Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

MITRE warns over lapse in CVE coverage | Computer Weekly

By Computer Weekly by By Computer Weekly
April 15, 2025
Home Uncategorized
Share on FacebookShare on Twitter


One of the cyber security world’s most significant assets, the common vulnerabilities and exposures (CVE) system operated by US-based non-profit MITRE appears to be heading for trouble after it emerged that the contract pathway for MITRE to continue to run the project on behalf of the US authorities, is set to lapse on Wednesday 16 April with no replacement ready.

In a letter to MITRE board members circulated today, a copy of which has been reviewed by Computer Weekly, Yosry Barsoum, vice president and director at the Centre for Securing Homeland (CSH) at MITRE, said the US government was currently making “considerable efforts” to continue MITRE’s longstanding role in the CVE programme.

“If a break in service were to occur, we anticipate multiple impacts to CVE, including deterioration of national vulnerability databases and advisories, tool vendors, incident response operations, and all manner of critical infrastructure,” wrote Barsoum.

“MITRE continues to be committed to CVE as a global resource. We thank you as a member of the CVE Board for your continued partnership,” he added.

A spokesperson for MITRE confirmed the legitimacy of Barsoum’s statement to Computer Weekly. They described the CVE programme as a “foundational pillar” of the cyber sector, anchoring a global industry worth close to $40bn (£30bn).

The 25 year-old CVE system is designed to serve as a reference and repository for disclosed cyber security vulnerabilities, and has been maintained by MITRE since its inception at the end of the 1990s, with funding drawn from the National Cyber Security Division of the Department of Homeland Security.

Over the years its impact on the world of security research has been of immense significance, providing cyber defenders with data on emerging vulnerabilities and threats, some of which have been implicated in some of the largest cyber incidents ever seen – such as WannaCry, SolarWinds Sunburst, Log4j, and MOVEit to name but a few.

Its continuing work will be familiar to most thanks to the sheer volume of CVEs – recognisable by their unique identifiers comprising the letters CVE, the year, and a numeric code – released on the second Tuesday of every month by Microsoft in its Patch Tuesday update.

If it was to have to cease operations, even temporarily pending a contract renewal, the impact would be keenly felt across the entire technology industry. Patch Tuesday aside, the current number of CVEs of all types being discovered and disclosed is running at record highs and shows no signs of slowing.

Disruption to the CVE system would be a gift to both financially-motivated cyber criminals and nation-state actors alike, who would be able to swiftly take advantage of any downtime as they continue to seek out, develop and weaponise new vulnerabilities, while security professionals would be left fumbling in the dark.

Coming amidst deep and painful government cuts being made in the US, the potential risk to the national security postures of the US and its allies from states such as China and Russia, is also extremely serious – a fact not lost on many members of the security community who took to social media late 15 April to spread the word.

Writing on LinkedIn, one observer speculated that the deprecation of MITRE’s contract was by design, and that taken alongside cuts to the likes of the Cybersecurity and Infrastructure Security Agency (CISA) and the National Institute of Standards and Technology (NIST), the US was tearing down core security institutions amid a significant ongoing cyber crisis.

Filling the gap

But with customary community spirit, many cyber professionals are already stepping up to address the looming shutdown. Patrick Garrity, a security researcher at VulnCheck, said: “We want to take a moment to thank MITRE for its decades of contributions to the CVE programme.

“Given the current uncertainty surrounding which services at MITRE or within the CVE programme may be affected, VulnCheck has proactively reserved 1,000 CVEs for 2025.”

Garrity added that VulnCheck’s reporting service would continue to assign CVE numbers for as long as it could do so.

“VulnCheck is closely monitoring the situation to ensure that both the community and our customers continue to receive timely, accurate vulnerability data,” he said.

MITRE added that historical CVE Records will continue to be available at GitHub.



Source link

By Computer Weekly

By Computer Weekly

Next Post
Logix Fiber Networks Appoints Telecom Veteran Greg O’Connor as CEO

Logix Fiber Networks Appoints Telecom Veteran Greg O'Connor as CEO

Recommended.

Broadcom Dumps Registered VMware Resellers; ‘Raising The Bar Across The Program,’ Says Channel Chief

Broadcom Dumps Registered VMware Resellers; ‘Raising The Bar Across The Program,’ Says Channel Chief

June 2, 2025
Texas Instruments commits B to domestic chip manufacturing

Texas Instruments commits $60B to domestic chip manufacturing

June 18, 2025

Trending.

VIDIZMO Earns Microsoft Solutions Partner Designations for All Three Areas of Azure, Solidifying its Expertise in Delivering AI Solutions

VIDIZMO Earns Microsoft Solutions Partner Designations for All Three Areas of Azure, Solidifying its Expertise in Delivering AI Solutions

June 28, 2025
Tilson Continues to Perform for Clients; Shares Substantial Progress in Chapter 11 Process

Tilson Continues to Perform for Clients; Shares Substantial Progress in Chapter 11 Process

June 27, 2025
OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors

OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors

June 27, 2025
DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes

DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes

June 23, 2025
Le nombre d’utilisateurs de la 5G-A atteint les dix millions en Chine : Huawei présente le développement de la 5G-A et la valeur de l’IA basée sur des scénarios

Le nombre d’utilisateurs de la 5G-A atteint les dix millions en Chine : Huawei présente le développement de la 5G-A et la valeur de l’IA basée sur des scénarios

June 27, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio