Wow. CVE database is in serious trouble, tomorrow.

The cyber industry as a whole is in trouble also really, it’s the elephant in the room - the collapse of the White House’s support for cybersecurity is obvious and pronounced due to widespread cutbacks.

My take on the CVE contract issue for businesses: don’t overreact, wait and see what impacts are.

The NVD backlog was already pretty crazy.. the US gov has gotta put real funding into this area if it wants to retain control of cyber standards.

Just as an update to this - @briankrebs has confirmed with MITRE the letter is real, and as it stands the CVE database is likely to go offline tomorrow.

To widen it out - CVE is the globally recognised system orgs use for vulnerability management.

Every vulnerability management product uses CVEs. Vulnerability management is a core part of cybersecurity - often, the most important part.

Additionally, CVE is written into several US government standards that orgs have to follow.

So the US Government not funding it is a major and historic own goal.

There's an argument that MITRE should try to keep everything alive and run things without funding and contracts etc.. but, honestly? My take - stop doing everything that isn't in the contract. Force the issue.
CISA comment on CVE situation - they say the contract “will” lapse tomorrow. https://infosec.exchange/@metacurity/114344326544856491
Metacurity (@metacurity@infosec.exchange)

Attached: 1 image Regarding the end of MITRE's CVE program, here's a statement that a CISA spokesperson gave me for a piece I'm writing.

Infosec Exchange
MITRE-backed cyber vulnerability program to lose funding Wednesday

Organizations across industry, government, national security and critical infrastructure rely on the CVE Program, which serves as the de-facto global standard for vulnerability identification and management.

Nextgov.com
DOGE have terminated MITREs contracts, they say they will be laying off nearly 500 people. This will have impacts beyond CVE - think MITRE ATT&CK etc. https://virginiabusiness.com/nova-govcon-firm-mitre-to-lay-off-442-employees-after-doge-cuts-contracts/
NoVa govcon firm Mitre to lay off 442 employees after DOGE cuts contracts

Listen to this article Federal contracting firm Mitre, which has dual headquarters in McLean and Massachusetts, expects to lay off 442 people in Virginia in two months. The cuts come after the Trump administration has announced more than $28 million in canceled contracts for the company. Mitre notified the state Wednesday of 442 job cuts […]

Virginia Business
If you want to know how stupid the CVE situation is - CISA are trying to source last minute funding or look at taking CVE management in house, but they themselves have had a massive budget cut where the staff trying to fix it are also at risk of being cut.
Looks like the US Government are going to lose control of CVE. https://www.thecvefoundation.org/
CVE Foundation

FOR IMMEDIATE RELEASE April 16, 2025 CVE Foundation Launched to Secure the Future of the CVE Program [Bremerton, Washington] – The CVE Foundation has been formally established to ensure the long-term viability, stability, and independence of the Common Vulnerabilities and Exposures (CVE) Program, a

Another effort - https://gcve.eu/ Global CVE Allocation System. @gcve
GCVE.eu

CISA have, at the last minute, extended the MITRE CVE contract. “The CVE Program is invaluable to cyber community and a priority of CISA. Last night, CISA executed the option period on the contract to ensure there will be no lapse in critical CVE services. We appreciate our partners’ and stakeholders’ patience.” HT @metacurity

It’s unclear how long it has been extended for.

Now all we need is for Breachforums to get back online and the threat intelligence industry is alive again!
Metacurity (@metacurity@infosec.exchange)

I hear that the extension granted to MITRE for its CVE contract lasts eleven months.

Infosec Exchange

CVE extension to March 16th 2026

See y’all March 15th 2026 for the last minute renewal 🫡😅

https://www.usaspending.gov/award/CONT_AWD_70RCSJ24FR0000018_7001_70RSAT20D00000001_7001

USAspending.gov

MITRE’s statement is interesting as they included trademark and copyright symbols on terms like CVE.. one to watch as people try to start their own systems.

https://mastodon.social/@bagder/114349504703321362

CVE Foundation - Frequently Asked Questions

What do you believe? We believe that CVEs are the cornerstone of cybersecurity defense. Without a common language to communicate about vulnerabilities, chaos follows. This is why the CVE Program was created 25 years ago and it is even more true today. We believe in a free, publicly available

@GossiTheDog Someone named “MZMegaZone”?
Nginx core developer quits project in security dispute, starts “freenginx” fork

Disagreement over security disclosures and bug-fixing priorities led to split.

Ars Technica

@GossiTheDog @thecvefoundation the fact that people are afraid to reveal their names for this is very telling.

We are in a strange fucking place.

@acalarch @GossiTheDog Most of the people involved have 'day jobs' and not all employers are necessarily supportive. Some people asked to have time to first discuss what's happening with their employer before their name is public.

Especially as we're already seeing people presume that because someone involved with the Foundation works for Employer X it must mean Employer X is backing the Foundation - which is not safe to assume. So there is some concern about blowback on employers causing problems for the individual.

People are participating as individuals, not corporate representatives. As people are comfortable being named they'll be added to the FAQ entry.

(This is MegaZone. F5 is not officially involved, but supports employees working on initiatives outside of F5. They're aware of what I'm doing - our CEO commented on my LinkedIn post about being part of this.)

@thecvefoundation @acalarch @GossiTheDog Thats a good point. Thanks for clarifiying. Even efforts done outside of the workplace can reflect, so it’s best to not cross certain lines before knowing if it’s okay.
@GossiTheDog
CVE®™: Copyrighted Vulnerabilities and Exposures
@GossiTheDog @bagder Shouldn’t be a problem since the US tech elite doesn’t believe in intellectual property right? Right?
@GossiTheDog I guess at least a lot of us learned about https://euvd.enisa.europa.eu/search today
Vulnerability Database

Web site created using create-react-app

@GossiTheDog What kind of clown show is this government ​

@GossiTheDog I have to say, as someone who lives in the D.C. area and is plugged into gossip networks of both civil servants and contractors…there is a lot of this kind of thing* going on lately.

*”This kind of thing” being “the contract is off, no, wait, now it’s back on.”

@GossiTheDog run a vulnerability database like you would handle certificate renewals 🤐
@number137 @GossiTheDog Exactly, like Let’s Encrypt. The reliance on MITRE (having a funding reliance on US gov) is itself a vulnerability. We need a CVE number for this whole event.
@GossiTheDog
Or before, depending on the random mood.
@GossiTheDog what an incredible shitshow 
@GossiTheDog oh good it aligns with the first cert shift to 200 day expiration too. Quick everyone find new fields before then so it all crumbles with no one to figure out anything anymore
@GossiTheDog @metacurity good for them, but I do hope that the other things that quickly sprang up to replace it.. continue to replace it.

@GossiTheDog Do they understand that if you smash the trust-china, it will not hold the soup in the future?

The last sentence reads like an intentional insult to me.

Kintsugi - Wikipedia

@isotopp Looks great, but I rather not have it smashed in the first place 😏

@GossiTheDog @metacurity I feel like this short period of uncertainty has done enough damage that alternatives will come forward regardless of what will happen to MITRE in the future.

I just hope that we'll be able to arrive at a better independent and decentralized solution without completely fragmenting into multiple competing standards

@GossiTheDog @metacurity Money must be coming from the said tariffs! 
@GossiTheDog Love the "let me put some anonymous website up and Yolo it" attempts. I'm sure it's a well funded long term commitment. GCVE vs lettuce webcam time...
@viraptor @GossiTheDog So they're anonymous just because you've never heard of them?
https://www.circl.lu/mission/rfc2350/
CIRCL » RFC 2350 CIRCL - the CERT for the private sector, communes and non-governmental entities in Luxembourg

CIRCL » RFC 2350 CIRCL - the CERT for the private sector, communes and non-governmental entities in Luxembourg

@oya3un @GossiTheDog more of a - there's only one org reference on the contact page in a postal address. No specific people, nothing about goals, funding, GitHub org is not connected to circl, etc. I just expected a "who are we and why should you care about this specific project" page, regardless of whether I know about circl or not.
(Actually, I think I looked at the page initially before contact was even there)
@viraptor @GossiTheDog Just so I understand what you're saying: there's an overnight emergency rescue attempt to sustain the CVE system (one of several in the European Union, by the way) by a very much official state CERT (Luxemburg being rather wealthy might even answer your concerns about funding), backed by a government not in any imminent danger of being taken over by fascist baboons, and you complain about a missing link between the repo of an improvised web site and its mothership?
@oya3un yeah. Otherwise how do we know it's in any way related? As much as it's an emergency, it's unlikely major changes will be made and full systems established within days.
Meanwhile we've got at least 3 officially-ish looking efforts and more randos popping up with a static site saying they're building a replacement. Which feels like either people aren't communicating well or not all the new orgs are real.
(But yes, I've seen a very early link - now it's been confirmed already)

@GossiTheDog @gcve Great, now there are three competing standards... Waiting for a fourth one from China...

Also, their FAQ doesn't cover even the very basic question - how do I request an ID for a vulnerability that I have discovered?

@GossiTheDog half tempted to spin up a website saying I am putting CVEs on the Blockchain with AI for the fun of it

@GossiTheDog @gcve

Ok, but why don't we just use OIDs?

They're hirarchical and already delegated to a lot of organizations. And they're already used at other places like TLS certs and such.
Also you can address anything and everything with them.

EUVD

European Vulnerability Database