Source: OJ L 333, 27.12.2022, p. 80–152
ENRecital 62 European vulnerability database
Access to correct and timely information about vulnerabilities means a weakness, susceptibility or flaw of a product with digital elements that can be exploited by a cyber threat; affecting ICT products means an ICT product as defined in Article 2, point (12), of Regulation (EU) 2019/881; and ICT services means digital and data services provided through ICT systems to one or more internal or external users on an ongoing basis, including hardware as a service and hardware services which includes the provision of technical support via software or firmware updates by the hardware provider, excluding traditional analogue telephone services; contributes to an enhanced cybersecurity risk means the potential for loss or disruption caused by an incident and is to be expressed as a combination of the magnitude of such loss or disruption and the likelihood of occurrence of the incident; management. Sources of publicly available information about vulnerabilities means a weakness, susceptibility or flaw of a product with digital elements that can be exploited by a cyber threat; are an important tool for the entities means a natural or legal person created and recognised as such under the national law of its place of establishment, which may, acting under its own name, exercise rights and be subject to obligations; and for the users of their services, but also for the competent authoritiesas defined in Article 46 and the CSIRTscomputer security incident response teams. For that reason, ENISA should establish a European vulnerability means a weakness, susceptibility or flaw of a product with digital elements that can be exploited by a cyber threat; database where entities means a natural or legal person created and recognised as such under the national law of its place of establishment, which may, acting under its own name, exercise rights and be subject to obligations;, regardless of whether they fall within the scope of this Directive, and their suppliers of network and information systems means: an electronic communications network as defined in Article 2, point (1), of Directive (EU) 2018/1972; any device or group of interconnected or related devices, one or more of which, pursuant to a programme, carry out automatic processing of digital data; or digital data stored, processed, retrieved or transmitted by elements covered under points (a) and (b) for the purposes of their operation, use, protection and maintenance;, as well as the competent authoritiesas defined in Article 46 and the CSIRTscomputer security incident response teams, can disclose and register, on a voluntary basis, publicly known vulnerabilities means a weakness, susceptibility or flaw of a product with digital elements that can be exploited by a cyber threat; for the purpose of allowing users to take appropriate mitigating measures. The aim of that database is to address the unique challenges posed by risks means the potential for loss or disruption caused by an incident and is to be expressed as a combination of the magnitude of such loss or disruption and the likelihood of occurrence of the incident; to Union entities means a natural or legal person created and recognised as such under the national law of its place of establishment, which may, acting under its own name, exercise rights and be subject to obligations;. Furthermore, ENISA should establish an appropriate procedure regarding the publication process in order to give entities means a natural or legal person created and recognised as such under the national law of its place of establishment, which may, acting under its own name, exercise rights and be subject to obligations; the time to take mitigating measures as regards their vulnerabilities means a weakness, susceptibility or flaw of a product with digital elements that can be exploited by a cyber threat; and employ state-of-the-art cybersecurity means cybersecurity as defined in Article 2, point (1), of Regulation (EU) 2019/881; risk-management measures as well as machine-readable datasets and corresponding interfaces. To encourage a culture of disclosure of vulnerabilities means a weakness, susceptibility or flaw of a product with digital elements that can be exploited by a cyber threat;, disclosure should have no detrimental effects on the reporting natural or legal person.