This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
| SeL v1 rev 01 JISEC-CC-CRP-C0012 |
Cisco Adaptive Security Appliances Version: ASA software version 9.1(2) Components: ASA 5500 (5505, 5510, 5520, 5540, 5550, 5580-20-40), ASA 5500-X Series (5512-X, 5515-X, 5525-X, 5545-X, 5555-X), ASA 5585-X (5585-10, 5585-20, 5585-40, 5585-60), ASA Services Module (ASA-SM) Certificate Number: 2013/86 |
|
|---|---|---|
| name | SeL v1 rev 01 | Cisco Adaptive Security Appliances Version: ASA software version 9.1(2) Components: ASA 5500 (5505, 5510, 5520, 5540, 5550, 5580-20-40), ASA 5500-X Series (5512-X, 5515-X, 5525-X, 5545-X, 5555-X), ASA 5585-X (5585-10, 5585-20, 5585-40, 5585-60), ASA Services Module (ASA-SM) |
| category | Other Devices and Systems | Network and Network-Related Devices and Systems |
| scheme | JP | AU |
| not_valid_after | 22.12.2010 | 01.09.2019 |
| not_valid_before | 03.08.2004 | 05.09.2013 |
| report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0012_ecvr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ASA_CR.pdf |
| st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ASA_ST.pdf | |
| manufacturer | Canon Sales Co., Inc. | Cisco Systems, Inc. |
| manufacturer_web | https://www.canon.com/ | https://www.cisco.com |
| security_level | EAL1 | {} |
| dgst | ff85840fb082ab07 | f79f5a3bdb302ec0 |
| heuristics/cert_id | JISEC-CC-CRP-C0012 | Certificate Number: 2013/86 |
| heuristics/cpe_matches | {} | cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2.8:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.1:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.6:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.8:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(2\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)4:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.7.4:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)13:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)29:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)15:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(1.7\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)6:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3.2:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)23:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)21:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(1\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)25:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(5\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(6.11\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(3\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4.5:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)20:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)19:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7.245\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1.4:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)12:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)9:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.7\(9\):*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)11:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)16:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.6.4:*:*:*:*:*:*:*, cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\(7\)7:*:*:*:*:*:*:* |
| heuristics/related_cves | {} | CVE-2016-6432, CVE-2014-3393, CVE-2017-6770, CVE-2013-5509, CVE-2017-6610, CVE-2014-3392, CVE-2017-6607, CVE-2013-5511, CVE-2013-5560, CVE-2017-3793, CVE-2013-5512, CVE-2016-1379, CVE-2017-3807, CVE-2015-0676, CVE-2014-2127, CVE-2015-6327, CVE-2015-0675, CVE-2017-6765, CVE-2013-5508, CVE-2020-3580, CVE-2020-3582, CVE-2013-5515, CVE-2020-3581, CVE-2013-5507, CVE-2016-6461, CVE-2017-6609, CVE-2022-20715, CVE-2022-20742, CVE-2015-6324, CVE-2022-20745, CVE-2014-2129, CVE-2013-5510, CVE-2020-3578, CVE-2016-6424, CVE-2016-6431, CVE-2013-5513, CVE-2022-20737, CVE-2014-2128, CVE-2015-6360, CVE-2015-0677, CVE-2014-0739, CVE-2015-6325, CVE-2015-6326, CVE-2013-5542, CVE-2017-6608, CVE-2016-1287, CVE-2022-20759, CVE-2014-2126, CVE-2022-20760 |
| heuristics/extracted_sars | {} | AGD_PRE.1, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ALC_CMS.1, AVA_VAN.1, ADV_FSP.1 |
| heuristics/extracted_versions | 01 | 9.1 |
| heuristics/protection_profiles | {} | ac9abe3d5c5a31f0, d7508f508083d040 |
| maintenance_updates |
|
|
| protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_ND_TFFWEP_V1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
| pdf_data/report_filename | c0012_ecvr.pdf | ASA_CR.pdf |
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_metadata |
|
|
| pdf_data/st_filename | ASA_ST.pdf | |
| pdf_data/st_keywords/cc_cert_id | ||
| pdf_data/st_keywords/cc_protection_profile_id | ||
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
|
|
| pdf_data/st_keywords/cc_sfr |
|
|
| pdf_data/st_keywords/cc_claims |
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility | ||
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto | ||
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve | ||
| pdf_data/st_keywords/crypto_engine | ||
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library | ||
| pdf_data/st_keywords/vulnerability | ||
| pdf_data/st_keywords/side_channel_analysis | ||
| pdf_data/st_keywords/technical_report_id | ||
| pdf_data/st_keywords/device_model | ||
| pdf_data/st_keywords/tee_name | ||
| pdf_data/st_keywords/os_name | ||
| pdf_data/st_keywords/cplc_data | ||
| pdf_data/st_keywords/ic_data_group | ||
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_keywords/javacard_version | ||
| pdf_data/st_keywords/javacard_api_const | ||
| pdf_data/st_keywords/javacard_packages | ||
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
|
|
| state/report/pdf_hash | Different | Different |
| state/report/txt_hash | Different | Different |
| state/st/convert_ok | False | True |
| state/st/download_ok | False | True |
| state/st/extract_ok | False | True |
| state/st/pdf_hash | Different | Different |
| state/st/txt_hash | Different | Different |