CISA’s CVE Program and Why it Matters for Zero Trust
The vulnerability program provides the cybersecurity community visibility into software as part of a key pillar of CISA’s zero trust model.

The cybersecurity community earlier this year turned its attention to a Cybersecurity and Infrastructure Security Agency (CISA) program that supports government’s priorities in zero trust adoption.
The Common Vulnerabilities and Exposures (CVE) Program is a vital resource for software developers and cybersecurity professionals because it enables them to quickly identify and address security vulnerabilities. In the context of zero trust, this means gaining necessary visibility into what software systems may be vulnerable, CISA Associate Director of Vulnerability Management Sandy Radesky told GovCIO Media & Research.
“Because zero trust assumes there is no perimeter, organizations must individually secure every asset, device and connection,” she said.
CVE is operated under a partnership between CISA and the nonprofit R&D company MITRE. Originally founded in 1999, the program quickly gained traction within the security community.
CVE provides foundational situational awareness to enforce the premise that “no user or asset is to be implicitly trusted.” It’s a principle underpinning the five pillars of CISA’s Zero Trust Maturity Model that outlines requirements for continuous asset visibility and supply chain risk management.
“The CVE Program supports this by enabling organizations to identify vulnerable components in third-party software,” said Radesky. “CVE data informs real-time intelligence within intrusion detection and prevention systems, allowing defenders to isolate or reroute traffic involving vulnerable systems.”
CISA uses CVE data to pinpoint emerging vulnerabilities through Coordinated Vulnerability Disclosure (CVD), issue alerts and advisories, and populate the agency’s Known Vulnerabilities Catalog, driving a coordinated national response to active threats.
The program is recognized as the de facto global standard for vulnerability identification and is critical to enhancing the resilience of critical infrastructure and improving the nation’s overall security posture. The catalog, for example, serves as a dynamic list of vulnerabilities actively exploited across global networks.
In April, the program reportedly had neared a lapse in funding, prompting concern throughout the cybersecurity community. It was enough to spur CISA to issue a public statement clarifying there were no funding issues, rather the agency had been working to exercise its option period on the contract before the funding deadline.
“The CVE Program is an invaluable public resource relied upon by network defenders and software developers alike,” said Matt Hartman, CISA’s then acting executive assistant director for cybersecurity. “There has been no interruption to the CVE program, and CISA is fully committed to sustaining and improving this critical cyber infrastructure.”
AI Tools in Vulnerability Monitoring
Through the CVE AI Working Group, the program has been assessing impacts from artificial intelligence and assessing vulnerabilities specific to AI, said Radesky.
Currently a CVE-ID is assigned when AI software has an identified cybersecurity vulnerability. The group is exploring how to signpost what should happen with AI-specific vulnerabilities that are not cybersecurity related, she said. This might include changing some of the database’s structure to separate AI-specific vulnerabilities.
CISA officials say AI has a lot of potential in supporting vulnerability detection tools. With appropriate asset management and identification, AI tools can improve detecting instances of vulnerabilities in certain product types, such as low-power internet of things devices.
“CISA is also experimenting with AI tools to automate mapping of CVEs to common TTPs,” said Radesky. “This automation could enhance decision-making for cyber defenders by providing clearer insights into vulnerability exploitation and helping organizations make more informed choices about patching, mitigation strategies and resource allocation.”
Future of Vulnerability Detection Efforts
AI has introduced needs to continuously evolve cybersecurity efforts. For CVE, CISA will continue to pursue and receive community feedback into the stewardship of the program.
“We welcome new ideas, active participation, and meaningful collaboration between the private sector and international governments,” said Radesky. “Together we can achieve our like-minded goal to deliver the requisite stability and innovation to the CVE program.”
In the near future, the agency plans to release Cyber Performance Goals (CPG) that will correlate to the most recent update from National Institutes of Standards and Technology (NIST)’s Cyber Security Framework (CSF) version 2.0.
CISA also plans to extend CPGs in a self-service assessment format with a new release of ReadySetCyber (RSC).
“RSC is a solution aimed at helping organizations understand their cyber risk, provide immediate actions and prioritize investments,” said Radesky. “Our aim with this effort is to simplify and streamline access to the right information, ensuring that every organization can make informed decisions to enhance their digital security. With RSC users will be able to provide feedback on their experience, enabling us in return to refine and enhance our application in a collaborative way.”
This is a carousel with manually rotating slides. Use Next and Previous buttons to navigate or jump to a slide with the slide dots
-
DHA CDAO Spearheads Master Data Catalog to Boost Transparency
Jesus Caban plans to boost DHA's data maturity through a new master data catalog, governance frameworks and inventory of tech tools.
5m read -
Trump Orders Spark Government-Wide Acquisition Overhaul
As Trump pushes for a faster, simpler procurement system, agencies are leveraging AI and adapting strategies to meet new requirements.
5m read -
Inside Oak Ridge National Lab’s Pioneer Approach to AI
Energy Department’s Oak Ridge National Lab transforms AI vulnerabilities into strategic opportunities for national defense.
22m listen -
A Look at Federal Zero Trust Transformation
Recent developments from CISA and DOD show how government is advancing zero trust quickly.
20m read -
Modernization Strategies to Enable Energy Innovation
Lawrence Berkeley National Lab and Maximus experts explore the modernization strategies driving digital transformation and operational resilience within the energy sector.
33m watch -
DOI Must Modernize Energy to Win AI Race, Secretary Says
Doug Burgum links AI innovation to energy reform as DOI advances digital infrastructure and wildfire response under Trump’s tech agenda.
2m read -
NIST to Release New AI Cybersecurity Guidance as Federal Use Expands
NIST plans to release AI cybersecurity guidance within the year to support safe adoption as federal agencies expand use cases.
4m read -
Federal Zero Trust Forum
The Federal Zero Trust Forum brings together key technology leaders from across government to explore practical strategies and share lessons for advancing zero trust architecture.
Ritz Pentagon City | 1250 S Hayes St, Arlington, VA 22202 -
CIA Adds Fourth Pillar to AI Strategy, CAIO Says
Lakshmi Raman says the new pillar marks a strategic shift toward embedding AI more deeply into the CIA’s day-to-day mission execution.
3m read -
FEHRM CTO Targets Two-Year Cloud Migration for Federal EHR
Lance Scott touts new EHR tech advancements, including cloud migration, expanded data exchange and AI integration to improve care delivery.
4m read -
AI Enables Coast Guard’s Workforce to Transform Operations
The Coast Guard’s Deputy CIO Brian Campo delves into the ways AI is pushing the service to rethink its core services, workforce and operations.
14m watch -
DOL Turns to Workforce Development to Maintain AI Superiority
DOL is bridging the AI skills gap through partnerships and upskilling to ensure future AI workforce readiness.
10m watch