This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Samsung Galaxy Devices on Android 10 - Spring CCEVS-VR-11042-2020 |
Microsoft Exchange Server 2010 SP1 Enterprise (English) 64-bit Certificate Number: 2011/72 |
|
---|---|---|
name | Samsung Galaxy Devices on Android 10 - Spring | Microsoft Exchange Server 2010 SP1 Enterprise (English) 64-bit |
category | Mobility | Other Devices and Systems |
scheme | US | AU |
not_valid_after | 30.04.2022 | 13.07.2017 |
not_valid_before | 30.04.2020 | 16.02.2011 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11042-ci.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11042-vr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFS-T024%20CR%20SP1.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11042-st.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/E14_EAL4_ASE_1.0.pdf |
manufacturer | Samsung Electronics Co., Ltd. | Microsoft Corporation |
manufacturer_web | https://www.samsung.com | https://www.microsoft.com |
security_level | {} | EAL4+, ALC_FLR.3 |
dgst | f628c89a64a0e7b5 | be0c7f67702ea646 |
heuristics/cert_id | CCEVS-VR-11042-2020 | Certificate Number: 2011/72 |
heuristics/cert_lab | US | [] |
heuristics/cpe_matches | cpe:2.3:o:samsung:android:10.0:smr-jan-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-oct-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jan-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-may-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jun-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-dec-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-aug-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-may-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-dec-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-mar-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-aug-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jul-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-oct-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-dec-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-apr-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jun-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-feb-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-nov-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-dec-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-nov-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-sep-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jun-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-mar-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-mar-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-apr-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jan-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-nov-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jul-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:-:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-oct-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-dec-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-oct-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-mar-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-nov-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-feb-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-feb-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-may-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-aug-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-apr-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jan-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-nov-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-feb-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jul-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jun-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-sep-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-apr-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jul-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-sep-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-may-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-sep-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-aug-2022-r1:*:*:*:*:*:* | cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_4:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp2:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_7:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_19:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_26:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_20:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_25:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_12:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_13:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_18:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_21:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_27:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_30:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_6:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_10:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_2:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_14:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_29:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_1:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_15:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp1:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_5:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_3:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup20:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_24:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_31:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_28:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_23:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_9:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_16:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_17:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_8:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_11:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_22:*:*:*:*:*:* |
heuristics/related_cves | CVE-2021-25369, CVE-2023-21430, CVE-2023-21436, CVE-2021-25394, CVE-2021-25370, CVE-2023-21429, CVE-2023-21425, CVE-2023-21437, CVE-2025-20934, CVE-2021-25489, CVE-2023-21441, CVE-2021-25337, CVE-2021-25487, CVE-2023-21426, CVE-2023-21421, CVE-2021-25395, CVE-2023-21420 | CVE-1999-1322, CVE-2019-0817, CVE-2013-0418, CVE-2018-8154, CVE-2014-6319, CVE-2019-1136, CVE-2018-8302, CVE-2021-26858, CVE-2013-5072, CVE-2019-0724, CVE-2012-4791, CVE-2020-0688, CVE-2021-26857, CVE-2016-0138, CVE-2019-1084, CVE-2020-17144, CVE-2018-0924, CVE-2018-8151, CVE-2000-0216, CVE-2018-0940, CVE-2017-8621 |
heuristics/extracted_sars | ALC_CMS.1, AGD_PRE.1, ADV_FSP.1, AVA_VAN.1, ALC_TSU_EXT.1, ATE_IND.1, ALC_CMC.1, AGD_OPE.1 | ADV_ARC.1, ATE_COV.2, ASE_TSS.1, AGD_OPE.1, ATE_DPT.1, ADV_IMP.1, ALC_FLR.3, ALC_DVS.1, ASE_REQ.2, ALC_TAT.1, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ALC_CMS.4, ASE_ECD.1, ADV_TDS.3, ALC_DEL.1, ASE_OBJ.2, AVA_VAN.3, ADV_FSP.4, ASE_INT.1, ASE_SPD.1, ATE_FUN.1, ALC_CMC.4, ALC_LCD.1 |
heuristics/extracted_versions | 10 | 2010, 64 |
heuristics/protection_profiles | df09b703c88c665a, c88af12926be2779, f4474c6c73660987 | {} |
maintenance_updates |
|
|
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v3.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vpn_cli_v2.1.pdf | {} |
pdf_data/cert_filename | st_vid11042-ci.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | st_vid11042-vr.pdf | EFS-T024 CR SP1.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | st_vid11042-st.pdf | E14_EAL4_ASE_1.0.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |