Android users can breathe a sigh of relief as the CVE cybersecurity tracker will continue to receive funding.


Many technology users do not usually have to worry about security vulnerabilities on their most-used devices, such as Android-based products, as long as they update their phones promptly when new security patches are available. However, there is a complex government-supported program in place to ensure this security, and it was almost at risk of shutting down today.

After nearly 24 hours of uncertainty, the U.S. Cybersecurity and Infrastructure Agency (CISA) confirmed that it would continue funding the Common Vulnerabilities and Exposures (CVE) program on the day its previous contract was due to expire. Today, on April 16, a CISA spokesperson informed The Verge that the agency had “executed the option period on the contract to ensure there will be no lapse in critical CVE services.”

It was a close call that could have led to a major tech security crisis.

The Google Pixel Watch 3 showing

(Image credit: Michael Hicks / Android Central)

The CVE program plays a crucial role in identifying and monitoring security issues publicly, from the moment a potential problem is discovered until a fix is issued. It has nearly 500 partners, including security researchers, open-source developers, and major companies like Google, Microsoft, and Apple.

You may have come across a CVE code in an article or update release notes, such as those found on Android Central or the Android Security Bulletin. These codes, like CVE-2024-53104, are universal identifiers for tracking security flaws across devices, platforms, and companies, starting with “CVE” followed by the year and a number.

A screenshot of the latest Android Security Bulletin with CVE codes.

A screenshot of the latest Android Security Bulletin with CVE codes. (Image credit: Future / Google)

The CVE program has been in operation for 25 years, starting in 1999. It is a vital tool for the security community, enabling researchers, developers, companies, and the public to collaborate in identifying and addressing critical vulnerabilities. It also indicates whether a vulnerability is being actively exploited by malicious actors.

See also  Chronicling the faces of Juneteenth with iPad Pro and Apple Pencil

Android 15 logo on the Galaxy S25 Ultra

(Image credit: Andrew Myrick / Android Central)

Prominent security researchers have emphasized the potential consequences of the CVE program shutting down, such as Lukasz Olejnik on X (formerly Twitter).