General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsDOGE has terminated MITRE's CVE contract
This is the primary system for sharing software vulnerabilities and is used by the cybersecurity industry (I work in this field). Cutting funding on this is like ending your nuclear defense funding during the cold war. Good luck out there, our information systems just became a lot less safe.
As long as I have been in this field (more than 15 years now) MITRE has been the keeper via DARPA and other government funding. This is what keeps the bad guys at bay and is the primary tool for sharing attack vectors in the industry so the industry can keep up with the black hats who do collaborate on the dark web.
whopis01
(3,916 posts)I worked in the field when the CVE was first created back in late 90s / early 2000s.
It is a critical point of information distribution for security.
You do not get rid of a tool like that unless you want the problems that will follow.
erronis
(23,660 posts)I'm guessing the rump USSR is mainly calling the shots at the White House, but others are looking on with glee and greed.
ultralite001
(2,527 posts)TIA...
ancianita
(43,286 posts)Last edited Tue Apr 15, 2025, 09:41 PM - Edit history (1)
Maybe explain more about what/who MITRE and CVE are/do? Or CVE?
I found this on Wikipedia, but it seems as if there's likely, out of 9,000+ employees, some one or even a few thousand of them will hold things together for free. Because if MITRE and CVE are as important as you say, and they love this work and know it's a matter of national security, they'll find funding somewhere. Am I being naive? I mean, McLean is the real home of the CIA, not Langley. It's not as if the CIA doesn't have a black budget and can't recover from a $2 billion loss, right?
Do you have any other info about why DOGE wants to extract revenue from this particular part of our national security?
erronis
(23,660 posts)When the dipshits in the current regime cancel that contract then all clearances become void.
Much of the security infrastructure in the government and throughout the corporate/academic world has been based on some trust. This has been shredded.
ancianita
(43,286 posts)NLRB whistleblower just said on Rachel, connected not just to DOGE, but to Starlink, and therefore, Russia. He has the forensics of 40 hits coming from a not-fake IP address in Russia within 15 minutes of unlogged breakins done by DOGE in the NLRB's securitized systems.
Muskovite isn't smart enough alone. His money buys a legion of smart. In the shadows of the dipshit theater of this administration are Legion of Doom operatives.
Thanks for your input, erronis.
IronLionZion
(51,148 posts)they add new ones daily. It's an important resource for those in the cybersecurity field. America is becoming much less secure with this administration's "efficiency".
SSJVegeta
(2,783 posts)WmChris
(716 posts)Let's open the door for all kinds of government and infrastructure failures due to lack of updated security data. The Moron and his henchmen are hell bent on turning us into the 3rd world shithole country that they can dominate with iron fists.
erronis
(23,660 posts)And I fear that they may use this information channel to start spreading false warnings and encouraging software updates that are actually trojans.
IronLionZion
(51,148 posts)Solar Winds attack happened during the last Trump administration. He cut cybersecurity funding that year too. Funny how that works
https://en.wikipedia.org/wiki/2020_United_States_federal_government_data_breach
https://en.wikipedia.org/wiki/Supply_chain_attack
IrishBubbaLiberal
(2,561 posts)Wow, Cutting that contact is beyond insane.
The only possible reason is to cause chaos.
AND
with DOGE/Musk causing this on purpose
this means
Musk DOES NOT want ANYTHING OR ANYONE
to be able to EXPOSE software vulnerabilities.
software vulnerabilities THAT possibility DOGE tech goons
installed on purpose
extremely shortsighted to cut MITRE contracts
LiberalArkie
(19,717 posts)erronis
(23,660 posts)Many of us still opine that these actions are being done because of ineptitude, or perhaps some psychological problem, malevolence.
This is well orchestrated and has been worked on since before the 1st trump installation.
There's real purpose here and a goal that is in sight. The take-over of the US (and probably world-wide) democracy without firing a shot.
blue-wave
(4,948 posts)They just won't stop undermining our country, will they?
yellow dahlia
(5,667 posts)calimary
(89,841 posts)Maybe he thinks this is good because increased vulnerability forces the peons on their knees to stay.
Cuz when were fearful and on our knees, were presumably easier to control cuz were less likely to put up a fight.
They THINK, that is. But what the bad guys think is all too often wrong (or wrong-headed).
eggplant
(4,179 posts)I was sick of having to fix all of the vulnerabilities they keep identifying.
Irish_Dem
(80,984 posts)orangecrush
(30,050 posts)erronis
(23,660 posts)The 25-year-old CVE program plays a huge role in vulnerability management. It is responsible overseeing the assignment and organizing of unique CVE ID numbers, such as CVE-2014-0160 and CVE-2017-5754, for specific vulnerabilities, in this case OpenSSL's Heartbleed and Intel's Meltdown, so that when referring to particular flaws and patches, everyone is agreed on exactly what we're all talking about.
It is used by companies big and small, developers, researchers, the public sector, and more as the primary system for identifying and squashing bugs. When multiple people find the same hole, CVEs are useful for ensuring everyone is working toward that one specific issue.
While the whole world's vulnerability management efforts aren't going to descend into chaos overnight, there is a concern that in a month or two they may. The lack of US government funding means that, unless someone else steps in to fill the gap, this standardized system for naming and tracking vulnerabilities may falter or shut down, new CVEs may no longer be published, and the program's website may go offline.