Critical Vulnerability
A critical vulnerability is a security flaw assigned a CVSS base score of 9.0 or higher, indicating the highest potential for harm — typically enabling remote code execution or full system compromise without authentication. Critical vulnerabilities require accelerated remediation and immediate advisory publication under CRA-compliant vulnerability handling processes.
A critical vulnerability is a security flaw assigned a CVSS base score of 9.0 or higher, indicating the highest potential for harm — typically enabling remote code execution or full system compromise without authentication. Critical vulnerabilities require accelerated remediation and immediate advisory publication under CRA-compliant vulnerability handling processes.
CVD & Vulnerability ManagementWhat Is a Critical Vulnerability?
A critical vulnerability is a security flaw with a CVSS base score of 9.0 to 10.0 on the standard 0–10 severity scale. This score reflects the highest potential impact: vulnerabilities in this range typically allow an unauthenticated attacker to remotely execute arbitrary code, gain full administrative control, or cause complete denial of service with no user interaction required. Classic examples include buffer overflow vulnerabilities in network-facing services, authentication bypass flaws in administrative interfaces, and SQL injection vulnerabilities with full database access. Critical vulnerabilities in widely deployed products are priority targets for threat actors and are frequently weaponised within days of public disclosure, making rapid manufacturer response essential.
CVSS and the Critical Severity Band
The CVSS (Common Vulnerability Scoring System) framework, published by FIRST, defines five severity bands: None (0.0), Low (0.1–3.9), Medium (4.0–6.9), High (7.0–8.9), and Critical (9.0–10.0). Achieving a Critical base score requires a combination of high impact ratings (confidentiality, integrity, and/or availability) with low attack complexity, no required privileges, and no user interaction — or equivalently, network accessibility combined with high impact and no mitigating factors. CVSS v4.0 introduced additional granularity including threat metrics and supplemental scores, but the base score critical threshold remains at 9.0. Manufacturers should note that a high CVSS base score does not always mean high contextual risk — environmental scoring can adjust the effective severity when compensating controls are in place.
Critical Vulnerability Response Under the CRA
The CRA does not define 'critical' as a specific regulatory category but requires that vulnerabilities be addressed 'without undue delay' — language that industry interprets as requiring the fastest response for the highest-severity issues. For critical vulnerabilities, CRA-compliant manufacturers should:
- Triage within 24–48 hours: Validate the vulnerability, confirm scope, and establish an EPSS-informed exploitation probability assessment.
- Issue interim advisory within 5 days: Even before a patch is available, publish guidance on mitigations and workarounds.
- Target patch release within 30 days: Compress the development and testing cycle, with emergency release approval processes bypassing normal sprint cadences.
- Notify ENISA immediately if actively exploited: If evidence of exploitation exists, the 24-hour notification obligation applies regardless of patch status.
Managing Critical Vulnerabilities in Dependencies
A significant proportion of critical vulnerabilities affecting products originate in third-party dependencies — open source libraries, commercial SDKs, or firmware components. Log4Shell (CVE-2021-44228, CVSS 10.0) is the canonical example: a single critical vulnerability in a widely used logging library that affected thousands of products across hundreds of manufacturers. For manufacturers subject to the CRA, this means maintaining a current SBOM is not optional — it is the prerequisite for rapid identification of affected products when critical upstream vulnerabilities are disclosed. Manufacturers should have a defined process for SBOM-based CVE correlation that can be executed within hours of a critical CVE being published, not days.
CVD Portal makes Critical Vulnerability compliance straightforward.
Public CVD submission portal, acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for EU manufacturers.
Start your free portalFrequently asked
Is a CVSS 9.8 vulnerability always more dangerous than a CVSS 7.5 one?+
Not necessarily in context. CVSS base scores measure theoretical maximum impact under idealised conditions. A CVSS 9.8 vulnerability in a component that is network-isolated and not exposed to untrusted input may pose less real-world risk than a CVSS 7.5 vulnerability in an internet-facing authentication component being actively exploited. Manufacturers should use CVSS Environmental scores to adjust for their specific deployment context and use EPSS scores to supplement base scores with exploitation probability data.
How quickly should a manufacturer publish an advisory for a critical vulnerability?+
Best practice and ENISA's CVD Good Practice Guide both recommend publishing an advisory for critical vulnerabilities within 5–7 days of the fix being available. For actively exploited critical vulnerabilities, interim mitigation guidance should be published even before a fix is ready — typically within 48–72 hours of confirming exploitation. The advisory should include the CVE identifier, CVSS score, affected versions, fix version, and concrete mitigation steps.
What qualifies as a critical vulnerability for CRA notification purposes?+
The CRA does not use 'critical' as a defined notification category. Its notification obligation in Article 14 is triggered by 'active exploitation' rather than severity classification. However, a critical-severity vulnerability (CVSS 9.0+) that is confirmed as actively exploited triggers both the full Article 14 notification cascade and the manufacturer's own highest-priority response SLAs. Manufacturers should treat the combination of high CVSS score and active exploitation as the clearest mandatory-notification trigger.
Related terms
Browse the full CRA Compliance Checklist
See how Critical Vulnerability fits into your complete CRA compliance programme.