Advisory Embargo
An advisory embargo is an agreed period during which a vulnerability disclosure is held private among the researcher, manufacturer, and any coordinating parties — allowing time for patch development and coordinated release before the vulnerability details become public. Embargoes are a core mechanism of coordinated vulnerability disclosure.
An advisory embargo is an agreed period during which a vulnerability disclosure is held private among the researcher, manufacturer, and any coordinating parties — allowing time for patch development and coordinated release before the vulnerability details become public. Embargoes are a core mechanism of coordinated vulnerability disclosure.
CVD & Vulnerability ManagementWhat Is an Advisory Embargo?
An advisory embargo is a mutually agreed period of confidentiality during which vulnerability details, proof-of-concept code, and related information are shared only among the affected manufacturer, the reporting researcher, and any CVD coordinators involved in the disclosure. The embargo period gives the manufacturer time to develop, test, and release a patch before the vulnerability becomes public knowledge. It is typically established at the point of report acknowledgement and runs until a coordinated release date — the point at which both the manufacturer's advisory and the researcher's public disclosure are released simultaneously. Embargoes are central to the coordinated vulnerability disclosure model and underpin the trust relationship between the security research community and manufacturers.
Setting and Managing Embargo Periods
The length of an embargo period should be established based on estimated remediation complexity. Common frameworks:
- Standard: 90 days from confirmed receipt of a reproducible report.
- Accelerated: 30–45 days for critical vulnerabilities or when the manufacturer confirms rapid remediation is feasible.
- Extended: Beyond 90 days by mutual agreement for systemic vulnerabilities requiring architectural changes or multi-vendor coordination.
- Set the release date collaboratively with the researcher, not unilaterally.
- Provide regular status updates to the researcher throughout the embargo period.
- Agree on a specific release date and time (including timezone) to avoid ambiguity.
- If the release date must change, renegotiate with the researcher promptly — silent extensions erode trust and often lead to unilateral disclosure.
When Embargoes Are Broken or Shortened
Several circumstances legitimise shortening or breaking an embargo:
- Active exploitation: If evidence emerges that the embargoed vulnerability is being actively exploited in the wild before the release date, the embargo should be broken immediately. Keeping a vulnerability secret that is already being weaponised harms users. The CRA's 24-hour ENISA notification obligation applies upon confirmed active exploitation regardless of any existing embargo.
- Independent discovery: If a third party independently discovers and discloses the same vulnerability, the embargo is effectively broken. The manufacturer should accelerate advisory release.
- Researcher emergency disclosure: Researchers may break an embargo if they have compelling evidence the manufacturer is acting in bad faith (e.g., using the embargo to suppress disclosure while not developing a fix). This is rare and typically done with coordinator involvement.
- Deadline expiry: If the agreed deadline is reached without mutual extension, the researcher is entitled to publish.
Multi-Party Embargoes and Coordination
When a vulnerability affects components used across multiple manufacturers' products, the embargo involves multiple parties simultaneously, significantly increasing complexity. Multi-party embargoes require:
- A coordinating CSIRT or organisation (CERT/CC, NCSC-NL, or ENISA) to manage communications.
- A shared, secure channel for coordinating parties — PGP-encrypted email lists or secure collaboration platforms.
- A single coordinated release date agreed among all affected parties.
- Contingency planning for scenarios where some parties cannot be ready by the agreed date.
Manufacturers should have a defined process for participating in multi-party embargoes, including a named individual authorised to commit to an embargo timeline and a fast-track development and review process for patch development under embargo constraints.
CVD Portal makes Advisory Embargo compliance straightforward.
Public CVD submission portal, acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for EU manufacturers.
Start your free portalFrequently asked
Does the CRA impose any obligations on embargo handling?+
The CRA does not explicitly regulate embargo periods or their management. Its Article 13(6) requires manufacturers to establish a CVD policy that enables researcher reporting; how embargo terms are handled within that policy is left to the manufacturer. The CRA does impose one direct override: when a vulnerability under embargo is discovered to be actively exploited, the CRA's 24-hour ENISA notification obligation applies immediately, effectively requiring the manufacturer to notify ENISA even if the advisory has not yet been released publicly.
Can a manufacturer legally enforce an embargo agreement against a researcher?+
Embargo agreements in CVD contexts are typically informal — a commitment made in the context of a disclosed vulnerability, often without a signed contract. Formal legal enforcement is rarely practical and almost never pursued by responsible manufacturers, as doing so would destroy researcher trust and deter future reports. The security community relies on reputational enforcement: coordinators and other researchers track which manufacturers honour embargoes and which do not. Manufacturers that use legal threats to extend embargoes beyond reasonable periods are publicly criticised and face disclosure regardless.
What should a manufacturer do if a researcher threatens to break the embargo early?+
First, take the threat seriously and investigate whether the researcher has legitimate concerns — for example, that the manufacturer is not making progress on the fix. If the concern is valid, accelerate the fix and consider an earlier release date. If the concern is a misunderstanding, communicate proactively with evidence of progress. Engage a coordinating CSIRT as a neutral mediator if direct communication has broken down. Legal threats against researchers are counterproductive and should be an absolute last resort, typically only considered in cases of deliberate extortion.
Related terms
Browse the full CRA Compliance Checklist
See how Advisory Embargo fits into your complete CRA compliance programme.