name |
Lexmark MX432, MX522, MX622, MX721, MX722, MX822, MX826, MX931, CX622,CX625, CX730, CX735, CX820, CX825, CX860, CX930, CX931, CX942, CX943, and CX944 MFPs with TPM, Fax and Hard Drive with firmware version 081.234 |
Xerox D136 Copier/Printer Controller+PS ROM Ver. 1.200.15 |
category |
Multi-Function Devices |
Multi-Function Devices |
scheme |
CA |
JP |
status |
active |
archived |
not_valid_after |
24.05.2028 |
28.09.2023 |
not_valid_before |
24.05.2023 |
28.09.2018 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/586-EWA%20CT%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0619_eimg.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/586%20EWA%20CR%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0619_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/586%20EWA%20Security%20Target%20v1.19.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0619_est.pdf |
manufacturer |
Lexmark International, Inc. |
Xerox Corporation |
manufacturer_web |
https://www.lexmark.com/ |
https://www.xerox.com |
security_level |
{} |
EAL2+, ALC_CMC.2 |
dgst |
ef7b2cb152266ca1 |
bcacf791c1b68053 |
heuristics/cert_id |
586-EWA |
JISEC-CC-CRP-C0619-01-2018 |
heuristics/cert_lab |
CANADA |
[] |
heuristics/cpe_matches |
cpe:2.3:o:lexmark:mx522_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx931:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx622:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx622:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx722_firmware:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx822_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx722:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:cx622_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx730:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx931:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx942:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:cx860_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx822:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx721:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx820:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx721_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx825:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx522:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx735:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:x860:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx432:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:cx825_firmware:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx826_firmware:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:cx820_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx826:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx860:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx625:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx943:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx86:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx944:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:cx625_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx930:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
CVE-2021-44735, CVE-2021-44738, CVE-2023-23560, CVE-2021-44734, CVE-2022-29850, CVE-2021-44737, CVE-2018-17944, CVE-2018-15520, CVE-2023-22960 |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
081.234 |
1.200.15 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- certification_date: 24.05.2023
- level: PP_HCD_V1.0
- product: Lexmark MX432, MX522, MX622, MX721, MX722, MX822, MX826, MX931, CX622, CX625, CX730, CX735, CX820, CX825, CX860, CX930, CX931, CX942, CX943, and CX944 MFPs with TPM, Fax and Hard Drive with firmware version 081.234
- vendor: Lexmark International, Inc.
|
- cert_id: JISEC-CC-CRP-C0619
- certification_date: 01.09.2018
- claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- enhanced:
- assurance_level: EAL2 Augmented by ALC_FLR.2
- cc_version: 3.1 Release4
- cert_id: JISEC-CC-CRP-C0619
- cert_link: https://www.ipa.go.jp/en/security/c0619_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, and scan. The TOE is assumed to be used at general office, from the control panel, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE Security functions To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Hard Disk Data OverwriteA function to overwrite and delete the document data in the internal HDD. - Hard Disk Data EncryptionA function to encrypt the document data before the data is stored into the internal HDD. - User AuthenticationA function to identify and authenticate users and permit the authorized users to use functions. This function also allows only owners of document data and system administrators to handle document data. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Information Flow SecurityA function to restrict the unpermitted communication between the TOE interface and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Xerox D136 Copier/Printer
- product_type: Multi-Function Device
- protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- report_link: https://www.ipa.go.jp/en/security/c0619_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0619_est.pdf
- toe_version: Controller+PS ROM Ver. 1.200.15
- vendor: Xerox Corporation
- expiration_date: 01.10.2023
- supplier: Xerox Corporation
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0619_it7651.html
- toe_overseas_name: Xerox D136 Copier/Printer Controller+PS ROM Ver. 1.200.15
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
b2cfec7a92fa2940 |
43ce79b420f23a00 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf |
pdf_data/cert_filename |
586-EWA CT v1.0.pdf |
c0619_eimg.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- JP:
- JISEC-CC-CRP-C0619-01-2018: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate: D:20230606073958-04'00'
- /Creator:
- /Keywords:
- /ModDate: D:20230606074014-05'00'
- /Producer: Foxit PDF Editor Printer Version 12.1.0.15345
- /Subject:
- /Title:
- pdf_file_size_bytes: 367719
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20181004142528+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20181004142725+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 86194
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
586 EWA CR v1.0.pdf |
c0619_erpt.pdf |
pdf_data/report_frontpage |
- CA:
- cert_id: 586-EWA
- cert_lab: CANADA
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- JISEC-CC-CRP-C0619-01-2018: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL2: 6
- EAL2 augmented: 2
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- T:
- T.CONF: 4
- T.DOC: 4
- T.FUNC: 2
- T.PROT: 2
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /CreationDate: D:20181220165622+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20181220165715+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 393296
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 37
|
pdf_data/st_filename |
586 EWA Security Target v1.19.pdf |
c0619_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL2: 4
- EAL2 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 1
- FAU_GEN: 13
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 4
- FAU_SAR.2.1: 1
- FAU_STG.1: 6
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 4
- FAU_STG.4.1: 1
- FAU_STG_EXT: 3
- FAU_STG_EXT.1: 6
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 25
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 10
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 3
- FCS_CKM_EXT.4: 18
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 60
- FCS_COP.1.1: 5
- FCS_KDF_EXT.1: 3
- FCS_KYC_EXT: 4
- FCS_KYC_EXT.1: 7
- FCS_KYC_EXT.1.1: 2
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 18
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 2
- FCS_SMC_EXT.1: 3
- FCS_SSH_EXT.1: 7
- FCS_TLS_EXT.1: 6
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 7
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DSK_EXT: 2
- FDP_DSK_EXT.1: 8
- FDP_DSK_EXT.1.1: 2
- FDP_DSK_EXT.1.2: 3
- FDP_FXS_EXT: 2
- FDP_FXS_EXT.1: 7
- FDP_FXS_EXT.1.1: 2
- FDP_IFC.1: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 4
- FDP_RIP.1: 8
- FDP_RIP.1.1: 2
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_PMG: 4
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_PSK_EXT: 2
- FIA_PSK_EXT.1: 9
- FIA_PSK_EXT.1.1: 2
- FIA_PSK_EXT.1.2: 3
- FIA_PSK_EXT.1.3: 2
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 4
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 4
- FMT_MOF.1.1: 1
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 6
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 4
- FMT_MTD.1.1: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FPT:
- FPT_KYP_EXT: 2
- FPT_KYP_EXT.1: 7
- FPT_KYP_EXT.1.1: 2
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 7
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 7
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FTA:
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 10
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 11
- FTP_TRP.1.1: 3
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 15
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FAU_SAR: 1
- FAU_SAR.1: 10
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 9
- FAU_SAR.2.1: 1
- FAU_STG: 1
- FAU_STG.1: 11
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 9
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 2
- FCS_COP: 1
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 3
- FDP_ACC.1: 74
- FDP_ACC.1.1: 6
- FDP_ACF.1: 67
- FDP_ACF.1.1: 6
- FDP_ACF.1.2: 6
- FDP_ACF.1.3: 6
- FDP_ACF.1.4: 6
- FDP_IFC: 1
- FDP_IFC.1: 6
- FDP_IFF: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 21
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU: 3
- FIA_UAU.1: 8
- FIA_UAU.2: 12
- FIA_UAU.2.1: 1
- FIA_UAU.7: 10
- FIA_UAU.7.1: 1
- FIA_UID: 4
- FIA_UID.1: 13
- FIA_UID.2: 20
- FIA_UID.2.1: 1
- FIA_USB.1: 9
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 11
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 76
- FMT_MSA.1.1: 6
- FMT_MSA.3: 68
- FMT_MSA.3.1: 6
- FMT_MSA.3.2: 6
- FMT_MTD.1: 21
- FMT_MTD.1.1: 2
- FMT_SMF.1: 33
- FMT_SMF.1.1: 1
- FMT_SMR.1: 37
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FDI_EXP: 3
- FPT_FDI_EXP.1: 16
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 10
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NETWORK: 2
- A.PHYSICAL: 2
- A.TRAINED_USERS: 2
- A.TRUSTED_ADMIN: 2
- D:
- O:
- O.ACCESS: 1
- O.ACCESS_: 1
- O.ACCESS_CONTROL: 10
- O.ADMIN_ROLES: 9
- O.AUDIT: 12
- O.COMMS_PROTECTION: 15
- O.FAX_NET_SEPARATION: 4
- O.IMAGE_OVERWRITE: 4
- O.KEY_MATERIAL: 4
- O.PURGE_DATA: 6
- O.STORAGE_ENCRYPTION: 9
- O.TSF_SELF_TEST: 4
- O.UPDATE_VERIFICATION: 5
- O.USER_AUTHORIZATION: 11
- OE:
- OE.ADMIN_TRAINING: 2
- OE.ADMIN_TRUST: 2
- OE.NETWORK_PROTECTION: 2
- OE.PHYSICAL_PROTECTION: 2
- OE.USER_TRAINING: 2
- OSP:
- T:
- T.NET_COMPROMISE: 1
- T.NET_COMRPOMISE: 1
- T.TSF_COMPROMISE: 2
- T.TSF_FAILURE: 2
- T.UNAUTHORIZED_ACCESS: 2
- T.UNAUTHORIZED_UPDATE: 2
|
- A:
- A.ACCESS: 3
- A.ADMIN: 6
- A.USER: 3
- D:
- D.CONF: 13
- D.DOC: 54
- D.FUNC: 17
- D.PROT: 4
- O:
- O.AUDIT: 8
- O.AUDIT_ACCESS: 10
- O.AUDIT_STORAGE: 9
- O.CIPHER: 8
- O.CONF: 16
- O.DOC: 16
- O.FUNC: 8
- O.INTERFACE: 8
- O.PROT: 8
- O.SOFTWARE: 8
- O.USER: 14
- OE:
- OE.ADMIN: 6
- OE.AUDIT: 4
- OE.AUDIT_ACCESS: 2
- OE.AUDIT_STORAGE: 1
- OE.INTERFACE: 3
- OE.PHYISCAL: 1
- OE.PHYSICAL: 2
- OE.USER: 12
- T:
- T.CONF: 6
- T.DOC: 6
- T.FUNC: 3
- T.PROT: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 8
- SHA-384: 4
- SHA-512: 1
- SHA256: 3
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 9
- IKEv1: 11
- IKEv2: 8
- IPsec:
- SSH:
- TLS:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 2
- malfunction: 5
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 180-3: 1
- FIPS PUB 186-4: 1
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- ISO:
- ISO/IEC 10116: 2
- ISO/IEC 18031:2011: 3
- ISO/IEC 18033-3: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-56B: 1
- NIST SP 800-90A: 5
- NIST SP 800-90B: 1
- RFC:
- RFC 3164: 1
- RFC 3602: 6
- RFC 4106: 2
- RFC 4109: 2
- RFC 4301: 2
- RFC 4303: 2
- RFC 4304: 2
- RFC 4868: 2
- RFC 5282: 1
- RFC2409: 1
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- RFC:
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- ConfidentialDocument:
- When this function is set to [enabled], normal printing is disabled. It enables a highly-confidential document output without being mixed with other documents. CentreWare Internet Services (CWIS) CWIS is a: 1
|
pdf_data/st_metadata |
- /Author: jmarshall
- /CreationDate: D:20230518105207-04'00'
- /ModDate: D:20230606084134-05'00'
- /Producer: Microsoft: Print To PDF
- /Title: Microsoft Word - Lexmark MFP Fax HD Security Target 119
- pdf_file_size_bytes: 1817638
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 107
|
- /CreationDate: D:20181220110632+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20181220113201+09'00'
- /Producer: Acrobat Distiller 10.1.16 (Windows)
- /Subject: Security Target
- /Title: Xerox D136 Copier/Printer
- pdf_file_size_bytes: 738511
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 124
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |