RESEARCH PAPER
Vulnerability Coordination under the Cyber Resilience Act
More details
Hide details
1
Centre for Industrial Software, University of Southern Denmark, Denmark
2
NA, KU Leuven & University of Oxford, Belgium
Submission date: 2025-07-25
Final revision date: 2025-10-18
Acceptance date: 2025-10-18
Online publication date: 2025-11-14
Corresponding author
Jukka Ruohonen
Centre for Industrial Software, University of Southern Denmark, Denmark
KEYWORDS
TOPICS
ABSTRACT
The Cyber Resilience Act (CRA) of the European Union (EU) imposes many new cyber security requirements practically to all network-enabled information technology products, whether hardware or software. The paper examines and elaborates the CRA’s new requirements for vulnerability coordination, including vulnerability disclosure. Although these requirements are only a part of the CRA’s obligations for vendors, also some new vulnerability coordination mandates are present. In particular, so-called actively exploited vulnerabilities require mandatory reporting. In addition to elaborating the reporting logic, the paper discusses the notion of actively exploited vulnerabilities in relation to the notion of known exploited vulnerabilities used in the United States. The CRA further alters the coordination practices on the side of public administrations. The paper addresses also these new practices. With the examination elaboration, and associated discussion based on conceptual analysis, the paper contributes to the study of cyber security regulations, providing also a few takeaways for further research.