
In response to recent media reports suggesting instability in the Common Vulnerabilities and Exposures (CVE) Program, the Cybersecurity and Infrastructure Security Agency (CISA) has issued a strong public statement reaffirming its commitment to sustaining one of cybersecurity’s most critical infrastructures.
“To set the record straight, there was no funding issue, but rather a contract administration issue that was resolved prior to a contract lapse,” CISA stated, dispelling fears that the CVE program was ever in jeopardy.
The CVE Program—managed by MITRE with funding from the U.S. Department of Homeland Security—serves as the universal standard for identifying and cataloging publicly known cybersecurity vulnerabilities. Used by defenders and developers alike, CVE IDs are a cornerstone of modern vulnerability management and threat intelligence platforms.
Concerns were initially triggered by comments from MITRE Vice President Yosry Barsoum, who warned that a lapse in U.S. government funding could severely impact both the CVE and CWE (Common Weakness Enumeration) programs. Barsoum’s warning led to speculation that a potential funding cutoff would destabilize vulnerability tracking efforts globally.
However, CISA was quick to clarify:
“There has been no interruption to the CVE Program and CISA is fully committed to sustaining and improving this critical cyber infrastructure.”
CISA emphasized the resilience and adaptability of the CVE Program, which has evolved from a centralized model into a federated system of 453 CVE Numbering Authorities (CNAs) distributed around the world. This network enables more scalable and timely assignment of CVE identifiers, fostering transparency and rapid response in the face of new threats.
“This growth has enabled faster and more distributed CVE identification, providing valuable vulnerability information to the public and enabling defenders to take quick action to protect themselves.”
Acknowledging the complexity and scale of the cybersecurity ecosystem, CISA reiterated its dedication to community engagement:
“We are committed to fostering inclusivity, active participation, and meaningful collaboration between the private sector and international governments to deliver the requisite stability and innovation to the CVE Program.”
The agency also affirmed that it would continue working closely with MITRE and the CVE Board to refine the program’s strategy based on community feedback, aiming to maintain its relevance and effectiveness in an ever-evolving digital landscape.
As the most widely adopted vulnerability taxonomy, the CVE Program is integrated into nearly every major cybersecurity tool and framework. From SIEMs and threat intel platforms to national vulnerability databases and risk scanners, CVE IDs provide the common language that powers automated detection and coordinated response.
A lapse in this infrastructure—real or perceived—could disrupt vulnerability disclosures, delay remediation cycles, and weaken global cyber defenses. CISA’s swift clarification, therefore, provides critical assurance to both industry stakeholders and international partners.
Despite recent concerns, the CVE Program remains fully operational and firmly supported by CISA and MITRE. As the backbone of global vulnerability management, its continuity is vital—and, according to CISA, absolutely guaranteed.