美国突然停止资助CVE项目
US abruptly turns off funding for CVE program

原始链接: https://www.theregister.com/2025/04/16/homeland_security_funding_for_cve/

美国政府对CVE项目的资助即将到期,这可能会严重削弱全球的网络安全工作。CVE项目是识别和追踪软件漏洞的全球标准,由MITRE公司在国土安全部的合同下管理,25年来一直为漏洞分配唯一的标识符,确保每个人在解决安全漏洞时都能步调一致。随着资金的到期,该项目可能难以维持甚至关闭,从而阻止新CVE的发布,并可能关闭其网站。如果没有这个标准化系统,混乱将会出现,各组织将难以管理漏洞,从而危及合规性并使关键基础设施面临风险。专家警告称,这将造成严重破坏,如同切断了网络安全行业的“氧气”。虽然VulnCheck等私营公司正在尝试暂时填补这一空白,但仍需要一个长期的解决方案,例如行业联盟,以确保CVE项目的持续运行,避免网络安全领域的混乱。

Hacker News 正在讨论据 theregister.com 报道的美国政府突然停止资助 CVE 计划一事。由 NIST 维护的 NVD(国家漏洞数据库),作为关键的网络安全基础设施组件,由于软件漏洞数量增加和机构间支持的变化,面临着越来越大的积压问题。NIST 正在考虑成立一个由行业、政府和利益相关者组成的联盟来改进 NVD。 Yocto 项目表达了对其漏洞处理影响的担忧,指出其依赖 NVD 数据来及时解决问题。评论者们就削减资金的理由展开了辩论,一些人建议私有化或志愿者参与。一位用户认为,CVE 计划(本质上是一个整数注册表)可以由 GitHub 上的志愿者管理。其他人则质疑基于志愿者的解决方案的可行性和管理问题,指出目前缺乏志愿者参与,并且 CNA(认证漏洞分析机构) 已经承担了大量的工作。文章还提供了 Hacker News 上相关讨论的链接。

原文

US government funding for the world's CVE program – the centralized Common Vulnerabilities and Exposures database of product security flaws – ends Wednesday.

The 25-year-old CVE program plays a huge role in vulnerability management. It is responsible overseeing the assignment and organizing of unique CVE ID numbers, such as CVE-2014-0160 and CVE-2017-5754, for specific vulnerabilities, in this case OpenSSL's Heartbleed and Intel's Meltdown, so that when referring to particular flaws and patches, everyone is agreed on exactly what we're all talking about.

It is used by companies big and small, developers, researchers, the public sector, and more as the primary system for identifying and squashing bugs. When multiple people find the same hole, CVEs are useful for ensuring everyone is working toward that one specific issue.

CVE is a cornerstone of cybersecurity, and any gaps in CVE support will put our critical infrastructure and national security at unacceptable risk

While the whole world's vulnerability management efforts aren't going to descend into chaos overnight, there is a concern that in a month or two they may. The lack of US government funding means that, unless someone else steps in to fill the gap, this standardized system for naming and tracking vulnerabilities may falter or shut down, new CVEs may no longer be published, and the program's website may go offline.

Not-for-profit outfit MITRE has a contract with the US Department of Homeland Security to operate the CVE program, and on Tuesday the group confirmed this arrangement has not been renewed. This comes as the Trump administration scours around the federal government for costs to trim.

"On Wednesday, April 16, funding for MITRE to develop, operate, and modernize the Common Vulnerabilities and Exposures Program and related programs, such as the Common Weakness Enumeration Program, will expire," Yosry Barsoum, MITRE's vice president and director at the Center for Securing the Homeland, told The Register

"The government continues to make considerable efforts to support MITRE's role in the program and MITRE remains committed to CVE as a global resource," Barsoum added.

The Common Weakness Enumeration program is a centrally managed database of bug types.

The expiration came to light after a letter sent to CVE program board members was leaked on Bluesky. In that memo, Barsoum confided:

Historical CVE records will at least remain available at GitHub.

"CVE is a cornerstone of cybersecurity, and any gaps in CVE support will put our critical infrastructure and national security at unacceptable risk," Luta Security founder and CEO Katie Moussouris, who pioneered Microsoft's vulnerability disclosure program, told The Register.

"All industries worldwide depend on the CVE program to keep their heads above water when it comes to managing threats, so an abrupt halt like this would be like depriving the cybersecurity industry of oxygen and expecting it to spontaneously sprout gills," Moussouris said.

It basically works like this: When an individual researcher or an organization discovers a new bug in some product, a CVE program partner — there are currently a few hundred across 40 countries — is asked to assess the vulnerability report and assign a unique CVE identifier for the flaw if and as necessary.

The program is sponsored, and largely funded by the Cybersecurity and Infrastructure Security Agency, aka CISA, under the umbrella of the US Department of Homeland Security.

"I can say that, having been in this industry for longer than CVEs themselves, it won't be good," Dustin Childs, head of threat awareness at Trend Micro's Zero Day Initiative, told The Register.

I can say that, having been in this industry for longer than CVEs themselves, it won't be good

"Before CVEs, each company referred to vulnerabilities using their own vernacular," he added. "Customers were confused about whether they were protected or impacted from a particular bug. And was a time when there were much fewer companies and infinitely fewer bugs."

To put this in perspective: More than 40,000 new CVEs were published last year.

"If MITRE were to lose funding for the CVE, we can expect considerable confusion again until someone else picks up the flag," Childs continued, noting that this would require some sort of industry consortium — but nothing along those lines currently exists.

"Vulnerability management will become a mess as enterprises struggle to confirm they are in compliance with regulations and directives," he said. "Let's hope this is resolved quickly."

VulnCheck, a private vulnerability intel company that is also a CVE Naming Authority, aka CNA, on Tuesday said it has proactively reserved 1,000 CVEs for 2025. 

Still, this only preserves the functionality of the program for a couple months at best. 

The security industry needs to step in to fill the void

"MITRE, as a CNA, issues between 300-600 CVEs each month, so by reserving 1,000 hypothetically, we can assign a CVE to vulnerabilities for 1-2 months as long as the core service continues," Patrick Garrity, security researcher at VulnCheck, told The Register.  

"The CVE program is a critical resource globally used by nearly every organization in the world, so the implications of a pause will have downstream implications for security tooling, security teams, and every organization that cares about security," he added.

"It would be terrible to see government funding for the CVE program go away, but we also believe that this is a time when the security industry needs to step in to fill the void." ®

联系我们 contact @ memedata.com