Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
EPSON LM-C6000/LM-C5000/LM-C4000/AM-C6000/AM-C5000/AM-C4000 with FAX1.00
JISEC-CC-CRP-C0803-01-2023
Apple macOS 13 Ventura: FileVault
CCEVS-VR-VID-11348-2023
name EPSON LM-C6000/LM-C5000/LM-C4000/AM-C6000/AM-C5000/AM-C4000 with FAX1.00 Apple macOS 13 Ventura: FileVault
category Multi-Function Devices Other Devices and Systems
scheme JP US
not_valid_after 14.12.2028 04.12.2025
not_valid_before 14.12.2023 04.12.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0803_eimg.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11348-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0803_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11348-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0803_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11348-st.pdf
manufacturer SEIKO EPSON CORPORATION Apple Inc.
manufacturer_web https://www.epson.com/ https://www.apple.com/
security_level EAL2, ALC_FLR.2 {}
dgst f6aad6ac7a2f5f2d 530a0b614fc36a82
heuristics/cert_id JISEC-CC-CRP-C0803-01-2023 CCEVS-VR-VID-11348-2023
heuristics/cert_lab [] US
heuristics/cpe_matches {} cpe:2.3:o:apple:macos:13.1:*:*:*:*:*:*:*, cpe:2.3:o:apple:macos:13.0.0:*:*:*:*:*:*:*, cpe:2.3:o:apple:macos:13.4:*:*:*:*:*:*:*, cpe:2.3:o:apple:macos:13.7:*:*:*:*:*:*:*, cpe:2.3:o:apple:macos:13.3:*:*:*:*:*:*:*, cpe:2.3:o:apple:macos:13.6:*:*:*:*:*:*:*, cpe:2.3:o:apple:macos:13.0:*:*:*:*:*:*:*, cpe:2.3:o:apple:macos:13.3.3:*:*:*:*:*:*:*, cpe:2.3:o:apple:macos:13.2:*:*:*:*:*:*:*, cpe:2.3:o:apple:macos:13.6.6:*:*:*:*:*:*:*, cpe:2.3:o:apple:macos:13.5:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2024-44260, CVE-2024-44144, CVE-2024-44255, CVE-2025-24138, CVE-2024-54550, CVE-2023-42823, CVE-2024-44151, CVE-2023-32356, CVE-2025-24262, CVE-2022-42867, CVE-2024-54533, CVE-2023-42858, CVE-2025-24159, CVE-2025-31215, CVE-2025-24113, CVE-2025-24142, CVE-2024-27791, CVE-2023-28204, CVE-2024-40817, CVE-2024-23225, CVE-2023-42853, CVE-2023-42854, CVE-2023-40384, CVE-2025-24116, CVE-2023-40541, CVE-2025-31232, CVE-2022-46705, CVE-2024-44184, CVE-2024-23283, CVE-2023-32379, CVE-2023-32399, CVE-2024-27856, CVE-2024-40809, CVE-2023-40386, CVE-2024-44291, CVE-2023-32367, CVE-2023-28195, CVE-2024-44146, CVE-2025-24109, CVE-2023-32418, CVE-2022-46710, CVE-2024-40786, CVE-2024-44170, CVE-2024-44188, CVE-2023-32435, CVE-2023-28178, CVE-2023-42943, CVE-2024-40846, CVE-2025-31260, CVE-2024-40791, CVE-2024-23261, CVE-2023-27950, CVE-2023-4750, CVE-2024-27836, CVE-2024-44153, CVE-2025-24271, CVE-2025-31259, CVE-2024-44198, CVE-2023-41968, CVE-2023-32377, CVE-2024-23257, CVE-2024-40827, CVE-2024-40844, CVE-2024-44248, CVE-2024-44281, CVE-2024-40806, CVE-2023-40410, CVE-2024-54547, CVE-2023-32441, CVE-2023-32387, CVE-2023-38261, CVE-2025-24101, CVE-2024-54527, CVE-2024-27876, CVE-2024-44164, CVE-2023-4733, CVE-2024-40860, CVE-2022-46691, CVE-2024-40770, CVE-2023-27968, CVE-2023-40433, CVE-2025-31195, CVE-2024-27853, CVE-2023-41078, CVE-2024-44165, CVE-2025-30470, CVE-2023-32409, CVE-2023-23529, CVE-2022-46696, CVE-2024-54557, CVE-2023-32363, CVE-2023-27961, CVE-2025-31212, CVE-2024-27809, CVE-2023-32415, CVE-2024-44132, CVE-2024-44129, CVE-2023-32398, CVE-2023-40396, CVE-2025-24124, CVE-2023-42919, CVE-2024-40775, CVE-2023-35984, CVE-2023-38593, CVE-2023-40388, CVE-2023-40413, CVE-2024-27800, CVE-2024-23222, CVE-2023-32357, CVE-2023-38599, CVE-2023-28198, CVE-2023-23534, CVE-2023-42937, CVE-2024-54528, CVE-2025-24127, CVE-2025-31218, CVE-2025-24121, CVE-2023-23497, CVE-2023-32426, CVE-2025-24097, CVE-2023-22809, CVE-2023-32421, CVE-2023-32407, CVE-2023-32410, CVE-2025-24173, CVE-2025-30445, CVE-2022-42856, CVE-2025-30463, CVE-2024-54513, CVE-2025-31233, CVE-2024-40795, CVE-2023-32383, CVE-2024-54463, CVE-2024-44181, CVE-2023-42869, CVE-2023-42922, CVE-2024-44253, CVE-2023-42829, CVE-2023-38421, CVE-2023-41995, CVE-2022-46692, CVE-2024-54486, CVE-2023-42947, CVE-2025-24251, CVE-2025-31226, CVE-2025-31223, CVE-2024-44154, CVE-2024-40833, CVE-2024-54515, CVE-2023-42929, CVE-2023-23499, CVE-2023-32385, CVE-2023-27935, CVE-2023-40416, CVE-2023-32360, CVE-2025-31187, CVE-2023-28215, CVE-2023-40420, CVE-2023-40383, CVE-2023-40401, CVE-2023-41987, CVE-2023-42832, CVE-2025-31183, CVE-2024-40856, CVE-2024-40859, CVE-2023-40429, CVE-2023-23498, CVE-2024-40857, CVE-2024-40801, CVE-2023-23526, CVE-2025-24170, CVE-2024-54537, CVE-2024-23230, CVE-2024-44128, CVE-2023-36495, CVE-2023-42848, CVE-2024-44279, CVE-2023-32370, CVE-2024-54538, CVE-2024-27881, CVE-2023-32414, CVE-2024-54518, CVE-2023-40436, CVE-2024-23212, CVE-2024-54504, CVE-2023-27966, CVE-2023-38598, CVE-2023-40434, CVE-2023-23519, CVE-2024-44254, CVE-2024-54551, CVE-2023-41984, CVE-2023-38259, CVE-2023-23532, CVE-2024-44196, CVE-2023-28202, CVE-2024-44283, CVE-2024-23272, CVE-2024-27877, CVE-2023-41232, CVE-2023-41254, CVE-2022-46693, CVE-2024-40794, CVE-2023-42840, CVE-2024-27880, CVE-2023-32416, CVE-2023-28321, CVE-2024-27887, CVE-2024-27872, CVE-2023-38590, CVE-2025-24102, CVE-2023-40411, CVE-2022-42840, CVE-2023-32402, CVE-2024-27827, CVE-2024-40804, CVE-2022-46700, CVE-2022-32943, CVE-2025-24136, CVE-2023-27929, CVE-2024-44189, CVE-2024-23269, CVE-2023-27946, CVE-2024-44216, CVE-2024-27855, CVE-2025-24129, CVE-2023-28200, CVE-2023-42977, CVE-2023-41070, CVE-2025-24092, CVE-2023-41980, CVE-2025-31237, CVE-2025-24131, CVE-2024-44296, CVE-2023-23533, CVE-2022-42852, CVE-2023-28205, CVE-2024-44267, CVE-2023-23543, CVE-2023-42872, CVE-2024-44280, CVE-2024-23266, CVE-2025-24172, CVE-2024-27859, CVE-2023-27963, CVE-2023-40417, CVE-2024-40848, CVE-2024-44224, CVE-2023-42924, CVE-2024-54516, CVE-2024-44301, CVE-2024-27831, CVE-2023-36862, CVE-2024-23268, CVE-2023-32362, CVE-2025-31200, CVE-2024-54519, CVE-2025-24148, CVE-2025-24137, CVE-2025-31242, CVE-2024-27863, CVE-2025-24140, CVE-2025-24108, CVE-2025-24223, CVE-2023-41990, CVE-2022-29181, CVE-2023-27937, CVE-2023-28207, CVE-2024-54543, CVE-2024-54478, CVE-2023-32432, CVE-2023-42931, CVE-2024-40799, CVE-2022-42864, CVE-2023-32386, CVE-2024-44169, CVE-2023-32412, CVE-2023-40452, CVE-2022-3970, CVE-2023-40424, CVE-2023-42925, CVE-2023-32439, CVE-2024-44155, CVE-2023-38594, CVE-2023-27943, CVE-2023-42933, CVE-2023-38586, CVE-2024-23216, CVE-2023-42936, CVE-2023-42914, CVE-2025-30456, CVE-2023-35983, CVE-2024-23237, CVE-2025-31257, CVE-2022-42841, CVE-2023-32378, CVE-2024-23265, CVE-2024-23254, CVE-2023-38596, CVE-2023-40412, CVE-2022-42854, CVE-2023-42835, CVE-2024-44152, CVE-2023-32654, CVE-2025-24281, CVE-2025-24185, CVE-2024-40796, CVE-2025-24258, CVE-2022-46690, CVE-2023-27951, CVE-2023-40406, CVE-2022-42845, CVE-2024-54474, CVE-2023-28213, CVE-2024-54507, CVE-2024-44190, CVE-2023-32401, CVE-2023-32364, CVE-2023-38608, CVE-2024-40828, CVE-2024-44145, CVE-2023-23496, CVE-2023-42873, CVE-2024-40823, CVE-2024-40793, CVE-2024-27824, CVE-2023-42870, CVE-2025-31206, CVE-2023-23516, CVE-2023-29497, CVE-2024-54505, CVE-2023-4752, CVE-2023-38614, CVE-2024-23201, CVE-2023-27932, CVE-2023-42934, CVE-2023-28180, CVE-2024-27875, CVE-2022-46699, CVE-2023-40407, CVE-2025-30442, CVE-2024-40837, CVE-2024-54514, CVE-2023-41066, CVE-2024-40798, CVE-2024-54468, CVE-2024-27871, CVE-2024-23229, CVE-2025-31201, CVE-2025-24130, CVE-2024-44278, CVE-2023-27933, CVE-2022-42859, CVE-2023-41979, CVE-2023-42918, CVE-2024-44158, CVE-2025-31191, CVE-2025-24099, CVE-2024-40771, CVE-2025-24204, CVE-2023-32388, CVE-2023-40385, CVE-2024-40780, CVE-2024-44123, CVE-2024-40787, CVE-2025-24274, CVE-2023-27965, CVE-2024-44183, CVE-2024-44232, CVE-2023-27941, CVE-2023-32392, CVE-2022-42858, CVE-2023-32369, CVE-2025-24146, CVE-2024-44122, CVE-2023-42871, CVE-2024-44160, CVE-2024-23236, CVE-2023-37450, CVE-2025-24151, CVE-2024-44308, CVE-2024-40816, CVE-2024-27817, CVE-2023-42889, CVE-2024-44179, CVE-2024-54559, CVE-2023-32444, CVE-2022-42863, CVE-2024-23234, CVE-2024-54508, CVE-2025-31209, CVE-2024-44236, CVE-2025-30465, CVE-2024-54522, CVE-2025-31238, CVE-2023-38601, CVE-2023-35990, CVE-2024-23203, CVE-2024-44305, CVE-2024-40785, CVE-2023-42935, CVE-2023-41079, CVE-2023-27949, CVE-2022-43552, CVE-2024-54467, CVE-2023-41067, CVE-2024-44172, CVE-2024-44125, CVE-2025-30461, CVE-2023-23506, CVE-2023-23493, CVE-2024-44256, CVE-2025-24206, CVE-2024-54466, CVE-2023-27948, CVE-2023-40427, CVE-2023-32389, CVE-2022-46701, CVE-2025-24174, CVE-2024-40774, CVE-2022-42916, CVE-2023-32408, CVE-2023-32394, CVE-2024-27861, CVE-2023-38612, CVE-2025-30460, CVE-2024-44176, CVE-2024-54471, CVE-2024-40834, CVE-2023-23495, CVE-2022-43454, CVE-2024-27869, CVE-2023-42856, CVE-2025-31213, CVE-2024-44264, CVE-2023-23505, CVE-2025-31194, CVE-2024-23231, CVE-2025-31219, CVE-2024-44159, CVE-2024-23278, CVE-2023-32397, CVE-2025-24222, CVE-2023-38603, CVE-2024-54476, CVE-2023-42974, CVE-2022-46716, CVE-2024-27798, CVE-2024-44297, CVE-2024-44234, CVE-2023-32423, CVE-2025-24106, CVE-2025-24162, CVE-2022-46718, CVE-2023-40409, CVE-2023-23518, CVE-2024-44218, CVE-2024-54506, CVE-2023-38611, CVE-2024-44215, CVE-2023-4781, CVE-2023-41065, CVE-2025-31197, CVE-2024-54534, CVE-2025-31203, CVE-2023-32368, CVE-2025-24184, CVE-2024-40789, CVE-2024-40825, CVE-2024-44163, CVE-2023-23513, CVE-2025-24248, CVE-2025-24128, CVE-2022-42843, CVE-2025-24160, CVE-2024-27805, CVE-2023-38595, CVE-2024-40845, CVE-2025-24155, CVE-2024-44287, CVE-2024-54491, CVE-2024-54490, CVE-2023-42982, CVE-2023-42876, CVE-2024-23206, CVE-2023-28320, CVE-2024-44156, CVE-2024-54465, CVE-2023-42957, CVE-2024-27792, CVE-2025-24163, CVE-2022-48610, CVE-2024-44227, CVE-2023-42899, CVE-2025-30457, CVE-2023-28192, CVE-2023-32413, CVE-2025-31240, CVE-2023-41063, CVE-2023-38602, CVE-2024-44185, CVE-2023-42836, CVE-2023-23522, CVE-2022-42853, CVE-2023-42896, CVE-2021-39537, CVE-2023-4734, CVE-2023-27942, CVE-2024-44222, CVE-2024-40781, CVE-2023-32376, CVE-2024-44187, CVE-2024-40815, CVE-2025-31246, CVE-2023-32433, CVE-2023-40450, CVE-2023-42831, CVE-2025-24122, CVE-2024-27860, CVE-2024-40838, CVE-2024-23207, CVE-2025-31245, CVE-2023-23539, CVE-2023-32390, CVE-2024-44239, CVE-2023-41074, CVE-2024-27885, CVE-2025-24242, CVE-2023-42841, CVE-2024-44177, CVE-2023-27928, CVE-2024-1580, CVE-2023-38580, CVE-2024-40822, CVE-2023-40391, CVE-2023-40421, CVE-2022-46704, CVE-2025-24115, CVE-2023-28209, CVE-2024-44130, CVE-2023-23508, CVE-2025-24086, CVE-2024-44257, CVE-2024-44265, CVE-2024-54531, CVE-2024-54477, CVE-2024-23245, CVE-2024-27849, CVE-2023-42881, CVE-2022-32919, CVE-2023-41975, CVE-2024-44161, CVE-2023-41991, CVE-2024-54542, CVE-2022-42847, CVE-2025-24252, CVE-2023-23514, CVE-2023-28197, CVE-2025-24156, CVE-2025-24112, CVE-2024-44269, CVE-2024-23224, CVE-2023-28212, CVE-2024-40792, CVE-2024-27826, CVE-2024-40832, CVE-2025-24145, CVE-2025-24176, CVE-2023-40422, CVE-2024-27823, CVE-2023-38410, CVE-2025-31202, CVE-2024-44191, CVE-2024-54523, CVE-2023-27952, CVE-2023-40449, CVE-2023-41064, CVE-2025-30458, CVE-2023-38565, CVE-2025-24149, CVE-2023-42887, CVE-2024-40843, CVE-2024-54499, CVE-2024-44237, CVE-2025-24134, CVE-2023-42891, CVE-2022-46703, CVE-2023-32429, CVE-2024-27810, CVE-2024-44247, CVE-2023-42860, CVE-2024-44275, CVE-2023-28214, CVE-2025-24152, CVE-2024-44203, CVE-2024-44270, CVE-2023-42875, CVE-2023-32371, CVE-2023-36854, CVE-2025-24161, CVE-2024-27843, CVE-2024-54530, CVE-2024-23267, CVE-2024-54469, CVE-2024-44289, CVE-2025-31220, CVE-2024-40855, CVE-2023-42826, CVE-2024-40821, CVE-2024-40842, CVE-2023-23524, CVE-2024-54473, CVE-2023-23512, CVE-2024-40788, CVE-2023-28211, CVE-2025-24126, CVE-2024-40800, CVE-2023-40528, CVE-2022-24836, CVE-2023-42949, CVE-2025-24093, CVE-2023-32428, CVE-2023-35993, CVE-2022-42855, CVE-2024-54536, CVE-2024-40803, CVE-2024-44175, CVE-2024-54509, CVE-2024-44294, CVE-2024-54489, CVE-2022-42861, CVE-2024-44174, CVE-2024-40829, CVE-2023-27947, CVE-2024-54501, CVE-2024-44244, CVE-2025-24179, CVE-2024-44168, CVE-2024-23247, CVE-2023-40395, CVE-2023-27954, CVE-2024-23204, CVE-2022-46695, CVE-2023-32442, CVE-2024-27884, CVE-2023-42862, CVE-2024-54520, CVE-2024-54549, CVE-2024-54497, CVE-2024-54498, CVE-2023-40393, CVE-2025-24153, CVE-2024-40847, CVE-2024-44199, CVE-2024-23209, CVE-2024-54488, CVE-2024-54558, CVE-2025-24118, CVE-2023-32393, CVE-2023-28187, CVE-2023-38604, CVE-2023-41992, CVE-2023-42892, CVE-2023-28182, CVE-2023-28191, CVE-2023-32373, CVE-2025-30448, CVE-2023-32420, CVE-2024-44166, CVE-2025-31239, CVE-2023-32404, CVE-2025-24100, CVE-2023-27969, CVE-2024-40783, CVE-2024-40779, CVE-2024-44197, CVE-2023-28190, CVE-2023-39434, CVE-2023-41994, CVE-2024-44273, CVE-2025-24157, CVE-2023-40402, CVE-2023-40430, CVE-2024-40810, CVE-2023-27930, CVE-2023-32443, CVE-2023-23523, CVE-2023-27956, CVE-2024-54479, CVE-2023-41071, CVE-2024-44192, CVE-2025-30440, CVE-2023-40398, CVE-2023-38424, CVE-2022-46689, CVE-2023-23501, CVE-2024-54529, CVE-2024-44282, CVE-2025-24144, CVE-2023-41981, CVE-2023-23530, CVE-2022-42866, CVE-2023-42893, CVE-2023-38597, CVE-2023-28201, CVE-2023-40441, CVE-2023-32445, CVE-2024-54493, CVE-2024-44225, CVE-2023-32384, CVE-2025-24107, CVE-2024-27799, CVE-2023-40454, CVE-2024-27796, CVE-2001-0102, CVE-2023-42830, CVE-2023-23527, CVE-2023-23510, CVE-2025-24139, CVE-2024-23299, CVE-2023-42959, CVE-2023-42948, CVE-2024-44137, CVE-2023-27931, CVE-2023-28189, CVE-2024-54658, CVE-2025-31262, CVE-2025-31182, CVE-2023-38610, CVE-2023-34352, CVE-2024-54484, CVE-2025-31236, CVE-2024-54541, CVE-2023-23504, CVE-2024-44208, CVE-2024-44135, CVE-2023-28188, CVE-2023-34425, CVE-2024-23296, CVE-2025-31235, CVE-2025-24164, CVE-2023-32372, CVE-2023-38605, CVE-2025-24111, CVE-2023-27957, CVE-2023-42930, CVE-2023-23537, CVE-2023-40397, CVE-2025-24120, CVE-2023-42833, CVE-2024-23264, CVE-2023-39233, CVE-2023-42866, CVE-2024-27883, CVE-2023-40448, CVE-2024-44201, CVE-2022-46697, CVE-2023-42913, CVE-2023-40414, CVE-2023-23500, CVE-2024-27840, CVE-2023-27953, CVE-2023-38133, CVE-2025-31241, CVE-2025-30471, CVE-2023-28181, CVE-2024-54564, CVE-2025-24245, CVE-2024-23275, CVE-2024-27789, CVE-2024-54492, CVE-2022-42837, CVE-2023-42952, CVE-2023-27955, CVE-2023-40426, CVE-2023-42894, CVE-1999-0590, CVE-2024-23274, CVE-2023-38564, CVE-2025-24123, CVE-2024-44240, CVE-2023-23517, CVE-2023-42958, CVE-2023-40392, CVE-2023-41075, CVE-2024-44182, CVE-2023-38571, CVE-2023-40423, CVE-2025-24085, CVE-2023-42834, CVE-2025-31222, CVE-2023-32382, CVE-2023-32411, CVE-2025-24094, CVE-2025-31217, CVE-2024-54510, CVE-2022-42842, CVE-2024-54500, CVE-2024-40776, CVE-2023-32405, CVE-2025-24270, CVE-2023-42932, CVE-2024-44178, CVE-2024-40831, CVE-2024-23286, CVE-2023-42849, CVE-2022-42915, CVE-2023-28179, CVE-2023-32422, CVE-2023-40438, CVE-2023-32734, CVE-2023-38592, CVE-2022-46720, CVE-2023-42859, CVE-2023-42886, CVE-2024-27806, CVE-2024-40850, CVE-2024-54539, CVE-2025-31247, CVE-2024-44300, CVE-2024-23227, CVE-2024-27847, CVE-2024-40778, CVE-2023-23536, CVE-2025-24150, CVE-2025-24114, CVE-2025-31221, CVE-2023-32358, CVE-2025-31234, CVE-2023-32352, CVE-2025-24135, CVE-2024-40835, CVE-2023-41077, CVE-2023-2953, CVE-2023-40439, CVE-2023-27936, CVE-2023-23507, CVE-2023-42828, CVE-2025-31224, CVE-2023-27934, CVE-2023-42942, CVE-2025-31196, CVE-2024-44186, CVE-2023-40400, CVE-2023-37285, CVE-2023-40455, CVE-2023-27962, CVE-2025-24117, CVE-2023-27940, CVE-2024-40866, CVE-2025-31250, CVE-2025-30467, CVE-2023-41996, CVE-2024-54560, CVE-2024-54494, CVE-2024-40826, CVE-2025-30464, CVE-2024-40797, CVE-2022-42865, CVE-2023-40390, CVE-2023-23520, CVE-2025-24239, CVE-2025-24103, CVE-2023-28319, CVE-2024-44131, CVE-2023-38616, CVE-2023-23502, CVE-2023-42865, CVE-2023-38615, CVE-2025-24189, CVE-2023-42961, CVE-2023-32361, CVE-2025-24087, CVE-2025-24154, CVE-2023-30774, CVE-2024-54525, CVE-2025-31204, CVE-2024-54517, CVE-2022-42862, CVE-2023-28322, CVE-2024-54565, CVE-2024-44284, CVE-2025-24143, CVE-2024-40864, CVE-2024-54526, CVE-2022-48618, CVE-2023-42970, CVE-2023-23525, CVE-2024-40861, CVE-2023-32375, CVE-2023-42884, CVE-2024-40818, CVE-2023-32380, CVE-2025-31208, CVE-2025-24158, CVE-2023-23538, CVE-2023-32403, CVE-2023-28206, CVE-2023-38572, CVE-2023-34241, CVE-2025-31205, CVE-2024-44167, CVE-2023-27939, CVE-2024-44205, CVE-2024-44206, CVE-2023-28210, CVE-2024-40802, CVE-2024-44233, CVE-2022-42839, CVE-2024-44149, CVE-2023-27944, CVE-2023-41986, CVE-2023-28199, CVE-2023-32434, CVE-2023-40403, CVE-2023-41073, CVE-2023-23503, CVE-2023-38600, CVE-2023-32400, CVE-2023-42969, CVE-2023-28826, CVE-2024-23270, CVE-2025-31249, CVE-2023-38403, CVE-2023-23535, CVE-2024-44295, CVE-2023-40432, CVE-2024-27873, CVE-2023-40437, CVE-2023-38607, CVE-2022-32942, CVE-2024-27858, CVE-2023-23542, CVE-2023-38609, CVE-2024-27882, CVE-2022-46698, CVE-2025-30453, CVE-2024-44148, CVE-2023-28208, CVE-2023-42888, CVE-2024-44302, CVE-2024-4558, CVE-2025-31258, CVE-2024-27795, CVE-2025-24183, CVE-2024-44126, CVE-2024-40784, CVE-2023-32396, CVE-2023-41060, CVE-2024-44213, CVE-2025-24191, CVE-2024-23276, CVE-2025-31244, CVE-2024-54475, CVE-2023-23531, CVE-2023-42877, CVE-2023-32366, CVE-2024-40854, CVE-2023-41993, CVE-2024-44133, CVE-2024-27802, CVE-2023-38606, CVE-2023-32395, CVE-2024-44134, CVE-2023-27958, CVE-2024-40807, CVE-2023-32436, CVE-2025-30462, CVE-2023-35074, CVE-2023-40389, CVE-2025-24201, CVE-2023-40399, CVE-2023-23511, CVE-2023-37448, CVE-2024-54546, CVE-2023-38258, CVE-2025-31251, CVE-2023-32438, CVE-2023-32381, CVE-2025-24178, CVE-2023-41076, CVE-2023-32391, CVE-2023-32355, CVE-2025-31256, CVE-2023-42844, CVE-2023-42838, CVE-2025-24169, CVE-2025-24282, CVE-2025-24096, CVE-2023-38425
heuristics/extracted_sars ADV_ARC.1, ATE_COV.1, ALC_CMS.2, ADV_FSP.2, ALC_CMC.2, ASE_OBJ.2, ALC_FLR.2, ASE_SPD.1, ATE_IND.2, AGD_PRE.1, ALC_DEL.1, ATE_FUN.1, AVA_VAN.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1, ASE_INT.1, ASE_CCL.1, ADV_TDS.1, AGD_OPE.1 ASE_SPD.1, ASE_TSS.1, ADV_FSP.1, AGD_PRE.1, AVA_VAN.1, ASE_ECD.1, ASE_CCL.1, ASE_OBJ.1, ATE_IND.1, ASE_REQ.1, ALC_CMS.1, AGD_OPE.1, ASE_INT.1, ALC_CMC.1
heuristics/extracted_versions 1.00 13
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0803
  • certification_date: 01.12.2023
  • claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • enhanced:
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0803
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000001dch-att/c0803_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a multifunction peripheral (MFP) that has the functions, such as copy, print, scan, FAX, document storage and retrieval. This TOE provides Security Functions required for "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for MFPs. TOE security functionality The security functions of this TOE are as follows: Identification and Authentication Function Function to identify and authenticate users. Access Control Function for TOE Function Function to restrict available functions for each authorized user. Document Access Control Function Function to allow only the authorized users and the administrator to access to stored documents. Residual Data Overwrite Function Function to overwrite and delete unnecessary document data in the HDD and the Flash ROM. Network Protection Function Function to protect communication data using encryption communication protocols. Security Management Function Function to allow only the administrator to manage security functions. Self-Test Function Function to verify the integrity of executable codes at startup. Audit Log Function Function to record audit logs related to security events and allow only the administrator to view that log.
    • evaluation_facility: Information Technology Security Center, Evaluation Department
    • product: EPSON LM-C6000/LM-C5000/LM-C4000/ AM-C6000/AM-C5000/AM-C4000 with FAX
    • product_type: Multifunction Peripheral
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000001dch-att/c0803_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000001dch-att/c0803_est.pdf
    • toe_version: 1.00
    • vendor: SEIKO EPSON CORPORATION
  • expiration_date:
  • supplier: SEIKO EPSON CORPORATION
  • toe_japan_name: EPSON LM-C6000 / LM-C5000 / LM-C4000 / AM-C6000 / AM-C5000 / AM-C4000 with FAX 1.00
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0803_it2837.html
  • toe_overseas_name: EPSON LM-C6000 / LM-C5000 / LM-C4000 / AM-C6000 / AM-C5000 / AM-C4000 with FAX 1.00
heuristics/protection_profiles 43ce79b420f23a00 9b51621665ff7223, 52d782dbb1cd05bd
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_FDE_AA_V2.0E.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_FDE_EE_V2.0E.pdf
pdf_data/cert_filename c0803_eimg.pdf st_vid11348-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0803-01-2023: 1
  • US:
    • CCEVS-VR-VID11348-2023: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 1
  • atsec:
    • atsec: 1
pdf_data/cert_metadata
  • /Author:
  • /CreationDate: D:20240118104935+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 17
  • /Keywords:
  • /ModDate: D:20240118105338+09'00'
  • /Producer: Adobe PDF Library 17.11.238
  • /SourceModified: D:20240118014904
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 234774
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /CreationDate: D:20231204154940-05'00'
  • /ModDate: D:20231204154940-05'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 187388
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename c0803_erpt.pdf st_vid11348-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID11348-2023
    • cert_item: Apple macOS 13 Ventura: FileVault
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0803-01-2023: 1
  • US:
    • CCEVS-VR-VID11348-2023: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 4
    • T.DOC: 4
    • T.FUNC: 2
    • T.PROT: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 13
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 4
  • atsec:
    • atsec: 5
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 12
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 2
pdf_data/report_keywords/hash_function
  • PBKDF:
    • PBKDF2: 3
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 4
  • IKE:
    • IKE: 1
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 2
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • XEX:
    • XEX: 1
  • XTS:
    • XTS: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • FIPS:
    • FIPS PUB 186-4: 2
  • ISO:
    • ISO/IEC 18033-3: 2
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38F: 1
pdf_data/report_metadata
  • /Author:
  • /CreationDate: D:20240117103337+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 17
  • /ModDate: D:20240117103448+09'00'
  • /Producer: Adobe PDF Library 17.11.238
  • /SourceModified: D:20240117012203
  • pdf_file_size_bytes: 395424
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 33
  • /Author: Stephan Mueller
  • /CreationDate: D:20231204153323-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20231204153323-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Title: Validation Report for Apple
  • pdf_file_size_bytes: 512530
  • pdf_hyperlinks: https://www.niap-ccevs.org/MMO/Product/st_vid11348-agd.pdf
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
pdf_data/st_filename c0803_est.pdf st_vid11348-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 5
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 16
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 10
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 6
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC.1: 30
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 24
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 6
    • FDP_ACF.1.4: 2
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_RIP.1: 7
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 15
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 6
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 24
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 26
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 24
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 26
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 33
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 12
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 11
    • FPT_STM.1.1: 1
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FCS:
    • FCS_AFA_EXT.1: 6
    • FCS_AFA_EXT.1.1: 2
    • FCS_AFA_EXT.2: 5
    • FCS_AFA_EXT.2.1: 1
    • FCS_CKM.1: 17
    • FCS_CKM.1.1: 2
    • FCS_CKM.4: 30
    • FCS_CKM.4.1: 4
    • FCS_CKM_EXT: 2
    • FCS_CKM_EXT.4: 10
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.6: 6
    • FCS_CKM_EXT.6.1: 1
    • FCS_COP.1: 75
    • FCS_COP.1.1: 7
    • FCS_KDF_EXT.1: 5
    • FCS_KDF_EXT.1.1: 1
    • FCS_KYC_EXT.1: 6
    • FCS_KYC_EXT.1.1: 1
    • FCS_KYC_EXT.1.2: 1
    • FCS_KYC_EXT.2: 6
    • FCS_KYC_EXT.2.1: 1
    • FCS_KYC_EXT.2.2: 1
    • FCS_PCC_EXT.1: 9
    • FCS_PCC_EXT.1.1: 1
    • FCS_RBG_EXT.1: 11
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SNI_EXT.1: 5
    • FCS_SNI_EXT.1.1: 1
    • FCS_SNI_EXT.1.2: 1
    • FCS_SNI_EXT.1.3: 2
    • FCS_VAL_EXT: 13
    • FCS_VAL_EXT.1: 7
  • FDP:
    • FDP_DSK_EXT.1: 5
    • FDP_DSK_EXT.1.1: 1
    • FDP_DSK_EXT.1.2: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_SMF: 10
    • FMT_SMF.1: 4
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 5
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FUA_EXT.1: 7
    • FPT_FUA_EXT.1.1: 1
    • FPT_FUA_EXT.1.2: 1
    • FPT_FUA_EXT.1.3: 1
    • FPT_FUA_EXT.1.4: 1
    • FPT_KYP_EXT: 10
    • FPT_KYP_EXT.1: 6
    • FPT_KYP_EXT.1.1: 2
    • FPT_PWR_EXT: 19
    • FPT_PWR_EXT.1: 10
    • FPT_PWR_EXT.1.1: 1
    • FPT_PWR_EXT.2: 5
    • FPT_PWR_EXT.2.1: 1
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 12
    • FPT_TUD_EXT.1: 8
    • FPT_TUD_EXT.1.2: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.USER: 3
  • D:
    • D.CONF: 11
    • D.DOC: 42
    • D.FUNC: 26
    • D.PROT: 8
  • O:
    • O.AUDIT: 5
    • O.AUDIT_ACCESS: 4
    • O.AUDIT_STORAGE: 4
    • O.CONF: 10
    • O.DOC: 10
    • O.FUNC: 5
    • O.INTERFACE: 5
    • O.PROT: 5
    • O.SOFTWARE: 5
    • O.USER: 11
  • OE:
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 2
    • OE.AUDIT_STORAGE: 2
    • OE.INTERFACE: 3
    • OE.PHISICAL: 1
    • OE.PHYSICAL: 2
    • OE.USER: 12
  • T:
    • T.CONF: 6
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
  • A:
    • A.PASSWORD_STRENGTH: 1
    • A.PHYSICAL: 1
    • A.PLATFORM_STATE: 1
    • A.SECURE_STATE: 1
    • A.SINGLE_USE_ET: 1
    • A.STRONG_CRYPTO: 1
    • A.TRUSTED_CHANNEL: 1
  • OE:
    • OE.INITIAL_DRIVE_STATE: 1
    • OE.PASSPHRASE_STRENGTH: 1
    • OE.PHYSICAL: 1
    • OE.PLATFORM_STATE: 1
    • OE.SINGLE_USE_ET: 1
    • OE.STRONG_ENVIRONMENT_CRYPTO: 1
    • OE.TRAINED_USERS: 1
    • OE.TRUSTED_CHANNEL: 1
  • T:
    • T.CHOSEN_PLAINTEXT: 1
    • T.KEYSPACE_EXHAUST: 1
    • T.KNOWN_PLAINTEXT: 1
    • T.UNAUTHORIZED_DATA_ACCESS: 1
    • T.UNAUTHORIZED_FIRMWARE_MODIFY: 1
    • T.UNAUTHORIZED_FIRMWARE_UPDATE: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 7
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 33
      • AES-: 4
      • AES-256: 2
  • constructions:
    • MAC:
      • HMAC: 7
      • HMAC-SHA-256: 7
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 11
  • RSA:
    • RSA 4096: 3
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF: 1
    • PBKDF2: 10
  • SHA:
    • SHA2:
      • SHA-256: 17
      • SHA-512: 9
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 5
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 19
  • TLS:
    • TLS:
      • TLS: 1
  • VPN:
    • VPN: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 14
  • RNG:
    • RBG: 4
  • TRNG:
    • TRNG: 9
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 9
  • XEX:
    • XEX: 2
  • XTS:
    • XTS: 8
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-521: 12
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 186-4: 4
    • FIPS 197: 2
    • FIPS PUB 186-4: 5
  • ISO:
    • ISO/IEC 10116: 8
    • ISO/IEC 14888-3: 1
    • ISO/IEC 18033-3: 3
    • ISO/IEC 9796-2: 1
    • ISO/IEC18033-3: 1
  • NIST:
    • NIST SP 800-132: 2
    • NIST SP 800-38A: 1
    • NIST SP 800-38F: 2
    • NIST SP 800-90A: 2
  • PKCS:
    • PKCS #1: 1
    • PKCS 1: 2
pdf_data/st_metadata
  • /CreationDate: D:20240111155300+09'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20240111155300+09'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 1539224
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 71
state/cert/convert_garbage False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different