Back
About RSIS
Introduction
Building the Foundations
Welcome Message
Board of Governors
Staff Profiles
Executive Deputy Chairman’s Office
Dean’s Office
Management
Distinguished Fellows
Faculty and Research
Associate Research Fellows, Senior Analysts and Research Analysts
Visiting Fellows
Adjunct Fellows
Administrative Staff
Honours and Awards for RSIS Staff and Students
RSIS Endowment Fund
Endowed Professorships
Career Opportunities
Getting to RSIS
Research
Research Centres
Centre for Multilateralism Studies (CMS)
Centre for Non-Traditional Security Studies (NTS Centre)
Centre of Excellence for National Security (CENS)
Institute of Defence and Strategic Studies (IDSS)
International Centre for Political Violence and Terrorism Research (ICPVTR)
Research Programmes
National Security Studies Programme (NSSP)
Social Cohesion Research Programme (SCRP)
Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
Other Research
Future Issues and Technology Cluster
Research@RSIS
Science and Technology Studies Programme (STSP) (2017-2020)
Graduate Education
Graduate Programmes Office
Exchange Partners and Programmes
How to Apply
Financial Assistance
Meet the Admissions Team: Information Sessions and other events
RSIS Alumni
Outreach
Global Networks
About Global Networks
RSIS Alumni
International Programmes
About International Programmes
Asia-Pacific Programme for Senior Military Officers (APPSMO)
Asia-Pacific Programme for Senior National Security Officers (APPSNO)
International Conference on Cohesive Societies (ICCS)
International Strategy Forum-Asia (ISF-Asia)
Executive Education
About Executive Education
SRP Executive Programme
Terrorism Analyst Training Course (TATC)
Public Education
About Public Education
Publications
RSIS Publications
Annual Reviews
Books
Bulletins and Newsletters
RSIS Commentary Series
Counter Terrorist Trends and Analyses
Commemorative / Event Reports
Future Issues
IDSS Papers
Interreligious Relations
Monographs
NTS Insight
Policy Reports
Working Papers
External Publications
Authored Books
Journal Articles
Edited Books
Chapters in Edited Books
Policy Reports
Working Papers
Op-Eds
Glossary of Abbreviations
Policy-relevant Articles Given RSIS Award
RSIS Publications for the Year
External Publications for the Year
Media
News Releases
Speeches
Video Channel
Podcasts
Events
Contact Us
S. Rajaratnam School of International Studies Think Tank and Graduate School Ponder The Improbable Since 1966
Nanyang Technological University Nanyang Technological University
  • About RSIS
      IntroductionBuilding the FoundationsWelcome MessageBoard of GovernorsHonours and Awards for RSIS Staff and StudentsRSIS Endowment FundEndowed ProfessorshipsCareer OpportunitiesGetting to RSIS
      Staff ProfilesExecutive Deputy Chairman’s OfficeDean’s OfficeManagementDistinguished FellowsFaculty and ResearchAssociate Research Fellows, Senior Analysts and Research AnalystsVisiting FellowsAdjunct FellowsAdministrative Staff
  • Research
      Research CentresCentre for Multilateralism Studies (CMS)Centre for Non-Traditional Security Studies (NTS Centre)Centre of Excellence for National Security (CENS)Institute of Defence and Strategic Studies (IDSS)International Centre for Political Violence and Terrorism Research (ICPVTR)
      Research ProgrammesNational Security Studies Programme (NSSP)Social Cohesion Research Programme (SCRP)Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
      Other ResearchFuture Issues and Technology ClusterResearch@RSISScience and Technology Studies Programme (STSP) (2017-2020)
  • Graduate Education
      Graduate Programmes OfficeExchange Partners and ProgrammesHow to ApplyFinancial AssistanceMeet the Admissions Team: Information Sessions and other eventsRSIS Alumni
  • Outreach
      Global NetworksAbout Global NetworksRSIS Alumni
      International ProgrammesAbout International ProgrammesAsia-Pacific Programme for Senior Military Officers (APPSMO)Asia-Pacific Programme for Senior National Security Officers (APPSNO)International Conference on Cohesive Societies (ICCS)International Strategy Forum-Asia (ISF-Asia)
      Executive EducationAbout Executive EducationSRP Executive ProgrammeTerrorism Analyst Training Course (TATC)
      Public EducationAbout Public Education
  • Publications
      RSIS PublicationsAnnual ReviewsBooksBulletins and NewslettersRSIS Commentary SeriesCounter Terrorist Trends and AnalysesCommemorative / Event ReportsFuture IssuesIDSS PapersInterreligious RelationsMonographsNTS InsightPolicy ReportsWorking Papers
      External PublicationsAuthored BooksJournal ArticlesEdited BooksChapters in Edited BooksPolicy ReportsWorking PapersOp-Eds
      Glossary of AbbreviationsPolicy-relevant Articles Given RSIS AwardRSIS Publications for the YearExternal Publications for the Year
  • Media
      News ReleasesSpeechesVideo ChannelPodcasts
  • Events
  • Contact Us
    • Connect with Us

      rsis.ntu
      rsis_ntu
      rsisntu
      rsisvideocast
      school/rsis-ntu
      rsis.sg
      rsissg
      RSIS
      RSS
      Subscribe to RSIS Publications
      Subscribe to RSIS Events

      Getting to RSIS

      Nanyang Technological University
      Block S4, Level B3,
      50 Nanyang Avenue,
      Singapore 639798

      Click here for direction to RSIS
Connect
Search
  • RSIS
  • Publication
  • RSIS Publications
  • The CVE Funding Crisis: Implications for Singapore and ASEAN
  • Annual Reviews
  • Books
  • Bulletins and Newsletters
  • RSIS Commentary Series
  • Counter Terrorist Trends and Analyses
  • Commemorative / Event Reports
  • Future Issues
  • IDSS Papers
  • Interreligious Relations
  • Monographs
  • NTS Insight
  • Policy Reports
  • Working Papers

CO25194 | The CVE Funding Crisis: Implications for Singapore and ASEAN
Asha Hemrajani, Davis Zheng

22 September 2025

download pdf

SYNOPSIS

In April 2025, the US-funded MITRE Corporation, which manages a registry (called the Common Vulnerabilities and Exposures (CVE) programme) of cybersecurity vulnerabilities – flaws in computer systems – that can be exploited for malicious purposes, announced that the funding for the CVE programme would cease, sparking alarm across the cybersecurity community. Although the US government reversed the decision, the scare exposed the danger of global dependence on a single registry and raised concerns amid shifting geopolitical tensions.

source: unsplash
source: unsplash

COMMENTARY

Cybersecurity vulnerabilities are flaws in computer systems that can be exploited for malicious purposes and are often worth millions of dollars on the dark web. The MITRE Corporation manages the global registry of such flaws. Called the Common Vulnerabilities and Exposures (CVE) programme, it is a critical resource used by governments and enterprises globally to patch flaws in their systems.

The MITRE Corporation is a non-profit organisation that operates R&D centres for the US government, covering areas such as cybersecurity, homeland security, aviation and defence. Its CVE programme is used worldwide by government agencies, armed forces, critical infrastructure operators, and enterprises to keep track of new vulnerabilities discovered in software, firmware and hardware, ranging from the Windows operating system to 5G telecommunications networks.

Vulnerability researchers submit proof of vulnerability to MITRE directly or to one of the CVE Numbering Authorities (CNAs) around the world, which includes the Cyber Security Agency of Singapore. This registry of cybersecurity vulnerabilities is available online for anyone to use, enabling IT systems administrators, for instance, to quickly act on severe vulnerabilities that may be present in their environment before threat actors can exploit them and siphon off data or, worse still, bring critical or enterprise systems to a halt.

The significance of the CVE programme has been heightened following recent campaigns by actors such as UNC3886, the China-linked cyber espionage group that tried to attack critical infrastructure in Singapore and other countries in North America, Southeast Asia and Oceania. UNC3886 is known to exploit vulnerabilities across typical enterprise computer platforms such as VMware and Fortinet to conduct malicious actions, ranging from deploying backdoors to obtaining credentials for deeper access, which underscores how quickly cyber defenders must act.

The CVE system is arguably one of the most critical pillars of cybersecurity, even though it is much underrated. Without this list to refer to is akin to not having access to a list of unique identifiers, such as, for example, the registration numbers of vehicles. Law enforcement and traffic police would not be able to keep track of vehicles, and drivers can take advantage of the fact. For enterprises, government agencies and critical infrastructure operators, the risk of losing confidentiality, integrity and the availability of their systems could increase.

The CVE programme allows any organisation to access the registry of publicly disclosed cybersecurity vulnerabilities without any cost, and removes information asymmetry (where one party possesses more or better information than another in a transaction), thereby improving the overall cybersecurity defence of not just the United States but that of the world.

The Issue at Hand

President Donald Trump’s broad strokes in cutting federal funding have resulted in a funding crisis for programmes such as the CVE. The possible loss of the programme has dangerous implications for every organisation that utilises it. It would result in a decreased security posture as organisations without their own vulnerability research capabilities would be at risk, since vulnerabilities found would have no way of being disclosed publicly.

The European Union has taken matters into its own hands. The EU Vulnerability Database (EUVD) is a recent initiative launched by the European Union Agency for Cybersecurity (ENISA) to reduce its reliance on the MITRE CVE programme. It is designed to be a publicly accessible database. This is part of the EU’s effort to strengthen its cybersecurity sovereignty and reduce reliance on external threat intelligence ecosystems.

The Way Forward

Several ideas to keep the CVE list going have been suggested. Some believe that the list should not come under the purview of a single government but rather a global organisation, such as the UN and managed by multiple countries. However, this is unlikely to work well, as the CVE programme is a multistakeholder undertaking that relies heavily on commercial enterprises and private individuals to contribute their research, rather than on governments.

Another suggestion is for the registry to come under the purview of the Internet Engineering Task Force (IETF), which is a global organisation for internet standards, protocols, and operations. However, parking the programme under another non-profit international organisation has disadvantages, such as cost and administration.

Implications for Singapore and ASEAN

Due to Singapore’s small size, it is unlikely that the country can develop the capability to create its own comprehensive database with sufficient data to be useful solely based on its national vulnerability research output. Singapore would still have to rely heavily on international databases such as ENISA’s EUVD and the US CVE programme to supplement its own defences.

An alternative measure for Singapore would be to adopt a decentralised model to create redundancy. Singapore can be one of the countries that hosts or maintains a decentralised database, which is mirrored across partner countries such as ASEAN, ensuring constant uptime and reducing the maintenance burden on participating nations. This would allow for possible confidence-building measures and capability development amongst ASEAN member states.

Given that funding for the US MITRE CVE database has only been committed until March 2026, the future of the database has been left hanging. Even if funding is renewed, the situation must be monitored closely. Singapore should explore alternative solutions to the MITRE CVE, as it is a critical resource for the nation’s cybersecurity needs.

About the Authors

Asha Hemrajani and Davis Zheng are, respectively, Senior Fellow and Research Assistant in the Centre of Excellence for National Security (CENS), at S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University (NTU).

Categories: RSIS Commentary Series / Country and Region Studies / Technology and Future Issues / East Asia and Asia Pacific / South Asia / Southeast Asia and ASEAN / Global
comments powered by Disqus

SYNOPSIS

In April 2025, the US-funded MITRE Corporation, which manages a registry (called the Common Vulnerabilities and Exposures (CVE) programme) of cybersecurity vulnerabilities – flaws in computer systems – that can be exploited for malicious purposes, announced that the funding for the CVE programme would cease, sparking alarm across the cybersecurity community. Although the US government reversed the decision, the scare exposed the danger of global dependence on a single registry and raised concerns amid shifting geopolitical tensions.

source: unsplash
source: unsplash

COMMENTARY

Cybersecurity vulnerabilities are flaws in computer systems that can be exploited for malicious purposes and are often worth millions of dollars on the dark web. The MITRE Corporation manages the global registry of such flaws. Called the Common Vulnerabilities and Exposures (CVE) programme, it is a critical resource used by governments and enterprises globally to patch flaws in their systems.

The MITRE Corporation is a non-profit organisation that operates R&D centres for the US government, covering areas such as cybersecurity, homeland security, aviation and defence. Its CVE programme is used worldwide by government agencies, armed forces, critical infrastructure operators, and enterprises to keep track of new vulnerabilities discovered in software, firmware and hardware, ranging from the Windows operating system to 5G telecommunications networks.

Vulnerability researchers submit proof of vulnerability to MITRE directly or to one of the CVE Numbering Authorities (CNAs) around the world, which includes the Cyber Security Agency of Singapore. This registry of cybersecurity vulnerabilities is available online for anyone to use, enabling IT systems administrators, for instance, to quickly act on severe vulnerabilities that may be present in their environment before threat actors can exploit them and siphon off data or, worse still, bring critical or enterprise systems to a halt.

The significance of the CVE programme has been heightened following recent campaigns by actors such as UNC3886, the China-linked cyber espionage group that tried to attack critical infrastructure in Singapore and other countries in North America, Southeast Asia and Oceania. UNC3886 is known to exploit vulnerabilities across typical enterprise computer platforms such as VMware and Fortinet to conduct malicious actions, ranging from deploying backdoors to obtaining credentials for deeper access, which underscores how quickly cyber defenders must act.

The CVE system is arguably one of the most critical pillars of cybersecurity, even though it is much underrated. Without this list to refer to is akin to not having access to a list of unique identifiers, such as, for example, the registration numbers of vehicles. Law enforcement and traffic police would not be able to keep track of vehicles, and drivers can take advantage of the fact. For enterprises, government agencies and critical infrastructure operators, the risk of losing confidentiality, integrity and the availability of their systems could increase.

The CVE programme allows any organisation to access the registry of publicly disclosed cybersecurity vulnerabilities without any cost, and removes information asymmetry (where one party possesses more or better information than another in a transaction), thereby improving the overall cybersecurity defence of not just the United States but that of the world.

The Issue at Hand

President Donald Trump’s broad strokes in cutting federal funding have resulted in a funding crisis for programmes such as the CVE. The possible loss of the programme has dangerous implications for every organisation that utilises it. It would result in a decreased security posture as organisations without their own vulnerability research capabilities would be at risk, since vulnerabilities found would have no way of being disclosed publicly.

The European Union has taken matters into its own hands. The EU Vulnerability Database (EUVD) is a recent initiative launched by the European Union Agency for Cybersecurity (ENISA) to reduce its reliance on the MITRE CVE programme. It is designed to be a publicly accessible database. This is part of the EU’s effort to strengthen its cybersecurity sovereignty and reduce reliance on external threat intelligence ecosystems.

The Way Forward

Several ideas to keep the CVE list going have been suggested. Some believe that the list should not come under the purview of a single government but rather a global organisation, such as the UN and managed by multiple countries. However, this is unlikely to work well, as the CVE programme is a multistakeholder undertaking that relies heavily on commercial enterprises and private individuals to contribute their research, rather than on governments.

Another suggestion is for the registry to come under the purview of the Internet Engineering Task Force (IETF), which is a global organisation for internet standards, protocols, and operations. However, parking the programme under another non-profit international organisation has disadvantages, such as cost and administration.

Implications for Singapore and ASEAN

Due to Singapore’s small size, it is unlikely that the country can develop the capability to create its own comprehensive database with sufficient data to be useful solely based on its national vulnerability research output. Singapore would still have to rely heavily on international databases such as ENISA’s EUVD and the US CVE programme to supplement its own defences.

An alternative measure for Singapore would be to adopt a decentralised model to create redundancy. Singapore can be one of the countries that hosts or maintains a decentralised database, which is mirrored across partner countries such as ASEAN, ensuring constant uptime and reducing the maintenance burden on participating nations. This would allow for possible confidence-building measures and capability development amongst ASEAN member states.

Given that funding for the US MITRE CVE database has only been committed until March 2026, the future of the database has been left hanging. Even if funding is renewed, the situation must be monitored closely. Singapore should explore alternative solutions to the MITRE CVE, as it is a critical resource for the nation’s cybersecurity needs.

About the Authors

Asha Hemrajani and Davis Zheng are, respectively, Senior Fellow and Research Assistant in the Centre of Excellence for National Security (CENS), at S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University (NTU).

Categories: RSIS Commentary Series / Country and Region Studies / Technology and Future Issues

Popular Links

About RSISResearch ProgrammesGraduate EducationPublicationsEventsAdmissionsCareersVideo/Audio ChannelRSIS Intranet

Connect with Us

rsis.ntu
rsis_ntu
rsisntu
rsisvideocast
school/rsis-ntu
rsis.sg
rsissg
RSIS
RSS
Subscribe to RSIS Publications
Subscribe to RSIS Events

Getting to RSIS

Nanyang Technological University
Block S4, Level B3,
50 Nanyang Avenue,
Singapore 639798

Click here for direction to RSIS

Get in Touch

    Copyright © S. Rajaratnam School of International Studies. All rights reserved.
    Privacy Statement / Terms of Use
    Help us improve

      Rate your experience with this website
      123456
      Not satisfiedVery satisfied
      What did you like?
      0/255 characters
      What can be improved?
      0/255 characters
      Your email
      Please enter a valid email.
      Thank you for your feedback.
      This site uses cookies to offer you a better browsing experience. By continuing, you are agreeing to the use of cookies on your device as described in our privacy policy. Learn more
      OK
      Latest Book
      more info