The cybersecurity world is reeling as the MITRE Corporation, a nonprofit cornerstone of global vulnerability management, announced that its funding for the Common Vulnerabilities and Exposures (CVE) program will expire today, April 16, 2025. This critical program, which has cataloged over 270,000 vulnerabilities since 1999, is at risk of disruption, threatening national security, critical infrastructure, and the global cybersecurity ecosystem. Here’s what you need to know about this unprecedented crisis, its potential impacts, and what might happen next.
What Is the CVE Program and Why Does It Matter?
The Common Vulnerabilities and Exposures (CVE) program is the backbone of global cybersecurity. It assigns unique identifiers (e.g., CVE-2024-43573) to publicly disclosed vulnerabilities, enabling security researchers, vendors, and organizations to communicate consistently about software and hardware flaws. Managed by MITRE and funded primarily by the U.S. Department of Homeland Security (DHS) through the Cybersecurity and Infrastructure Security Agency (CISA), the CVE program supports:
- Vulnerability Management: Helps organizations prioritize and patch vulnerabilities.
- Incident Response: Provides a standardized language for Computer Emergency Response Teams (CERTs).
- Critical Infrastructure Protection: Safeguards systems like power grids and financial networks.
- Global Coordination: Used by over 400 CVE Numbering Authorities (CNAs) in 40 countries, including Microsoft, Google, and Apple.
Without CVE, the cybersecurity community loses its “dictionary,” as experts like John Hammond of Huntress have warned, comparing the lapse to “suddenly deleting all dictionaries.”

The Funding Crisis: What Happened?
On April 15, 2025, a leaked letter from Yosry Barsoum, MITRE’s Vice President and Director of the Center for Securing the Homeland, alerted CVE board members that the DHS contract funding the CVE program, along with related initiatives like the Common Weakness Enumeration (CWE), would expire on April 16, 2025. MITRE confirmed the letter’s authenticity, stating, “The government continues to make considerable efforts to support MITRE’s role in the program, and MITRE remains committed to CVE as a global resource.”
CISA, the primary sponsor, acknowledged the lapse and said it is “urgently working to mitigate impact and to maintain CVE services on which global stakeholders rely.” However, no clear reason for the contract’s expiration has been provided, leaving the cybersecurity community in shock.
Speculation points to broader federal budget cuts, with some sources linking the issue to the Trump administration’s Department of Government Efficiency (DOGE) initiatives, which reportedly canceled $29 million in MITRE contracts. Whether intentional or a bureaucratic oversight, the timing—mere hours before the deadline—has sparked outrage.
Immediate Impacts of the CVE Funding Lapse
MITRE has confirmed that no new CVEs will be added after April 16, 2025, and the CVE website (cve.mitre.org) may eventually go offline, though historical records will remain accessible on GitHub. The immediate consequences include:
- Deterioration of Vulnerability Databases: The National Vulnerability Database (NVD), already backlogged with over 30,000 unprocessed vulnerabilities, relies on CVE data. A lapse could widen this gap, delaying actionable intelligence.
- Slowed Vendor Reactions: Without standardized CVE identifiers, vendors like Microsoft and Google may struggle to coordinate disclosures and patches, creating confusion.
- Impaired Incident Response: CERTs and security teams will lose a critical source of free vulnerability intelligence, hampering rapid response.
- Critical Infrastructure Risks: From electric grids to nuclear facilities, vulnerabilities may go untracked, increasing the risk of cyberattacks.
- Global Cybersecurity Chaos: The absence of a centralized system could lead to fragmented, proprietary vulnerability tracking, undermining coordination.
Brian Martin, a vulnerability historian, warned, “Pulling the plug on the database would cause an immediate cascading effect that will impact vulnerability management on a global scale.”
Community and Expert Reactions
The cybersecurity community is in uproar, with experts and leaders voicing alarm:
- John Hammond, Huntress: “I swore out loud when I heard the news. We’d lose the language and lingo we use to address problems in cybersecurity.”
- Casey Ellis, Bugcrowd: “A sudden interruption in services has the very real potential to bubble up into a national security problem in short order.”
- Sasha Romanosky, Rand Corporation: Called the potential end “tragic.”
- Congressional Leaders: Zoe Lofgren and Bennie Thompson labeled the lapse “reckless and ignorant,” urging DHS to restore funding to prevent malicious actors from exploiting the gap.
Jen Easterly, CISA’s director, emphasized the stakes: “If CVEs vanish, so does one of the clearest public sector warning systems we have. Cyber threats don’t stop at borders. Neither does defense. Lose this, and everyone’s flying blind.”
Social media platforms like X are abuzz with frustration, with users like @miliefsky calling it a “five-alarm fire” and @the_yellow_fall warning of “threatened global cybersecurity.”
What Happens Next?
The future of the CVE program is uncertain, but several scenarios are possible:
- Funding Renewal: DHS or CISA could secure emergency funding or extend the contract, though time is short.
- Industry Intervention: Private sector players like VulnCheck, which reserved 1,000 CVEs for 2025, are stepping up, but this is a temporary fix.
- Program Transition: Another organization could take over, though the federated CNA model makes this complex.
- Disruption: Without a solution, new vulnerabilities may go untracked, leading to a “wild west” of uncoordinated efforts.
Experts like Ben Edwards of Bitsight remain hopeful: “The federated framework and openness of the system make it possible for others to pick up where MITRE left off, but it’ll be a rocky road.”
Why This Matters to You
The CVE program’s potential collapse affects everyone, from individuals to enterprises:
- Businesses: Without CVEs, prioritizing patches becomes chaotic, increasing the risk of data breaches.
- Consumers: Vulnerabilities in everyday devices and services may go unaddressed.
- National Security: Critical infrastructure faces heightened risks from untracked threats.
As Greg Anderson of DefectDojo warned, a fragmented landscape could lead to confusion, with different groups naming the same vulnerability inconsistently, like “The Worst Encryption Flaw Ever” versus “A Terrible Encryption Flaw.”
Call to Action
The cybersecurity community is rallying to raise awareness and push for solutions. Here’s how you can help:
- Stay Informed: Follow updates from MITRE, CISA, and trusted sources like Krebs on Security.
- Advocate: Contact policymakers to emphasize the importance of funding cybersecurity programs.
- Prepare: Organizations should review their vulnerability management processes and explore alternative intelligence sources.
Conclusion
The expiration of MITRE’s CVE program funding on April 16, 2025, is a wake-up call for the cybersecurity world. This “five-alarm fire” threatens to disrupt a 25-year-old pillar of global security, with far-reaching consequences for businesses, governments, and critical infrastructure. While CISA and MITRE are working to mitigate the impact, the clock is ticking. The cybersecurity community must come together—whether through government action, industry collaboration, or innovative solutions—to ensure the CVE program’s legacy endures.
For the latest updates, visit cve.mitre.org or check the CVE GitHub repository at github.com/CVEProject. Let’s keep the conversation going and work to make cybersecurity better, not worse.








