EU Cyber Resilience Act: Vulnerability Handling Guide (Art 13-14)
The EU Cyber Resilience Act (CRA), formally Regulation (EU) 2024/2847, is the most consequential product-security regulation Europe has shipped this decade. Every manufacturer placing a product with digital elements (PDE) on the EU market is going to live inside it, and the operational core of the regulation is not the conformity assessment, the CE mark, or the technical documentation. It is the recurring vulnerability-handling discipline that Articles 13 and 14, together with Annex I Part 2, codify into a continuous obligation across the support period. This guide covers what Article 13 actually asks of manufacturers, what Article 14 actually asks (the early-warning, notification, and final-report cascade for actively-exploited vulnerabilities and severe incidents), how the CRA relates to NIS2, DORA, and the NIST SSDF, how the SBOM, VEX, and SLSA evidence artefacts feed the supporting record, the application-date staircase that starts in September 2026 and lands in December 2027, and the common failure modes AppSec, product security, vulnerability management, and GRC teams run into when they treat the CRA as a one-time conformity event rather than a recurring vulnerability- handling discipline.
What the CRA Actually Is, in One Paragraph
The Cyber Resilience Act is a regulation, not a directive. It applies directly in every EU Member State without national transposition. It sets cybersecurity essential requirements (Annex I Part 1) and vulnerability-handling essential requirements (Annex I Part 2) that every product with digital elements placed on the EU market must meet. It defines four product classes by risk level, four conformity-assessment routes that depend on class, and a continuous obligation across the support period that does not stop when the product ships. The vulnerability-handling and reporting obligations sit on the manufacturer; importers and distributors carry due-diligence obligations rather than primary handling obligations.
Two articles do most of the operational work. Article 13 codifies the manufacturer vulnerability-handling discipline: identify and document vulnerabilities and components, address them without delay, provide security updates separately and free of charge, maintain a coordinated vulnerability disclosure policy, and keep evidence for the support period. Article 14 codifies the reporting obligations: early warning within 24 hours, notification within 72 hours, and final report within 14 days for actively-exploited vulnerabilities and severe incidents impacting the security of the PDE. These are not aspirational targets. They are statutory deadlines tied to the manufacturer's awareness of the underlying event.
For an AppSec, product security, or GRC owner, the practical CRA posture is a recurring vulnerability-handling record per product covered by the regulation, reconcilable across the support period, defensible against a market surveillance authority that asks to read it, and operable by an internal team that does not scale linearly with the product portfolio. The work is the work; what changes is the audit-readiness discipline behind it.
Who Must Comply, and When
The CRA covers manufacturers placing a product with digital elements on the EU market. The definition of PDE is broad: any software or hardware product, and any remote data-processing solution provided alongside it, whose intended or reasonably foreseeable use includes a direct or indirect logical or physical data connection to a device or network. That is, in practice, almost every commercial software and hardware product, including pure SaaS where remote data processing forms part of the product, except for narrow exclusions (medical devices already covered by MDR and IVDR, motor vehicles covered by UN Regulation No. 155, civil aviation under Regulation 2018/1139, marine equipment under Directive 2014/90, and free and open- source software not made available in the course of a commercial activity).
The application-date staircase has three load-bearing dates. Reporting obligations under Article 14 begin to apply on 11 September 2026, around four months from this writing. Conformity-assessment-body designation rules apply on 11 June 2026. The full body of CRA obligations applies on 11 December 2027. Manufacturers selling into the EU market on or after these dates need the corresponding evidence in place; placing a non-conformant product on the market triggers market-surveillance enforcement, which can include withdrawal orders and administrative fines up to EUR 15 million or 2.5 percent of global annual turnover, whichever is higher.
Three populations of buyers ask for the supporting record: market surveillance authorities directly, EU customers running supplier security reviews against the CRA expectation, and increasingly, non-EU customers reading the CRA evidence pack as a baseline because it is broader than most national PDE regimes. Internal AppSec teams at PDE manufacturers find themselves drafting the same evidence multiple times per quarter unless they consolidate it onto a single record.
CRA vs NIS2 vs DORA: Three Regulations, Different Subjects
The EU cybersecurity regulatory landscape is dense, and CRA is often confused with the directives next to it. The three pieces compose; they do not replace each other.
CRA: The Product Regulation
The CRA regulates the product. Subject: a manufacturer placing a PDE on the EU market. Output: essential requirements, conformity assessment, CE mark, technical documentation, support-period vulnerability handling, and Article 14 reporting. The CRA is the regulation that follows the product across its life.
NIS2: The Operator Directive
NIS2 regulates the operator of essential and important services. Subject: an in-scope organisation, not a product. Output: Article 21 risk-management measures, Article 23 incident reporting, supply-chain due diligence, and national supervisory regimes. See the NIS2 framework page for the operator-side treatment. CRA is the supplier-side counterpart that NIS2 Article 21 supply-chain due diligence reads against.
DORA: The Financial-Sector ICT Regime
DORA regulates ICT risk management and operational resilience for EU financial entities and their critical ICT third parties. Subject: a financial entity, or a designated critical ICT third-party provider serving them. See the DORA framework page. When a financial entity buys a PDE, CRA is what the supplier owes the product, DORA is what the bank owes its operations.
SSDF/SBOM/SLSA: The Practice Stack Underneath
The NIST SSDF, SBOM, VEX, and SLSA are the practice catalogue, the component inventory format, the per-CVE exploitability filter, and the build-integrity scaffold. CRA reads against them. They are not substitutes; they are the supporting evidence the CRA vulnerability-handling record consumes.
Article 13: The Vulnerability Handling Discipline
Article 13 codifies the manufacturer vulnerability-handling discipline across the support period. The article reads through Annex I Part 2 of the regulation, which enumerates the operational requirements. The seven obligations below are the operating shape of the article, each with the supporting evidence a market surveillance authority or a customer reading the record expects to see.
Identify and Document Vulnerabilities and Components
Maintain a current SBOM in a machine-readable, commonly used format (SPDX or CycloneDX), at minimum covering top-level dependencies. Identify and document the vulnerabilities and components contained in the product. The SBOM is the spine of the vulnerability inventory, not a one-time release artefact. See the SBOM guide for the format-level treatment.
Address and Remediate Vulnerabilities Without Delay
Vulnerabilities affecting the security of the PDE must be addressed and remediated without delay, including by providing security updates. The regulation does not name a per-severity SLA; "without delay" is read against the risk and the public availability of an exploit. Manufacturers commonly anchor the internal SLA against CISA KEV, EPSS, and CVSS signals.
Apply Effective and Regular Tests and Reviews
Apply effective and regular tests and reviews of the security of the PDE. SAST, SCA, dependency scanning, authenticated testing, and the recurring scan cadence land here. The cadence has to be defensible: scanner type, frequency, evidence retention, and the reconciliation between scan output and the vulnerability ledger.
Provide Security Updates Separately and Free of Charge
Security updates must be made available without delay and free of charge. They must be separated from feature or functionality updates so users can apply the security update without inheriting unrelated changes. The release pipeline has to support a security-only release path; bundling a security fix into a major release with breaking changes is a CRA failure mode.
Maintain a Coordinated Vulnerability Disclosure Policy
A coordinated vulnerability disclosure policy is a direct manufacturer obligation. The policy must include a contact channel for reports, the safe harbour and acknowledgement language, the triage discipline, and the publication discipline. See the vulnerability disclosure programme setup guide for the structural design and the ISO/IEC 29147 and 30111 anchors that hold up under a regulator read.
Disseminate Information About Fixed Vulnerabilities
Manufacturers must publicly disclose information about fixed vulnerabilities, including a description of the vulnerability, the affected versions, the impact, and the corrective measures, ideally referencing CVE identifiers where available. See the CVE Numbering Authority guide for the upstream identifier-issuance layer behind public advisories.
Keep the Evidence for the Support Period
The support period defaults to a minimum of five years from placing on the market, or the expected use period if shorter. Throughout the support period the manufacturer keeps the SBOM current, the disclosure record, the security update history, the scan cadence evidence, and the per-vulnerability advisory record. After the support period ends, archive policy applies; the record does not vanish on day one of year six.
Article 14: The Reporting Cascade
Article 14 codifies the reporting obligations for actively-exploited vulnerabilities and severe incidents impacting the security of the PDE. The cascade is a three-step timeline anchored on the manufacturer's awareness of the event. Reporting goes through the single reporting platform operated by ENISA together with national CSIRTs; the manufacturer does not pick the recipient.
| Stage | Deadline | What it must contain |
|---|---|---|
| Early warning | Within 24 hours of awareness | Notification that the manufacturer has become aware of an actively-exploited vulnerability or a severe incident, with a brief indication of whether unlawful or malicious acts are suspected and whether cross-border impact is possible. |
| Notification | Within 72 hours of awareness | Update on the early warning with a general description of the vulnerability or incident, an initial assessment of severity and impact, the affected products and versions where known, and any indicators of compromise available. |
| Final report | Within 14 days of remediation availability | A detailed description, including the type of vulnerability or threat, the corrective measures applied, the affected products and versions, the indicators of compromise, and the user-side mitigation guidance, with the publication discipline aligned to coordinated disclosure. |
The clock starts when the manufacturer becomes aware. "Awareness" is read as the moment a credible internal owner can no longer dismiss the event; a triage queue timestamp on the ticket is the practical anchor. The 24-hour, 72-hour, and 14-day deadlines are statutory; missing them is a violation independently of whether the underlying remediation is on track. This is why the timestamp discipline behind the awareness moment matters more than the calendar arithmetic on the deadline.
"Actively-exploited" is read narrowly: there must be reliable evidence of exploitation in the wild, not theoretical exploitability or proof-of-concept availability. "Severe incident" is read against the impact on the security of the PDE: confidentiality, integrity, availability, or authentication compromise that affects users. Routine vulnerability discovery does not trigger Article 14; handling under Article 13 is the path. Manufacturers running both paths in parallel without confusing them is the operational shape the regulation expects.
The Support Period and the Five-Year Default
The CRA introduces a support period during which the manufacturer must address vulnerabilities and provide security updates. The default is the expected lifetime of the product, with a minimum of five years from placing on the market unless the expected use period is genuinely shorter (consumer accessories with a known twelve-month replacement cycle are the canonical short-lifetime case). The support period must be communicated to users at the time of purchase or download, and a manufacturer cannot silently shorten it after the fact.
Manufacturers commonly underestimate the operational weight of the support period. The same security-update obligation, the same vulnerability handling, and the same reporting cascade apply equally to a product placed on the market in the first month of CRA enforcement and a product still in the support period four years later. Engineering planning has to account for back-port maintenance, and the evidence record has to reconcile across the entire window, not just the most recent release.
For free and open-source components shipped inside a commercial PDE, the manufacturer is responsible for the support-period obligation, not the upstream maintainer. The OSS exclusion in the CRA covers software not made available in the course of a commercial activity; the moment a manufacturer ships an OSS component as part of a commercial PDE, the obligation lands on the manufacturer. This is why SBOM completeness and pinned-version discipline matter more under the CRA than they do under most other compliance regimes.
The Supporting Evidence Stack
The CRA does not enumerate a fixed evidence list. It requires a manufacturer to be able to demonstrate compliance under Article 32 if a market surveillance authority asks. In practice the defensible record covers eight artefact families, each tied to a verifiable process behind it.
Product-Level SBOM
SBOM per release in SPDX or CycloneDX, dependency manifest with pinned versions, and the link between source commit and release artefact. The SBOM is current at placing on the market and updated across the support period when components change.
Vulnerability Inventory
Per-product vulnerability ledger with CVE identifier where available, CVSS vector, EPSS context, KEV listing flag, status, owner, target close date, and the audit trail of state changes. The ledger reconciles to the SBOM and to the scanner output history.
Coordinated Disclosure Policy and Record
Published coordinated vulnerability disclosure policy with intake channel, safe harbour, triage SLA, and acknowledgement language. The intake record holds every received report, the timestamp of acknowledgement, the triage outcome, and the publication state.
Security Update Release History
Versioned release artefact list, signature or hash per release, the link between vulnerability and release, the customer-facing release notes that name security-relevant changes, and evidence that security updates ship separately from feature updates.
Test and Review Cadence
SAST and SCA results history per release, authenticated and external test results, third-party assessment evidence where the conformity route requires it, and the documented cadence at which each test runs across the support period.
Article 14 Reporting Trail
Per-event awareness timestamp, the early-warning submission, the 72-hour notification submission, the 14-day final-report submission, and the reconciled status of the underlying vulnerability or incident.
Public Advisory Stream
Per-vulnerability advisory with CVE, affected versions, impact, corrective measures, and the publication date. Advisories are aligned with the coordinated disclosure timeline and reference VEX statements where the manufacturer chooses to publish them.
Programme-Level Evidence
Designated point of contact for CRA matters, support-period statement per product, technical documentation per Annex VII, the EU declaration of conformity, and the named owner reconciling the evidence across cycles.
The first time a manufacturer assembles this stack the work is substantial; the recurring cycle once the stack is stood up is materially shorter because most of the artefacts are already produced as part of the engineering programme. The failure mode is treating each customer audit, market surveillance review, or self-assessment as a bespoke evidence draft rather than a read of the same canonical record.
Common Failure Modes
Treating the CRA as a one-time conformity event
The conformity assessment is a moment in time. The CRA obligation is across the support period. Manufacturers that prepare the technical documentation once and stop maintaining the underlying evidence drift out of compliance during the support period and discover the gap when the next vulnerability or customer audit surfaces it.
Awareness timestamps that cannot be defended
Article 14 deadlines run from the manufacturer's awareness moment. If the triage queue does not capture a defensible timestamp on the awareness event, the 24-hour and 72-hour deadlines become arguments rather than facts, and the manufacturer is in a structurally weak position in any market-surveillance conversation that reads the timeline.
SBOM that is current at release and abandoned afterwards
Article 13 expects the SBOM to be current across the support period when components change. A manufacturer that publishes the SBOM at release and never updates it cannot reconcile the vulnerability inventory against shipped releases two years later. The SBOM is a living record, not a release artefact.
Bundling security fixes into feature releases
Article 13 requires security updates to ship separately from feature updates and free of charge. A release pipeline that always bundles security fixes into the next major release violates the obligation, even when the underlying fix is timely. The pipeline has to support a security-only release path.
Confusing Article 13 handling with Article 14 reporting
Routine vulnerability handling does not trigger Article 14. Active exploitation or a severe incident does. Manufacturers that under-report by treating an actively-exploited vulnerability as routine triage, or over-report by escalating every CVE through the 24-hour cascade, lose the ability to operate either path cleanly. The triage rubric has to make the boundary explicit.
Coordinated disclosure as a contact email and nothing else
A published email address is not a coordinated disclosure policy. The policy has to define the safe harbour, the triage SLA, the acknowledgement language, the publication discipline, and the link between the disclosure intake and the vulnerability ledger. A bare contact email is a CRA documentation gap that surfaces under any moderately careful read.
CRA, NIS2, and the Supply-Chain Reading
CRA does not stand alone in the supply-chain reading. NIS2 Article 21 obliges essential and important entities to manage supply-chain security, including the security of suppliers and direct providers. CRA gives those NIS2 entities a structured artefact to read against: the supplier's CRA conformity record, the published SBOM, the coordinated disclosure policy, and the support-period statement. A supplier who cannot produce these artefacts is structurally weak in any NIS2 buyer's supplier review, even if the buyer is technically reading NIS2 and the supplier is technically reading CRA.
For DORA-regulated financial entities buying PDEs from CRA-regulated manufacturers, the same shape applies: DORA Article 28 third-party ICT risk management reads against the supplier's CRA evidence pack. The financial entity is not asking for a different artefact; it is asking for the same artefact through a different regulatory lens. Manufacturers operating one canonical evidence record answer all three reads (CRA conformity, NIS2 supplier review, DORA third-party risk) without drafting three separate packs.
How SecPortal Helps Manufacturers Run the Stack
SecPortal does not place products on the EU market, file declarations of conformity, submit to the ENISA single reporting platform, or act as the manufacturer's authorised representative. Those actions remain the manufacturer's, taken through the relevant regulatory interfaces. What SecPortal does is hold the recurring evidence record that Articles 13 and 14 read against, on a single workspace, reconcilable across the support period, and exportable to the customer, the 3PAO, the notified body, or the market surveillance authority that asks.
- The CRA programme per product becomes a versioned engagement record with named participants, the support-period start and end dates, the conformity route, and the renewal triggers documented in one place.
- The vulnerability inventory lives in findings management with CVSS-aligned severity, the CVE identifier, the affected versions, the owner, the target close date, and the audit trail of every state change.
- The SBOM, the coordinated disclosure policy, the technical documentation, the EU declaration of conformity, and the per-cycle support-period statement land in document management with versioning, timestamps, and author attribution.
- The Article 13 test and review cadence comes from external scanning, authenticated scanning, code scanning via Semgrep SAST and SCA, and continuous monitoring with scheduled scans, with each scan result carrying its own audit trail.
- The Article 14 reporting timeline runs against the activity log, with timestamped state changes per user, retained on the plan-defined window, and exportable to CSV when a regulator or customer reads the cascade.
- The CRA expectations map to compliance tracking alongside ISO 27001, SOC 2, PCI DSS, and NIST framework mappings, so closing a control reflects across every parallel compliance read at once.
- The development-environment posture lands behind MFA, team management with role-based access controls, and AES-256-GCM encrypted credential storage for credentials referenced by the evidence record.
- The narrative read for a notified body, a 3PAO, or a market surveillance authority can be drafted by AI report generation from the live evidence; named author edits, named approver signs off, and the AI accelerates the draft rather than substitutes for the security author.
The platform is the recurring evidence record, not the regulatory submission. The manufacturer still files the conformity declaration, the technical documentation, and the Article 14 reports through the relevant authority interfaces. SecPortal keeps the supporting record reconcilable across the support period so the submissions are grounded in the evidence rather than reconstructed from email threads.
A Practical Rollout Plan
Manufacturers approaching the CRA for the first time benefit from a sequenced rollout rather than a horizontal compliance push. The order below reflects the dependencies inside the regulation: classification first, because conformity route depends on class; SBOM and vulnerability ledger second, because every other obligation reads against them; disclosure programme third, because that is the public-facing intake the regulation expects; reporting readiness fourth, because September 2026 is the closest deadline; and the recurring discipline last, because the support-period obligation continues for at least five years.
- Classify each PDE against Annex III and IV. Identify whether the product is default, important class I, important class II, or critical, and pick the conformity route that maps to the class. The classification frames every downstream decision.
- Stand up the SBOM and the vulnerability ledger. Adopt SPDX or CycloneDX as the SBOM format, pin dependencies, ingest scanner output into the ledger, and establish the link between SBOM components and ledger entries. See the SBOM guide for the format-level treatment.
- Publish the coordinated vulnerability disclosure policy. Use ISO/IEC 29147 as the structural anchor, name the safe harbour, define the triage SLA, and route intake into the same vulnerability ledger that holds scanner findings. See the vulnerability disclosure programme setup guide for the operating shape.
- Stand up the Article 14 reporting readiness. Designate the awareness-timestamp owner, document the rubric for actively-exploited vs routine, draft the early-warning template, the 72-hour notification template, and the 14-day final-report template, and run a tabletop against a recent CVE to validate the cascade.
- Stand up the security-update release path. Confirm the pipeline can ship security-only releases separately from feature releases, document the release notes discipline, and align the per-vulnerability advisory format with the public disclosure expectations.
- Stand up the test and review cadence. Configure SAST and SCA in the pipeline, configure secret scanning, define the threat-modelling cadence per major feature, archive scanner result history per release, and reconcile the cadence against the Article 13 "regular tests and reviews" expectation.
- Document the support-period statement per product, communicate it to users at point of purchase or download, and reconcile the statement to the engineering capacity plan that has to maintain the support obligation.
- Brief the named CRA point of contact. Walk through the seven Article 13 obligations, the three Article 14 deadlines, the five-year support default, and the conformity route. Document the brief.
- File the EU declaration of conformity, affix the CE mark where applicable, and place the product on the market. Archive the submission alongside the evidence pack. Set the recurring review cycle and the renewal triggers.
Wider Reading
- Cyber Resilience Act framework page for the product-class taxonomy, the essential requirements catalogue, and the conformity-assessment routes the regulation defines.
- NIST SSDF implementation guide for the practice catalogue the CRA Article 13 obligations read against.
- CISA SSDA form guide for the federal-procurement self-attestation that runs the same SSDF practice clusters from the US side, with a different reporting cadence.
- SBOM guide for the SPDX vs CycloneDX format treatment behind the CRA Article 13 inventory obligation.
- VEX guide for the per-CVE exploitability filter that pairs with SBOM in the vulnerability-handling cluster.
- SLSA framework guide for the build-integrity scaffold the CRA evidence pack references for code provenance.
- Vulnerability disclosure programme setup guide for the operating shape of the coordinated disclosure policy Article 13 requires manufacturers to maintain.
- Vulnerability management programme guide for the operational triage and remediation discipline the Article 13 vulnerability handling reads against.
- CISA KEV catalog guide for the actively-exploited signal that anchors the Article 14 reporting trigger.
- CVE Numbering Authority explained for the upstream identifier-issuance layer behind public advisories under the Article 13 dissemination obligation.
- PSIRT product security incident response workflow for the operational PSIRT case lifecycle that runs the Article 13 vulnerability handling and the Article 14 reporting cascade against one structured engagement record per case.
- Vendor security questionnaire response workflow for the customer-facing read that consumes the same CRA evidence pack.
- Control mapping cross-framework crosswalks for the canonical control library the CRA reads against alongside ISO, SOC 2, PCI DSS, and NIST.
- Audit evidence retention and disposal for the lifecycle policy that governs how long each CRA artefact stays in the record across the five-year support period.
- NIS2, DORA, ISO 27001, and CISA Secure by Design for the framework-side reads that share the same evidence stack the CRA consumes.
- SecPortal for product security teams and SecPortal for GRC and compliance teams for the persona-side reading paths into the CRA evidence record.
Scope and Limitations
This guide describes the structure and operational shape of the EU Cyber Resilience Act, Regulation (EU) 2024/2847, as the regulation reads at the time of writing. Specific implementation details, the harmonised standards referenced, the in-force product class lists, the implementing acts, and the operational interfaces of the ENISA single reporting platform evolve over time. The authoritative reference for the in-force obligations and implementation guidance remains the published text of the regulation and the European Commission acts that follow it.
The dates noted in this guide (11 June 2026 for conformity-assessment-body designation, 11 September 2026 for reporting obligations, 11 December 2027 for the full body of obligations) reflect the application-date staircase as published. Manufacturers should confirm the application dates against the current Official Journal text and any subsequent legislative amendments before committing programme deadlines. Nothing in this guide constitutes legal advice; CRA programme decisions should be reconciled with qualified legal counsel and, where applicable, with a notified body.
Run your CRA evidence record on SecPortal
Stand up the engagement record in under two minutes. Free plan available, no credit card required.