2025-04-16
CVE Program Regains Threatened CISA Funding, Plus Non-Profit Foundation
On April 15, 2025, research non-profit MITRE announced that the US federal government had not renewed its contract, meaning funding for the Common Vulnerabilities and Exposures (CVE) program and Common Weakness Enumeration (CWE) program would expire on April 16, threatening breaks in those programs' services. However, hours after the announcement, the Cybersecurity and Infrastructure Security Agency (CISA) "executed the option period on the contract to ensure there will be no lapse in critical CVE services," extending the contract by 11 months. The following day CVE board members announced the creation of a non-profit CVE Foundation to support the long-term "sustainability and neutrality of a globally relied-upon resource" supplementing the formerly "single government sponsor." MITRE's Vice President Yosry Barsoum stated that lapses in the CVE and CWE programs could cause "deterioration of national vulnerability databases and advisories, tool vendors, incident response operations, and all manner of critical infrastructure." The CVE program has been in place since 1999, serving to "identify, define, and catalog publicly disclosed cybersecurity vulnerabilities" in a standardized system administered by over 450 CVE Numbering Authorities (CNAs) in 40 countries, cataloging over 40,000 new vulnerabilities in 2024 alone.
Editor's Note
Between the newly created CVE Foundation and incremental funding identified by MITRE, the program will continue. While thousands of CVEs are identified, scored and published every year, the next hurdle will be the challenge of enrichment.

Lee Neely
What this issue highlighted is that the global cybersecurity industry relies too much on individual entities or people to run and maintain critical services, tools, and platforms that we all heavily rely on. Which is quite ironic given that we as an industry preach to organisations that they need to build cyber resilience into their business, yet our own industry is quite brittle in places. Interestingly, the EU Agency for Cybersecurity (ENISA) has launched its beta site for the European Union Vulnerability Database which can be found at https://euvd.enisa.europa.eu/ They are looking for feedback and given what has happened in the past few weeks it is important for us an industry to do so.

Brian Honan
It's satisfying that CISA was able to execute funding for this critical service for another year. That said, after 25 years it's time to move away from a government funded activity and find a permanent home for CVE and its associated projects. The CVE Foundation or perhaps another non-profit seems like an ideal candidate. The difficulty is going to be in creation of a sustainable revenue model to fund the work by the non-profit. Whomever is selected should work with the global community to consolidate the various cybersecurity 'plumbing' activities into one.

Curtis Dukes
CISA has earned our support.

William Hugh Murray
Read more in
Krebs on Security: Funding Expires for Key Cyber Vulnerability Database
CVE Foundation: CVE Foundation Launched to Secure the Future of the CVE Program
Ars Technica: CVE, global source of cybersecurity info, was hours from being cut by DHS
The Register: CVE program gets last-minute funding from CISA Ð and maybe a new home
The Record: CISA extends CVE program contract with MITRE for 11 months amid alarm over potential lapse
MeriTalk: CISA Extends CVE Program Contract at 11th Hour, Averting Disruption
NextGov: CISA extends MITRE-backed CVE contract hours before its lapse
SCMedia: CISA funds CVE program in the 11th hour of contract with MITRE