Vulnerability Coordination Under the Cyber Resilience Act

Jukka Ruohonen,Paul Timmers
2024-12-09
Abstract:A new Cyber Resilience Act (CRA) was recently agreed upon in the European Union (EU). It imposes many new cyber security requirements practically to all information technology products, whether hardware or software. The paper examines and elaborates the CRA's new requirements for vulnerability coordination, including vulnerability disclosure. Although these requirements are only a part of the CRA's obligations for vendors, also some new vulnerability coordination mandates are present, including particularly with respect to so-called actively exploited vulnerabilities. The CRA further alters the coordination practices on the side of public administrations. With the examination, elaboration, and associated discussion, the paper contributes to the study of cyber security regulations, providing also a few practical takeaways.
Cryptography and Security,Computers and Society,Software Engineering
What problem does this paper attempt to address?
The problem that this paper attempts to solve is the impact of the new EU Cyber Resilience Act (CRA) on vulnerability coordination, especially the requirements in terms of vulnerability disclosure. Specifically: 1. **Background and Motivation**: - The EU has passed the new Cyber Resilience Act, which imposes many new cybersecurity requirements on almost all information technology products (hardware and software). - The paper focuses on the new requirements of CRA on vulnerability coordination, including the obligation of vulnerability disclosure. 2. **Specific Content of the Problem**: - **Vulnerability Disclosure Models**: The paper explores different vulnerability disclosure models (such as direct disclosure, full disclosure, coordinated disclosure) and analyzes the application of these models in the European public sector. - **New Requirements of CRA**: CRA has introduced some new terms and requirements, such as "actively exploited vulnerabilities". These vulnerabilities refer to those for which there is reliable evidence that malicious actors have already exploited in the system. - **Coordination Mechanisms**: CRA stipulates vertical and horizontal coordination mechanisms between national Computer Security Incident Response Teams (CSIRTs) and European - level institutions (such as ENISA). - **Reporting Obligations**: Manufacturers must report actively exploited vulnerabilities to relevant CSIRTs and ENISA within 24 hours, provide updates within 72 hours, and submit the final report within two weeks. - **Market Supervision**: CRA also stipulates the role of market supervision authorities to ensure that only compliant security products can enter the market. 3. **Scope of Impact**: - **Commercial Software**: All commercial software and hardware products need to comply with these new regulations. - **Open - source Software**: For open - source software projects, CRA has relatively loose supervision, mainly targeting those open - source projects for commercial activities. - **Supply Chain Security**: CRA also puts forward new requirements for supply chain management. For example, manufacturers need to create a Software Bill of Materials (SBOM) to record the use of third - party components. 4. **Research Significance**: - This paper not only provides a detailed interpretation of CRA provisions but also points out future research directions, such as further research on the concept of "actively exploited vulnerabilities" and the application of SBOM in supply chain management. In conclusion, this paper aims to deeply analyze the specific impact of the Cyber Resilience Act on vulnerability coordination and disclosure and provide references for future policy - making and academic research.