CVE Funding Crisis Threatens Cybersecurity; Experts Urge Resilient Solutions Before 2025 Deadline

April 15, 2025
CVE Funding Crisis Threatens Cybersecurity; Experts Urge Resilient Solutions Before 2025 Deadline
  • Tenable, a key player in vulnerability scanning, continues to develop its coverage based on vendor advisories and maintains a curated Vulnerability Intelligence feed, independent of CVE assignments.

  • The funding for the Common Vulnerabilities and Exposures (CVE) program is set to expire on April 16, 2025, raising alarms about potential disruptions in cybersecurity vulnerability management.

  • Experts warn that a break in service could severely impact national vulnerability databases and hinder incident response operations, posing a national security risk.

  • Despite processing incoming CVEs at a steady rate, NIST has reported a growing backlog, which highlights the need for timely actionable intelligence for organizations.

  • Some members of the CVE Board are exploring options to transform the initiative into a nonprofit foundation or an international consortium to ensure sustainable operations.

  • Post-April 16, while the CVE website will remain accessible, no new CVEs will be added, potentially slowing responses to emerging threats.

  • Industry leaders are also advocating for a European equivalent to the CVE program to enhance information sharing and vulnerability management across the EU.

  • Without the CVE program, organizations may struggle to meet compliance demands, risking penalties and damaging their reputations due to fragmented vulnerability data.

  • In light of the funding uncertainties, there is hope that alternative funding sources or organizations like the CVE Foundation could step in to fill the gap left by MITRE.

  • The funding challenges coincide with NIST's struggle to manage a significant backlog of CVEs, exacerbated by a 32% increase in submissions last year.

  • Despite ongoing government efforts to secure MITRE's continued involvement, concerns remain about the potential negative impacts on cybersecurity management.

  • Stakeholders emphasize the necessity for a resilient funding model that includes contributions from governments, corporations, and international entities to support the CVE program.

Summary based on 44 sources


Get a daily email with more Tech stories

More Stories