EU Cyber Resilience Act Guide for Professional Audio-Visual Equipment Vendors
Default Class for basic networked AV hardware; Important Class I for management systems and high-security facility AV
Professional audio-visual equipment vendors manufacturing networked AV processors, digital signage players, conference room systems, streaming encoders, and broadcast infrastructure hardware for the EU market must comply with the EU Cyber Resilience Act by September 2026. AV equipment with IP networking, cloud management, and remote control capabilities is within CRA scope, and large format display systems and control processors used in critical facility infrastructure may be classified as Class I.
CRA Scope and Classification for Professional AV Products
Professional AV equipment within CRA scope includes: IP-networked audio digital signal processors (DSPs), videoconferencing endpoints and room systems, streaming encoders and decoders, AV-over-IP distribution systems, broadcast routing and switching hardware, digital media players and signage controllers, and AV control systems with network management interfaces.
Most professional AV hardware with IP connectivity and management software falls into Default Class. However, AV systems deployed in security-sensitive environments — government facilities, boardrooms handling sensitive discussions, critical infrastructure control rooms — and AV management platforms controlling large distributed AV networks may be classified as Important Class I depending on their network connectivity and data processing capabilities. Vendors must assess each product's network exposure and management capabilities to determine appropriate classification.
Technical Security Requirements for Professional AV Equipment
Professional AV equipment has traditionally been managed by AV integrators rather than IT security teams, with many installations using factory default credentials on AV processors and control systems connected to the enterprise network. CRA Annex I directly addresses this systemic weakness:
- No default credentials: AV processors, conference room systems, and streaming hardware must require credential configuration at first use. The widespread practice of using default credentials (e.g.,
admin/adminon AV processors) is prohibited. - Encrypted management interfaces: Web management interfaces and API control channels must use HTTPS with valid certificates. Unencrypted HTTP management access must not be enabled by default.
- Authenticated firmware updates: AV hardware firmware updates must be cryptographically authenticated before installation. Unsigned firmware upload capability must be restricted.
- Network segmentation support: AV hardware must support operation in network-segmented AV VLANs without requiring access to corporate IT network resources.
- SBOM maintenance: AV equipment running embedded Linux with AV processing libraries and network management frameworks requires comprehensive SBOM documentation.
CVD Policy and Article 13 for AV Vendors
Professional AV vendors have traditionally not maintained formal CVD programmes, with security issues often handled informally through integrator channels. Article 13 requires a formal, publicly accessible CVD policy for all products with digital elements.
- Cover all IP-networked AV products
- Be publicly accessible via the corporate
security.txtand security pages - Provide a submission channel for security researchers and enterprise IT security teams who may discover vulnerabilities in AV equipment installed on their networks
- Define response timelines and advisory publication process
AV vendors should recognise that enterprise IT security teams — responsible for all devices on the corporate network including AV equipment — increasingly conduct security assessments of AV systems and will require a formal disclosure channel to report findings. The CVD policy enables a professional relationship with these internal and external researchers. CVD Portal provides the intake infrastructure for vendors establishing CVD programmes for the first time.
Article 14 Incident Reporting for AV Products
Article 14 incident reporting for AV vendors covers active exploitation of vulnerabilities in networked AV hardware or management software. AV equipment on enterprise networks has been used as an attack vector for lateral movement in documented enterprise security incidents — a compromised conference room AV system can provide a foothold on the corporate network.
- Exploitation of AV processor web management vulnerabilities for unauthorised access to enterprise networks
- Use of compromised AV equipment for eavesdropping on conference room audio or video
- Firmware replacement on AV hardware to establish persistent network access
The 24-hour ENISA notification must be triggered when active exploitation is confirmed through threat intelligence or customer reports. Vendors should maintain a process for receiving exploitation reports from enterprise IT security teams, who are often the first to detect AV equipment compromise within their environments.
Conformity Assessment for Professional AV Equipment
Default Class professional AV products may use Module A self-assessment. The technical file for professional AV hardware must address the specific network management security architecture that has historically been a weakness in this product category.
- Document the classification rationale — confirm Default Class or justify Class I if applicable
- Assess the product against Annex I Part I, with specific attention to default credentials, management interface security, and firmware update authentication
- Prepare a threat model that accounts for AV equipment as a network-connected device on enterprise infrastructure
- Maintain an SBOM for firmware and management software components
- Issue the EU Declaration of Conformity
Vendors with products used in government, defence, or security-sensitive facilities should consider voluntary Class I assessment even where Default Class applies, as government procurement processes are increasingly requiring third-party security certification evidence.
CVD Portal handles your CRA Article 13 obligations automatically.
Public CVD submission portal, 48-hour acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for Professional Audio-Visual Equipment Vendors.
Start your free portalFrequently asked
Are cloud-managed AV systems (e.g., cloud-based conference room management) within CRA scope?+
Yes. Cloud-managed AV systems — where configuration, monitoring, and firmware management occur via a vendor-operated cloud platform — involve both hardware products with digital elements (the AV endpoint hardware) and software (the cloud management agent). The hardware must meet Annex I technical requirements, including security of the cloud management channel. The vendor is responsible for ensuring the cloud management integration does not introduce vulnerabilities into the AV hardware. Cloud-only management platforms without associated hardware products may fall under NIS2 digital service provider obligations rather than CRA product obligations.
How do AV integrators' security responsibilities differ from the manufacturer's CRA obligations?+
The CRA manufacturer obligation sits with the entity placing the product on the EU market. AV integrators who install equipment supplied by manufacturers are not CRA manufacturers for that equipment — they are installers. However, AV integrators who source, brand, or substantially modify third-party AV equipment for EU market sale may take on manufacturer-equivalent obligations. From a practical standpoint, AV integrators are responsible for secure installation (changing default credentials, configuring network segmentation, applying firmware updates) and should demand CRA-compliant products from their hardware suppliers. Integrators are increasingly required to provide security evidence to enterprise customers — CRA compliance documentation from equipment manufacturers supports this.
Are microphones and cameras in conference room systems subject to GDPR as well as CRA?+
Yes. Conference room systems with built-in cameras and microphones process personal data — audio and video recordings of meeting participants. GDPR obligations apply to the data processing (controller obligations for the organisation operating the system) and to the system design (data protection by design — Article 25 GDPR). The CRA addresses the cybersecurity of the device, ensuring that the microphone and camera cannot be accessed by unauthorised parties. CRA compliance (ensuring the AV system cannot be remotely accessed for eavesdropping) is simultaneously a GDPR data protection by design measure. Manufacturers should document how CRA Annex I security measures satisfy GDPR Article 25 requirements for privacy-by-design in their product documentation.
Key CRA articles for Professional Audio-Visual Equipment Vendors
Need a CVD policy template for Professional Audio-Visual Equipment Vendors?
Download a free CRA-compliant vulnerability disclosure policy and deploy it in minutes.