This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Lexmark MX721h, MX722h, MX822 and MX826 Multi-Function Printers with firmware version MXTGW.052.025 with Lexmark Secure Element (P/N 57X0185 383-4-464 |
McAfee Advanced Threat Defense 4.12 CCEVS-VR-11219-2021 |
|
---|---|---|
name | Lexmark MX721h, MX722h, MX822 and MX826 Multi-Function Printers with firmware version MXTGW.052.025 with Lexmark Secure Element (P/N 57X0185 | McAfee Advanced Threat Defense 4.12 |
category | Multi-Function Devices | Network and Network-Related Devices and Systems |
scheme | CA | US |
not_valid_after | 21.01.2024 | 14.12.2023 |
not_valid_before | 21.01.2019 | 14.12.2021 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-464%20CT%20v1.1e%20-%20original%20signed.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11219-ci.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-464%20CR%201.0e.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11219-vr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Lexmark%20HD%20MXTGW%20Security%20Target%2014.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11219-st.pdf |
manufacturer | Lexmark International, Inc. | McAfee, LLC. |
manufacturer_web | https://www.lexmark.com/ | https://www.mcafee.com/ |
dgst | f9ea05e0e8584782 | f0e97d81d5d403ca |
heuristics/cert_id | 383-4-464 | CCEVS-VR-11219-2021 |
heuristics/cert_lab | [] | US |
heuristics/cpe_matches | cpe:2.3:h:lexmark:mx822:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx822_firmware:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx826_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx721:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx722:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx826:-:*:*:*:*:*:*:* | {} |
heuristics/related_cves | CVE-2023-23560, CVE-2021-44735, CVE-2021-44738, CVE-2023-22960, CVE-2022-29850, CVE-2021-44734, CVE-2021-44737 | {} |
heuristics/extracted_sars | {} | ADV_FSP.1, AGD_PRE.1, AVA_VAN.1, ALC_CMS.1, AGD_OPE.1, ATE_IND.1, ALC_CMC.1 |
heuristics/extracted_versions | 052.025 | 4.12 |
heuristics/protection_profiles | b2cfec7a92fa2940 | 89f2a255423f4a20 |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf |
pdf_data/cert_filename | 383-4-464 CT v1.1e - original signed.pdf | st_vid11219-ci.pdf |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | 383-4-464 CR 1.0e.pdf | st_vid11219-vr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | st_vid11219-st.pdf | |
pdf_data/st_keywords/cc_cert_id | ||
pdf_data/st_keywords/cc_protection_profile_id | ||
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor | ||
pdf_data/st_keywords/eval_facility | ||
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto | ||
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine | ||
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability | ||
pdf_data/st_keywords/side_channel_analysis | ||
pdf_data/st_keywords/technical_report_id | ||
pdf_data/st_keywords/device_model | ||
pdf_data/st_keywords/tee_name | ||
pdf_data/st_keywords/os_name | ||
pdf_data/st_keywords/cplc_data | ||
pdf_data/st_keywords/ic_data_group | ||
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version | ||
pdf_data/st_keywords/javacard_api_const | ||
pdf_data/st_keywords/javacard_packages | ||
pdf_data/st_keywords/certification_process | ||
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | False | True |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/convert_ok | False | True |
state/st/download_ok | False | True |
state/st/extract_ok | False | True |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |