This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Lexmark MX432, MX522, MX622, MX721, MX722, MX822, MX826, MX931, CX622,CX625, CX730, CX735, CX820, CX825, CX860, CX930, CX931, CX942, CX943, and CX944 MFPs with TPM, Fax and Hard Drive with firmware version 081.234 586-EWA |
Splunk Enterprise 8.1 CCEVS-VR-VID-11108-2021 |
|
---|---|---|
name | Lexmark MX432, MX522, MX622, MX721, MX722, MX822, MX826, MX931, CX622,CX625, CX730, CX735, CX820, CX825, CX860, CX930, CX931, CX942, CX943, and CX944 MFPs with TPM, Fax and Hard Drive with firmware version 081.234 | Splunk Enterprise 8.1 |
category | Multi-Function Devices | Other Devices and Systems |
scheme | CA | US |
status | active | archived |
not_valid_after | 24.05.2028 | 26.01.2023 |
not_valid_before | 24.05.2023 | 26.01.2021 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/586-EWA%20CT%20v1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11108-ci.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/586%20EWA%20CR%20v1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11108-vr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/586%20EWA%20Security%20Target%20v1.19.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11108-st.pdf |
manufacturer | Lexmark International, Inc. | Splunk, Inc. |
manufacturer_web | https://www.lexmark.com/ | https://www.splunk.com/ |
dgst | ef7b2cb152266ca1 | 5183b777ff463c5c |
heuristics/cert_id | 586-EWA | CCEVS-VR-VID-11108-2021 |
heuristics/cert_lab | CANADA | US |
heuristics/cpe_matches | cpe:2.3:h:lexmark:cx820:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx86:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx721:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx721_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx432:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx625:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx722_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx822:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx931:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx942:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:cx825_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx622:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:x860:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx943:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx826_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx931:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx622:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx722:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx522:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx822_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx730:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx522_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx825:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx735:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx860:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:cx625_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx944:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:cx622_firmware:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:cx820_firmware:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:cx860_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx930:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx826:-:*:*:*:*:*:*:* | cpe:2.3:a:splunk:splunk:8.1.1:*:*:*:enterprise:*:*:*, cpe:2.3:a:splunk:splunk:8.1.6:*:*:*:enterprise:*:*:*, cpe:2.3:a:splunk:splunk:8.1.0:*:*:*:enterprise:*:*:*, cpe:2.3:a:splunk:splunk:8.1.4:*:*:*:enterprise:*:*:*, cpe:2.3:a:splunk:splunk:8.1.7:*:*:*:enterprise:*:*:*, cpe:2.3:a:splunk:splunk:8.1.12:*:*:*:enterprise:*:*:*, cpe:2.3:a:splunk:splunk:8.1.13:*:*:*:enterprise:*:*:*, cpe:2.3:a:splunk:splunk:8.1.5:*:*:*:enterprise:*:*:*, cpe:2.3:a:splunk:splunk:8.1.2:*:*:*:enterprise:*:*:* |
heuristics/related_cves | CVE-2021-44738, CVE-2018-17944, CVE-2021-44734, CVE-2023-22960, CVE-2023-23560, CVE-2022-29850, CVE-2018-15520, CVE-2021-44735, CVE-2021-44737 | CVE-2023-32710, CVE-2021-33845, CVE-2023-22933, CVE-2022-32151, CVE-2022-43567, CVE-2022-43568, CVE-2022-32155, CVE-2022-43563, CVE-2023-22935, CVE-2022-32154, CVE-2023-32708, CVE-2023-32714, CVE-2022-43562, CVE-2023-22937, CVE-2022-43564, CVE-2023-32709, CVE-2023-32716, CVE-2022-32152, CVE-2023-22938, CVE-2022-43565, CVE-2023-32706, CVE-2023-32712, CVE-2022-43566, CVE-2021-26253, CVE-2023-32717, CVE-2022-26889, CVE-2022-43572, CVE-2022-43571, CVE-2022-43561, CVE-2023-22936, CVE-2023-40598, CVE-2023-22931, CVE-2023-22940, CVE-2023-22934, CVE-2022-32158, CVE-2022-32153, CVE-2022-43570, CVE-2023-22939, CVE-2023-32707, CVE-2022-27183, CVE-2022-43569, CVE-2023-32711, CVE-2021-31559, CVE-2022-32156, CVE-2022-37438, CVE-2021-3422, CVE-2023-22942, CVE-2022-37439, CVE-2022-32157, CVE-2023-22941 |
heuristics/extracted_sars | ASE_ECD.1, ASE_TSS.1, ALC_CMS.1, AVA_VAN.1, ATE_IND.1, ASE_CCL.1, AGD_PRE.1, ASE_INT.1, ALC_CMC.1, ASE_OBJ.1, ADV_FSP.1, AGD_OPE.1, ASE_SPD.1, ASE_REQ.1 | ALC_CMS.1, ASE_REQ.1, AVA_VAN.1, ATE_IND.1, ASE_CCL.1, AGD_PRE.1, ALC_TSU_EXT.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, ADV_FSP.1, AGD_OPE.1, ASE_TSS.1, ASE_ECD.1 |
heuristics/extracted_versions | 081.234 | 8.1 |
heuristics/scheme_data |
|
|
heuristics/protection_profiles | b2cfec7a92fa2940 | c40ae795865a0dba, a1cc4a4e079f4d1f |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_APP_v1.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf |
pdf_data/cert_filename | 586-EWA CT v1.0.pdf | st_vid11108-ci.pdf |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | 586 EWA CR v1.0.pdf | st_vid11108-vr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | 586 EWA Security Target v1.19.pdf | st_vid11108-st.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |