@@ -608,8 +608,6 @@ This section is a list of technical requirements necessary to satisfy the CRA es
See Section 5.3 for tables which map mitigations to security profiles and Annex C for additional information.
> TODO-HAS: Renumber the requirements
### 5.2.2 TR-NKEV: No known exploitable vulnerabilities at first use
#### 5.2.2.1 Requirement
@@ -685,8 +683,6 @@ If automatable and freely-usable vulnerability scanners are available for the pr
* Verdict: No vulnerabilities found, or all reported vulnerabilities satisfy either the age or documentation requirement => PASS, otherwise FAIL
* Evidence: Documented vulnerability handling policy, list of vulnerability scanners selected, reports from each scanner, correlation of reports of discovered vulnerabilities with documentation of mitigations