Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Lexmark MX421, MX521, MX622, MX721, MX722, MX725, CX622, CX625, CX725w/firmware 073.239 and Lexmark Secure Element (P/N 57X0185)
522-EWA-2020
Argus Command Center Web Portal Stable Version 2.1
ISCB-3-RPT-C115-CR-v1
name Lexmark MX421, MX521, MX622, MX721, MX722, MX725, CX622, CX625, CX725w/firmware 073.239 and Lexmark Secure Element (P/N 57X0185) Argus Command Center Web Portal Stable Version 2.1
category Multi-Function Devices Other Devices and Systems
scheme CA MY
not_valid_after 26.01.2026 23.06.2026
not_valid_before 26.01.2021 23.06.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/522%20EWA%202020%20CT%20no%20sig%20Eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C115-CERTIFICATE-v1.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/522%20EWA%202020%20CR.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C115-CR-v1.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/522%20EWA%202020%20Lexmark%20NoHD%20Security%20Target%2017.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019%20Certis%20Cisco%20–%20Argus%20CC%20EAL2%20%20Security%20Target%20[ASE]-v1.14%202.pdf
manufacturer Lexmark International, Inc. Certis CISCO Security Pte Ltd (Certis)
manufacturer_web https://www.lexmark.com/ https://www.certisgroup.com/
security_level {} EAL2
dgst fb6759770ff2ae8a c86ad5ef88d4cf8b
heuristics/cert_id 522-EWA-2020 ISCB-3-RPT-C115-CR-v1
heuristics/cpe_matches cpe:2.3:o:lexmark:cx622_firmware:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx521_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx421:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx722:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx421_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx721:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx521:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx622:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx721_firmware:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:cx625_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:mx725:-:*:*:*:*:*:*:*, cpe:2.3:o:lexmark:mx722_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx725:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx622:-:*:*:*:*:*:*:*, cpe:2.3:h:lexmark:cx625:-:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2021-44738, CVE-2023-23560, CVE-2021-44734, CVE-2022-29850, CVE-2021-44737, CVE-2021-44735, CVE-2023-22960 {}
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 073.239 2.1
heuristics/scheme_data
  • certification_date: 26.01.2021
  • level: PP_HCD_V1.0
  • product: Lexmark MX421, MX521, MX622, MX721, MX722, MX725, CX622, CX625, CX725 w/firmware 073.239 and Lexmark Secure Element (P/N 57X0185)
  • vendor: Lexmark International, Inc.
heuristics/protection_profiles b2cfec7a92fa2940 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf {}
pdf_data/cert_filename 522 EWA 2020 CT no sig Eng.pdf ISCB-5-CERT-C115-CERTIFICATE-v1.pdf
pdf_data/cert_keywords/cc_cert_id
  • CA:
    • 522-EWA-2020: 1
pdf_data/cert_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
pdf_data/cert_metadata
  • /CreationDate: D:20190122115136-04'00'
  • /Creator: Adobe Illustrator CC 22.0 (Windows)
  • /ModDate: D:20210128112935-05'00'
  • /Producer: Adobe PDF library 15.00
  • /Title: cyber-centre-product-evaluation-certificate-e-bg
  • pdf_file_size_bytes: 1640650
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20210630131348Z
  • /Creator: Word
  • /ModDate: D:20210630215915+08'00'
  • /Producer: macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext
  • pdf_file_size_bytes: 205722
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 522 EWA 2020 CR.pdf ISCB-5-RPT-C115-CR-v1.pdf
pdf_data/report_frontpage
  • CA:
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 522-EWA-2020: 1
  • MY:
    • ISCB-3-RPT-C115-CR-v1: 35
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL2: 6
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACF.1: 1
  • FIA:
    • FIA_AFL.1: 2
    • FIA_ATD.1: 5
    • FIA_SOS.1: 3
    • FIA_SOS.2: 2
    • FIA_UAU.1: 2
    • FIA_UID.1: 7
  • FMT:
    • FMT_MSA.1: 7
    • FMT_SMF.1: 3
    • FMT_SMR.1: 3
  • FTP:
    • FTP_ITC.1: 17
    • FTP_TRP.1: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.CLOUD: 1
    • A.CONNECTIVITY: 1
    • A.DDOS: 1
    • A.MALWARE: 1
    • A.THIRDPARTY: 1
    • A.TIMESTAMP: 1
    • A.TRUSTED_ADMIN: 1
    • A.TRUSTED_DEV: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 5
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKEv1: 1
    • IKEv2: 1
  • TLS:
    • TLS:
      • TLS 1.2: 1
      • TLSv1.2: 1
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025: 2
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
pdf_data/report_metadata
  • /Author:
  • /CreationDate: D:20210201145419-05'00'
  • /Creator:
  • /Keywords:
  • /ModDate: D:20210201145434-05'00'
  • /Producer: Foxit PhantomPDF Printer Version 10.1.0.3521
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 512725
  • pdf_hyperlinks: mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
  • /CreationDate: D:20210629084408Z00'00'
  • /Creator: Word
  • /ModDate: D:20210629084408Z00'00'
  • /Producer: macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext
  • pdf_file_size_bytes: 800031
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
pdf_data/st_filename 522 EWA 2020 Lexmark NoHD Security Target 17.pdf 2019 Certis Cisco – Argus CC EAL2 – Security Target [ASE]-v1.14 2.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
  • EAL:
    • EAL 2: 1
    • EAL2: 11
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 4
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 4
  • ASE:
    • ASE_CCL.1: 3
    • ASE_ECD: 1
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.2: 3
    • ASE_REQ.2: 5
    • ASE_SPD.1: 3
    • ASE_TSS.1: 3
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 1
    • FAU_GEN: 10
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 5
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 5
    • FAU_STG.4.1: 1
    • FAU_STG_EXT: 3
    • FAU_STG_EXT.1: 7
    • FAU_STG_EXT.1.1: 2
  • FCS:
    • FCS_CKM.1: 18
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 10
    • FCS_CKM.4.1: 1
    • FCS_CKM_EXT: 3
    • FCS_CKM_EXT.4: 16
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP.1: 41
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 15
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 2
    • FCS_SSH_EXT.1: 5
    • FCS_TLS_EXT.1: 6
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 8
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_DSK_EXT.1: 2
    • FDP_DSK_EXT.1.2: 1
    • FDP_FXS_EXT: 2
    • FDP_FXS_EXT.1: 8
    • FDP_FXS_EXT.1.1: 2
    • FDP_IFC.1: 1
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_PMG: 4
    • FIA_PMG_EXT: 2
    • FIA_PMG_EXT.1: 5
    • FIA_PMG_EXT.1.1: 1
    • FIA_PSK_EXT: 2
    • FIA_PSK_EXT.1: 10
    • FIA_PSK_EXT.1.1: 2
    • FIA_PSK_EXT.1.2: 3
    • FIA_PSK_EXT.1.3: 2
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 11
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 5
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 5
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 7
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 7
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
  • FPT:
    • FPT_SKP_EXT: 2
    • FPT_SKP_EXT.1: 8
    • FPT_SKP_EXT.1.1: 2
    • FPT_STM.1: 7
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 8
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 8
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 3
  • FTA:
    • FTA_SSL.1: 1
    • FTA_SSL.3: 4
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 11
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 13
    • FTP_TRP.1.1: 3
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
  • FDP:
    • FDP_ACC.1: 8
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
  • FIA:
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_SOS.2: 5
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 6
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 8
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 7
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 9
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 5
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NETWORK: 2
    • A.PHYSICAL: 2
    • A.TRAINED_USERS: 2
    • A.TRUSTED_ADMIN: 2
  • D:
    • D.TSF: 12
    • D.USER: 15
  • O:
    • O.ACCESS: 1
    • O.ACCESS_: 1
    • O.ACCESS_CONTROL: 10
    • O.ADMIN_ROLES: 9
    • O.AUDIT: 12
    • O.COMMS_PROTECTION: 14
    • O.FAX_NET_SEPARATION: 4
    • O.PURGE_DATA: 6
    • O.STORAGE_ENCRYPTION: 2
    • O.TSF_SELF_TEST: 4
    • O.UPDATE_VERIFICATION: 5
    • O.USER_AUTHORIZATION: 11
  • OE:
    • OE.ADMIN_TRAINING: 2
    • OE.ADMIN_TRUST: 2
    • OE.NETWORK_PROTECTION: 2
    • OE.PHYSICAL_PROTECTION: 2
    • OE.USER_TRAINING: 2
  • OSP:
    • OSP: 1
  • T:
    • T.NET_COMPROMISE: 1
    • T.NET_COMRPOMISE: 1
    • T.TSF_COMPROMISE: 2
    • T.TSF_FAILURE: 2
    • T.UNAUTHORIZED_ACCESS: 2
    • T.UNAUTHORIZED_UPDATE: 2
  • A:
    • A.CLOUD: 3
    • A.CONNECTIVITY: 4
    • A.DDOS: 3
    • A.MALWARE: 4
    • A.THIRDPARTY: 3
    • A.TIMESTAMP: 4
    • A.TRUSTED_ADMIN: 4
    • A.TRUSTED_DEV: 3
  • O:
    • O.SEC_ACCESS: 5
    • O.SEC_AUTHENTICATE: 5
    • O.SEC_COMMUNICATION: 5
    • O.SEC_PASSWORD_GENER: 1
    • O.SEC_PASSWORD_GENERATION: 3
  • OE:
    • OE.ADMINISTRATOR: 3
    • OE.ANTI_DDOS: 3
    • OE.ANTI_MALWARE: 3
    • OE.DEVELOPER: 3
    • OE.SAFE_CLOUD: 3
    • OE.SAFE_CONNECTIVITY: 3
    • OE.SYN_TIMESTAMP: 3
    • OE.THIRDPARTY: 3
  • T:
    • T.BROKEN_AUTH: 4
    • T.INTERCEPTION: 4
    • T.UNAUTHORIZED_AC: 1
    • T.UNAUTHORIZED_ACCESS: 2
    • T.WEAK_PASSWORD_: 1
    • T.WEAK_PASSWORD_GENE: 1
    • T.WEAK_PASSWORD_GENERATION: 1
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 2
  • Cisco:
    • Cisco: 7
  • Samsung:
    • Samsung: 4
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 8
  • constructions:
    • MAC:
      • HMAC: 6
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 9
      • Diffie-Hellman: 2
  • RSA:
    • RSA 2048: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 7
    • SHA2:
      • SHA-256: 8
      • SHA-384: 5
      • SHA-512: 1
      • SHA256: 3
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 9
    • IKEv1: 11
    • IKEv2: 8
  • IPsec:
    • IPsec: 42
  • SSH:
    • SSH: 4
  • TLS:
    • TLS:
      • TLS: 3
  • TLS:
    • TLS:
      • TLS 1.2: 3
      • TLSv1.2: 2
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 3
  • RNG:
    • RBG: 4
  • TRNG:
    • TRNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 2
    • malfunction: 5
  • SCA:
    • SPA: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 180-3: 1
    • FIPS PUB 186-4: 1
    • FIPS PUB 197: 1
    • FIPS PUB 198-1: 1
  • ISO:
    • ISO/IEC 18031:2011: 3
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-56B: 1
    • NIST SP 800-90A: 3
  • RFC:
    • RFC 3164: 1
    • RFC 3602: 6
    • RFC 4106: 2
    • RFC 4109: 2
    • RFC 4301: 2
    • RFC 4303: 2
    • RFC 4304: 2
    • RFC 4868: 2
    • RFC 5282: 1
    • RFC2409: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope: 1
    • environment, listing the AWS services being used. The Argus Platform and AWS S3 are deemed as out of scope. Consumers are able to access the TOE upon successful authentication through the web browser and: 1
    • infrastructure is conducted solely by Amazon Web Services, Inc. The following are categorized as out of scope from the selected TOE: • Amazon Web Service (AWS) host, • database host(s); • mobile device(s: 1
    • inside the Amazon Web Services AWS S3 (AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope. Figure 1 shows the supporting non-TOE software shown within the: 1
    • out of scope: 5
    • together with the logical scope of the TOE boxed in red. The Argus Platform is deemed as out of scope. All hardware appliances/devices, software components, integration APIs and third-party hosting: 1
pdf_data/st_metadata
  • /Author: kballantyne
  • /CreationDate: D:20210125090256-05'00'
  • /Creator: PDFCreator 3.2.0.11758
  • /Keywords:
  • /ModDate: D:20210125090256-05'00'
  • /Producer: PDFCreator 3.2.0.11758
  • /Subject:
  • /Title: Lexmark NoHD Security Target 17
  • pdf_file_size_bytes: 677827
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 94
  • /Author: CLAIREHYC
  • /CreationDate: D:20210701124256+08'00'
  • /Creator: PDFCreator Free 4.2.0
  • /Keywords:
  • /ModDate: D:20210701124256+08'00'
  • /Producer: GPL Ghostscript 9.52
  • /Subject:
  • /Title: 2019 Certis Cisco – Argus CC EAL2 – Security Target [ASE]-v1.14
  • pdf_file_size_bytes: 1022047
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 46
state/cert/convert_garbage False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different