The limitations are standard wordings of Common Criteria certifications. The wordings are motivated by certification Schemes that wish to protect their integrity and reputation for a possible fallout should a customer not abide by this advice and then expose themself to a potential vulnerability.
I'm not aware of customers that follow this advice, and my understanding is that most are pragmatic and use the certification for the assurance it provides and as one consideration in their risk analysis for how to protect their assets which may be best served by also using unevaluated features.
It is also worth noting that for certification expediency we disable CPMI and therefore SmartConsole. This is not due to a risk, where the administrator is configured to be on a protected network, but due to the heavy load in evidence creation and testing that allowing CPMI or SmartConsole would require.
There will not be equivalent TOE JHFs, due to the work that would be required, and that there is no simple path for their certification. The path of a hot fix and its potential certification could happen if a CVE is discovered. Thankfully these are very rare in Check Point.
The TOE is very similar to the one we had for R81.10, with the obvious advantage of being on R82 that supports the latest appliances.