CVD INFRASTRUCTURE

CVD Portal
Infrastructure
Framework

REGULATORY DEADLINE APPROACHING
REGULATORY TIMELINE

EU Cyber Resilience Act Compliance Roadmap

Nov 2024

CRA Published

Regulation (EU) 2024/2847 published in the Official Journal; enters into force 11 December 2024

Sept 2026

Art. 14 Enforcement Begins

Vulnerability reporting obligations apply to all products in scope

48h Acknowledgment (ISO/IEC 29147 · Art. 13 Best Practice)
24h Early Warning to Authorities (Art. 14, Actively Exploited / Severe Incidents Only)
72h Full Notification Report (Art. 14, Actively Exploited / Severe Incidents Only)
Dec 2027

Full Conformity Deadline

Design and production requirements (Annex I, CE marking) apply to new products placed on the market

REFERENCE
Official Journal of the European Union, 20 November 2024
SOLUTION ARCHITECTURE

Three Pillars of CRA CVD Compliance

A complete vulnerability disclosure infrastructure designed for economic operators subject to the Cyber Resilience Act.

Automated Disclosure

Dual-Track SLA Compliance

48-hour acknowledgment per CVD best practice (ISO/IEC 29147, Art. 13), plus mandatory 24-hour early warning and 72-hour full notification to authorities under Article 14 of the CRA.

48h Acknowledgment (ISO/IEC 29147 · Art. 13)
24h Authority Warning (Art. 14)
72h Full Report (Art. 14)
SPOC Portal

Single Point of Contact

A unified, branded vulnerability intake portal for your organization. Security researchers submit reports through a standardized, encrypted channel.

HTTPS Encrypted
Structured Intake
Audit-Ready Logs
Professional Coordination

ENISA-Aligned Triage

All submissions follow ENISA coordinated vulnerability disclosure (CVD) best practices with CVSS scoring, reporter communication, and mitigation tracking.

CVSS Scoring
Researcher Coordination
Mitigation Tracking
COMPLIANCE CHECKLIST

Are You CRA Ready?

Loading...

EU Vulnerability Database (EUVD) Pulse

Official feed of the latest critical and actively exploited vulnerabilities tracked by European authorities.

Latest Critical Vulnerabilities

CVSS 9.0+
EUVD-2026-22053CVSS 9.3

Pachno 1.0.6 contains a deserialization vulnerability that allows unauthenticated attackers to execute arbitrary code by injecting malicious serialized objects into cache files. Attackers can write PHP object payloads to world-writable cache files with predictable names in the cache directory, which are unserialized during framework bootstrap before authentication checks occur.

4/13/2026Pachno
EUVD-2026-22049CVSS 9.3

Pachno 1.0.6 contains an XML external entity injection vulnerability that allows unauthenticated attackers to read arbitrary files by exploiting unsafe XML parsing in the TextParser helper. Attackers can inject malicious XML entities through wiki table syntax and inline tags in issue descriptions, comments, and wiki articles to trigger entity resolution via simplexml_load_string() without LIBXML_NONET restrictions.

4/13/2026Pachno
EUVD-2026-22092CVSS 9.8

A series of Improper Input Validation vulnerabilities could allow a Command Injection by a malicious actor with access to the UniFi Play network. Affected Products: UniFi Play PowerAmp (Version 1.0.35 and earlier)
 UniFi Play Audio Port  (Version 1.0.24 and earlier)
 Mitigation: Update UniFi Play PowerAmp to Version 1.0.38 or later
 Update UniFi Play Audio Port  to Version 1.1.9 or later

4/13/2026UniFi Play Audio Port
EUVD-2026-22091CVSS 9.8

A malicious actor with access to the UniFi Play network could exploit a Path Traversal vulnerability found in the device firmware to write files on the system that could be used for a remote code execution (RCE). Affected Products: UniFi Play PowerAmp (Version 1.0.35 and earlier)
UniFi Play Audio Port  (Version 1.0.24 and earlier)
 Mitigation: Update UniFi Play PowerAmp to Version 1.0.38 or later
Update UniFi Play Audio Port  to Version 1.1.9 or later

4/13/2026UniFi Play PowerAmp

Actively Exploited (KEV)

In the wild
EUVD-2026-4936CVSS 9.8

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

Exploited: 1/29/2026Ivanti
EUVD-2026-18963CVSS 9.1

A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.

Exploited: 4/6/2026Fortinet
EUVD-2026-17162CVSS 7.8

TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.

Exploited: 4/2/2026TrueConf
EUVD-2026-17795CVSS 0

Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

Exploited: 4/1/2026Google
ISO 29147 Aligned
ISO 29147 Aligned
EU Hosted
EU Hosted
GDPR Compliant
GDPR Compliant
Secured by Cloudflare
Secured by Cloudflare
CSAF 2.0 Compatible
CSAF 2.0 Compatible

The Trusted CVD Platform for CRA Compliance

A definitive standard for economic operators to satisfy CRA Article 13 requirements out-of-the-box. Deploy your compliant portal in minutes.