.1, ATE_IND.2, AGD_OPE.1, ADV_TDS.3, ATE_COV.2, ADV_FSP.4, ALC_TAT.1, AGD_PRE.1, ALC_DVS.1, ALC_CMS.4, ADV_ARC.1, ALC_DEL.1 |
heuristics/extracted_versions | 081.234 | 6.4 |
heuristics/scheme_data |
|
|
heuristics/protection_profiles | b2cfec7a92fa2940 | {} |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf | {} |
pdf_data/cert_filename | 586-EWA CT v1.0.pdf | NSCIB-CC-22-0259553-Cert.pdf |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | 586 EWA CR v1.0.pdf | NSCIB-CC-0259553-CR-1.0.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | 586 EWA Security Target v1.19.pdf | nscib-cc-0259553-st-v1.0.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |