Technical article

Planned standard for dealing with vulnerabilities

prEN 40000-1-3 on cybersecurity requirements for products with digital elements

Don't miss out on any news and changes relating to CE! Register now for the CE InfoService

Draft standard prEN 40000-1-3: ‘Dealing with (cyber) vulnerabilities’


Share Article
Share Button Linkedin Share Button Xing Share Button X Share Button Email

The new Cyber Resilience Act (CRA) 2024/2847 is intended to make digital products (such as machines, IoT devices, but also pure software) more secure from December 2027 onwards.

A key requirement of the CRA will be the prevention of vulnerabilities and other security incidents, which manufacturers must remedy by means of software updates. To this end, the technical files for the legal act provide for ‘a description of the design, development and manufacture of the product with digital elements and the procedures for handling vulnerabilities’.

The prEN 40000-1-3 standard, entitled ‘Cybersecurity requirements for products with digital elements - Part 1-3: Vulnerability Handling’, will serve as the basis for the technical implementation of these requirements in the future. Since the beginning of 2026, there has also been a draft standard that explains the first details of its implementation. This technical article presents the most important contents of the standard.

Even though many manufacturers may already be familiar with the IEC 62443 series of standards, the new standard EN 40000-1-3 (currently prEN) offers a crucial tool for practical application. EN 40000-1-3 translates the abstract legal requirements into concrete requirements. To this end, manufacturers are instructed to create structured processes and internal and external guidelines for dealing with vulnerabilities. These should take into account the content explained in the following chapters:
 

Coordinated disclosure of security vulnerabilities

The standard specifies that passive receipt of error messages is not sufficient. Manufacturers must create an active interface to the outside world to support the process. To do this, manufacturers must establish an external policy for the coordinated disclosure of security vulnerabilities and make it publicly available, e.g. on their website. This includes:

  • A ‘safe harbour’ (legal certainty): An important confidence-building measure. The manufacturer undertakes not to take legal action against reporters as long as they:
    • do not exploit the vulnerability
    • report the vulnerability to the manufacturer first instead of making it public immediately
    • do not attempt blackmail
  • Receipt management: Technical hurdles must not prevent reports from being received. Professional receipt management therefore uses various confidential channels and media. This ensures:
    • that critical information reaches the manufacturer via at least one channel, regardless of the sender's capabilities
    • that it remains confidential
  • A phase plan (response process): What happens after the report is submitted in order to comply with the CRA's reporting deadlines.
    • Confirmation of receipt: Feedback to the reporter within a fixed time frame (usually 48–72 hours).
    • Validation & analysis: Technical review by the manufacturer to determine whether the vulnerability is real and critical.
    • Remediation: Timeframe for developing and testing a patch or workaround.
  • Coordination rules (disclosure): This is where it is agreed how the information will be made public:
    • Standstill period: The reporter undertakes not to publish details until the manufacturer has provided a solution (patch).
    • Joint publication: Determination of how and when a security advisory will be issued to affected customers.
  • Credit: Determination of whether and how the reporter will be mentioned by name (e.g. in a ‘Hall of Fame’). This is often the primary motivation for many reporters and encourages cooperation.

Product note

Safexpert 9.1 - The CE software already supports the new Machinery Regulation (EU) 2023/1230


Since version 9.1, Safexpert has been providing you with targeted support when switching to the new Machinery Regulation (EU) 2023/1230. For machines with a long service life that are placed on the market from 20 January 2027, you can now use the CE guide in accordance with the new Machinery Regulation!

Integrated inventory management: SBOM meets HBOM

The standard specifies that vulnerability management must not stop at the software application. According to the standard, identification means knowing what is installed where in order to be able to react quickly when an actively exploited vulnerability is discovered.

Manufacturers must have an overview of the entire bill of materials, which includes a hardware bill of materials (HBOM).

  • Separate parts lists: In addition to the software bill of materials (SBOM), the hardware components involved must also be recorded as a parts list (HBOM) and thus clearly identified.
  • End-to-end supply chain security: Identification must reflect the depth of the supply chain. It is not enough to know the product – you need to know which software version is running on which hardware revision.
  • Up-to-date: Parts lists are not static documents, but dynamic data sets that must be kept up to date throughout the entire support period of the machine.


Continuous review and identification

The standard describes systematic testing processes throughout the entire support period.

  • Automation: Use of analysis tools that continuously check the SBOM for new known vulnerabilities.
  • Intervals: Defining regular review cycles, even if no changes have been made to the machine (as new vulnerabilities are discovered in existing code every day).
  • Verifiability: Documenting the test results as part of the technical files for market surveillance authorities.

 

Patch-Management 

If a vulnerability is found, the standard defines a ‘path to patch’:

  • Classification of the vulnerability: The priority of the fix must be determined based on a risk assessment. Critical vulnerabilities must be patched before less risky errors.
  • Interim solutions: If a final patch takes time, the standard requires the immediate provision of workarounds (e.g. configuration adjustments) to minimise the window of opportunity for attackers.
  • Secure distribution: The standard specifies requirements for the integrity of the update so that the update itself does not become a gateway for attackers.
  • Duty to inform: Creation of advisories – clear instructions to the machine operator on what measures (workarounds or updates) they must take.

 

Crisis response and reporting workflows

This is the most critical point of the standard from an administrative perspective, as it establishes a link to the legal reporting obligation.

  • Event categorisation: The standard helps to determine whether an event constitutes a ‘security incident’ that must be reported within 24 hours.
  • Interface definition: Defining internal roles (e.g. Product Security Officer) that are authorised to submit reports to national authorities (in Germany, the BSI) or ENISA.
  • Documentation requirement: Even if a vulnerability is not reported, the standard requires that the reasons for not reaching the reporting threshold be justified and documented internally.

 

Synergies with the Machinery Regulation  

In most cases, machines must comply with several sets of regulations at the same time. In this context, compliance with the CRA, through the application of standards such as those in the EN 40000 series, can also facilitate compliance with the cybersecurity aspects of the new 2023/1230 EU Machinery Regulation. EN 40000-1-3 acts as a ‘horizontal’ bracket that standardises processes.

Note: 


This technical article is updated regularly! Don't miss any important updates – register now for our free newsletter, the CE InfoService, or follow us on LinkedIn.

Conclusion and practical benefits 

EN 40000-1-3 is currently available as a draft (prEN). Even though the final publication is still pending, it already provides a framework for the implementation of the Cyber Resilience Act. Manufacturers should not misunderstand the draft as non-binding, but rather use it as early guidance. As the standard is being developed on behalf of the European Commission, it can be assumed that the core requirements for vulnerability management will remain stable. Those who align their processes with the draft now will avoid the ‘compliance bottleneck’ before the deadlines and lay a good foundation for possible future presumption of conformity. The first reporting requirements for vulnerabilities will take effect in September 2026. Those who use the standard early on can be prepared with an appropriate process.
 


Posted on: 2026-01-30 (Last amendment)

Authors

Hendrik Stupin

Trained technical editor (tekom-certified) and certified CE coordinator. Previously 11 years of experience in technical communication and as a CE coordinator in the field of mechanical and plant engineering, specialising in ‘Engineered to Order (ETO)’ products.

E-Mail: hendrik.stupin@ibf-solutions.com| www.ibf-solutions.com

 

Wolfgang Reich
CE marking and safety expert HTL electrical engineering, specialising in power engineering (Dipl.-HTL-Ing.),  20 years of experience in CE marking, machine safety, conversion of machines, electrical engineering and explosion protection, 10 years of which at TÜV Austria and Intertek Deutschland GmbH. Chairman of the master craftsman examination commission in the Styrian Chamber of Commerce for mechatronics (automation technology and electronics).

E-Mail: wolfgang.reich@ibf-solutions.com


Share Article
Share Button Linkedin Share Button Xing Share Button X Share Button Email

Support by IBF

CE Software Safexpert

CE software for systematic and professional safety engineering

Seminars

Practical seminars on aspects of risk assessment and ce marking

Stay Up-to-Date!

With the CE InfoService you stay informed about important developments in the field of product safety.