Don't miss out on any news and changes relating to CE! Register now for the CE InfoService
Share Article
The new Cyber Resilience Act (CRA) 2024/2847 is intended to make digital products (such as machines, IoT devices, but also pure software) more secure from December 2027 onwards.
A key requirement of the CRA will be the prevention of vulnerabilities and other security incidents, which manufacturers must remedy by means of software updates. To this end, the technical files for the legal act provide for ‘a description of the design, development and manufacture of the product with digital elements and the procedures for handling vulnerabilities’.
The prEN 40000-1-3 standard, entitled ‘Cybersecurity requirements for products with digital elements - Part 1-3: Vulnerability Handling’, will serve as the basis for the technical implementation of these requirements in the future. Since the beginning of 2026, there has also been a draft standard that explains the first details of its implementation. This technical article presents the most important contents of the standard.
Even though many manufacturers may already be familiar with the IEC 62443 series of standards, the new standard EN 40000-1-3 (currently prEN) offers a crucial tool for practical application. EN 40000-1-3 translates the abstract legal requirements into concrete requirements. To this end, manufacturers are instructed to create structured processes and internal and external guidelines for dealing with vulnerabilities. These should take into account the content explained in the following chapters:
The standard specifies that passive receipt of error messages is not sufficient. Manufacturers must create an active interface to the outside world to support the process. To do this, manufacturers must establish an external policy for the coordinated disclosure of security vulnerabilities and make it publicly available, e.g. on their website. This includes:
Product note
Safexpert 9.1 - The CE software already supports the new Machinery Regulation (EU) 2023/1230
Since version 9.1, Safexpert has been providing you with targeted support when switching to the new Machinery Regulation (EU) 2023/1230. For machines with a long service life that are placed on the market from 20 January 2027, you can now use the CE guide in accordance with the new Machinery Regulation!
More information
The standard specifies that vulnerability management must not stop at the software application. According to the standard, identification means knowing what is installed where in order to be able to react quickly when an actively exploited vulnerability is discovered.
Manufacturers must have an overview of the entire bill of materials, which includes a hardware bill of materials (HBOM).
The standard describes systematic testing processes throughout the entire support period.
If a vulnerability is found, the standard defines a ‘path to patch’:
This is the most critical point of the standard from an administrative perspective, as it establishes a link to the legal reporting obligation.
In most cases, machines must comply with several sets of regulations at the same time. In this context, compliance with the CRA, through the application of standards such as those in the EN 40000 series, can also facilitate compliance with the cybersecurity aspects of the new 2023/1230 EU Machinery Regulation. EN 40000-1-3 acts as a ‘horizontal’ bracket that standardises processes.
Subscribe to our newsletter
Follow IBF on LinkedIn
This technical article is updated regularly! Don't miss any important updates – register now for our free newsletter, the CE InfoService, or follow us on LinkedIn.
EN 40000-1-3 is currently available as a draft (prEN). Even though the final publication is still pending, it already provides a framework for the implementation of the Cyber Resilience Act. Manufacturers should not misunderstand the draft as non-binding, but rather use it as early guidance. As the standard is being developed on behalf of the European Commission, it can be assumed that the core requirements for vulnerability management will remain stable. Those who align their processes with the draft now will avoid the ‘compliance bottleneck’ before the deadlines and lay a good foundation for possible future presumption of conformity. The first reporting requirements for vulnerabilities will take effect in September 2026. Those who use the standard early on can be prepared with an appropriate process.
Posted on: 2026-01-30 (Last amendment)
Hendrik Stupin
Trained technical editor (tekom-certified) and certified CE coordinator. Previously 11 years of experience in technical communication and as a CE coordinator in the field of mechanical and plant engineering, specialising in ‘Engineered to Order (ETO)’ products.
E-Mail: hendrik.stupin@ibf-solutions.com| www.ibf-solutions.com
Wolfgang Reich CE marking and safety expert HTL electrical engineering, specialising in power engineering (Dipl.-HTL-Ing.), 20 years of experience in CE marking, machine safety, conversion of machines, electrical engineering and explosion protection, 10 years of which at TÜV Austria and Intertek Deutschland GmbH. Chairman of the master craftsman examination commission in the Styrian Chamber of Commerce for mechatronics (automation technology and electronics).
E-Mail: wolfgang.reich@ibf-solutions.com
CE software for systematic and professional safety engineering
Practical seminars on aspects of risk assessment and ce marking
With the CE InfoService you stay informed about important developments in the field of product safety.