Skip to content

Commit e96c944

Browse files
authored
11/20/25 release branch (#3775)
* #3773 Update AWG c-chairs on Working Groups page * #3771 Add ENISA as Root
1 parent b67421a commit e96c944

File tree

6 files changed

+105
-6
lines changed

6 files changed

+105
-6
lines changed
1.15 MB
Loading

src/assets/data/CNAsList.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19736,7 +19736,7 @@
1973619736
"shortName": "ENISA",
1973719737
"cnaID": "CNA-2024-0008",
1973819738
"organizationName": "EU Agency for Cybersecurity (ENISA)",
19739-
"scope": "Vulnerabilities in information technology (IT) products discovered by European Union (EU) Computer Security Incident Response Teams (CSIRTs) or reported to EU CSIRTs for coordinated disclosure, as long as they do not fall under a CNA with a more specific scope.",
19739+
"scope": "<strong>Root Scope:</strong> European Union (EU) member states/EU authorities, EU CSIRTs network members, and cooperative partners under ENISA’s mandate as well as other CNAs who choose ENISA as their Root<br/><br/><strong>CNA Scope:</strong> Vulnerabilities in information technology (IT) products discovered by European Union (EU) Computer Security Incident Response Teams (CSIRTs) or reported to EU CSIRTs for coordinated disclosure, as long as they do not fall under a CNA with a more specific scope.",
1974019740
"contact": [
1974119741
{
1974219742
"email": [],
@@ -19773,6 +19773,10 @@
1977319773
"organizationName": "n/a"
1977419774
},
1977519775
"roles": [
19776+
{
19777+
"helpText": "",
19778+
"role": "Root"
19779+
},
1977619780
{
1977719781
"helpText": "",
1977819782
"role": "CNA"
@@ -24168,7 +24172,7 @@
2416824172
"email": [
2416924173
{
2417024174
"label": "Email",
24171-
"emailAddr": "cve-coordination@s21sec.com"
24175+
"emailAddr": "es.dis.s21sec.cve.coordination@thalesgroup.com"
2417224176
}
2417324177
],
2417424178
"contact": [],

src/assets/data/news.json

Lines changed: 94 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,99 @@
11
{
22
"currentNews": [
3+
{
4+
"id": 604,
5+
"newsType": "blog",
6+
"title": "CVE Program Expands Partnership with European Union Agency for Cybersecurity (ENISA)&mdash;ENISA Is Now a Root in the CVE Program",
7+
"urlKeywords": "ENISA Root CVE Program",
8+
"date": "2025-11-20",
9+
"author": {
10+
"name": "CVE Program",
11+
"organization": {
12+
"name": "CVE Program",
13+
"url": ""
14+
},
15+
"title": "",
16+
"bio": ""
17+
},
18+
"description": [
19+
{
20+
"contentnewsType": "paragraph",
21+
"content": "The <a href='/'>CVE Program</a> is expanding its partnership with the <a href='/PartnerInformation/ListofPartners/partner/ENISA'>European Union Agency for Cybersecurity (ENISA)</a> for managing the assignment of <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifiers (CVE IDs)</a> and publication of <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> for the CVE Program. ENISA is now designated as a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRoot'>Root</a> for EU member states/EU authorities, EU CSIRTs network members, and cooperative partners under ENISA’s mandate as well as other <a href='/ProgramOrganization/CNAs'>CVE Numbering Authorities (CNAs)</a> who choose ENISA as their Root."
22+
},
23+
{
24+
"contentnewsType": "paragraph",
25+
"content": "The addition of ENISA as Root is a significant milestone for the CVE Program. ENISA’s new role directly supports shared goals around expanding international participation in operational and governance roles. It also demonstrates continued progress by the program in growing the Root community and advancing federated operations where additional organizations help scale CNA engagement, onboarding, and data quality across respective program hierarchies."
26+
},
27+
{
28+
"contentnewsType": "paragraph",
29+
"content": "As a Root, ENISA is responsible for ensuring the effective assignment of CVE IDs, implementing the CVE Program rules and guidelines, and managing the <a href='/ProgramOrganization/CNAs'>CNAs</a> under its care. It is also responsible for recruitment and onboarding of new CNAs and resolving disputes within its scope."
30+
},
31+
{
32+
"contentnewsType": "paragraph",
33+
"content": "A <a href='/ProgramOrganization/CNAs'>CNA</a> is an organization responsible for the regular assignment of CVE IDs to vulnerabilities, and for creating and publishing information about the vulnerability in the associated CVE Record. Each CNA has a specific scope of responsibility for vulnerability identification and publishing. There are currently <a href='/PartnerInformation/ListofPartners'>483 CNAs</a> (480 CNAs and 3 CNA-LRs) from <a href='/ProgramOrganization/CNAs'>40 countries</a> and 1 no country affiliation actively participating in the CVE Program."
34+
},
35+
{
36+
"contentnewsType": "paragraph",
37+
"content": "For existing CNAs who are eligible and interested in moving under ENISA’s Root, the CVE Program encourages a collaborative and voluntary transition. The CVE Program will closely engage with each organization to ensure a smooth transition process. A transition period is foreseen for those CNAs who intend to change Root. The phased approach by ENISA will allow for thoughtful coordination, ongoing support, and alignment with the preferences and operational needs of each CNA."
38+
},
39+
{
40+
"contentnewsType": "paragraph",
41+
"content": "As a Root, ENISA will join the CVE Program Council of Roots, which focuses on operational coordination across the CVE Program’s Root hierarchies. At an international level, CVE Program Roots include MITRE, CISA, Google, and Red Hat from the US, and JPCERT/CC from Japan. Within the EU, Roots include INCIBE Cert, Thales Group, and, most recently, CERT@VDE."
42+
},
43+
{
44+
"contentnewsType": "paragraph",
45+
"content": "Currently, <a href='/PartnerInformation/ListofPartners/partner/ENISA'>ENISA</a>, <a href='/PartnerInformation/ListofPartners/partner/Google'>Google</a>, <a href='/PartnerInformation/ListofPartners/partner/jpcert'>JPCERT/CC</a>, <a href='/PartnerInformation/ListofPartners/partner/redhat'>Red Hat</a>, <a href='/PartnerInformation/ListofPartners/partner/INCIBE'>Spanish National Cybersecurity Institute (INCIBE)</a>, and <a href='/PartnerInformation/ListofPartners/partner/THA-PSIRT'>Thales Group</a> are Roots under the <a href='/PartnerInformation/ListofPartners/partner/mitre'>MITRE Top-Level Root</a>. <a href='/PartnerInformation/ListofPartners/partner/CERTVDE'>CERT@VDE</a> and <a href='/PartnerInformation/ListofPartners/partner/icscert'>CISA ICS</a> are Roots under the <a href='/PartnerInformation/ListofPartners/partner/CISA'>CISA Top-Level Root</a>. Learn more about how the CVE Program is organized on the <a href='/ProgramOrganization/Structure'>Structure page</a> on the CVE website."
46+
},
47+
{
48+
"contentnewsType": "image",
49+
"imageWidth": "",
50+
"href": "/news/NewCVEProgramRoot.png",
51+
"altText": "New CVE Program Root"
52+
}
53+
]
54+
},
55+
{
56+
"id": 603,
57+
"displayOnHomepageOrder": 0,
58+
"newsType": "press-release",
59+
"title": "CVE Program Expands Partnership with European Union Agency for Cybersecurity (ENISA)&mdash;ENISA Is Now a Root in the CVE Program",
60+
"urlKeywords": "ENISA Root CVE Program",
61+
"date": "2025-11-20",
62+
"description": [
63+
{
64+
"contentnewsType": "paragraph",
65+
"content": "FOR IMMEDIATE RELEASE &mdash; The <a href='/'>CVE Program</a> is expanding its partnership with the <a href='/PartnerInformation/ListofPartners/partner/ENISA'>European Union Agency for Cybersecurity (ENISA)</a> for managing the assignment of <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifiers (CVE IDs)</a> and publication of <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> for the CVE Program. ENISA is now designated as a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRoot'>Root</a> for EU member states/EU authorities, EU CSIRTs network members, and cooperative partners under ENISA’s mandate as well as other <a href='/ProgramOrganization/CNAs'>CVE Numbering Authorities (CNAs)</a> who choose ENISA as their Root."
66+
},
67+
{
68+
"contentnewsType": "paragraph",
69+
"content": "The addition of ENISA as Root is a significant milestone for the CVE Program. ENISA’s new role directly supports shared goals around expanding international participation in operational and governance roles. It also demonstrates continued progress by the program in growing the Root community and advancing federated operations where additional organizations help scale CNA engagement, onboarding, and data quality across respective program hierarchies."
70+
},
71+
{
72+
"contentnewsType": "paragraph",
73+
"content": "As a Root, ENISA is responsible for ensuring the effective assignment of CVE IDs, implementing the CVE Program rules and guidelines, and managing the <a href='/ProgramOrganization/CNAs'>CNAs</a> under its care. It is also responsible for recruitment and onboarding of new CNAs and resolving disputes within its scope."
74+
},
75+
{
76+
"contentnewsType": "paragraph",
77+
"content": "A <a href='/ProgramOrganization/CNAs'>CNA</a> is an organization responsible for the regular assignment of CVE IDs to vulnerabilities, and for creating and publishing information about the vulnerability in the associated CVE Record. Each CNA has a specific scope of responsibility for vulnerability identification and publishing. There are currently <a href='/PartnerInformation/ListofPartners'>483 CNAs</a> (480 CNAs and 3 CNA-LRs) from <a href='/ProgramOrganization/CNAs'>40 countries</a> and 1 no country affiliation actively participating in the CVE Program."
78+
},
79+
{
80+
"contentnewsType": "paragraph",
81+
"content": "For existing CNAs who are eligible and interested in moving under ENISA’s Root, the CVE Program encourages a collaborative and voluntary transition. The CVE Program will closely engage with each organization to ensure a smooth transition process. A transition period is foreseen for those CNAs who intend to change Root. The phased approach by ENISA will allow for thoughtful coordination, ongoing support, and alignment with the preferences and operational needs of each CNA."
82+
},
83+
{
84+
"contentnewsType": "paragraph",
85+
"content": "As a Root, ENISA will join the CVE Program Council of Roots, which focuses on operational coordination across the CVE Program’s Root hierarchies. At an international level, CVE Program Roots include MITRE, CISA, Google, and Red Hat from the US, and JPCERT/CC from Japan. Within the EU, Roots include INCIBE Cert, Thales Group, and, most recently, CERT@VDE."
86+
},
87+
{
88+
"contentnewsType": "paragraph",
89+
"content": "Currently, <a href='/PartnerInformation/ListofPartners/partner/ENISA'>ENISA</a>, <a href='/PartnerInformation/ListofPartners/partner/Google'>Google</a>, <a href='/PartnerInformation/ListofPartners/partner/jpcert'>JPCERT/CC</a>, <a href='/PartnerInformation/ListofPartners/partner/redhat'>Red Hat</a>, <a href='/PartnerInformation/ListofPartners/partner/INCIBE'>Spanish National Cybersecurity Institute (INCIBE)</a>, and <a href='/PartnerInformation/ListofPartners/partner/THA-PSIRT'>Thales Group</a> are Roots under the <a href='/PartnerInformation/ListofPartners/partner/mitre'>MITRE Top-Level Root</a>. <a href='/PartnerInformation/ListofPartners/partner/CERTVDE'>CERT@VDE</a> and <a href='/PartnerInformation/ListofPartners/partner/icscert'>CISA ICS</a> are Roots under the <a href='/PartnerInformation/ListofPartners/partner/CISA'>CISA Top-Level Root</a>. Learn more about how the CVE Program is organized on the <a href='/ProgramOrganization/Structure'>Structure page</a> on the CVE website."
90+
},
91+
{
92+
"contentnewsType": "paragraph",
93+
"content": "MEDIA CONTACT<br/><a href='mailto:[email protected]'>[email protected]</a>"
94+
}
95+
]
96+
},
397
{
498
"id": 602,
599
"newsType": "blog",
1.6 KB
Loading

src/views/ProgramOrganization/Structure.vue

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,14 +38,15 @@
3838
(<router-link to='/PartnerInformation/ListofPartners/partner/CERTVDE'>CERT@VDE</router-link>
3939
and
4040
<router-link to='/PartnerInformation/ListofPartners/partner/icscert'>CISA ICS</router-link>),
41-
multiple CNAs, and one CNA-LR managed by the CISA ICS Root. The MITRE TL-Root hierarchy includes five Roots
42-
(<router-link to='/PartnerInformation/ListofPartners/partner/Google'>Google</router-link>,
41+
multiple CNAs, and one CNA-LR managed by the CISA ICS Root. The MITRE TL-Root hierarchy includes six Roots
42+
(<router-link to='/PartnerInformation/ListofPartners/partner/ENISA'>ENISA</router-link>,
43+
<router-link to='/PartnerInformation/ListofPartners/partner/Google'>Google</router-link>,
4344
<router-link to='/PartnerInformation/ListofPartners/partner/INCIBE'>INCIBE</router-link>,
4445
<router-link to='/PartnerInformation/ListofPartners/partner/jpcert'>JPCERT/CC</router-link>,
4546
<router-link to='/PartnerInformation/ListofPartners/partner/redhat'>Red Hat</router-link>, and
4647
<router-link to='/PartnerInformation/ListofPartners/partner/THA-PSIRT'>Thales Group</router-link>),
4748
multiple CNAs, and two CNA-LRs, one managed by Red Hat for its own Root hierarchy and one managed by the MITRE TL-Root.
48-
In both TL-Root hierarchies, each of the seven Roots also manages their own CNAs.
49+
In both TL-Root hierarchies, each of the eight Roots also manages their own CNAs.
4950
</p>
5051
<p>
5152
<router-link to='/ProgramOrganization/ADPs'>Authorized Data Publishers (ADPs)</router-link>

src/views/ProgramOrganization/WorkingGroups.vue

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@
3535
class="title">
3636
{{cvenavs['Program Organization']['submenu']['Working Groups']['items']['Automation Working Group (AWG)']['label']}}</h2>
3737
<p>
38-
Chair: Kris Britton
38+
Co-Chairs: Kris Britton, Terrell Mitchell, and Dave Welch
3939
</p>
4040
<p>
4141
The AWG is focused on identifying and advancing proposals for the collaborative design, development, and deployment of

0 commit comments

Comments
 (0)