CRA Compliance Report

EU Cyber Resilience Act Assessment • 2025-12-11 22:17

EU Cyber Resilience Act (Regulation 2024/2847)

Product Information

Product Name
Model Number
Vendor
ABC Vendor
Version
17.17.01
Asset ID
Asset ID
Analysis Date
2025-08-16T04:00:39.637Z

Compliance Overview

The EU Cyber Resilience Act (CRA) establishes cybersecurity requirements for products with digital elements. This assessment evaluates compliance across all Annex I requirements.

63%
Overall Compliance
Partial
Part I: Product Security Requirements 11 of 14 clauses assessed
40% Compliant
Clause Requirement Status
1 Appropriate Cybersecurity Level Partial
2(a) No Known Exploitable Vulnerabilities Non-Compliant
2(b) Secure by Default Configuration Partial
2(c) Security Update Capability Partial
2(d) Protection from Unauthorized Access Partial
2(e) Data Confidentiality Partial
2(f) Data Integrity Partial
2(g) Data Minimization Not Assessed
2(h) Availability Protection Partial
2(i) Minimize Network Impact Partial
2(j) Limit Attack Surfaces Partial
2(k) Exploitation Mitigation Compliant
2(l) Security Logging and Monitoring Not Assessed
2(m) Secure Data Removal Not Assessed
Part II: Vulnerability Handling Requirements 8 of 8 clauses assessed
94% Compliant
Clause Requirement Status
II-1 SBOM Documentation Compliant
II-2 Vulnerability Remediation Compliant
II-3 Regular Security Testing Compliant
II-4 Vulnerability Disclosure Compliant
II-5 Coordinated Vulnerability Disclosure Policy Compliant
II-6 Vulnerability Information Sharing Compliant
II-7 Secure Update Distribution Partial
II-8 Security Update Dissemination Compliant

Part I: Product Security Requirements

Clause 1 Appropriate Cybersecurity Level
Partial
Products with digital elements shall be designed, developed and produced in such a way that they ensure an appropriate level of cybersecurity based on the risks.
NetRise Findings
CISA KEV Vulnerabilities
49
Config Checks Failed
6/20
Cracked Credentials
0
Private Keys Exposed
24
Assessment Methodology

Checks Performed:

  • CISA KEV vulnerabilities present
  • Configuration checks failed
  • Cracked credentials detected
  • Private keys compromised

Score Calculation: Starting from 100 points:

CISA KEV vulnerabilities (49 found)-30 pts
Config checks failed (6 failed)-6 pts
Cracked credentials (0 found)No penalty
Private keys exposed (24 found)-20 pts
Final Score44 pts

Status Thresholds: ≥80 = Compliant, 25-79 = Partial, <25 = Non-Compliant

Clause 2(a) No Known Exploitable Vulnerabilities
Non-Compliant
Products must be delivered without any known exploitable vulnerabilities.
NetRise Findings
CISA KEV Vulnerabilities
49
Weaponized Exploits
125
CVESeverityKEVWeaponizedEPSS
CVE-2016-5195 HIGH 🔴 Yes 💥 Yes 94.2%
CVE-2016-5195 HIGH 🔴 Yes 💥 Yes 94.2%
CVE-2017-1000253 HIGH 🔴 Yes 💥 Yes 54.4%
CVE-2017-1000253 HIGH 🔴 Yes 💥 Yes 54.4%
CVE-2019-13272 HIGH 🔴 Yes 💥 Yes 80.8%
CVE-2021-0920 MEDIUM 🔴 Yes 💥 Yes 0.9%
CVE-2021-0920 MEDIUM 🔴 Yes 💥 Yes 0.9%
CVE-2021-0920 MEDIUM 🔴 Yes 💥 Yes 0.9%
CVE-2021-0920 MEDIUM 🔴 Yes 💥 Yes 0.9%
CVE-2021-22555 HIGH 🔴 Yes 💥 Yes 86.1%
Assessment Methodology

Checks Performed:

  • Presence of vulnerabilities on CISA Known Exploited Vulnerabilities (KEV) catalog
  • Presence of vulnerabilities with weaponized exploits in the wild

Score Calculation:

CISA KEV vulnerabilities (49 found)Immediate Non-Compliance (0 pts)
Weaponized exploits (125 found)N/A (KEV present)
Final Score0 pts

Compliance Logic: Any CISA KEV vulnerability results in immediate non-compliance. Weaponized exploits without KEV entries result in partial compliance (30 pts).

Clause 2(b) Secure by Default Configuration
Partial
Products must be made available on the market with a secure by default configuration, unless otherwise agreed between manufacturer and business user in relation to a tailor-made product with digital elements, including the possibility to reset the product to its original state.
NetRise Findings
Config Checks (Total/Failed)
20/6
Critical Failed Checks
2
Cracked Credentials
0
Private Keys Found
24
Assessment Methodology

Checks Performed:

  • Cracked/weak credentials detected (passwords that can be easily broken)
  • Critical security configuration checks that failed
  • Exposed private keys in firmware/software

Score Calculation: Starting from 100 points:

Cracked credentials (0 found)No penalty
Critical failed config checks (2 found)-30 pts
Private keys exposed (24 found)-20 pts
Final Score50 pts

Status Thresholds: ≥80 = Compliant, 25-79 = Partial, <25 = Non-Compliant

Clause 2(c) Security Update Capability
Partial
Vendors must ensure that vulnerabilities can be addressed through security updates, including, where applicable, through automatic security updates that are installed within an appropriate timeframe enabled as a default setting, with a clear and easy-to-use opt-out mechanism.
NetRise Findings
Vulnerabilities Tracked
17740
Continuous Monitoring
Enabled via NetRise
Assessment Methodology

Checks Performed:

  • Vulnerability tracking and identification capability
  • Continuous monitoring for new vulnerabilities

Assessment Notes:

NetRise provides vulnerability identification and continuous monitoring capabilities. However, verification of actual update delivery mechanisms requires operational testing outside the scope of static firmware analysis.

Status: Partial - NetRise confirms monitoring capability, but update mechanism verification requires runtime testing.

Coverage Note: NetRise addresses vulnerability identification and monitoring. Update mechanism verification requires additional operational testing.
Clause 2(d) Protection from Unauthorized Access
Partial
Products must ensure protection from unauthorised access by appropriate control mechanisms, including but not limited to authentication, identity or access management systems, and report on possible unauthorised access.
NetRise Findings
Critical/High Vulnerabilities
5176
Hardcoded Credentials
230
Exposed Private Keys
24
Certificates
5161
Assessment Methodology

Checks Performed:

  • Cracked/weak credentials that could enable unauthorized access
  • Exposed private keys that could compromise authentication
  • High volume of critical vulnerabilities indicating access control weaknesses

Score Calculation: Starting from 100 points:

Cracked credentials (0 found)No penalty
Private keys exposed (24 found)-20 pts
Critical vulns >5 (244 found)-20 pts
Final Score60 pts

Status Thresholds: ≥80 = Compliant, 25-79 = Partial, <25 = Non-Compliant

Clause 2(e) Data Confidentiality
Partial
Products must protect the confidentiality of stored, transmitted or otherwise processed data, personal or other, such as by encrypting relevant data at rest or in transit by state of the art mechanisms, and by using other technical means.
NetRise Findings
Certificates Analyzed
5161
Certificates with Issues
4738
Private Keys Exposed
24
Assessment Methodology

Checks Performed:

  • Certificate validity and configuration issues
  • Exposed private keys that could compromise encrypted data

Score Calculation: Starting from 100 points:

Certificates with issues (4738 found)-30 pts
Private keys exposed (24 found)-30 pts
Final Score40 pts

Status Thresholds: ≥80 = Compliant, 25-79 = Partial, <25 = Non-Compliant

Clause 2(f) Data Integrity
Partial
Products must protect the integrity of stored, transmitted or otherwise processed data, personal or other, commands, programs and configuration against any manipulation or modification not authorised by the user, and report on corruptions.
NetRise Findings
Data Integrity Vulnerabilities
229
CWEs Checked (13 total)
Information Disclosure: CWE-200, CWE-312, CWE-319
Access Control: CWE-284, CWE-285, CWE-862, CWE-863, CWE-22
Weak Crypto: CWE-311, CWE-327
Credential Exposure: CWE-798, CWE-522

⚠ 229 vulnerabilities with data integrity CWEs found - Review recommended.

View Matching CVEs (229 total, showing top 10)
CVESeverityComponentCWEs
CVE-2005-2946 HIGH openssl 0.9.7d CWE-327
CVE-2007-2768 MEDIUM openssh 8.0 CWE-200
CVE-2010-3192 MEDIUM glibc 2.23 CWE-200
CVE-2010-4563 MEDIUM linux_kernel 6.6.21 CWE-200
CVE-2012-4530 LOW linux_kernel 3.4.103 CWE-200
CVE-2012-6536 LOW linux_kernel 3.4.103 CWE-200
CVE-2012-6537 LOW linux_kernel 3.4.103 CWE-200
CVE-2012-6538 LOW linux_kernel 3.4.103 CWE-200
CVE-2012-6539 LOW linux_kernel 3.4.103 CWE-200
CVE-2012-6540 LOW linux_kernel 3.4.103 CWE-200
Assessment Methodology

Checks Performed:

  • Scan for 13 data integrity-related CWEs across 4 vulnerability families
  • Information Disclosure: CWE-200, CWE-312, CWE-319
  • Access Control Failures: CWE-284, CWE-285, CWE-862, CWE-863, CWE-22
  • Weak/Missing Crypto: CWE-311, CWE-327
  • Credential Exposure: CWE-798, CWE-522

Score Calculation:

0 data integrity CWEs100 pts (Compliant)
1-5 data integrity CWEs70 pts (Partial)
6-15 data integrity CWEs50 pts (Partial)
>15 data integrity CWEs30 pts (Non-Compliant)
Current (229 CWE matches)30 pts

Status Thresholds: ≥80 = Compliant, 25-79 = Partial, <25 = Non-Compliant

Clause 2(g) Data Minimization
Not Assessed
Products must process only data, personal or other, that are adequate, relevant and limited to what is necessary in relation to the intended purpose of the product with digital elements (data minimisation).
NetRise Findings

Indirect coverage through security risk assessment.

Assessment Methodology

Assessment Status: Not Assessed

Data minimization requirements relate to limiting data collection and processing to what is necessary for the product's intended purpose. This is primarily a design and policy consideration that cannot be fully assessed through static firmware analysis.

Indirect Coverage: NetRise can identify potential data leakage risks through vulnerability analysis, but direct assessment of data minimization practices requires design documentation review.

Coverage Note: NetRise provides indirect coverage through identification of risks that may lead to processing of unintended data.
Clause 2(h) Availability Protection
Partial
Products must protect the availability of essential and basic functions, also after an incident, including through resilience and mitigation measures against denial-of-service attacks.
NetRise Findings
DoS-Related Vulnerabilities
253
DoS CWEs Checked (12 total)
Resource Exhaustion: CWE-400, CWE-770, CWE-404, CWE-789, CWE-1325
Algorithmic Complexity: CWE-1333, CWE-834, CWE-606
Hang/Freeze: CWE-835, CWE-674, CWE-1322
Crash-on-demand: CWE-617

⚠ 253 vulnerabilities with DoS-related CWEs found - Review recommended.

View Matching CVEs (253 total, showing top 10)
CVESeverityComponentCWEs
CVE-2012-0876 MEDIUM libexpat 1.95.5 CWE-400
CVE-2013-7470 MEDIUM linux_kernel 3.4.103 CWE-400
CVE-2014-3122 MEDIUM linux_kernel 3.4.103 CWE-400
CVE-2014-3687 HIGH linux_kernel 3.4.103 CWE-400
CVE-2014-3690 MEDIUM linux_kernel 3.14.33 CWE-400
CVE-2014-7970 MEDIUM linux_kernel 3.14.33 CWE-400
CVE-2014-8559 MEDIUM linux_kernel 3.14.33 CWE-400
CVE-2015-8785 MEDIUM linux_kernel 4.1.52 CWE-835
CVE-2016-6213 MEDIUM linux_kernel 3.4.103 CWE-400
CVE-2016-8666 HIGH linux_kernel 3.14.33 CWE-400
Assessment Methodology

Checks Performed:

  • Scan for 12 DoS-related CWEs across 4 vulnerability families
  • Resource Exhaustion: CWE-400, CWE-770, CWE-404, CWE-789, CWE-1325
  • Algorithmic Complexity (CPU): CWE-1333, CWE-834, CWE-606
  • Hang/Freeze: CWE-835, CWE-674, CWE-1322
  • Crash-on-demand: CWE-617

Score Calculation:

0 DoS-related CWEs100 pts (Compliant)
1-3 DoS-related CWEs70 pts (Partial)
4-10 DoS-related CWEs50 pts (Partial)
>10 DoS-related CWEs30 pts (Non-Compliant)
Current (253 CWE matches)30 pts

Status Thresholds: ≥80 = Compliant, 25-79 = Partial, <25 = Non-Compliant

Clause 2(i) Minimize Network Impact
Partial
Products must minimise the negative impact by the products themselves or connected devices on the availability of services provided by other devices or networks.
NetRise Findings
Network-Related Vulnerabilities
5176
DoS Vulnerabilities
253
Failed Config Checks
6/20
Assessment Methodology

Checks Performed:

  • DoS-related vulnerabilities that could impact network availability
  • Critical/High severity vulnerabilities with network impact potential
  • Failed security configuration checks

Assessment Notes:

This clause is assessed in conjunction with Clause 2(h) Availability Protection, as DoS vulnerabilities directly impact network service availability.

Score: 30 pts (based on DoS vulnerability assessment)

Status Thresholds: ≥80 = Compliant, 25-79 = Partial, <25 = Non-Compliant

Clause 2(j) Limit Attack Surfaces
Partial
Products must be designed, developed and produced to limit attack surfaces, including external interfaces.
NetRise Findings
Total Components
2063
High-Risk Vulnerabilities
174
Total Vulnerabilities
17740
Assessment Methodology

Checks Performed:

  • CISA KEV vulnerabilities (actively exploited attack vectors)
  • Weaponized exploits (high-risk attack surface exposure)
  • Component count (software attack surface size - threshold: 500)

Score Calculation: Starting from 100 points:

CISA KEV vulnerabilities (49 found)-30 pts
Weaponized exploits (125 found)-20 pts
Large component count (2063 components)-20 pts
Final Score30 pts

Status Thresholds: ≥80 = Compliant, 25-79 = Partial, <25 = Non-Compliant

Clause 2(k) Exploitation Mitigation
Compliant
Products must be designed, developed and produced to reduce the impact of an incident using appropriate exploitation mitigation mechanisms and techniques.
NetRise Findings
Weak Credentials
0
Exposed Keys
24
Failed Config Checks
6/20
Assessment Methodology

Checks Performed:

  • Weak/cracked credentials that facilitate exploitation
  • Exposed private keys that could be leveraged in attacks
  • Failed security configuration checks that reduce exploit barriers

Score Calculation: Starting from 100 points:

Weak/cracked credentials (0 found)No penalty
Exposed private keys (24 found)-20 pts
Final Score80 pts

Status Thresholds: ≥80 = Compliant, 25-79 = Partial, <25 = Non-Compliant

Clause 2(l) Security Logging and Monitoring
Not Assessed
Products must provide security related information by recording and monitoring relevant internal activity, including the access to or modification of data, services or functions, with an opt-out mechanism for the user.
NetRise Findings

Configuration analysis can be customized to verify logging presence.

Assessment Methodology

Assessment Status: Not Assessed

Security logging and monitoring requirements relate to runtime behavior and operational configuration. Static firmware analysis has limited visibility into logging implementations.

Potential Coverage: Custom configuration checks can be developed to identify presence of logging frameworks, syslog configurations, or audit trails in the firmware image.

Coverage Note: Limited coverage. Configuration analysis can be customized to identify presence of monitoring functionality. Runtime analysis capabilities planned for 2026.
Clause 2(m) Secure Data Removal
Not Assessed
Products must provide the possibility for users to securely and easily remove on a permanent basis all data and settings and, where such data can be transferred to other products or systems, ensure that this is done in a secure manner.
NetRise Findings

Configuration analysis can be customized to verify data removal capability.

Assessment Methodology

Assessment Status: Not Assessed

Secure data removal is primarily a functional capability that requires runtime testing to verify. Static analysis cannot confirm data removal procedures are implemented correctly.

Potential Coverage: Custom configuration checks can identify presence of factory reset mechanisms or data wipe utilities in the firmware.

Coverage Note: Limited coverage. Configuration analysis can be customized to identify presence of data removal functionality.

Part II: Vulnerability Handling Requirements

Clause II-1 SBOM Documentation
Compliant
Vendors must identify and document vulnerabilities and components contained in products with digital elements, including by drawing up a software bill of materials in a commonly used and machine-readable format covering at the very least the top-level dependencies of the products.
NetRise Findings
Total Components (SBOM)
2063
Components with Vulnerabilities
81
Clean Components (No CVEs)
1982 (96.1%)
Total Vulnerabilities
17740
Assessment Methodology

Checks Performed:

  • SBOM generation capability (component enumeration)
  • Component-to-vulnerability correlation
  • Export format support (CycloneDX, SPDX)

Assessment Logic:

Compliant if components are identified (2063 found). The SBOM provides complete visibility into 2063 software components, with 81 having known vulnerabilities and 1982 (96.1%) being clean.

Supported Formats: CycloneDX SPDX
Clause II-2 Vulnerability Remediation
Compliant
Vendors must, in relation to the risks posed to products with digital elements, address and remediate vulnerabilities without delay, including by providing security updates; where technically feasible, new security updates shall be provided separately from functionality updates.
NetRise Findings
Vulnerabilities Tracked
17740
Critical/High Priority
5176
With Known Fix Available
54
Continuous Monitoring
Enabled
Assessment Methodology

Checks Performed:

  • Vulnerability discovery and tracking
  • Fix version availability identification
  • Continuous monitoring for new vulnerabilities

Assessment Logic:

NetRise provides automated vulnerability discovery, prioritization, and remediation guidance. 17740 vulnerabilities tracked, with 54 having known fixes available.

Clause II-3 Regular Security Testing
Compliant
Vendors must apply effective and regular tests and reviews of the security of the product with digital elements.
NetRise Findings
CI/CD Integration
Available
Continuous Monitoring
Active
Automated Analysis
Enabled
Assessment Methodology

Checks Performed:

  • CI/CD pipeline integration capability
  • Continuous security monitoring
  • Automated firmware/software analysis

Assessment Logic:

NetRise supports integration into development pipelines for regular security testing. Continuous monitoring ensures new vulnerabilities are identified as they are disclosed.

Clause II-4 Vulnerability Disclosure
Compliant
Once a security update has been made available, vendors must share and publicly disclose information about fixed vulnerabilities, including a description of the vulnerabilities, information allowing users to identify the product with digital elements affected, the impacts of the vulnerabilities, their severity and clear and accessible information helping users to remediate the vulnerabilities.
NetRise Findings
VEX Generation
Supported
Disclosure Format
Standardized
Vulnerability Details
17740 documented
Assessment Methodology

Checks Performed:

  • VEX (Vulnerability Exploitability Exchange) document generation
  • Standardized vulnerability disclosure format
  • Impact and severity information availability

Assessment Logic:

NetRise supports VEX document generation for standardized vulnerability disclosure. All 17740 identified vulnerabilities include severity ratings, descriptions, and remediation guidance.

Supported Formats: VEX
Clause II-5 Coordinated Vulnerability Disclosure Policy
Compliant
Vendors must put in place and enforce a policy on coordinated vulnerability disclosure.
NetRise Findings
VEX Support
Enabled
Impact Assessment
Available
Severity Classification
CVSS-based
Assessment Methodology

Checks Performed:

  • VEX document support for coordinated disclosure
  • Vulnerability impact assessment capability
  • Standardized severity classification (CVSS)

Assessment Logic:

NetRise supports coordinated vulnerability disclosure through VEX document generation, enabling standardized communication with stakeholders about vulnerability status and impact.

Clause II-6 Vulnerability Information Sharing
Compliant
Vendors must take measures to facilitate the sharing of information about potential vulnerabilities in their product with digital elements as well as in third-party components contained in that product, including by providing a contact address for the reporting of the vulnerabilities discovered in the product with digital elements.
NetRise Findings
Third-Party Vulnerabilities
17740
Shareable Reports
Available
Export Formats
VEX, SBOM
Assessment Methodology

Checks Performed:

  • Third-party component vulnerability tracking
  • Exportable vulnerability reports
  • Multiple format support for information sharing

Assessment Logic:

NetRise identifies and tracks 17740 vulnerabilities in third-party components. Reports can be exported in VEX, CycloneDX, and SPDX formats for stakeholder sharing.

Supported Formats: VEX CycloneDX SPDX
Clause II-7 Secure Update Distribution
Partial
Vendors must provide for mechanisms to securely distribute updates for products with digital elements to ensure that vulnerabilities are fixed or mitigated in a timely manner and, where applicable for security updates, in an automatic manner.
NetRise Findings
Version Tracking
Enabled
Patch Validation
Available
Fix Version Detection
54 vulns with fixes
Assessment Methodology

Checks Performed:

  • Software version tracking across assets
  • Patch validation through re-analysis
  • Fix version availability detection

Assessment Logic:

NetRise provides version tracking and can validate patches through re-analysis. 54 vulnerabilities have known fix versions identified. Status is Partial as actual update distribution mechanisms require operational verification.

Clause II-8 Security Update Dissemination
Compliant
Vendors must ensure that, where security updates are available to address identified security issues, they are disseminated without delay and free of charge, accompanied by advisory messages providing users with the relevant information, including on potential action to be taken.
NetRise Findings
Advisory Generation
VEX Supported
Remediation Guidance
Available
Prioritization Data
EPSS, KEV, CVSS
Assessment Methodology

Checks Performed:

  • VEX-formatted security advisory generation
  • Remediation guidance availability
  • Vulnerability prioritization data (EPSS, KEV, CVSS)

Assessment Logic:

NetRise supports VEX document generation for security advisory dissemination. Advisories include severity, impact, fix availability, and prioritization data to help users take appropriate action.

Supported Formats: VEX

Detailed Findings

Prioritized Vulnerabilities

Vulnerabilities prioritized by exploitability and impact (showing top 20)

CVE Severity Component Risk Indicators EPSS
CVE-2023-44487 HIGH grpc 0.11.0 🔴 KEV 💥 Weaponized 94.4%
CVE-2016-5195 HIGH linux_kernel 3.4.103 🔴 KEV 💥 Weaponized 94.2%
CVE-2016-5195 HIGH linux_kernel 3.14.33 🔴 KEV 💥 Weaponized 94.2%
CVE-2024-1086 HIGH linux_kernel 5.4.284 🔴 KEV 💥 Weaponized 86.2%
CVE-2024-1086 HIGH linux_kernel 6.6.21 🔴 KEV 💥 Weaponized 86.2%
CVE-2024-1086 HIGH linux_kernel 4.1.52 🔴 KEV 💥 Weaponized 86.2%
CVE-2021-22555 HIGH linux_kernel 4.1.52 🔴 KEV 💥 Weaponized 86.1%
CVE-2021-22555 HIGH linux_kernel 3.4.103 🔴 KEV 💥 Weaponized 86.1%
CVE-2021-22555 HIGH linux_kernel 3.14.33 🔴 KEV 💥 Weaponized 86.1%
CVE-2019-13272 HIGH linux_kernel 4.1.52 🔴 KEV 💥 Weaponized 80.8%
CVE-2017-1000253 HIGH linux_kernel 3.4.103 🔴 KEV 💥 Weaponized 54.4%
CVE-2017-1000253 HIGH linux_kernel 3.14.33 🔴 KEV 💥 Weaponized 54.4%
CVE-2024-53104 HIGH linux_kernel 3.14.33 🔴 KEV 💥 Weaponized 12.0%
CVE-2024-53104 HIGH linux_kernel 3.4.103 🔴 KEV 💥 Weaponized 12.0%
CVE-2024-53104 HIGH linux_kernel 5.4.284 🔴 KEV 💥 Weaponized 12.0%
CVE-2024-53104 HIGH linux_kernel 6.6.21 🔴 KEV 💥 Weaponized 12.0%
CVE-2024-53104 HIGH linux_kernel 4.1.52 🔴 KEV 💥 Weaponized 12.0%
CVE-2022-2586 HIGH linux_kernel 3.4.103 🔴 KEV 💥 Weaponized 2.2%
CVE-2022-2586 HIGH linux_kernel 5.4.284 🔴 KEV 💥 Weaponized 2.2%
CVE-2022-2586 HIGH linux_kernel 3.14.33 🔴 KEV 💥 Weaponized 2.2%

Configuration Findings

Security configuration checks performed: 20 total

Total Checks
20
Passed
10
Failed
6
Check Result Severity Details
Multiple users with UID 0 FAIL CRITICAL AUTHENTICATION: Change the UIDs for all other user accounts identified.
Users with no password set FAIL CRITICAL AUTHENTICATION: Disable login or set a password for the specified users.
World writable and readable directories outside tmp FAIL MEDIUM CONFIGURATION: Modify the permissions to restrict access to the directories.
Services Without Configuration Files FAIL LOW CONFIGURATION: Include config files for the associated services to further secure installation.
Weak hash algorithms found FAIL MEDIUM CRYPTOGRAPHY: Replace weak hashing algorithms with stronger algorithms.
Insecure URL FAIL MEDIUM DATA: Check individual URL problem descriptions
Overly permissive access to passwd files PASS Check passed
Authorized Key with Matching Private Key PASS Check passed
History file present on disk PASS Check passed
Sudoers file with weak permissions PASS Check passed
Multiple groups with the same Group ID PASS Check passed
Binaries with Memory Corruption Vulnerabilities and Protection Disabled PASS Check passed
Telnet server exists PASS Check passed
SELinux is disabled PASS Check passed
fstab should always have permissions of 0644 PASS Check passed
Insecure services start at boot PASS Check passed
GTFOBins installed with setuid bit enabled can lead to privilege escalation PASS Check passed
One or more compilers exist PASS Check passed
Sudoers file missing PASS Check passed
Cronjobs with weak permissions PASS Check passed

Credential Findings

Credentials and password hashes detected in firmware

Total Accounts
230
Hashes Identified
87
Hashes Cracked
0

✓ No password hashes were successfully cracked.

Cryptographic Material

Keys and certificates discovered in firmware

Private Keys
24
Public Keys
5350
Keypairs
11
Certificates
5161
Certs with Issues
4738 (92%)
⚠ Keypairs Found (11) - Critical Security Risk

Complete keypairs (matching public and private keys) were found. This means attackers can extract both keys and fully impersonate the device or decrypt its communications.

Algorithms: rsa
⚠ Private Keys Found (24)

Embedded private keys can be extracted and used to compromise encrypted communications or impersonate the device.

Algorithms: dsa ecdsa rsa

Recommendations

Priority Actions for CRA Compliance
  1. Address CISA KEV Vulnerabilities: 49 vulnerabilities are on the CISA Known Exploited Vulnerabilities list. These must be remediated as a priority per Clause 2(a).
  2. Remediate Weaponized Exploits: 125 vulnerabilities have known weaponized exploits and pose immediate risk.
  3. Address Failed Configuration Checks: 6 of 20 security configuration checks failed and require remediation.
  4. Maintain SBOM Documentation: Ensure the Software Bill of Materials is kept current and available in CycloneDX or SPDX format per Part II Clause 1.
  5. Establish Vulnerability Disclosure Process: Implement VEX document generation for vulnerability disclosure per Part II Clauses 4-6.
  6. Continuous Monitoring: Enable continuous vulnerability monitoring to detect new threats as they emerge.

Generated by NetRise Platform • 2025-12-11 22:17

This report provides an assessment of CRA compliance based on NetRise platform analysis.

Real person here 👉