Friday, May 9, 2025
HomeCVE/vulnerabilityCISA Extend Funding to MITRE to Keep CVE Program Running

CISA Extend Funding to MITRE to Keep CVE Program Running

Published on

SIEM as a Service

Follow Us on Google News

The Cybersecurity and Infrastructure Security Agency (CISA) has extended funding to the MITRE Corporation, ensuring the continued operation of the Common Vulnerabilities and Exposures (CVE) program, a linchpin of global cybersecurity.

Announced late on April 15, 2025, just hours before the program’s funding was set to expire, the 11-month extension averts a crisis that could have disrupted vulnerability tracking worldwide.

Since 1999, MITRE has managed the CVE program, which catalogs and tracks cybersecurity vulnerabilities, providing a standardized framework for governments, industries, and researchers. With over 274,000 records, the CVE database is critical for vulnerability management, incident response, and protecting critical infrastructure.

- Advertisement - Google News

The program assigns unique CVE Identifiers (CVE IDs) through over 400 CVE Numbering Authorities (CNAs), including tech giants like Microsoft and Google, enabling coordinated disclosure of software and hardware flaws.

On April 15, MITRE’s Yosry Barsoum warned that the Department of Homeland Security (DHS) contract funding the CVE and Common Weakness Enumeration (CWE) programs would lapse on April 16.

“A break in service would degrade national vulnerability databases, disrupt tool vendors, and undermine critical infrastructure,” Barsoum wrote to CVE Board members.

The news triggered alarm, with experts warning that a shutdown could fragment vulnerability management, delay patches, and embolden cybercriminals.

CISA Extend the Funding to MITRE

CISA’s timely intervention, executing an 11-month funding option, ensures the CVE program’s continuity. “The CVE Program is a priority for CISA,” a spokesperson said.

CISA’s 11-month funding extension, executed on the evening of April 15, ensures that the CVE program will continue without interruption for the near term. “The CVE Program is invaluable to the cyber community and a priority of CISA,” a CISA spokesperson said in a statement. “Last night, CISA executed the option period on the contract to ensure there will be no lapse in critical CVE services. We appreciate our partners’ and stakeholders’ patience.”

“We executed the contract’s option period to prevent any lapse in services and appreciate our stakeholders’ patience.” The decision quelled fears of immediate disruption, but the program’s long-term stability remains uncertain amid CISA’s budget constraints.

Recent budget cuts under the Trump administration’s cost-saving initiatives, including the Department of Government Efficiency led by Elon Musk, have strained CISA’s resources.

Nearly 40% of CISA’s 3,300 employees face termination, and MITRE recently laid off 442 staff after losing $28 million in contracts. These cuts underscored the fragility of relying on a single government sponsor for a globally critical program.

In response, CVE Board members announced the CVE Foundation on April 16, a non-profit aimed at securing the program’s independence.

“The CVE Foundation will ensure the long-term viability and stability of the CVE Program,” the group stated, highlighting the risks of a “single point of failure.” The foundation’s formation signals a shift toward diversified funding to safeguard the program’s future.

Cybersecurity experts praised CISA’s action but called for permanent solutions. “CVE is the backbone of vulnerability coordination,” said Jen Easterly, former CISA Director. “Its funding should be ironclad, not subject to last-minute rescues.” Roger Grimes of KnowBe4 added, “This program deserves robust resources to fulfill its mission without uncertainty.”

For now, the CVE program remains operational, with records accessible via GitHub. As the cybersecurity community rallies behind the CVE Foundation’s efforts, the 11-month reprieve offers breathing room to plan for a sustainable future, ensuring this vital resource continues to protect global systems.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Azure Storage Utility Vulnerability Allows Privilege Escalation to Root Access

A critical vulnerability discovered by Varonis Threat Labs has exposed users of Microsoft Azure’s...

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Azure Storage Utility Vulnerability Allows Privilege Escalation to Root Access

A critical vulnerability discovered by Varonis Threat Labs has exposed users of Microsoft Azure’s...

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...