ENISA Vulnerability Reporting: The 24-Hour Clock Starts 11 September 2026
From 11 September 2026, manufacturers must report actively exploited vulnerabilities to ENISA within 24 hours. This guide covers what triggers reporting, the full timeline, and how to prepare.
In this article
- Summary
- What Triggers CRA Reporting?
- What Does "Actively Exploited" Mean Under the CRA?
- Reporting Timelines
- Where Do You Submit the ENISA Vulnerability Report?
- Internal Preparation Checklist
- Common Pitfalls
- SME Exemptions
- Integration with Existing Processes
- ENISA Reporting Readiness Checklist
- Frequently Asked Questions
- Next Steps
11 September 2026. From this date, you have 24 hours to report actively exploited vulnerabilities to ENISA. Miss the deadline and face enforcement action.
Summary
- September 2026: Vulnerability and incident reporting obligations begin
- "Actively exploited": A malicious actor has used the vulnerability to affect users
- Timeline: 24h early warning → 72h detailed notification → 14d final report (vulns) / one month (incidents)
- Report to: ENISA Single Reporting Platform + relevant national CSIRT
- Prepare now: Internal triage process, escalation paths, report templates
What Triggers CRA Reporting?
The CRA defines two categories requiring mandatory notification:
1. Actively Exploited Vulnerabilities
A vulnerability in your product that:
- Is known to you (discovered internally or reported externally)
- Has been exploited by a malicious actor
- Affects or could affect users of your product
2. Severe Incidents
Security incidents that:
- Impact the security of your product
- Compromise your development environment in ways affecting product security
- Cause widespread service disruption to users
- Result in widespread compromise
Both categories trigger the same reporting timelines but have different final report windows.
Warning: The 24-hour clock starts at awareness of active exploitation. Forensic confirmation is not required.
What Does "Actively Exploited" Mean Under the CRA?
The CRA defines an actively exploited vulnerability as one where "a malicious actor makes use of a flaw."
This is not the same as:
- A vulnerability being publicly disclosed
- A proof-of-concept being published
- A researcher demonstrating exploitability
It means actual malicious use.
Reportable vs Non-Reportable Scenarios
| Scenario | Reportable? | Why |
|---|---|---|
| Security researcher reports vulnerability privately | No | No exploitation; handle via CVD process |
| Proof-of-concept published on GitHub | No | PoC publication ≠ exploitation |
| Customer reports suspicious activity consistent with vulnerability | Yes | Evidence of exploitation |
| Vulnerability detected being exploited in the wild | Yes | Active malicious use |
| Component in your SBOM has known exploited vulnerability | Assess | Only if exploitation affects your product |
| Your product is specifically targeted in attacks | Yes | Direct exploitation |
| Generic malware uses vulnerability class your product has | Assess | Only if your specific implementation is affected |
The "Reasonable Belief" Standard
You don't need forensic proof of exploitation. The standard is reasonable belief based on available evidence:
- Unusual access patterns consistent with known exploit techniques
- Customer reports of compromise
- Threat intelligence indicating your product is targeted
- Detection of exploit code designed for your product
When uncertain: Err on the side of reporting. A premature early warning that proves unfounded is far better than a missed deadline for actual exploitation.
Reporting Timelines
Both vulnerabilities and incidents follow a staged reporting model:
Actively Exploited Vulnerability Timeline
DISCOVERY → 24 HOURS → 72 HOURS → PATCH AVAILABLE → 14 DAYS
| | | | |
| | | | \-- Final Report
| | | \-- Clock restarts
| | \-- Detailed Notification
| \-- Early Warning
\-- Clock starts
Severe Incident Timeline
DISCOVERY → 24 HOURS → 72 HOURS → 1 MONTH
| | | |
| | | \-- Final Report
| | \-- Detailed Notification
| \-- Early Warning
\-- Clock starts
What Each Report Contains
Early Warning (24 hours)
Minimum information to alert authorities:
- Your identity (manufacturer)
- Affected product(s) identification
- Brief description of vulnerability/incident
- Initial severity assessment
- Whether exploitation is confirmed or suspected
- Indication of potential impact scope
This is not a complete analysis. It's an alert that something serious is happening.
Detailed Notification (72 hours)
Expanded information for assessment:
- Technical details of the vulnerability
- Affected versions and configurations
- Exploitation method (if known)
- Current mitigation status
- Remediation timeline estimate
- Known affected users/scope
- Coordination with other parties (other vendors, CSIRTs)
Final Report (14 days for vulns / one month for incidents)
Complete analysis after remediation:
- Root cause analysis
- Full technical description
- Remediation actions taken
- Lessons learned
- Prevention measures implemented
- Impact assessment (confirmed affected users, data exposure, etc.)
Where Do You Submit the ENISA Vulnerability Report?
ENISA Single Reporting Platform (SRP)
The SRP is not operational as of April 2026. ENISA has contracted a vendor and the platform is scheduled to open by 11 September 2026, when reporting obligations begin. A testing period is planned before that date. No registration URL has been published. Monitor the ENISA SRP page for updates: https://www.enisa.europa.eu/topics/product-security-and-certification/single-reporting-platform-srp
What is confirmed:
- Web-based platform for submissions
- Standardized reporting forms
- Single submission routed to the relevant national CSIRT
What manufacturers can do now:
- Draft report templates using the structure below
- Identify your coordinator CSIRT (see below)
- Define internal escalation paths and authorized reporters
National CSIRTs
Under Article 14(7) of Regulation (EU) 2024/2847, you submit once via the SRP to the CSIRT of the Member State where your organization has its main establishment. Main establishment means where decisions about product cybersecurity are predominantly taken.
If you are established outside the EU, the relevant CSIRT is that of your EU authorized representative. If you have no authorized representative, the cascade falls to your importer, then distributor, then the country with the greatest user concentration.
You are not required to notify every CSIRT in every country where your product is sold. Under Article 16, ENISA routes the notification onward to market-country CSIRTs after you submit. That step is not the manufacturer's responsibility.
For Products in Multiple Member States
One submission to the SRP covers your reporting obligation. You may receive follow-up from multiple national authorities, but there is a single submission path.
Internal Preparation Checklist
Tip: Pre-approve notification templates and establish 24/7 escalation paths NOW. You cannot draft templates during a 24-hour deadline.
Don't wait until September 2026. Build your processes now.
1. Vulnerability Intake Channels
Establish clear paths for vulnerability reports:
security.txt file:
# https://yourproduct.com/.well-known/security.txt
Contact: mailto:security@yourcompany.com
Contact: https://yourcompany.com/security/report
Expires: 2027-01-01T00:00:00.000Z
Preferred-Languages: en
Canonical: https://yourcompany.com/.well-known/security.txt
Policy: https://yourcompany.com/security/policy
Web form for structured reports
Dedicated email monitored 24/7 (or with clear SLA)
2. Internal Triage Process
Define how reports are evaluated:
VULNERABILITY INTAKE TRIAGE
1. Initial Receipt (< 4 hours)
- Acknowledge receipt
- Assign to security team member
- Initial validity check
2. Technical Triage (< 24 hours)
- Confirm vulnerability exists
- Determine affected versions
- Assess exploitability
- Check for active exploitation evidence
3. Severity Assessment (< 24 hours)
- CVSS scoring (or equivalent)
- Business impact evaluation
- Exploitation likelihood
4. Reporting Decision (IMMEDIATE if exploitation confirmed)
- Does this require ENISA notification?
- If yes, initiate 24-hour clock
3. Escalation Paths
Define who can trigger external reporting:
| Role | Authority |
|---|---|
| Security Team Lead | Can initiate early warning |
| CISO / Security Director | Must approve detailed notification |
| Legal / Compliance | Review before final report |
| Executive sponsor | Escalation for ambiguous cases |
Key principle: The person who discovers potential exploitation must be able to escalate immediately, 24/7.
4. After-Hours Coverage
The 24-hour clock doesn't pause for weekends or holidays.
Options:
- On-call rotation for security team
- Monitoring service with escalation authority
- Clear out-of-hours contact chain
- Pre-authorized reporters who can submit early warnings
5. Report Templates
Prepare templates before you need them:
Early Warning Template:
ENISA CRA EARLY WARNING
Manufacturer: [Company Name]
Report Date: [Date/Time UTC]
Report Type: [ ] Actively Exploited Vulnerability [ ] Severe Incident
AFFECTED PRODUCT(S):
- Product Name:
- Version(s):
- Product Category:
VULNERABILITY/INCIDENT SUMMARY:
[Brief description - 2-3 sentences]
EXPLOITATION STATUS:
[ ] Confirmed exploitation
[ ] Suspected exploitation
Evidence: [Brief description of evidence]
INITIAL SEVERITY ASSESSMENT:
[ ] Critical [ ] High [ ] Medium [ ] Low
Basis: [CVSS score or other rationale]
POTENTIAL IMPACT SCOPE:
- Estimated affected users:
- Geographic scope:
- Data at risk:
CURRENT STATUS:
[ ] Under investigation
[ ] Mitigation in progress
[ ] Patch in development
CONTACT FOR FOLLOW-UP:
Name:
Email:
Phone:
This is an early warning. Detailed notification to follow within 72 hours.
6. Test Your Process
Run tabletop exercises before September 2026:
Scenario 1: Friday 5pm - Security researcher reports critical vulnerability with PoC
- How quickly can you assess exploitation risk?
- Who makes the reporting decision over the weekend?
Scenario 2: Customer reports suspicious activity suggesting your product was entry point
- How do you gather evidence to confirm/deny exploitation?
- What's your threshold for "reasonable belief"?
Scenario 3: Threat intelligence indicates your product is being targeted by APT group
- Do you have visibility into actual exploitation?
- How do you coordinate with external threat intel providers?
Common Pitfalls
Waiting for Certainty
Problem: Wanting forensic proof before reporting.
Reality: The 24-hour clock starts when you have reasonable belief. If you wait for certainty, you'll miss the deadline.
Solution: Report early. You can update with "no longer believed to be exploited" in the detailed notification if evidence doesn't support it.
Confusing CVD with Reporting
Problem: Treating researcher reports as ENISA notifications.
Reality: Coordinated vulnerability disclosure and ENISA reporting are separate processes.
- CVD: How you handle researcher reports, agree on disclosure timelines
- ENISA: Mandatory notification when exploitation occurs
Solution: CVD process should include a gate: "Is there evidence of exploitation?" If yes, trigger ENISA reporting parallel to CVD.
Single Point of Failure
Problem: Only one person can authorize reports, and they're unreachable.
Reality: Exploitation can be discovered at any time. Weekends. Holidays. 3am.
Solution: Multiple authorized reporters. Clear delegation. Emergency contact chain.
No Relationship with CSIRTs
Problem: First contact with your national CSIRT is during an incident.
Reality: Building relationships beforehand makes incident response smoother.
Solution: Engage your national CSIRT now. Understand their processes. Join any manufacturer outreach programs.
SME Exemptions
Info: Microenterprises and small enterprises are exempt from timing-specific fines for the 24-hour early warning deadline, but must still report. This is a penalty relief, not an exemption from reporting.
Microenterprises and small enterprises have some relief under Article 64(10)(a):
Notification timing exemption: Exempt from fines for missing the 24-hour early warning deadlines in Article 14(2)(a) and Article 14(4)(a). The 72-hour detailed notification deadline (Articles 14(2)(b) and 14(4)(b)) is not covered. Missing it can result in fines regardless of company size.
Still required:
- Reporting (just not penalized for the 24-hour timing)
- All other CRA obligations
- Final reports
Definition (Article 64(10)(a)): Applies to microenterprises (fewer than 10 employees, annual turnover or balance sheet ≤ EUR 2 million) and small enterprises (fewer than 50 employees, annual turnover or balance sheet ≤ EUR 10 million). Medium enterprises (up to 250 employees) are not covered by this exemption.
This exemption covers the 24-hour early warning penalty only. All manufacturers — including microenterprises — must establish reporting capabilities.
Integration with Existing Processes
If You Already Have Incident Response
Map CRA reporting to your existing process:
EXISTING IR PROCESS CRA INTEGRATION
---------------------------------------------
Detection
|
Triage ------------------→ Check: Exploitation of CRA product?
| |
Containment +- YES: Trigger 24h clock
| | Submit early warning
Investigation |
| |
Remediation --------------→ 72h detailed notification
|
Recovery
|
Lessons Learned ----------→ 14d/1 month final report
If You Have NIS 2 Obligations
Some organizations have both NIS 2 and CRA obligations:
- NIS 2: Organization/service level incidents
- CRA: Product-level vulnerabilities and incidents
These may overlap. A single incident might require both:
- NIS 2 notification to competent authority
- CRA notification to ENISA/CSIRT
ENISA has indicated the SRP will handle routing for both regimes where applicable. This has not been confirmed in final guidance.
ENISA Reporting Readiness Checklist
ENISA REPORTING READINESS CHECKLIST
BEFORE SEPTEMBER 2026:
CHANNELS & CONTACTS
[ ] security.txt published and current
[ ] Vulnerability reporting form available
[ ] Security email monitored (define SLA: ____ hours)
[ ] National CSIRT contact identified
[ ] ENISA SRP registration (when available)
INTERNAL PROCESS
[ ] Triage criteria documented
[ ] Exploitation assessment checklist created
[ ] Escalation path defined (names, contacts)
[ ] Authorized reporters identified
[ ] After-hours coverage established
DOCUMENTATION
[ ] Early warning template prepared
[ ] Detailed notification template prepared
[ ] Final report template prepared
[ ] Internal briefing materials ready
TESTING
[ ] Tabletop exercise completed
[ ] After-hours escalation tested
[ ] Template review completed
WHEN EXPLOITATION IS DETECTED:
IMMEDIATE (within 4 hours)
[ ] Initial assessment: Is this actively exploited?
[ ] Clock start time documented: ____________
[ ] Escalation to authorized reporter
WITHIN 24 HOURS
[ ] Early warning submitted to ENISA SRP
[ ] Submission confirmation received
[ ] Internal stakeholders notified
WITHIN 72 HOURS
[ ] Detailed notification submitted
[ ] Mitigation status updated
[ ] Customer communication initiated (if appropriate)
WITHIN 14 DAYS (vulnerability) / ONE MONTH (incident)
[ ] Final report submitted
[ ] Lessons learned documented
[ ] Process improvements identified
Frequently Asked Questions
What counts as "active exploitation" that starts the 24-hour clock?
Active exploitation means a malicious actor has used the vulnerability to affect users. Disclosure alone, a published PoC, or a researcher demonstrating exploitability does not qualify. You do not need forensic proof. The CRA uses a "reasonable belief" standard: unusual access patterns consistent with known exploit techniques, customer reports of compromise, or threat intelligence indicating your product is targeted all qualify. The clock starts the moment you form that belief.
Where exactly do you submit the ENISA vulnerability report?
Through the ENISA Single Reporting Platform (SRP). As of April 2026, the SRP is not yet operational. ENISA has contracted a vendor and the platform is scheduled to open by 11 September 2026. No registration URL has been published yet. Under Article 14(7), you submit once to the CSIRT of the Member State where your organization has its main establishment. You do not submit separately to every CSIRT in every country where your product is sold.
What is the difference between the 24-hour, 72-hour, and 14-day reports?
The 24-hour early warning is a minimal alert: product identification, a brief description, and an initial severity assessment. The 72-hour detailed notification adds technical details, affected versions, exploitation method, and remediation timeline. The 14-day final report (or one month for severe incidents) is the complete analysis: root cause, full technical description, remediation actions taken, and confirmed impact. Each submission builds on the previous one.
Does the 24-hour obligation apply to all CRA products or only Important and Critical ones?
The reporting obligation under Article 14 applies to all manufacturers of products with digital elements covered by the CRA. This covers all product classes, not only Important Class I, Important Class II, or Critical ones. Product classification determines your conformity assessment route, not your reporting obligations. Any CRA-covered product with an actively exploited vulnerability triggers the 24-hour deadline.
What happens if you miss the 24-hour reporting window?
Missing the deadline exposes you to enforcement action. Microenterprises and small enterprises (fewer than 50 employees, annual turnover up to EUR 10 million) are exempt from fines specifically for the 24-hour early warning timing under Article 64(10)(a), but must still report. Medium and large companies have no such relief. The SME exemption covers only the 24-hour early warning. Missing the 72-hour detailed notification can result in fines regardless of company size.
Does the report go to ENISA or to the national CSIRT?
Both, through a single submission. You submit once via the ENISA Single Reporting Platform, which routes your notification to the relevant national CSIRT: the CSIRT of the Member State where your organization has its main establishment. Under Article 16, ENISA then routes the notification onward to CSIRTs in other Member States where your product is sold. That secondary routing is ENISA's responsibility, not yours.
Next Steps
Managing CRA compliance across multiple products? CRA Evidence tracks deadline countdowns and pre-filled report templates for each product's vulnerability disclosures.
Once your triage process is in place, set up your vulnerability intake with our CVD policy template. Check the penalties guide to understand what enforcement looks like if the deadline is missed.
This article is for informational purposes only and does not constitute legal advice. For specific compliance guidance, consult with qualified legal counsel familiar with EU product regulations.
Related Articles
ECSMAF v3.0 Explained: How ENISA Maps the EU Cybersecurity Market
Does the CRA apply to your product?
Answer 6 simple questions to find out if your product falls under the EU Cyber Resilience Act scope. Get your result in under 2 minutes.
Ready to achieve CRA compliance?
Start managing your SBOMs and compliance documentation with CRA Evidence.