EU Cyber Resilience Act Guide for Fleet Management & Telematics Vendors
Important Class I for OBD/telematics hardware with vehicle network access or cellular connectivity
Fleet management and telematics vendors placing OBD dongles, connected vehicle gateways, tachograph interface hardware, and fleet management software on the EU market must comply with the EU Cyber Resilience Act by September 2026. Telematics hardware that connects to vehicle CAN bus systems or transmits location and operational data via cellular networks is classified as Important Class I, given its direct interface with vehicle systems and the sensitivity of the operational data it processes.
CRA Scope and Classification for Telematics Products
Fleet management hardware — OBD-II dongles, CAN bus gateways, satellite tracking units, tachograph remote download devices, and trailer telematics units — are products with digital elements within CRA scope. Software platforms for fleet management that include an installed hardware component (gateway, dongle) are similarly in scope for the hardware element.
Telematics hardware that connects directly to a vehicle's diagnostic port or CAN bus presents elevated risk: a compromised telematics device could potentially inject commands into vehicle systems or exfiltrate sensitive operational data. Such products are classified as Important Class I under Annex III. OBD-connected devices are specifically relevant given the growing use of telematics for commercial vehicle compliance (digital tachograph, emissions monitoring, ADAS data collection) and insurance telematics. Vendors must assess each product's vehicle integration depth to determine classification.
Annex I Technical Requirements for Telematics Hardware
Telematics hardware vendors must address Annex I requirements that account for the vehicle-network interface and cellular connectivity of their products:
- Authenticated CAN/OBD access: Where a telematics device reads from or writes to vehicle CAN bus systems, access must be authenticated and the device must not accept commands from unauthorised sources that could be passed to the vehicle network.
- Cellular communication security: All data transmitted over cellular networks (MQTT, HTTPS, proprietary protocols) must be encrypted with current TLS standards. Certificate pinning should be considered for high-security applications.
- Firmware update authentication: OTA firmware updates to telematics hardware must be cryptographically signed. Update delivery over cellular must verify integrity before installation.
- Data minimisation: Telematics devices must not collect or transmit data beyond what is necessary for the declared fleet management function.
- Remote wipe/disable: If the telematics device processes sensitive fleet or driver data, a mechanism for remote data wipe upon device loss or end-of-service must be provided.
CVD Policy and Article 13 for Telematics Vendors
Fleet management vendors serve commercial vehicle operators — logistics companies, bus operators, construction fleets — whose operations depend on the integrity and confidentiality of telematics data. Security vulnerabilities in telematics hardware or platforms can expose route planning data, driver behaviour records, and vehicle location information that has significant commercial sensitivity.
- Define the scope of covered products (hardware and software)
- Provide a submission channel for fleet operator security teams and independent researchers
- Commit to customer notification for vulnerabilities that could expose fleet operational data
- Address vehicle security implications — vulnerabilities that could affect vehicle systems (via OBD interface) must be treated with elevated urgency and coordinated with vehicle OEMs where relevant
CVD Portal enables telematics vendors without dedicated security teams to establish a standards-compliant CVD programme through the intake, triage, and advisory publication workflow.
Article 14 Incident Reporting for Fleet Telematics
Article 14 applies when a telematics vulnerability is being actively exploited. For fleet management vendors, exploitation scenarios include mass location data exfiltration, fleet route manipulation, and in rare cases, vehicle system interference via the OBD interface. The 24-hour ENISA notification requirement must be built into incident response procedures.
Fleet operators who are themselves NIS2-obligated entities (e.g., transport operators designated as essential services) have independent incident reporting obligations. Telematics vendors should be prepared to provide fleet operator customers with the technical information they need to fulfil their own NIS2 reporting obligations, in addition to filing the Article 14 CRA report. The coordination between vendor CRA reporting and operator NIS2 reporting should be pre-agreed as part of commercial contracts and security incident response plans.
Conformity Assessment and Vehicle Cybersecurity Standards
Class I telematics products require third-party conformity assessment. Vendors should leverage alignment with UNECE WP.29 R155 (which applies to the vehicles themselves) and ISO/SAE 21434 (automotive cybersecurity engineering) as evidence supporting CRA conformity assessment.
- The vehicle interface security design (CAN bus access controls, OBD communication security)
- Cellular communication security architecture
- OTA update security mechanism
- SBOM for firmware and software components
- CVD policy and operational status
Vendors with products subject to tachograph regulations (EU 165/2014 and amendments) should ensure that CRA conformity assessment covers tachograph interface components — these have additional security requirements under tachograph-specific regulations.
CVD Portal handles your CRA Article 13 obligations automatically.
Public CVD submission portal, 48-hour acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for Fleet Management & Telematics Vendors.
Start your free portalFrequently asked
Are insurance telematics (UBI) devices subject to the CRA?+
Yes. Usage-based insurance (UBI) telematics devices — OBD dongles or smartphone-based telematics that collect driving behaviour data for insurance pricing — are products with digital elements within CRA scope when they are placed on the EU market as hardware products. The Class I classification applies given the OBD interface and cellular connectivity. Insurance telematics vendors must also address GDPR requirements for the sensitive driving behaviour data collected, which runs in parallel with CRA cybersecurity obligations. Devices processing biometric driving pattern data (harsh braking, cornering g-forces) must apply both CRA Annex I security requirements and GDPR data minimisation principles.
Does a fleet management platform (pure SaaS, no hardware) require CRA compliance?+
A pure SaaS fleet management platform with no associated hardware component falls primarily outside strict CRA product scope and is instead subject to NIS2 digital service provider obligations if it qualifies as a cloud computing service. However, if the SaaS platform provides a mobile app or installed desktop component, those software components are products with digital elements. Vendors should conduct a scope assessment for each product offering. Providing connected hardware (OBD dongle, gateway) alongside a SaaS platform brings the hardware within CRA scope; the SaaS platform's integration security must also meet Annex I requirements.
How do we handle CRA compliance for third-party OBD hardware we resell under our brand?+
If you place a third-party OBD device on the EU market under your own brand name, you are the manufacturer for CRA purposes, regardless of who physically manufactures the hardware. This means you are responsible for CRA conformity, including obtaining technical documentation from the original manufacturer, verifying Annex I compliance, maintaining an SBOM, establishing a CVD policy, and providing security updates throughout the product's declared supported lifetime. White-labelling arrangements must be reviewed and updated to ensure the original manufacturer provides the security documentation and ongoing support you need to fulfil your CRA manufacturer obligations.
Key CRA articles for Fleet Management & Telematics Vendors
Need a CVD policy template for Fleet Management & Telematics Vendors?
Download a free CRA-compliant vulnerability disclosure policy and deploy it in minutes.