This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
| Cisco Catalyst 3K/4K Wired Access Switches running IOS-XE 3.8.0E CCEVS-VR-10688-2015 |
Oberthur B0' application v1.0.1 and GemClub v1.3 loaded on Javacard/VOP GemXpresso platform 211 V2 ANSSI-CC-2001/03 |
|
|---|---|---|
| name | Cisco Catalyst 3K/4K Wired Access Switches running IOS-XE 3.8.0E | Oberthur B0' application v1.0.1 and GemClub v1.3 loaded on Javacard/VOP GemXpresso platform 211 V2 |
| category | Network and Network-Related Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme | US | FR |
| not_valid_after | 09.03.2018 | 01.09.2019 |
| not_valid_before | 09.03.2016 | 01.01.2001 |
| cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10688-ci.pdf | |
| report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10688-vr.pdf | https://www.commoncriteriaportal.org/files/epfiles/2001_03.pdf |
| st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10688-st.pdf | https://www.commoncriteriaportal.org/files/epfiles/ |
| manufacturer | Cisco Systems, Inc. | Oberthur Card Systems, Gemplus, Trusted Logic |
| manufacturer_web | https://www.cisco.com | |
| security_level | {} | EAL1+, AVA_VLA.2 |
| dgst | fd544dd6fc90b18e | 3669d9560559c730 |
| heuristics/cert_id | CCEVS-VR-10688-2015 | ANSSI-CC-2001/03 |
| heuristics/cert_lab | US | [] |
| heuristics/cpe_matches | cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:* | {} |
| heuristics/related_cves | CVE-2019-1750, CVE-2024-20312, CVE-2023-20109, CVE-2023-20097, CVE-2017-3861, CVE-2020-3215, CVE-2017-3850, CVE-2025-20199, CVE-2016-6386, CVE-2017-12228, CVE-2016-1409, CVE-2021-34699, CVE-2017-6606, CVE-2021-1620, CVE-2019-1746, CVE-2018-0193, CVE-2020-3230, CVE-2023-20076, CVE-2021-34729, CVE-2016-6384, CVE-2020-3209, CVE-2024-20271, CVE-2019-1761, CVE-2020-3200, CVE-2017-6742, CVE-2022-20920, CVE-2017-6736, CVE-2024-20433, CVE-2023-20056, CVE-2020-3204, CVE-2025-20171, CVE-2016-1384, CVE-2017-3857, CVE-2017-6738, CVE-2025-20201, CVE-2018-0188, CVE-2020-3444, CVE-2021-1616, CVE-2025-20170, CVE-2018-0184, CVE-2018-0182, CVE-2018-0185, CVE-2025-20175, CVE-2021-1442, CVE-2018-0195, CVE-2016-6381, CVE-2017-6665, CVE-2018-0189, CVE-2021-1384, CVE-2025-20198, CVE-2017-6737, CVE-2018-0186, CVE-2017-3862, CVE-2025-20176, CVE-2025-20200, CVE-2024-20414, CVE-2020-3516, CVE-2020-3217, CVE-2017-6739, CVE-2016-6415, CVE-2018-0194, CVE-2021-1625, CVE-2018-0190, CVE-2019-16009, CVE-2017-6663, CVE-2016-6393, CVE-2017-3856, CVE-2017-6740, CVE-2025-20173, CVE-2014-2146, CVE-2023-20186, CVE-2020-3228, CVE-2017-6770, CVE-2025-20338, CVE-2023-20080, CVE-2021-1382, CVE-2016-6385, CVE-2019-1748, CVE-2025-20169, CVE-2018-0197, CVE-2025-20172, CVE-2016-6380, CVE-2017-3860, CVE-2024-20308, CVE-2014-3409, CVE-2016-6382, CVE-2023-44487, CVE-2019-1737, CVE-2017-3849, CVE-2018-0183, CVE-2017-6743, CVE-2017-3863, CVE-2013-6692, CVE-2025-20352 | {} |
| heuristics/extracted_sars | AGD_PRE.1, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ALC_CMS.1, AVA_VAN.1, ADV_FSP.1, ALC_OPE.1 | ADV_FSP.2, ASE_ENV.1, AGD_ADM.1, ATE_IND.2, ADV_RCR.1, AVA_VLA.2, AGD_USR.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_TSS.1, ASE_PPC.1, ASE_SRE.1, ASE_DES.1 |
| heuristics/extracted_versions | 3.8.0 | 1.3, 1.0.1 |
| heuristics/scheme_data |
|
|
| heuristics/protection_profiles | c7cf611c6bb1e4b0 | {} |
| protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V1.0.pdf | {} |
| pdf_data/cert_filename | st_vid10688-ci.pdf | |
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id | ||
| pdf_data/cert_keywords/cc_security_level | ||
| pdf_data/cert_keywords/cc_sar | ||
| pdf_data/cert_keywords/cc_sfr | ||
| pdf_data/cert_keywords/cc_claims | ||
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto | ||
| pdf_data/cert_keywords/asymmetric_crypto | ||
| pdf_data/cert_keywords/pq_crypto | ||
| pdf_data/cert_keywords/hash_function | ||
| pdf_data/cert_keywords/crypto_scheme | ||
| pdf_data/cert_keywords/crypto_protocol | ||
| pdf_data/cert_keywords/randomness | ||
| pdf_data/cert_keywords/cipher_mode | ||
| pdf_data/cert_keywords/ecc_curve | ||
| pdf_data/cert_keywords/crypto_engine | ||
| pdf_data/cert_keywords/tls_cipher_suite | ||
| pdf_data/cert_keywords/crypto_library | ||
| pdf_data/cert_keywords/vulnerability | ||
| pdf_data/cert_keywords/side_channel_analysis | ||
| pdf_data/cert_keywords/technical_report_id | ||
| pdf_data/cert_keywords/device_model | ||
| pdf_data/cert_keywords/tee_name | ||
| pdf_data/cert_keywords/os_name | ||
| pdf_data/cert_keywords/cplc_data | ||
| pdf_data/cert_keywords/ic_data_group | ||
| pdf_data/cert_keywords/standard_id | ||
| pdf_data/cert_keywords/javacard_version | ||
| pdf_data/cert_keywords/javacard_api_const | ||
| pdf_data/cert_keywords/javacard_packages | ||
| pdf_data/cert_keywords/certification_process | ||
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename | st_vid10688-vr.pdf | 2001_03.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_metadata |
|
|
| pdf_data/st_filename | st_vid10688-st.pdf | |
| pdf_data/st_keywords/cc_cert_id | ||
| pdf_data/st_keywords/cc_protection_profile_id | ||
| pdf_data/st_keywords/cc_security_level | ||
| pdf_data/st_keywords/cc_sar |
|
|
| pdf_data/st_keywords/cc_sfr |
|
|
| pdf_data/st_keywords/cc_claims |
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility | ||
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto | ||
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve | ||
| pdf_data/st_keywords/crypto_engine | ||
| pdf_data/st_keywords/tls_cipher_suite | ||
| pdf_data/st_keywords/crypto_library | ||
| pdf_data/st_keywords/vulnerability | ||
| pdf_data/st_keywords/side_channel_analysis | ||
| pdf_data/st_keywords/technical_report_id | ||
| pdf_data/st_keywords/device_model | ||
| pdf_data/st_keywords/tee_name | ||
| pdf_data/st_keywords/os_name | ||
| pdf_data/st_keywords/cplc_data | ||
| pdf_data/st_keywords/ic_data_group | ||
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_keywords/javacard_version | ||
| pdf_data/st_keywords/javacard_api_const | ||
| pdf_data/st_keywords/javacard_packages | ||
| pdf_data/st_keywords/certification_process | ||
| pdf_data/st_metadata |
|
|
| state/cert/convert_ok | True | False |
| state/cert/download_ok | True | False |
| state/cert/extract_ok | True | False |
| state/cert/pdf_hash | Different | Different |
| state/cert/txt_hash | Different | Different |
| state/report/pdf_hash | Different | Different |
| state/report/txt_hash | Different | Different |
| state/st/convert_ok | True | False |
| state/st/download_ok | True | False |
| state/st/extract_ok | True | False |
| state/st/pdf_hash | Different | Different |
| state/st/txt_hash | Different | Different |