OBL-ART13-10Binding

Handle and remediate vulnerabilities throughout the support period

적용 대상
Manufacturer
출처 인용
Art. 13(10)Annex I Part II
제품 등급
default, important-class-i, important-class-ii, critical
Last reviewed

쉬운 설명

Once you find a security bug you must fix it fast. How fast depends on how bad the bug is. Assign a CVE ID. Tell users. Publish a security note. Do this for the whole time you support the product — not just at launch.

Legal text

Article 13(10) of Regulation (EU) 2024/2847, read with Annex I Part II, requires that manufacturers shall handle vulnerabilities effectively. The annex specifies the following concrete requirements:

Annex I Part II — Vulnerability handling requirements:

  1. Identify and document vulnerabilities and components in the product (SBOM)
  2. Address vulnerabilities without delay, proportionate to risk
  3. Apply effective and regular security updates
  4. Use CVE identifiers (from a CVE numbering authority) for vulnerabilities
  5. Publish information about fixed vulnerabilities, including CVSS score
  6. Adopt a coordinated vulnerability disclosure policy
  7. Make it easy for third parties to report vulnerabilities
  8. Share information on vulnerabilities with CSIRT network and ENISA upon request

Key requirements

  1. Vulnerability management process — documented intake, triage, remediation, and disclosure workflow
  2. Timely remediation — response time proportionate to CVSS score and exploitability
  3. CVE assignment — obtain CVE IDs from a CNA (CVE Numbering Authority); ENISA operates as the EU CNA for CRA-related CVEs
  4. CVSS scoring — publish CVSS (v3.1 or later) score with security advisories
  5. Security advisories — publish advisories for all fixed vulnerabilities
  6. End-of-support notice — notify users no later than 12 months before support ends so they can make alternative arrangements

Evidence you may need

  • Vulnerability management policy and SLA targets (time-to-patch by severity)
  • Vulnerability tracker or backlog
  • CVE assignment records
  • Published security advisories with CVSS scores
  • End-of-support notification records
Handle and remediate vulnerabilities throughout the support period — CRA 컴플라이언스 허브