Article Details
Scrape Timestamp (UTC): 2025-04-16 17:01:45.012
Source: https://www.theregister.com/2025/04/16/cve_program_funding_save/
Original Article Text
Click to Toggle View
CVE program gets last-minute funding from CISA – and maybe a new home. Feds extend vulnerability nerve-center contract at 11th hour. In an 11th-hour reprieve, the US government last night agreed to continue funding the globally used Common Vulnerabilities and Exposures (CVE) Program. This comes after the Feds decided not to renew their long-standing contract with nonprofit research hub MITRE to operate the CVE database. That arrangement was due to expire today, but now the money's coming through to continue the crucial service. "The CVE Program is invaluable to the cyber community and a priority of CISA," a spokesperson for the US Cybersecurity and Infrastructure Security Agency, aka CISA, told The Register Wednesday. "Last night, CISA executed the option period on the contract to ensure there will be no lapse in critical CVE services. We appreciate our partners' and stakeholders' patience." Also in response to long-standing concerns and fresh uncertainty triggered by MITRE yesterday disclosing that federal support was about to end, CVE board members today announced the formation of a nonprofit foundation. This new CVE Foundation will "focus solely" on ultimately continuing the program's work of naming and tracking vulnerabilities, and maintaining the database of product security flaws, we're told. "The formation of the CVE Foundation marks a major step toward eliminating a single point of failure in the vulnerability management ecosystem and ensuring the CVE Program remains a globally trusted, community-driven initiative," a statement by the oversight body said. "Over the coming days, the foundation will release more information about its structure, transition planning, and opportunities for involvement from the broader community." That single point of failure right now is Uncle Sam. CVE has become the world's de facto system for identifying and squashing vulnerabilities in technology products, and it is reliant on federal funding at a time when the Feds are trimming costs, threatening allies, and evaporating America's soft power. The 25-year-old program serves as the single source of truth for everyone — companies, developers, governments, researchers — working on vulnerability management. While MITRE operates it, the CVE program is sponsored, and largely funded by the CISA, under the umbrella of the US Department of Homeland Security. MITRE has received roughly $30 million since 2023 from Homeland Security to run CVE and associated programs. News broke yesterday that the program's funding would expire today, and this sparked a great deal of outrage and concern about who or what would fill the impending void in vulnerability management. According to the newly established foundation, it's vital that the CVE program isn't reliant on a government contract to continue: Since its inception, the CVE Program has operated as a US government-funded initiative, with oversight and management provided under contract. While this structure has supported the program's growth, it has also raised longstanding concerns among members of the CVE Board about the sustainability and neutrality of a globally relied-upon resource being tied to a single government sponsor. This concern has become urgent following an April 15, 2025 letter from MITRE notifying the CVE Board that the US government does not intend to renew its contract for managing the program. While we had hoped this day would not come, we have been preparing for this possibility. Now that CISA has extended the contract with MITRE to operate the program, it's unclear if the new foundation will continue transitioning CVE to its auspices. The Register reached out to the CVE Foundation about this and other questions, including the org's members and how the funding will work, and we will update this story when we hear back. Judging from the community's response, however, it seems the momentum to wrest CVE from the Feds hasn't lessened. "The announcement by MITRE Corporation that Homeland Security and CISA were not renewing the contract came to many as a complete surprise," said CVE board member Peter Allor in a LinkedIn post. "Evidently this situation was known by the three parties for nearly a month." He added that "it is time for change" to come to the program, and that includes two things. "First is that the US Government needs to move this out from their sole funding and control for this Global and collective problem regarding vulnerabilities and the enumeration of records," Allor wrote. "Second, the way CISA has not been straight and truthful with the program and notably to the CVE Board. This was a game of chicken on who pays." And despite the continued funding, it looks like the chaos isn't over quite yet. "The announcement of potential disruption that came out yesterday caused a lot of thrash in a lot of circles, and has ultimately already put a dent in confidence in the CVE process, and several alternative government agencies outside of the USA, as well as a handful of vendors, have already signaled their intention to step up," Bugcrowd founder Casey Ellis told The Register. "The challenge this creates is split-standards, which work in opposition to the entire purpose of programs like CVE: Creating a single reference-able data key on a per vulnerability basis."
Daily Brief Summary
The U.S. government secured funding for the CVE (Common Vulnerabilities and Exposures) Program just before the existing contract was set to expire.
The funding extension prevents any interruption in the CVE services, which are crucial globally for identifying and managing security vulnerabilities in technology products.
MITRE, a nonprofit that has been managing the CVE database, disclosed uncertainties about continuing federal support, prompting concerns about the program's future.
In response, CVE board members announced plans to establish the CVE Foundation to maintain and enhance the program's independence and sustainability without sole reliance on federal funding.
The newly formed CVE Foundation aims to address the vulnerability management ecosystem's vulnerabilities by reinforcing the program's global trust and community-driven approach.
Despite the funding extension by CISA, there are ongoing discussions and concerns within the cybersecurity community about the need for a more globally collaborative approach to managing vulnerabilities.
The situation has exposed potential risks, such as split-standards and reduced confidence in the CVE process, highlighted by reactions from international agencies and vendors.