MITRE CVE Program: A Single Point of Failure for Global Cybersecurity

Image cover for blog post.

May 3, 2025

Profile image of Abhilash Hota

Abhilash Hota

The Common Vulnerabilities and Exposures (CVE) program has played a central role in global cybersecurity, providing a unified language for communicating vulnerabilities across researchers, vendors, and defenders. Managed primarily by the MITRE Corporation, with funding from the U.S. government, the CVE system facilitates the timely dissemination of critical cybersecurity information. However, recent developments highlight challenges within its current structure, suggesting strategic improvements are needed.

In this article, we look at the process from the discovery and initial reporting to the eventual publication of a vulnerability as a CVE entry. We explore the roles of MITRE and other key stakeholders. We highlight how CVE records are enriched and the resource constraints affecting performance. Finally, we offer considerations for building a more resilient CVE publication system: A public-private, multi-country partnership to distribute responsibility and reduce single points of failure, including suggestions for its organization, funding, and governance.

Key Stakeholders and Disclosure Process

The vulnerability disclosure process primarily involves the following entities:

  1. Researchers and Discoverers: Initial identification and reporting of vulnerabilities.
  2. CVE Numbering Authorities (CNAs): Organizations responsible for assigning CVE identifiers.
  3. MITRE Corporation: Manages CVE infrastructure and publication. They receive funding from CISA (~$30 million since 2023) for running the CVE Program.
  4. CISA and NIST (U.S. Government): Provide funding and additional vulnerability data enrichment via the NIST National Vulnerability Database (NVD) and CISA Vulnrichment.

CISA and NIST lie within the umbrella of the U.S. Government, while MITRE is a private organization that runs the CVE program financed by the U.S. Government through CISA.

Org Chart

The CVE Program itself has a hierarchical structure, with MITRE and CISA currently serving as the only top-level roots.

CVE Program

The process of discovering and reporting a vulnerability is mainly based on the following steps:

  1. Discovery: Vulnerabilities identified and reported to vendors or coordinators.
  2. CNA Submission: CNAs assign CVE identifiers; MITRE generally handles cases lacking appropriate CNAs. However, a security researcher can bypass CNAs and report directly to MITRE.
  3. Coordinated Disclosure: Information is withheld publicly until mitigations are available.
  4. Publication: MITRE publishes CVE entries publicly on CVE.org and GitHub.
  5. Enrichment: The National Vulnerability Database (NVD) gathers public information from CVE.org, provides analysis, and adds data, including CVSS scores, CWE types, and affected products. This database is used by organizations globally for vulnerability prioritization and/or risk assessment.

Discovery And Publication Process

Key Challenges

CVE Analysis Backlog

In recent years, the CVE system has faced substantial challenges:

  • Growing CVE Volume: The annual number of vulnerabilities increased significantly from 6,449 in 2016 to 40,300 in 2024, putting a significant strain on resources.
  • Processing Delays: Notable backlogs, particularly at NIST’s NVD in 2023, caused widespread delays, leaving vulnerabilities unanalyzed for extended periods.
  • Data Quality Variability: Inconsistent data quality and completeness across different CNAs undermine reliability. While the CVE schema is quite comprehensive, the data provided during initial submission and eventual analysis often leaves much to be desired.
  • Funding and Stability: MITRE’s operations depend heavily on U.S. government funding, creating vulnerability to budgetary and political instability. Early 2025 saw the industry facing potentially halted operations in the CVE program due to delayed contract renewals.
  • Centralization Risks: Sole reliance on U.S. government-funded programs at MITRE and NIST NVD as the central manager and primary data repository creates a significant single point of failure.

Alternative Vulnerability Databases

Other countries also maintain vulnerability databases and reporting programs. However, they offer varying levels of coverage and maturity.

  • China (CNNVD/CNVD): China maintains two major vulnerability databases. The China National Vulnerability Database of Information Security (CNNVD) is managed by the China Information Technology Security Evaluation Center and is the primary catalog of vulnerabilities in China. The China National Vulnerability Database (CNVD) is managed by the National Computer Network Emergency Response Technical Coordination Center. While these databases have a high throughput and are quick to publish vulnerabilities, they are completely government-controlled, highly centralized, and have relatively opaque processes.

  • Japan (JVN): Japan Vulnerability Notes (JVN) is a vulnerability information site operated jointly by the JPCERT Coordination Center and the Information Technology Promotion Agency. It provides descriptions, remediations, and vendor notes on vulnerabilities. JP-CERT is a CNA and works in tandem with the CVE program. While it offers essential local context, it is narrower in scope and relies on the global CVE system for baseline identification.

  • EU (EUVD): European countries have maintained mainly their own CERT advisories and relied on the CVE program/NVD. However, the EU NIS2 directive in 2022 and the Cyber Resilience Act have led to a push for Europe’s own coordinated vulnerability disclosure program. The European Union Agency for Cybersecurity (ENISA) is a CNA and has launched the European Vulnerability Database (EUVD) as a multi-stakeholder pilot program. However, it is in the early stages of development and adoption.

Proposals for The Future of the CVE Program

We propose the following strategic enhancements as a possible solution:

  • Distributed CVE Governance: Establish an international, public-private foundation involving global stakeholders, including researchers, industry representatives, and national governments (e.g., national CERTs/CSIRTs).

  • Diversified and Distributed Funding: Reduce reliance on single-source funding by distributing financial support across multiple governments and private sector partners, ensuring continuity and resilience.

  • Operational Decentralization: Introduce regional hubs for data storage and operations, expanding the number of top-level root CNAs to balance the analysis workload and build redundancies into the system.

  • Unified Global CVE Naming Standard: Maintain a single global CVE naming convention to avoid fragmentation and facilitate consistency and communication efficiency worldwide.

  • Enhanced Transparency and Collaboration: Implement public oversight to build trust in the cybersecurity community.

Conclusion

The CVE program, while somewhat polarizing in certain circles, has been a mainstay of the global cybersecurity effort. That said, as an industry, we must listen to our own advice and not allow single points of failure in crucial systems. This article does not suggest a need for new standards. The underlying program itself has been a net positive and can still play an important role, but how we have structured and administered it needs to change. While the suggested steps require a certain level of political will and a not insignificant amount of negotiations and wrangling, we believe that, in this case, the ends would justify the efforts.

All Rights Reserved by ENTRYZERO GmbH

Website by Sanico Software

IMPRINT: ENTRYZERO GmbH, Konrad-Zuse-Straße 18, 44801 Bochum, Registered Office: Bochum, Registration Court: Local Court Bochum, Registration number: HRB 21709, VAT ID: DE369315057, Managing Directors: Dr. Mohamad Sbeiti, Samet Gökbayrak, Tel.: +49 234 94426026, Email: info@entryzero.ai

PRIVACY POLICY: This website does not collect any personal data. We do not use cookies, trackers, forms or similar technologies. However, by visiting our website you agree that for every site request the following non-personal information is stored on the webserver for statistical, intrusion detection/prevention and troubleshooting purposes: requested address (URL), request date and time, client IP address, user-agent and referer. No information is given to or shared with third parties

Logo of the German Ministry