Common Security Advisory Framework (CSAF)
CSAF is an OASIS open standard for machine-readable security advisory documents, replacing the older CVRF format. ENISA recommends CSAF as the preferred format for security advisories published by manufacturers under the EU Cyber Resilience Act.
CSAF is an OASIS open standard for machine-readable security advisory documents, replacing the older CVRF format. ENISA recommends CSAF as the preferred format for security advisories published by manufacturers under the EU Cyber Resilience Act.
Security Standards & FrameworksWhat Is CSAF?
The Common Security Advisory Framework (CSAF) is an OASIS open standard (CSAF 2.0, published 2022) that defines a JSON-based format for machine-readable security advisories. CSAF advisories contain structured data about vulnerabilities — CVE IDs, CVSS scores, affected products (using CPE or PURL identifiers), remediation status, and fix availability — enabling downstream tools to automate vulnerability correlation and patch management. CSAF supersedes the older CVRF (Common Vulnerability Reporting Framework) XML format. CSAF also defines distribution requirements: advisories must be published at a standardised URL path and listed in a CSAF provider-metadata.json index.
CSAF Under the CRA
The CRA requires manufacturers to publish security advisories when releasing patches (Annex I Part II), but does not mandate CSAF by name. ENISA's published guidance strongly recommends CSAF as the format for CRA-compliant advisories. Key reasons:
- Machine-readability — CSAF enables customers' vulnerability management tools to automatically ingest advisory data without manual parsing.
- VEX support — CSAF supports VEX (Vulnerability Exploitability eXchange) documents, allowing manufacturers to assert which CVEs do and do not affect specific product versions.
- CSIRT compatibility — national CSIRTs that manufacturers must notify under Article 14 are increasingly CSAF-native and expect structured data.
- Regulatory auditing — a structured, versioned CSAF archive provides an audit trail of vulnerability handling activity.
Publishing CSAF Advisories
A CSAF advisory publication workflow for a CRA-obligated manufacturer:
- Draft — author the advisory in CSAF JSON format, including document metadata, product tree (affected products and versions), vulnerability records (CVE, CVSS, CWE), and remediation entries.
- Validate — use the CSAF validator tool (open-source, from BSI / OASIS) to check schema conformance and business rule compliance.
- Sign — sign the advisory document and its SHA-256/SHA-512 hash files.
- Publish — upload to
/.well-known/csaf/on your advisory distribution domain alongside an updatedprovider-metadata.jsonand aggregator-accessible index. - Notify — reference the CSAF advisory URL in ENISA/CSIRT notifications required by Article 14.
CSAF Profile Selection
CSAF 2.0 defines six profiles for different advisory types:
- CSAF Base — minimal required fields only.
- Security Advisory — the standard profile for disclosing fixed vulnerabilities.
- VEX — for asserting exploitability status without remediation information.
- CSAF Informational Advisory — non-security product notices.
For CRA compliance, manufacturers will primarily use the Security Advisory and VEX profiles. VEX is particularly valuable for communicating which CVEs in shared upstream components do not affect your specific product build, reducing unnecessary customer patch workloads.
CVD Portal makes Common Security Advisory Framework (CSAF) compliance straightforward.
Public CVD submission portal, acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for EU manufacturers.
Start your free portalFrequently asked
Is CSAF required by the CRA, or is it just recommended?+
The CRA requires security advisories to be published but does not mandate a specific format. CSAF 2.0 is the format recommended by ENISA and expected by national CSIRTs. As CSAF adoption grows across the EU regulatory ecosystem, manufacturers who publish advisories in proprietary or PDF-only formats will face increasing pressure to migrate. Starting with CSAF from the outset is significantly easier than retrofitting it later.
Can we publish CSAF advisories without technical expertise?+
CSAF JSON authoring requires some technical familiarity, but tooling significantly reduces the barrier. Several open-source and commercial tools can generate CSAF documents from form-based inputs. The CSAF validator (free, from BSI) catches errors before publication. For manufacturers issuing fewer than ten advisories per year, a template-based approach with a technical reviewer is practical and cost-effective.
What is VEX and how does it relate to CSAF?+
VEX (Vulnerability Exploitability eXchange) is a document type that allows manufacturers to communicate the exploitability status of specific CVEs in specific product versions — particularly for CVEs in shared upstream components that may or may not be reachable in a given product configuration. VEX is defined as a CSAF profile and is increasingly important for SBOM-linked vulnerability management, allowing customers to suppress irrelevant CVE alerts without manual investigation.
Related terms
Browse the full CRA Compliance Checklist
See how Common Security Advisory Framework (CSAF) fits into your complete CRA compliance programme.