The vulnerability reporting obligation is the first CRA requirement to take effect. From 11 September 2026, every manufacturer of a product with digital elements on the EU market must report actively exploited vulnerabilities through the single reporting platform established under Article 16. The reporting timeline is explicit: 24-hour early warning, 72-hour vulnerability notification, 14-day final report. If you manufacture in China and a vulnerability in your firmware is exploited in Europe, the obligation applies to you. CRACheck generates 8 PDF documents including the ENISA Notification Template pre-structured for the three-step reporting timeline. 15-25 minutes. €149. Browser-side.
€149 one-time · 8-document ZIP · 15–25 minutes · Browser-side
You enter your product data. CRACheck structures the documentation per Article 31 + Annex VII.
Article 71 explicitly states that Article 14 shall apply from 11 September 2026. This is 15 months before full CRA enforcement. If a vulnerability in your product is actively exploited after September 2026 and you fail to report, you are in breach before most other obligations even apply.
Article 14.2(a) requires an early warning within 24 hours. This is not the full report — it is an initial notification. Art. 14.2(b) gives you 72 hours for the detailed notification. Art. 14.2(c) gives you 14 days for the final report. The 24h timeline is for the early warning only.
Article 14.1 requires notification of any actively exploited vulnerability in the product — not only those affecting EU users. The notification is simultaneous to the CSIRT designated as coordinator and to ENISA. If the vulnerability exists in a product placed on the EU market, the obligation applies regardless of where the exploit occurs.
8 PDF documents generated from your data. Each cites the specific article of Regulation (EU) 2024/2847 it complies with.
Annex III classification. Reporting obligations apply to all products regardless of classification.
Art. 31 + Annex VII. Includes vulnerability handling processes (Annex VII point 2(b)) that underpin the Art. 14 reporting obligation.
Art. 13.2-13.3. Identifies vulnerability categories and impact severity that inform reporting thresholds.
Annex II. Includes the vulnerability reporting contact address for external reporters.
Art. 28 + Annex V.
The inbound channel — how researchers and users report vulnerabilities to you. Feeds into your Art. 14 outbound reporting to ENISA.
Art. 14. Pre-structured for the three-step timeline: 24h early warning (Art. 14.2(a)), 72h vulnerability notification (Art. 14.2(b)), 14-day final report (Art. 14.2(c)). Also covers severe incident reporting under Art. 14.3-14.4.
Art. 14 from 11 September 2026 highlighted. Full enforcement 11 December 2027.
See before you buy — Download sample dossier (PDF, fictional company) — Real structure, real articles, real format. Fictional data.
Generated from your data, in your browser. No data leaves your device.
Generates the documentation framework for your vulnerability reporting obligation: CVD Policy (inbound), ENISA Notification Template (outbound), vulnerability handling processes (Annex VII point 2(b)). Pre-structured for the 24h/72h/14-day timeline.
CRACheck does not monitor your products for vulnerabilities, file ENISA notifications on your behalf or provide incident response services. The documentation structures your process. Your security team executes it.
We structure the documentation. You run the reporting process.
Article 64 of Regulation (EU) 2024/2847.
Art. 64.2. This is the highest penalty tier. Art. 14 applies from September 2026.
Art. 64.3.
Art. 64.4.
| Criterion | European incident response retainer | Build internal reporting from scratch | Ignore Art. 14 until December 2027 | CRACheck |
|---|---|---|---|---|
| Cost | €20,000–€50,000/year | Free + months of work | €0 now | €149 |
| Result | Full monitoring + reporting. Ongoing annual cost. | High risk of gaps in the 24h/72h/14d timeline. | Art. 14 applies from September 2026. 15 months of unprotected exposure. | 8 docs including ENISA template. Pre-structured for the three-step timeline. One-time payment. |
The ENISA notification template references a specific product. If a vulnerability affects multiple products, each notification references the specific product documentation. Generate dossiers for all product lines. Volume pricing: €99/product (10-pack), €79/product (30-pack).
Request Volume PricingCRACheck generates a structured document according to Article 31 and Annex VII of Regulation (EU) 2024/2847 from the information you provide. The accuracy, completeness and truthfulness of that information is your responsibility as the manufacturer.
We guarantee that the document structure follows Article 31 and Annex VII of Regulation (EU) 2024/2847 and that the legal references cited are correct. We do not guarantee that a specific document will be accepted by a market surveillance authority in a specific case or by a commercial buyer in a procurement process.
CRACheck is not legal advice. For specific situations, consult a lawyer or specialised regulatory consultancy.
Eight documents. Article 31 + Annex VII fully structured. Regulation (EU) 2024/2847. Your data stays on your device. The ZIP you download is yours forever.