Auto Electronics

ANVISA’s New Cybersecurity Rule for OBD-II Devices in Brazil

ANVISA’s new cybersecurity rule for OBD-II devices mandates ISO/IEC 30111 penetration testing and CVE remediation reports—key for exporters, OEMs & labs entering Brazil.
Analyst :Automotive Tech Analyst
May 04, 2026
ANVISA’s New Cybersecurity Rule for OBD-II Devices in Brazil

On May 15, 2026, Brazil’s National Health Surveillance Agency (ANVISA) enforced Portaria 221/2026 — a regulatory update requiring all imported OBD-II automotive diagnostic devices to undergo cybersecurity penetration testing per ISO/IEC 30111 and submit CVE remediation verification reports from INMETRO-accredited laboratories. This development directly impacts automotive electronics exporters, medical device compliance stakeholders, and cross-border supply chain operators serving the Brazilian market.

Event Overview

On April 30, 2026, ANVISA published Portaria 221/2026, formally classifying certain OBD-II diagnostic devices as subject to medical-device-level cybersecurity regulation. The rule mandates that all such imported auto electronics products must pass penetration testing aligned with ISO/IEC 30111 and provide vulnerability remediation validation reports issued by laboratories accredited by INMETRO (Brazil’s National Institute of Metrology, Quality and Technology). Enforcement began on May 15, 2026. As of that date, only three Chinese OBD-II manufacturers had completed full compliance testing; other affected firms report an average remediation timeline of 6–8 weeks.

Which Subsectors Are Affected

Direct Exporters of Auto Electronics

Exporters shipping OBD-II devices into Brazil are now required to obtain pre-market cybersecurity certification. Non-compliant shipments may be detained or rejected at customs, disrupting delivery schedules and triggering contractual penalties. The requirement applies regardless of whether the device is marketed for consumer, aftermarket, or fleet-management use — as long as it connects to vehicle ECUs via OBD-II and processes diagnostic data.

Manufacturers & OEM Suppliers

OBD-II hardware and firmware developers — including tier-2 and tier-3 suppliers embedded in automotive supply chains — face upstream compliance pressure. If their modules are integrated into final devices destined for Brazil, they must ensure traceable vulnerability disclosure handling and patch validation. This affects design documentation, firmware update mechanisms, and audit readiness for third-party lab assessments.

Compliance & Certification Service Providers

Testing labs, conformity assessment bodies, and regulatory consultants accredited or operating in Brazil must verify alignment with both ANVISA’s interpretation of ISO/IEC 30111 and INMETRO’s accreditation scope for cybersecurity validation. Demand has surged for labs capable of issuing CVE-specific remediation reports — a narrow capability currently held by few INMETRO-recognized entities.

What Relevant Enterprises or Practitioners Should Focus On Now

Monitor official ANVISA clarifications on device scope

Portaria 221/2026 does not publish an exhaustive list of covered OBD-II product types. Analysis shows ANVISA may apply the rule based on functional risk — e.g., devices enabling remote ECU reprogramming or transmitting health-related vehicle telemetry. Exporters should track upcoming Q&A documents or guidance notes issued by ANVISA’s Division of Health Informatics and Digital Health Products.

Prioritize INMETRO-accredited labs with documented CVE reporting capacity

Only laboratories explicitly authorized by INMETRO to issue CVE remediation verification reports satisfy the requirement. Observably, many internationally accredited labs lack this specific INMETRO endorsement. Firms should confirm lab accreditation status via INMETRO’s public registry before initiating testing — avoiding delays from invalid submissions.

Separate regulatory signal from operational implementation

The rule took effect May 15, 2026, but enforcement ramp-up may vary across ports and ANVISA regional offices. From industry perspective, early enforcement actions (e.g., customs holds, requests for test reports) are likely limited to high-volume or high-risk SKUs. Companies should treat the first 90 days as a de facto transition window — using it to validate documentation workflows rather than assuming blanket non-enforcement.

Update technical files and supplier agreements immediately

Firms must revise internal technical documentation to include threat modeling, attack surface mapping, and evidence of vulnerability triage processes. For OEM-supplied components, contracts should clarify responsibility for CVE identification, patch deployment timelines, and validation report ownership — especially where firmware updates originate from upstream suppliers.

Editorial Perspective / Industry Observation

This regulation is better understood as a structural signal than an isolated compliance hurdle. ANVISA’s extension of medical-device cybersecurity standards to automotive diagnostics reflects a broader regulatory convergence: safety-critical vehicle systems are increasingly treated as digital health enablers — particularly where diagnostics inform driver health monitoring, fleet wellness analytics, or telematics-based insurance. Observably, similar frameworks are under discussion in Argentina’s ANMAT and Chile’s ISP, suggesting regional harmonization may follow. However, current enforcement remains narrowly scoped and technically specific — not yet indicative of a broad automotive software bill of materials (SBOM) mandate.

Current enforcement focus is on verification readiness, not real-time intrusion detection or continuous monitoring. Therefore, the immediate implication is procedural — not architectural. It signals growing expectations for verifiable, auditable security practices in connected vehicle tools, but does not yet require runtime protections or zero-trust architectures.

Industry needs sustained attention because ANVISA has indicated future amendments will expand coverage to include wireless update mechanisms (e.g., Bluetooth/Wi-Fi-enabled OBD-II adapters) and cloud-connected diagnostic platforms — topics flagged in its 2026–2027 Regulatory Agenda.

Conclusion

ANVISA’s Portaria 221/2026 marks a formal step toward treating certain automotive diagnostic tools as regulated digital health products in Brazil. Its practical impact lies not in sweeping technological overhaul, but in introducing mandatory, lab-verified evidence of vulnerability management for OBD-II devices entering the market. For stakeholders, this is best interpreted as an early-stage compliance checkpoint — one that tests documentation rigor, lab coordination capability, and cross-supplier accountability — rather than a fundamental redesign trigger. Continued observance of ANVISA’s technical guidance updates and INMETRO’s accreditation bulletins remains essential.

Information Sources

Primary source: ANVISA Portaria No. 221/2026, published April 30, 2026; effective May 15, 2026. Official text available via ANVISA’s Diário Oficial da União portal. Additional context drawn from INMETRO’s Accreditation Bulletin No. 04/2026 (April 2026), confirming laboratory scope requirements. Note: ANVISA’s forthcoming FAQ document and enforcement protocol details remain pending and are under active observation.