|
1 | 1 | { |
2 | 2 | "currentNews": [ |
| 3 | + { |
| 4 | + "id": 604, |
| 5 | + "newsType": "blog", |
| 6 | + "title": "CVE Program Expands Partnership with European Union Agency for Cybersecurity (ENISA)—ENISA Is Now a Root in the CVE Program", |
| 7 | + "urlKeywords": "ENISA Root CVE Program", |
| 8 | + "date": "2025-11-20", |
| 9 | + "author": { |
| 10 | + "name": "CVE Program", |
| 11 | + "organization": { |
| 12 | + "name": "CVE Program", |
| 13 | + "url": "" |
| 14 | + }, |
| 15 | + "title": "", |
| 16 | + "bio": "" |
| 17 | + }, |
| 18 | + "description": [ |
| 19 | + { |
| 20 | + "contentnewsType": "paragraph", |
| 21 | + "content": "The <a href='/'>CVE Program</a> is expanding its partnership with the <a href='/PartnerInformation/ListofPartners/partner/ENISA'>European Union Agency for Cybersecurity (ENISA)</a> for managing the assignment of <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifiers (CVE IDs)</a> and publication of <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> for the CVE Program. ENISA is now designated as a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRoot'>Root</a> for EU member states/EU authorities, EU CSIRTs network members, and cooperative partners under ENISA’s mandate as well as other <a href='/ProgramOrganization/CNAs'>CVE Numbering Authorities (CNAs)</a> who choose ENISA as their Root." |
| 22 | + }, |
| 23 | + { |
| 24 | + "contentnewsType": "paragraph", |
| 25 | + "content": "The addition of ENISA as Root is a significant milestone for the CVE Program. ENISA’s new role directly supports shared goals around expanding international participation in operational and governance roles. It also demonstrates continued progress by the program in growing the Root community and advancing federated operations where additional organizations help scale CNA engagement, onboarding, and data quality across respective program hierarchies." |
| 26 | + }, |
| 27 | + { |
| 28 | + "contentnewsType": "paragraph", |
| 29 | + "content": "As a Root, ENISA is responsible for ensuring the effective assignment of CVE IDs, implementing the CVE Program rules and guidelines, and managing the <a href='/ProgramOrganization/CNAs'>CNAs</a> under its care. It is also responsible for recruitment and onboarding of new CNAs and resolving disputes within its scope." |
| 30 | + }, |
| 31 | + { |
| 32 | + "contentnewsType": "paragraph", |
| 33 | + "content": "A <a href='/ProgramOrganization/CNAs'>CNA</a> is an organization responsible for the regular assignment of CVE IDs to vulnerabilities, and for creating and publishing information about the vulnerability in the associated CVE Record. Each CNA has a specific scope of responsibility for vulnerability identification and publishing. There are currently <a href='/PartnerInformation/ListofPartners'>483 CNAs</a> (480 CNAs and 3 CNA-LRs) from <a href='/ProgramOrganization/CNAs'>40 countries</a> and 1 no country affiliation actively participating in the CVE Program." |
| 34 | + }, |
| 35 | + { |
| 36 | + "contentnewsType": "paragraph", |
| 37 | + "content": "For existing CNAs who are eligible and interested in moving under ENISA’s Root, the CVE Program encourages a collaborative and voluntary transition. The CVE Program will closely engage with each organization to ensure a smooth transition process. A transition period is foreseen for those CNAs who intend to change Root. The phased approach by ENISA will allow for thoughtful coordination, ongoing support, and alignment with the preferences and operational needs of each CNA." |
| 38 | + }, |
| 39 | + { |
| 40 | + "contentnewsType": "paragraph", |
| 41 | + "content": "As a Root, ENISA will join the CVE Program Council of Roots, which focuses on operational coordination across the CVE Program’s Root hierarchies. At an international level, CVE Program Roots include MITRE, CISA, Google, and Red Hat from the US, and JPCERT/CC from Japan. Within the EU, Roots include INCIBE Cert, Thales Group, and, most recently, CERT@VDE." |
| 42 | + }, |
| 43 | + { |
| 44 | + "contentnewsType": "paragraph", |
| 45 | + "content": "Currently, <a href='/PartnerInformation/ListofPartners/partner/ENISA'>ENISA</a>, <a href='/PartnerInformation/ListofPartners/partner/Google'>Google</a>, <a href='/PartnerInformation/ListofPartners/partner/jpcert'>JPCERT/CC</a>, <a href='/PartnerInformation/ListofPartners/partner/redhat'>Red Hat</a>, <a href='/PartnerInformation/ListofPartners/partner/INCIBE'>Spanish National Cybersecurity Institute (INCIBE)</a>, and <a href='/PartnerInformation/ListofPartners/partner/THA-PSIRT'>Thales Group</a> are Roots under the <a href='/PartnerInformation/ListofPartners/partner/mitre'>MITRE Top-Level Root</a>. <a href='/PartnerInformation/ListofPartners/partner/CERTVDE'>CERT@VDE</a> and <a href='/PartnerInformation/ListofPartners/partner/icscert'>CISA ICS</a> are Roots under the <a href='/PartnerInformation/ListofPartners/partner/CISA'>CISA Top-Level Root</a>. Learn more about how the CVE Program is organized on the <a href='/ProgramOrganization/Structure'>Structure page</a> on the CVE website." |
| 46 | + }, |
| 47 | + { |
| 48 | + "contentnewsType": "image", |
| 49 | + "imageWidth": "", |
| 50 | + "href": "/news/NewCVEProgramRoot.png", |
| 51 | + "altText": "New CVE Program Root" |
| 52 | + } |
| 53 | + ] |
| 54 | + }, |
| 55 | + { |
| 56 | + "id": 603, |
| 57 | + "displayOnHomepageOrder": 0, |
| 58 | + "newsType": "press-release", |
| 59 | + "title": "CVE Program Expands Partnership with European Union Agency for Cybersecurity (ENISA)—ENISA Is Now a Root in the CVE Program", |
| 60 | + "urlKeywords": "ENISA Root CVE Program", |
| 61 | + "date": "2025-11-20", |
| 62 | + "description": [ |
| 63 | + { |
| 64 | + "contentnewsType": "paragraph", |
| 65 | + "content": "FOR IMMEDIATE RELEASE — The <a href='/'>CVE Program</a> is expanding its partnership with the <a href='/PartnerInformation/ListofPartners/partner/ENISA'>European Union Agency for Cybersecurity (ENISA)</a> for managing the assignment of <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifiers (CVE IDs)</a> and publication of <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> for the CVE Program. ENISA is now designated as a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRoot'>Root</a> for EU member states/EU authorities, EU CSIRTs network members, and cooperative partners under ENISA’s mandate as well as other <a href='/ProgramOrganization/CNAs'>CVE Numbering Authorities (CNAs)</a> who choose ENISA as their Root." |
| 66 | + }, |
| 67 | + { |
| 68 | + "contentnewsType": "paragraph", |
| 69 | + "content": "The addition of ENISA as Root is a significant milestone for the CVE Program. ENISA’s new role directly supports shared goals around expanding international participation in operational and governance roles. It also demonstrates continued progress by the program in growing the Root community and advancing federated operations where additional organizations help scale CNA engagement, onboarding, and data quality across respective program hierarchies." |
| 70 | + }, |
| 71 | + { |
| 72 | + "contentnewsType": "paragraph", |
| 73 | + "content": "As a Root, ENISA is responsible for ensuring the effective assignment of CVE IDs, implementing the CVE Program rules and guidelines, and managing the <a href='/ProgramOrganization/CNAs'>CNAs</a> under its care. It is also responsible for recruitment and onboarding of new CNAs and resolving disputes within its scope." |
| 74 | + }, |
| 75 | + { |
| 76 | + "contentnewsType": "paragraph", |
| 77 | + "content": "A <a href='/ProgramOrganization/CNAs'>CNA</a> is an organization responsible for the regular assignment of CVE IDs to vulnerabilities, and for creating and publishing information about the vulnerability in the associated CVE Record. Each CNA has a specific scope of responsibility for vulnerability identification and publishing. There are currently <a href='/PartnerInformation/ListofPartners'>483 CNAs</a> (480 CNAs and 3 CNA-LRs) from <a href='/ProgramOrganization/CNAs'>40 countries</a> and 1 no country affiliation actively participating in the CVE Program." |
| 78 | + }, |
| 79 | + { |
| 80 | + "contentnewsType": "paragraph", |
| 81 | + "content": "For existing CNAs who are eligible and interested in moving under ENISA’s Root, the CVE Program encourages a collaborative and voluntary transition. The CVE Program will closely engage with each organization to ensure a smooth transition process. A transition period is foreseen for those CNAs who intend to change Root. The phased approach by ENISA will allow for thoughtful coordination, ongoing support, and alignment with the preferences and operational needs of each CNA." |
| 82 | + }, |
| 83 | + { |
| 84 | + "contentnewsType": "paragraph", |
| 85 | + "content": "As a Root, ENISA will join the CVE Program Council of Roots, which focuses on operational coordination across the CVE Program’s Root hierarchies. At an international level, CVE Program Roots include MITRE, CISA, Google, and Red Hat from the US, and JPCERT/CC from Japan. Within the EU, Roots include INCIBE Cert, Thales Group, and, most recently, CERT@VDE." |
| 86 | + }, |
| 87 | + { |
| 88 | + "contentnewsType": "paragraph", |
| 89 | + "content": "Currently, <a href='/PartnerInformation/ListofPartners/partner/ENISA'>ENISA</a>, <a href='/PartnerInformation/ListofPartners/partner/Google'>Google</a>, <a href='/PartnerInformation/ListofPartners/partner/jpcert'>JPCERT/CC</a>, <a href='/PartnerInformation/ListofPartners/partner/redhat'>Red Hat</a>, <a href='/PartnerInformation/ListofPartners/partner/INCIBE'>Spanish National Cybersecurity Institute (INCIBE)</a>, and <a href='/PartnerInformation/ListofPartners/partner/THA-PSIRT'>Thales Group</a> are Roots under the <a href='/PartnerInformation/ListofPartners/partner/mitre'>MITRE Top-Level Root</a>. <a href='/PartnerInformation/ListofPartners/partner/CERTVDE'>CERT@VDE</a> and <a href='/PartnerInformation/ListofPartners/partner/icscert'>CISA ICS</a> are Roots under the <a href='/PartnerInformation/ListofPartners/partner/CISA'>CISA Top-Level Root</a>. Learn more about how the CVE Program is organized on the <a href='/ProgramOrganization/Structure'>Structure page</a> on the CVE website." |
| 90 | + }, |
| 91 | + { |
| 92 | + "contentnewsType": "paragraph", |
| 93 | + "content": "MEDIA CONTACT<br/><a href='mailto: [email protected]'> [email protected]</a>" |
| 94 | + } |
| 95 | + ] |
| 96 | + }, |
3 | 97 | { |
4 | 98 | "id": 602, |
5 | 99 | "newsType": "blog", |
|
0 commit comments