為CRA做好準備:一站式平台,簡化合規流程

2025年7月14日
VicOne
為CRA做好準備:一站式平台,簡化合規流程

The EU Cyber Resilience Act (CRA), which officially came into force on December 10, 2024, sets unified and stringent cybersecurity requirements for all Products with Digital Elements (PDE). These requirements cover the entire product lifecycle—from design and development to deployment and end-of-life. While the regulation has already taken effect, the primary compliance obligations will become fully enforceable starting November 10, 2027, leaving a limited window for the automotive industry to prepare. 

Why CRA matters for the automotive ecosystem 

Although automakers are already subject to regulations as UN R156 (Software Update Management System), which partially align with CRA requirements, many PDEs within their supply chain will need to meet CRA obligations independently. 

 These include, for example: 

  • Third-party in-vehicle applications and aftermarket software 
  • Wireless connectivity devices (e.g., keyless entry systems) 
  • Electric vehicle charging equipment (EVSE) 
  • Digital control modules in agricultural and construction machinery 

Under the CRA, manufacturers must continuously monitor vulnerabilities and threats. If an actively exploited vulnerability is discovered, they are required to report it to the EU Agency for Cybersecurity (ENISA) within 24 hours and promptly provide remediation or mitigation. Failure to comply may result in fines of up to €15 million or 2.5% of global annual revenue, whichever is higher. Sanctions apply to violations such as failure to report vulnerabilities, submit Software Bill of Materials (SBOM), or implement secure design practices. 

Top 3 CRA compliance roadblocks 

For suppliers and developers, CRA introduces several significant challenges: 

  1. Identifying actively exploited vulnerabilities within 24 hours 
    In reality, this is extremely difficult due to: Limited visibility into whether vulnerabilities are being actively exploited, lack of contextual threat intelligence specific to automotive systems, and incomplete PSIRT processes or manual incident workflows. Without novel threat intelligence and automated detection, it’s difficult to meet CRA’s 24-hour early warning notification requirement. 
  2. Vulnerability, patch management, and incident response 
    Continuously detecting, disclosing, and remediating vulnerabilities across the full product lifecycle takes substantial effort and resources. Could there be a more cost-effective approach to meet these requirements? 
  3. Limited supply chain cybersecurity visibility 
    Responsibility for compliance is difficult to clarify without clear visibility into third-party cybersecurity practices. A lack of transparency in the supply chain leaves manufacturers vulnerable to compliance risks from external suppliers. 

One platform to simplify CRA compliance 

To meet CRA requirements, companies need a Vulnerability and SBOM Management System capable of handling continuous vulnerability identification, assessment, and remediation. 

Key capabilities include: 

  • Automated vulnerability detection and prioritization 
    Automatically detect known and unknown vulnerabilities, and classify vulnerabilities based on severity, exploitability, and relevance to system contexts. 
  • Automated SBOM generation and management 
    Automatically generate and continuously update SBOMs, and cross-reference against known CVEs and potential vulnerabilities. 
  • Automotive threat intelligence for early warning 
    Built on a continuously updated automotive threat intelligence platform, the system instantly identifies vulnerabilities linked to real-world exploits. It even maps out the full attack path—so you know exactly where threats begin and where they’re headed. 
  • Uncover hidden software risks in supplier components 
    Automatically identify zero-day and undisclosed vulnerabilities within third-party components included in the PDE. 

Introducing VicOne xZETA—a platform that  integrates Vulnerability Management, SBOM Management, and Automotive Threat Intelligence, offering a comprehensive solution designed for CRA compliance. Let us help you accelerate your path to compliance—reducing risk, speeding up time-to-market, and earning the trust of the European market. 

VicOne新聞與觀點

深入瞭解汽車網路安全

  • 為CRA做好準備:一站式平台,簡化合規流程
    部落格與觀點
    2025年7月14日
    歐盟《資安韌性法(EU Cyber Resilience Act, CRA)》制定了針對包含數位元素的產品 (PDE) 的網路安全要求。這意味著供應鏈中的製造商必須監控漏洞,並在發現漏洞後立即報告,否則將面臨巨額罰款。在這樣的法規環境下,製造商亟需一套能主動監測漏洞並進行軟體物料清單(SBOM)管理的解決方案,以確保合規與資安同步到位。
    閱讀更多
  • CVE-2025-6019:一個影響 AGL 及未來SDV的權限提升漏洞
    部落格與觀點
    2025年6月25日
    一個最近揭露的 Linux 漏洞顯示,看似普通的錯誤,正逐漸開始影響軟體定義車輛(SDV)。我們解析 CVE-2025-6019、探討它對 Automotive Grade Linux(AGL)的影響,以及它對車載網路安全所代表的意義。
    閱讀更多
  • 使用單一 STM32 開發板複製 RAMN:經濟高效地實踐探索
    部落格與觀點
    2025年5月26日
    這是一篇針對車廠先進網路開發或是相關研究人員的實務實作指南。內容介紹如何深入研究先進車載網路的一種實用且經濟高效的方法,而這僅需使用一塊 STM32 板即可複製全尺寸抗干擾汽車微型網路 (RAMN) 的核心功能。這個實務實作指南中,我們將逐步介紹設定流程,讓車廠工程師和領域愛好者能夠使用最少的硬體來製作逼真可用來測試的汽車通訊系統的原型。
    閱讀更多
  • LockBit 勒索病毒集團資料外洩:對汽車網路安全的影響
    部落格與觀點
    2025年5月21日
    最近一起LockBit 勒索病毒集團的遭駭入侵事件,揭露了大量內部聊天紀錄,讓外界得以一窺該集團如何鎖定受害對象並進行勒索。其中,汽車公司以成為其主要攻擊焦點之一。我們將深入剖析此次資料外洩的關鍵發現,並提出務實的做法步驟,讓車廠面對LockBit 或類似的網路攻擊事件得以採取適當的防範措施。
    閱讀更多
閱讀最新報告

馬上體驗更先進的汽車網路安全防護

預約專人展示