Remix.run Logo
alexmorley 7 days ago

Edit suggests the contract has been renewed last minute.

https://www.forbes.com/sites/kateoflahertyuk/2025/04/16/cve-...

7 days ago | parent | next [-]
[deleted]
Shank 7 days ago | parent | prev [-]

Are there any non-Forbes sources that confirm this?

shagie 7 days ago | parent | next [-]

https://www.itpro.com/security/confusion-and-frustration-mit...

> However, in an updated statement, the agency revealed it intends to maintain the database in a bid to prevent a lapse in CVE services.

> “The CVE Program is invaluable to the cyber community and a priority of CISA,” a spokesperson said.

> “Last night, CISA executed the option period on the contract to ensure there will be no lapse in critical CVE services. We appreciate our partners’ and stakeholders’ patience.”

Searching for that last passage:

https://www.bleepingcomputer.com/news/security/cisa-extends-...

> "The CVE Program is invaluable to cyber community and a priority of CISA," the U.S. cybersecurity agency told BleepingComputer. "Last night, CISA executed the option period on the contract to ensure there will be no lapse in critical CVE services. We appreciate our partners' and stakeholders' patience."

And https://www.reuters.com/world/us/us-agency-extends-support-l...

> WASHINGTON, April 16 (Reuters) - U.S. officials have said at the last minute that they're extending support for a critical database of cyber weaknesses whose funding was due to run out on Wednesday.

> The planned lapse in payments for the MITRE Corp's Common Vulnerabilities and Exposures database spread alarm across the cybersecurity community. The database, which acts as a kind of catalog for cyber weaknesses, plays a key role in enabling IT administrators to quickly flag and triage the myriad different bugs and hacks discovered daily.

chris_wot 7 days ago | parent [-]

Let me guess, Elon's DOGE crew were part of this and screwed up yet another thing that is essential for U.S. security?

shagie 7 days ago | parent [-]

My {conspiracy | belief | suspicion} is that this was something that as part of the DoD they saw "Mitre Corporation" and that organization's relationship with MIT and were pulling funding for anything "elite liberal academia" (even distantly related) combined with the "we're pulling back from anything cybersecurity" ( https://news.ycombinator.com/item?id=43228029 ). (edit) I've run out of invocations of Hanlon's Razor and it needs a long rest before its recharged. (/edit)

I don't believe it was a mistake - they wanted to pull its funding (and still intend to do). Note the wording of the statement:

> Last night, CISA executed the option period on the contract to ensure there will be no lapse in critical CVE services.

We are now in the option period.

At some point in the future, that option period will expire.

neodymiumphish 7 days ago | parent | next [-]

This type of option exercise is extremely common in government contracts. I don’t think there’s much to read into on that front.

shagie 7 days ago | parent [-]

The option is common (its particulars of the award is at https://www.usaspending.gov/award/CONT_AWD_70RCSJ24FR0000019... ). The fact that the option needed to be done rather than DHS continuing to support CVE and related programs is an abandonment of the responsibilities of the organization to try to keep computer systems secure.

https://www.cisa.gov/news-events/directives/bod-22-01-reduci...

   A binding operational directive is a compulsory direction to federal, executive branch, departments and agencies for purposes of safeguarding federal information and information systems.

   Section 3553(b)(2) of title 44, U.S. Code, authorizes the Secretary of the Department of Homeland Security (DHS) to develop and oversee the implementation of binding operational directives.

   Federal agencies are required to comply with DHS-developed directives.

   ...

   Remediate each vulnerability according to the timelines set forth in the CISA-managed vulnerability catalog. The catalog will list exploited vulnerabilities that carry significant risk to the federal enterprise with the requirement to remediate within 6 months for vulnerabilities with a Common Vulnerabilities and Exposures (CVE) ID assigned prior to 2021 and within two weeks for all other vulnerabilities. These default timelines may be adjusted in the case of grave risk to the Federal Enterprise.
If there's no catalog that the government is maintaining for "these things need to be fixed to run on federal systems" ... then how do you ensure that the federal computers are secure?
snickerbockers 6 days ago | parent | prev [-]

I would feel a lot better about my skills knowing that bigballs also had difficulty figuring out what the correct syntax for this particular engine's version of \w and how many layers of backslash escapes are needed.

plasma_beam 7 days ago | parent | prev | next [-]

It hasn't posted to FPDS yet:https://www.fpds.gov/ezsearch/fpdsportal?q=PIID%3A%2270RCSJ2...

Assuming this is the correct contract, which it appears to be, it had an option period starting today through March of next year. DHS just needed to exercise the option.

DeepYogurt 7 days ago | parent | prev | next [-]

Main page news on https://www.cisa.gov/

marcusb 7 days ago | parent | prev | next [-]

Just social media posts, with claims they received the info from CISA https://infosec.exchange/@metacurity/114347467581760027

Supposedly, MITRE will make a statement today. Time will tell.

Edit - it is MITRE, not CISA, which the poster expects to make a statement.

ForOldHack 7 days ago | parent [-]

This was 0 minutes ago. Glad to see how important CVE is to security personel.

marcusb 7 days ago | parent [-]

?

Metacurity’s post was like 90 minutes ago.

gtani 5 days ago | parent | prev | next [-]

reddit thread w/sources seem credible but 11 months only and still dependent on single funder

https://old.reddit.com/r/netsec/comments/1k0dodx/mitre_suppo...

numpad0 6 days ago | parent | prev [-]

Why would that be important???

throawayonthe 6 days ago | parent [-]

[dead]