Security Researcher
A security researcher is an individual or organisation that investigates security vulnerabilities in products, systems, or software — often independently of the affected manufacturer — and reports findings to enable remediation. The EU Cyber Resilience Act recognises the role of security researchers as essential contributors to the vulnerability discovery ecosystem and requires manufacturers to establish accessible disclosure channels for them.
A security researcher is an individual or organisation that investigates security vulnerabilities in products, systems, or software — often independently of the affected manufacturer — and reports findings to enable remediation. The EU Cyber Resilience Act recognises the role of security researchers as essential contributors to the vulnerability discovery ecosystem and requires manufacturers to establish accessible disclosure channels for them.
CVD & Vulnerability ManagementWho Is a Security Researcher?
A security researcher is any individual or organisation that investigates the security properties of products, systems, or software — probing for vulnerabilities, misconfigurations, or design flaws. Security researchers range from professional penetration testers employed by security firms, to academic researchers conducting independent investigations, to hobbyist hackers who analyse products in their own time. What distinguishes a security researcher from an attacker is intent: researchers seek to identify vulnerabilities in order to report them and enable fixes, not to exploit them for malicious gain. The security research community is a vital force in improving product security and has historically discovered the majority of significant software vulnerabilities.
Security Researchers Under the CRA
The CRA acknowledges the critical role that security researchers play in the vulnerability discovery ecosystem. Recital 63 states that manufacturers should facilitate the ability of security researchers and others to report vulnerabilities. Article 13(6) requires manufacturers to establish a CVD policy that enables researchers — and users — to submit vulnerability reports through accessible channels. Critically, the CRA does not require researchers to be professionals, to have a commercial relationship with the manufacturer, or to obtain prior permission before investigating a product they lawfully possess. The CVD policy must be open and accessible to any good-faith reporter.
Safe Harbour and Legal Protections for Researchers
One of the most important features of a compliant CVD policy is the safe harbour clause — an explicit statement by the manufacturer that it will not pursue legal action against researchers who discover and report vulnerabilities in good faith, within the scope of the policy, and without causing unnecessary harm. Without safe harbour, researchers face legal risk under computer misuse laws and may choose not to report — or to disclose publicly without giving the manufacturer a remediation opportunity. The CRA's recognition of CVD as mandatory implicitly requires that the CVD process is accessible: a process that exposes reporters to legal risk is not genuinely accessible. Manufacturers should seek legal advice to draft a robust safe harbour clause.
Common Mistakes
The most counter-productive mistake a manufacturer can make is pursuing legal action against a researcher who reported a vulnerability in good faith. This destroys the manufacturer's reputation with the security research community, ensures that future vulnerabilities in their products go unreported, and constitutes a failure of the CVD obligation to maintain an accessible reporting channel. Other common failures include: not acknowledging reports within a reasonable timeframe (5 business days is standard); not updating reporters on remediation progress; and failing to credit researchers in security advisories when requested — a standard professional courtesy that motivates future responsible disclosure.
CVD Portal makes Security Researcher compliance straightforward.
Public CVD submission portal, acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for EU manufacturers.
Start your free portalFrequently asked
Does the CRA grant security researchers the right to test any product?+
The CRA does not create an explicit right for researchers to test products. However, it does require manufacturers to maintain open CVD channels that researchers can use to report findings. Researchers who test products they lawfully own in a manner consistent with the manufacturer's CVD policy — and without causing harm to other users — are acting within the spirit of the CRA's vulnerability disclosure framework. Manufacturers who attempt to criminalise good-faith research on their own products undermine the CVD obligations the CRA imposes.
What should a manufacturer do when a researcher reports a vulnerability?+
The manufacturer should: (1) acknowledge receipt of the report within 5 business days; (2) validate the report and assess its severity using CVSS; (3) communicate the remediation timeline to the researcher; (4) provide regular progress updates throughout the remediation period; (5) notify the researcher when a fix is released; (6) credit the researcher in the security advisory if they wish to be credited; and (7) coordinate the public disclosure timing with the researcher, respecting any agreed embargo period. This process should be documented in the CVD policy.
Are security researchers protected from prosecution in the EU when reporting vulnerabilities?+
EU law does not provide a universal blanket protection for security researchers, though several member states have enacted or are considering safe harbour provisions in their national law. The CRA's requirement for manufacturers to maintain accessible CVD processes implies that good-faith reporting should not be criminalised, but researchers should review the specific safe harbour terms in a manufacturer's CVD policy before testing. The EU's Network and Information Systems Directive (NIS2) also encourages coordinated disclosure, but criminal law remains a national competence. Manufacturers' safe harbour clauses are the primary legal protection researchers can rely on.
Related terms
Browse the full CRA Compliance Checklist
See how Security Researcher fits into your complete CRA compliance programme.