Can a security update still become a substantial modification?
Yes.
A security-driven change can still be substantial if it changes the product's intended purpose beyond what was originally foreseen or introduces new cybersecurity risks that were not covered in the original risk assessment.
If a modification is a substantial modification, is the modified product treated as a new product?
Yes.
The draft guidance says a substantially modified product is treated as a new product for CRA purposes. Making that modified product available on the market is therefore a new placing-on-the-market event.
Who becomes the manufacturer when a substantial modification is carried out?
The person carrying out the substantial modification and making the modified product available on the market is treated as the manufacturer for CRA purposes. That can be the original manufacturer, an importer, a distributor, or another third party depending on the case.
If a third party substantially modifies a product but does not make the modified product available on the market, does Article 22 automatically make that person the CRA manufacturer?
Not on that basis.
Article 22(1) applies to a natural or legal person other than the manufacturer, importer or distributor that carries out a substantial modification and makes the modified product available on the market. So the CRA manufacturer trigger for those third parties is tied to both the substantial modification and a new making-available event.
If only part of the product is affected, do the new manufacturer's obligations cover only that part?
Sometimes.
Article 22 says the person making the substantial modification is subject to the CRA obligations for the part affected by the modification or, if the modification affects the cybersecurity of the product as a whole, for the entire product.
Does a substantial modification trigger a new conformity assessment?
Yes, where the modification affects compliance or changes intended purpose.
The CRA recitals state that in such situations compliance should be verified again and, where applicable, the product should undergo a new conformity assessment.
Must the whole technical file and all tests be redone after a substantial modification?
Not necessarily.
The Blue Guide and the draft guidance both say unchanged parts can rely on existing tests and documentation. The updating work should focus on the parts affected by the substantial modification, but the person placing the modified product on the market remains responsible for the modified product's conformity.
If a pre-2027 product receives a non-substantial software update after 11 December 2027, does that alone make the product subject to the CRA?
No.
The Commission FAQ gives this directly. A post-2027 update that does not qualify as a substantial modification does not pull the legacy product into full CRA compliance.
Even where a software update is not a substantial modification, does the manufacturer still have CRA obligations during the support period?
Yes.
The draft guidance says that regardless of whether an update is substantial, manufacturers remain responsible for the security of updates and for keeping the risk assessment and technical documentation accurate, complete, and updated during the support period.
Is the legal definition of substantial modification tied to Annex I Part I or also to Annex I Part II?
The legal definition itself is tied to Annex I Part I and intended purpose.
Article 3(30) defines substantial modification by reference to a change that affects compliance with the essential cybersecurity requirements in Annex I Part I, or that changes the intended purpose for which the product was assessed. The draft guidance adds that, regardless of that qualification, the Annex I Part II vulnerability-handling obligations still continue during the support period.
Does it matter for substantial-modification analysis whether a feature update was shipped separately or bundled with a security update?
No.
Recital 39 says that when assessing whether a feature update is a substantial modification, it is not relevant whether the feature update is provided separately or in combination with a security update. The legal question is the effect on intended purpose and cybersecurity risk, not the packaging of the release.
If a later software iteration is not a substantial modification, does it trigger a new conformity assessment or a new placing-on-the-market date?
No.
The March 2026 draft guidance says later software iterations that do not qualify as substantial modifications do not require a new conformity assessment procedure and do not change the software product's date of placement on the market.
Do importers and distributors become manufacturers under the same substantial-modification rule as other third parties?
No.
The CRA uses different provisions. Article 21 covers importers and distributors that carry out a substantial modification of a product already placed on the market. Article 22 covers other natural or legal persons, but only where they carry out the substantial modification and make the modified product available on the market.
For a product placed on the market before 11 December 2027, should the manufacturer be able to show why a later update is not a substantial modification?
Yes.
The March 2026 draft guidance says manufacturers that did not apply the CRA when the product was first placed on the market must be able, on request from a market surveillance authority, to demonstrate that later updates do not constitute a substantial modification. The guidance adds that a cybersecurity risk assessment covering the Article 13(2) elements, with documented demonstration of compliance, should make that easier.
If a product placed on the market before 11 December 2027 is later substantially modified, does the manufacturer then have to comply with the CRA in full?
Yes.
The draft guidance says that where a later update constitutes a substantial modification, the manufacturer must comply with the CRA in its entirety before placing the substantially modified product on the market, and then for the duration of that product's support period. The Commission FAQ illustrates the same result with the smart-TV example where a later update adds smart-home-control functionality.
Does replacing a defective part with a better-performing part automatically count as a substantial modification?
No.
The March 2026 draft guidance says replacing defective or worn items with parts that perform better does not in itself trigger a substantial modification. It becomes substantial only if the change affects compliance with the essential requirements or changes the intended purpose that was covered by the original risk assessment.
If a replacement spare part is not identical to the original one, does that automatically mean the repaired product was substantially modified?
No.
The March 2026 draft guidance says a non-identical replacement part may itself be a product subject to the CRA, because it does not fall within the identical-spare-parts exemption in Article 2(6). But the repair of the host product still does not in itself amount to a substantial modification if the host product's intended purpose and cybersecurity risk profile remain unchanged.
The CRA defines the support period as the period during which the manufacturer must ensure that vulnerabilities of a product with digital elements are handled effectively and in line with Annex I, Part II.
This obligation applies to the product in its entirety, including integrated components.