EU Cyber Resilience Act Guide for HVAC & Climate Control Manufacturers
Default Class for residential thermostats; Important Class I for industrial HVAC controllers with BMS integration
HVAC and climate control manufacturers placing networked heating, ventilation, air conditioning, and refrigeration systems on the EU market must comply with the EU Cyber Resilience Act by September 2026. Connected HVAC controllers, building management system (BMS) integration gateways, and smart thermostats are products with digital elements. Industrial HVAC systems integrated into building automation networks face Important Class I classification; residential smart thermostats are typically Default Class.
CRA Scope and Classification for HVAC Products
HVAC products within CRA scope include: connected room thermostats with WiFi or Zigbee connectivity, commercial HVAC unit controllers with BMS interfaces (BACnet, Modbus, LonWorks), refrigeration controllers with remote monitoring, air handling unit controllers with IP management, and building management system (BMS) gateways integrating HVAC systems into facility management platforms.
Residential smart thermostats with consumer WiFi connectivity and companion app control are typically Default Class — limited data processing and manageable attack surface. Commercial and industrial HVAC controllers integrated into building management networks, managing HVAC for large facilities, or connected via BACnet/IP to facility management systems are more likely to be Important Class I. Data centre cooling systems and pharmaceutical cleanroom HVAC — where temperature and humidity control has direct product quality and safety implications — may warrant Class I assessment even if the controller itself is otherwise modest.
Technical Security Requirements for HVAC Controllers
HVAC controllers in commercial buildings are frequently connected to building management systems that share network infrastructure with IT systems — creating pathways for cyberattacks (multiple documented ransomware incidents entered building systems via HVAC VPN connections). CRA Annex I requirements address this systemic risk:
- Default credential elimination: Commercial HVAC controllers accessed via BACnet, Modbus, or web interfaces must not use factory default credentials. The Target breach (via HVAC contractor VPN access) demonstrated the consequences of poor HVAC access security.
- Encrypted management: Web-based and IP management interfaces must use HTTPS. BACnet/Secure Connect (BACnet over TLS) should replace legacy unencrypted BACnet where technically feasible.
- Authenticated firmware updates: Remote firmware updates to HVAC controllers must be cryptographically authenticated.
- Network segmentation: HVAC controllers must support isolated network configuration — not requiring connection to corporate IT networks for management.
- SBOM maintenance: Embedded RTOS and BMS communication protocol stack components must be documented in a comprehensive SBOM.
CVD Policy and Article 13 for HVAC Vendors
HVAC manufacturers — from large multinational climate companies to specialist controller manufacturers — largely lack formal CVD programmes. Security researchers who discover vulnerabilities in HVAC controllers (a documented research area given the Target breach publicity) find no structured disclosure channel. Article 13 mandates this change.
- Cover all IP-networked HVAC products and BMS integration hardware
- Be accessible via the corporate
security.txtand product security pages - Provide a submission channel for security researchers and building facility managers who identify anomalous HVAC behaviour suggesting compromise
- Define response timelines that account for the building operations context — HVAC vulnerabilities in critical facilities may require emergency response procedures
- Coordinate with building management system integrators who need to apply patches across facility deployments
CVD Portal enables HVAC manufacturers without dedicated security teams to establish a structured CVD programme, with intake, triage, and advisory publication workflows appropriate for organisations managing building technology products.
Article 14 Incident Reporting for HVAC Products
- Exploitation of HVAC controller vulnerabilities as a network entry point into building infrastructure
- Manipulation of temperature or environmental controls in critical facilities (data centres, pharmaceutical storage, hospitals)
- Use of HVAC management credentials to access broader BMS systems controlling fire, access control, and other building safety systems
The 24-hour ENISA notification must be triggered when exploitation is confirmed. For HVAC incidents affecting critical facility operators — hospitals, data centres, pharmaceutical manufacturers — parallel notification to the facility operator and potentially to sectoral CSIRTs is essential given the potential operational safety implications. Manufacturers should pre-establish direct notification protocols with major enterprise and critical facility customers for use in Article 14 scenarios.
Conformity Assessment and BMS Standards
Default Class residential HVAC products may self-assess under Module A. Class I commercial HVAC controllers require third-party conformity assessment. For manufacturers spanning both residential and commercial product lines, separate conformity assessment pathways apply to different product families.
- BMS communication security (BACnet/SC, Modbus TCP authentication)
- Web management interface security (HTTPS enforcement, authentication)
- Firmware update authentication mechanism
- SBOM for embedded software components
- CVD policy operational status
Vendors with products certified under BACnet Testing Laboratories (BTL) or with BACnet/Secure Connect implementation can use BTL test reports as supporting evidence for the communication protocol security aspects of CRA assessment. The building automation sector's adoption of ASHRAE Guideline 35 (Cybersecurity for Building Automation Systems) provides an aligned framework that manufacturers should reference in their technical files.
CVD Portal handles your CRA Article 13 obligations automatically.
Public CVD submission portal, 48-hour acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for HVAC & Climate Control Manufacturers.
Start your free portalFrequently asked
Is a connected residential smart thermostat definitely Default Class under the CRA?+
Most connected residential thermostats — which provide remote temperature control and scheduling via a smartphone app — are Default Class, enabling self-assessment conformity. The classification is Default Class because these products typically have limited data processing (temperature schedules, energy consumption), no direct connection to critical infrastructure, and manageable attack surface. However, a thermostat that integrates with a home energy management system controlling heating, cooling, and energy storage for demand response programmes — interfacing with the grid operator — may have elevated classification risk. Manufacturers should document their classification rationale and review it if product capabilities are expanded through software updates.
How does the CRA interact with the F-Gas Regulation and Energy Performance of Buildings Directive?+
The F-Gas Regulation and Energy Performance of Buildings Directive (EPBD) govern the environmental performance and installation requirements for HVAC systems. The CRA is separate and governs cybersecurity of the digital elements in HVAC products. All three regulatory frameworks apply to HVAC manufacturers placing products on the EU market and must be satisfied independently. The EPBD's smart readiness indicator (SRI) framework may intersect with CRA connected HVAC requirements, as SRI credits require connectivity features that expand the CRA-relevant attack surface. HVAC manufacturers should ensure that SRI-qualifying connectivity features are implemented in accordance with CRA Annex I security requirements.
How do HVAC manufacturers handle security patches for controllers installed in buildings with limited IT infrastructure?+
Commercial HVAC controllers installed in buildings with limited IT infrastructure — older sites without enterprise IT support — present a significant patch delivery challenge. The CRA requires manufacturers to provide security updates throughout the declared supported lifetime and to make them reasonably accessible to operators. Practical approaches include: USB-based firmware update delivery for sites without reliable internet connectivity, field technician-assisted update programmes during scheduled maintenance visits, and cloud-based update delivery through secure connections where connectivity is available. Manufacturers should design update delivery mechanisms that account for the range of deployment contexts their products encounter, and must not declare supported lifetimes that exceed their realistic ability to deliver updates to all deployment scenarios.
Key CRA articles for HVAC & Climate Control Manufacturers
Need a CVD policy template for HVAC & Climate Control Manufacturers?
Download a free CRA-compliant vulnerability disclosure policy and deploy it in minutes.