54 votes

MITRE support for the Common Vulnerabilities and Exposures (CVE) program will expire tomorrow

A letter to CVE board members posted to bluesky a few hours ago reveals that MITRE funding for the Common Vulnerabilities and Exposures (CVE) program is about to expire. Haven't found any good articles that cover this news story yet, but it's spreading like wildfire over on bluesky.

Of course this doesn't mean that the CVE program will immediately cease to exist, but at the moment MITRE funding is absolutely essential for its longterm survival.

In a nutshell CVEs are a way to centrally organize, rate, and track software vulnerabilities. Basically any publicly known vulnerability out there can be referred to via their CVE number. The system is an essential tool for organizations worldwide to keep track of and manage vulnerabilities and implement appropriate defensive measures. Its collapse would be devestating for the security of information systems worldwide.

How can one guy in a position of power destroy so much in such a short amount of time..? I hope the EU will get their shit together and fund independent alternatives for all of these systems being butchered at the moment...

Edit/Update 20250415 21:10 UTC:
It appears Journalist David DiMolfetta confirmed the legitimacy of the letter with a source a bit over an hour ago and published a corresponding article on nextgov 28 minutes ago.

Edit/Update 20250415 21:25 UTC:
Brian Krebs also talked to MITRE to confirm this news. On infosec.exchange he writes:

I reached out to MITRE, and they confirmed it is for real. Here is the contract, which is through the Department of Homeland Security, and has been renewed annually on the 16th or 17th of April.
MITRE's CVE database is likely going offline tomorrow. They have told me that for now, historical CVE records will be available at GitHub, https://github.com/CVEProject

Edit/Update 20250415 21:37 UTC:
Abovementioned post has been supplemented by Brian Krebs 5 Minutes ago with this comment:

Hearing a bit more on this. Apparently it's up to the CVE board to decide what to do, but for now no new CVEs will be added after tomorrow. the CVE website will still be up.

Edit/Update 20250416 08:40 UTC:
First off here's one more article regarding the situation by Brian Krebs - the guy I cited above, as well as a YouTube video by John Hammond.

In more positive news: first attempts to save the project seem to emerge. Tib3rius posted on Bluesky about half an hour ago, that a rogue group of CVE board members has Launched a CVE foundation to secure the project's future. It's by no means a final solution, but it's at least a first step to give some structure to the chaos that has emerged, and a means to manage funding from potential alternative sources that will hopefully step up to at least temporarily carry the project.

Edit/Update 20250416 15:20 UTC:
It appears the public uproar got to them. According to a nextgov article by David DiMolfetta the contract has been extended by 11 months on short notice just hours before it expired...

Imo the events of the past 24 hours will leave their mark. It has become very clear that relying on the US government for such critical infrastructure is not a sustainable approach. I'm certain (or at least I hope) that other governments (i.e. EU) will draw appropriate consequences and build their own infrastructure to take over if needed. The US is really giving up their influence on the world at large at an impressive pace.

12 comments

  1. [3]
    snake_case
    Link
    Man, I have learned so much about government agencies and funding in the past few months. Its like how, growing up, the way I would learn about new species is because there would be some article...

    Man, I have learned so much about government agencies and funding in the past few months.

    Its like how, growing up, the way I would learn about new species is because there would be some article about how they’re about to be extinct. I knew what a axolotl was in like 2005.

    Learning about government agencies via the ongoing news of the catabolic collapse of the united states is an interesting pass time.

    33 votes
    1. [2]
      DefinitelyNotAFae
      Link Parent
      That comparison is poignant. Do you mind if I steal it in explaining my own experience elsewhere?

      That comparison is poignant. Do you mind if I steal it in explaining my own experience elsewhere?

      9 votes
      1. snake_case
        Link Parent
        Haha sure give it a go. Maybe someone somewhere will listen cause they sure aint ever listened to me.

        Haha sure give it a go. Maybe someone somewhere will listen cause they sure aint ever listened to me.

        2 votes
  2. [5]
    ShroudedScribe
    Link
    This could be bad. If the funding remains cut, IT professionals will have to go to other sources to keep up to date on newly discovered and disclosed vulnerabilities. This would be quite a pivot,...

    This could be bad. If the funding remains cut, IT professionals will have to go to other sources to keep up to date on newly discovered and disclosed vulnerabilities. This would be quite a pivot, as even a lot of commercial software relies on the CVE database.

    I found an article that explains what CVE is, how it integrates with some other systems, and potential alternatives. Hopefully that will help others with less familiarity understand the topic a bit more.

    17 votes
    1. slade
      Link Parent
      I believe this is where we wax optimistic about the free market saving the day. I'm certain somebody is already positioning themselves to get individually wealthy by selling us something we need...

      will have to go to other sources to keep up to date on newly discovered and disclosed vulnerabilities

      I believe this is where we wax optimistic about the free market saving the day. I'm certain somebody is already positioning themselves to get individually wealthy by selling us something we need as an entire society and used to get through tax funding.

      7 votes
    2. redwall_hp
      Link Parent
      As someone who deals with these occasionally, our usual workflow as code owners in a large company is: Automated tools flag an application as using a dependency that has a known CVE. Look up the...

      As someone who deals with these occasionally, our usual workflow as code owners in a large company is:

      1. Automated tools flag an application as using a dependency that has a known CVE.

      2. Look up the CVE on MITRE, because the automated tool's report doesn't supply all of the information.

      3. Triage the problem, by finding out if the developer of the dependency has an update or a timeline for one.

      4. Eventually update the dependency version, make a recommended workaround or find an alternative.

      Without a central database, this becomes impossible. Being aware of issues across many third party packages is unlikely without it, and keeping tabs on the remediation of the vulnerability also simply doesn't scale if you just end up with hundreds of companies blasting emails at some unfortunate third party...

      7 votes
    3. AndreasChris
      Link Parent
      There's also this really nice diagram created and shared on LinkedIn by James Berthoty earlier. It nicely illustrates how central CVEs are to effectively processing vulnerabilities in a...

      There's also this really nice diagram created and shared on LinkedIn by James Berthoty earlier. It nicely illustrates how central CVEs are to effectively processing vulnerabilities in a professional setting, and how many dependencies would be destroyed by removing them from the equation.

      2 votes
    4. DefinitelyNotAFae
      Link Parent
      Thank you, very little of this made sense to me up front due to not having the broader context.

      Thank you, very little of this made sense to me up front due to not having the broader context.

  3. [2]
    Protected
    Link
    As a former infosec worker: This could seriously hinder the reporting, tracking and dissemination of information of vulnerabilities in systems everywhere, causing a sharp decline in vulnerability...

    As a former infosec worker: This could seriously hinder the reporting, tracking and dissemination of information of vulnerabilities in systems everywhere, causing a sharp decline in vulnerability patching and mitigation, and thereby resulting in systems that are more vulnerable to bad actors.

    I think we almost certainly could bring the CVE database to the EU; the EU would probably fund it. However, the EU tends to move slowly. It's not going to happen in a day.

    16 votes
    1. AndreasChris
      Link Parent
      Well, at least the EU has already been working on the EU vulnerability database (EUVD) for some time now. (See also: this ENISA press release from June 2024.) Maybe building off of that we could...

      However, the EU tends to move slowly.

      Well, at least the EU has already been working on the EU vulnerability database (EUVD) for some time now. (See also: this ENISA press release from June 2024.)

      Maybe building off of that we could get a full CVE replacement in a somewhat reasonable timeframe. But yes, changing how basically every organization worldwide is keeping track of vulnerabilities is not something that happens overnight.

      4 votes
  4. revivinglaziness
    Link
    Current infosec worker; discussed with my chunk of the organization today. What we're losing will hurt security professionals' ability to rapidly, correctly triage and prioritize risks. In turn,...

    Current infosec worker; discussed with my chunk of the organization today. What we're losing will hurt security professionals' ability to rapidly, correctly triage and prioritize risks. In turn, that will cause delays and gaps in incident response. We believe the likeliest consequences are:

    • Vulnerability information fragmentation. There are always vendors who really wanted to do things their own way: RedHat, for example, has always preferred its own homegrown vulnerability identifiers. Microsoft has like three of their own ID systems at this point. But these were all tied together with CVEs, which really helped the folks doing the work to do things like correlate which patches from which vendors fixed the same OpenSSL critical bug. Security practitioners will have to spend more time doing data lookups and correlation for no real benefit.
    • Slow rot of the NVD. NVD is run by NIST, which is part of the Department of Commerce rather than the Department of Homeland Security. But between the staffing cuts across all agencies, plus this new wrinkle, it seems unlikely that the NVD will maintain its present status as the most-usually-correct source of information. NIST already had problems last year keeping up with scoring. Beyond making things worse for the future, it'd be tremendously annoying and disruptive if the NVD were to go offline eventually, even though it's all backed up elsewhere.
    • Minor increase in zero-days. Major companies who could already assign their own CVEs ("CNAs"), like Microsoft and the Linux Foundation, will likely continue to do so ... at least for awhile. But if there's no new central clearinghouse or replacement ID assigning authority rapidly identified, a lot of smaller software vendors will go back to what they used to do: nothing, because it's a lot less work. So there probably won't be any report of those vulnerabilities until we're all learning about the exploits.

    Lastly and more personally, I am expecting a barrage of disinformation -- specifically, disingenuous bloviating about CVE creep, CVSS inflation, and similar subjects. I fully expect a bunch of bootlickers to say 'good riddance' and blame everything on MITRE. Yes, no one likes having to handle a gazillion CVEs and many are kinda stupid. Yes, CVSS v3 and v4 scores are generally higher across the board than they used to be in earlier versions. But no one is arguing these systems are perfect. Throwing the (ugly) baby out with the bathwater, and then celebrating it like I've already seen a few folks online doing? That's just bad attempts at deflecting from the obvious parallels where other public agency data sources (NOAA, NWS, etc.) are being trashed for no good reason.

    I'd like to hope that sanity prevails before tomorrow, but my pessimist side has been feeling right a lot lately.

    14 votes
  5. l_one
    Link
    I just found out about this from John Hammond's YT page a minute ago. Holy crap, they really are just throwing every bit of critical infrastructure they can grab into a bonfire. I feel like we are...

    I just found out about this from John Hammond's YT page a minute ago. Holy crap, they really are just throwing every bit of critical infrastructure they can grab into a bonfire.

    I feel like we are speedrunning the collapse of the American empire. Sure, it was in decline anyway, but was there really a need to push as fast and hard as possible for everything to burn?

    10 votes