The EU Cyber Resilience Act (CRA) is changing the way software-defined product manufacturers approach security. Unlike legacy compliance frameworks that assess point-in-time risks, the CRA demands continuous monitoring, vulnerability disclosure, and evidence-backed assurance that products remain secure throughout their lifecycle. For many manufacturers, that mandate translates into a single, daunting reality: thousands of vulnerabilities to manage, report, and remediate—often across decades-old codebases and global product portfolios.
Prioritizing that level of risk isn’t just difficult, it’s nearly impossible without the right context. That’s where reachability analysis becomes essential. By helping teams understand which vulnerabilities are actually exploitable within a product’s architecture, reachability transforms CRA readiness from a theoretical exercise into a scalable, repeatable program.
The Challenge: CVE Fatigue and the Limits of Traditional Triage
Security and product teams are facing a surge in vulnerability volume as they prepare for CRA enforcement. In one real-world case, a manufacturer scanning a single legacy product uncovered more than 26,000 vulnerabilities. Without the staff, time, or clarity to address them all, teams often fall back on generic severity scores like CVSS or use probabilistic tools like EPSS (Exploit Prediction Scoring System) to rank potential risk.
While those tools are helpful starting points, they don’t tell the whole story. A CVE with a high EPSS score might never be exploitable in the context of a specific product’s design. Conversely, a lower-severity vulnerability might pose a significant threat if it’s accessible from an attack path. Without insight into how and whether a vulnerability can be reached, organizations risk wasting resources, or worse, missing critical issues entirely.
What Reachability Analysis Adds to the Equation
Reachability analysis addresses a fundamental question that other triage methods can’t answer: Can this vulnerability actually be exploited in my product’s real-world implementation?
Instead of evaluating vulnerabilities in isolation, reachability analysis examines the execution paths, software dependencies, architecture, and system configuration to determine if a given vulnerability is accessible to an attacker. When combined with vulnerability databases, exploit intelligence, and scoring systems like EPSS, reachability provides a sharper view of product-specific risk.
This approach allows security teams to move from reactive triage to confident prioritization. Vulnerabilities that are not reachable in a particular binary, processor architecture, or firmware environment can be deprioritized or documented as non-exploitable. The result is a shorter, higher-quality list of vulnerabilities that matter—and that auditors and compliance officers can trust.
A Real-World Example: Reducing 26,000 CVEs to 300
In the earlier case of the manufacturer facing 26,000 vulnerabilities, Finite State applied a layered prioritization model. The team began with standard CVSS scoring, then layered in EPSS probability data and exploit weaponization intelligence. Even after this refinement, the list still included more than 1,000 vulnerabilities.
It wasn’t until reachability analysis was applied that the organization was able to reduce the list to just 300 actionable issues. These were vulnerabilities that weren’t just severe or theoretically exploitable—they were demonstrably reachable within the software architecture and could be prioritized for remediation based on risk, not guesswork.
That 98.8% reduction in triage scope wasn’t just a time-saver. It made CRA compliance possible under tight timelines and limited resources.
Why Reachability Matters for CRA
The CRA isn’t interested in theoretical security. It requires manufacturers to continuously monitor their products, disclose vulnerabilities in a timely and coordinated fashion, and maintain transparency about exploitable risks. That means security teams can no longer rely solely on generic scanners, checklists, or outside-in analysis. They must demonstrate why specific vulnerabilities do—or do not—pose a risk.
Reachability analysis delivers that assurance. It provides a defensible, evidence-based way to exclude unreachable vulnerabilities from remediation plans, VEX documents, and CRA disclosures. In other cases, it helps pinpoint which CVEs must be addressed immediately because they are both reachable and weaponized in the wild.
This level of context is critical not just for compliance, but for trust. Whether the end audience is an auditor, a regulator, or an OEM customer, reachability analysis equips teams with the data they need to justify decisions and demonstrate responsible security practices.
How It Works in the Finite State Platform
Finite State’s reachability analysis is integrated directly into our broader software supply chain security platform. As vulnerabilities are discovered through source code analysis, binary scanning, or SBOM ingestion, the platform evaluates reachability using control flow analysis, function mapping, and architecture awareness.
This allows users to:
- Flag vulnerabilities that are reachable versus those that are not
- Track risk and remediation status across large portfolios
- Create audit-ready reports with detailed technical justifications
- Generate VEX records to support vulnerability disclosure obligations
Combined with EPSS scoring, exploit intelligence, and threat modeling, reachability enables security teams to move from vulnerability detection to smart, defensible decision-making.
Conclusion: From Compliance Burden to Strategic Advantage
Preparing for CRA compliance is not just about meeting regulatory deadlines—it’s about building a sustainable, scalable product security program. Reachability analysis offers a critical path forward. It helps reduce false positives, prioritize real threats, and align security actions with business outcomes.
By focusing on what’s exploitable—and why—organizations can reduce risk, satisfy auditors, and reclaim valuable time for their security and development teams. In a post-CRA world, that kind of clarity isn’t optional. It’s essential.
Call to Action
Want to reduce your vulnerability triage surface by 90% or more?
Contact us to see how reachability analysis works in the Finite State platform.
Subscribe to Our Blog
Get the latest posts delivered straight to your inbox weekly.
Share this
You May Also Like
These Related Stories

Countdown to Compliance: Why Connected Device Manufacturers Must Prepare for the EU CRA Now

EU CRA's Vulnerability Handling & Incident Reporting Rules: A Guide


