EU Cyber Resilience Act Guide for Private 5G & Industrial Wireless Vendors
Important — Class I or Class II; core network components likely Class II
Vendors of private 5G network equipment, industrial Wi-Fi infrastructure, and CBRS/NR-U industrial wireless systems deployed in EU manufacturing, logistics, and critical infrastructure environments face CRA obligations as manufacturers of products with digital elements. Private 5G gNBs, core network components, and network management platforms are likely Important Products under Annex III, given their role as foundational connectivity infrastructure. The intersection of CRA obligations and Radio Equipment Directive (RED) cybersecurity delegated act requirements creates a dual compliance framework for wireless equipment vendors.
CRA Scope and Interaction with RED Delegated Act
Private 5G gNBs (base stations), 5G core network components (AMF, SMF, UPF), network management systems (NMS), and industrial wireless access points — when placed on the EU market as standalone commercial products — are products with digital elements subject to the CRA. The Radio Equipment Directive (RED) Delegated Act (EU 2022/30) imposes cybersecurity requirements on internet-connected radio equipment, including privacy, fraud protection, and network harm prevention requirements. From August 2025, RED delegated act compliance is mandatory for affected radio equipment, and the CRA adds further security requirements from September 2026. Vendors must map their obligations under both frameworks: RED covers radio-specific consumer equipment; the CRA covers all products with digital elements including enterprise and industrial network infrastructure. Products subject to both must comply with both.
Technical Security Obligations for 5G Infrastructure
Private 5G network infrastructure is itself security-critical — it provides the connectivity layer for industrial IoT, robotics, automated guided vehicles, and operational technology systems in factories and logistics facilities. Annex I requirements for 5G vendors include: implementing authenticated and encrypted management plane communications for all gNB and core network management interfaces; eliminating default administrative credentials and requiring strong credential setup on initial deployment; providing cryptographically signed firmware updates with rollback protection; supporting network slicing isolation controls where applicable; maintaining audit logs of all configuration changes and management access events; and implementing network-level security controls protecting attached devices from attacks routed through the private 5G network. The SBOM must cover all software components in the gNB and core network, including open-source 5G stack components (e.g. OpenAirInterface, free5GC) that are increasingly used in private 5G implementations.
CVD Policy Under Article 13 for Telecommunications Vendors
Article 13 mandates a published CVD policy. Telecommunications infrastructure vendors face active security research communities — 5G protocol vulnerabilities are regularly published at academic and industry security conferences. The CVD policy must: establish a dedicated security reporting channel separate from general customer support; define researcher acknowledgment timelines and disclosure handling procedures; address coordination with national CSIRTs for telecommunications infrastructure vulnerabilities, given the critical infrastructure implications; and specify how security updates and advisories are communicated to operators of deployed private 5G networks. For vendors with both enterprise and carrier-grade 5G product lines, the CVD policy should address differences in disclosure handling between consumer-facing and operator-grade products. GSMA's Coordinated Vulnerability Disclosure guidelines provide a useful framework complement to the CRA requirements.
Article 14 Incident Reporting for Network Infrastructure
Article 14 requires notification to the relevant national CSIRT within 24 hours of confirmed active exploitation. For private 5G vendors, exploitation of a gNB or core network vulnerability could compromise the connectivity of an entire industrial facility — affecting manufacturing operations, autonomous vehicle guidance, or industrial control system communications depending on what runs over the private 5G network. The downstream consequences of a private 5G network compromise depend entirely on the applications it supports, and vendors must communicate this amplification risk to customers in security advisories. Vendors with products deployed in critical infrastructure sectors — energy, water, healthcare — should maintain pre-established contact channels with the relevant sector CSIRTs in addition to the general national CSIRT notification process.
Conformity Assessment: CRA and RED Coordination
Private 5G equipment subject to both RED delegated act and CRA conformity requirements should coordinate assessments to leverage shared technical documentation. For radio equipment, RED conformity may use harmonised standards that overlap with CRA Annex I requirements. The CRA technical file must additionally cover: SBOM; CVD policy; Article 14 notification procedures; and post-market vulnerability monitoring specific to CRA obligations. Core network software components (AMF, SMF, UPF) that are sold as software-only products are not covered by RED but remain fully in scope under CRA. Class II products require notified body assessment; Class I products may self-declare. Vendors should verify their CRA classification before the RED delegated act compliance deadline of August 2025, as the two compliance deadlines are in close sequence.
CVD Portal handles your CRA Article 13 obligations automatically.
Public CVD submission portal, 48-hour acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for Private 5G & Industrial Wireless Vendors.
Start your free portalFrequently asked
We supply private 5G infrastructure to a system integrator who deploys it for end customers. Are we or the integrator responsible for CRA compliance?+
As the original manufacturer of the 5G equipment, you bear CRA obligations for the security of your products regardless of how they reach the end customer. The system integrator who deploys your equipment becomes a 'distributor' under the CRA unless they substantially modify the product, in which case they assume manufacturer obligations for the modified system. Supply contracts should clearly define: your obligations as equipment manufacturer (Annex I security requirements, CVD policy, Article 14 notification); the integrator's obligations for deployment security (network architecture, configuration); and the customer's operational security responsibilities. This allocation does not reduce your obligations — it clarifies parallel responsibilities.
Our private 5G core uses open-source 5G stack components. How do we handle SBOM and vulnerability monitoring for these components?+
Open-source 5G stack components (such as free5GC, Open5GS, or OpenAirInterface) are in scope for your SBOM obligations just as proprietary components are. Use software composition analysis tooling to generate machine-readable SBOMs from your core network software builds. Monitor OSV.dev, NVD, and project-specific security advisories for CVEs affecting your open-source components. When critical vulnerabilities are identified in upstream open-source projects, you must assess impact, develop patches or workarounds, and issue updates to customers. The pace of open-source vulnerability disclosure in the 5G stack is significant — automated SBOM vulnerability scanning integrated into your CI/CD pipeline is strongly advisable.
How do the CRA's security update obligations apply to 5G firmware deployed on customer-managed hardware?+
You are obligated to make security updates available without undue delay for all supported products — you cannot fulfil this obligation solely by developing a patch without providing customers with a straightforward update delivery mechanism. For private 5G equipment on customer-managed hardware, this means providing: documented update procedures; update packages with integrity verification; release notes that clearly identify the security issues resolved; and customer advisories specifying the urgency and recommended installation timeline for each update. Customers who delay applying security updates are making their own risk decisions — your obligation is to ensure the update is available, documented, and communicated. Contractual provisions should clarify customer responsibility for timely patch application.
Key CRA articles for Private 5G & Industrial Wireless Vendors
Need a CVD policy template for Private 5G & Industrial Wireless Vendors?
Download a free CRA-compliant vulnerability disclosure policy and deploy it in minutes.