Experts welcome EU-led alternative to MITRE's vulnerability tracking scheme
The EU-led framework will reduce reliance on US-based MITRE vulnerability reporting database
Cybersecurity experts have welcomed the launch of the new Global CVE Allocation System (GCVE) as a positive move toward more robust vulnerability disclosure.
The EU-led system aims to offer a “decentralized approach” to vulnerability identification and reduce dependence on US-based reporting systems, in particular the MITRE Corporation’s Common Vulnerabilities and Exposures (CVEs) database.
Freely accessible, the GCVE will draw upon common vulnerability data from more than 25 public sources and hosted by the Computer Incident Response Center Luxembourg (CIRCL).
The platform itself will be powered by vulnerability-lookup, an open source initiative which allows security practitioners to track software vulnerabilities.
“This ensures that data collection, synchronization, and publication follow open, transparent, and reproducible processes,” the GCVE said.
“Vulnerability-lookup is designed to support decentralized vulnerability publishing while enabling efficient aggregation and correlation, a core principle of the GCVE model.”
What to expect from the GCVE system
According to official materials, the intention is to “improve flexibility, scalability, and autonomy for participating entities”.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Notably, the new setup will remain compatible with the traditional CVE reporting system but with a distinct caveat: the GCVE scheme will introduce GCVE Numbering Authorities (GNAs).
These are “independent entities” that can allocate identifiers without the reliance on a centralized distribution system – a common criticism of the traditional framework.
Sylvain Cortes, VP strategy at Hackuity, said the launch of the GCVE scheme is a “positive development” for the cybersecurity community, particularly as the US-based CVE system faces an uncertain future.
The security industry was plunged into chaos last year amidst reports that funding for the MITRE CVE database was set to lapse.
While CISA stepped in with a last minute reprieve for the scheme, the incident raised concerns about the stability of future vulnerability reporting on both sides of the Atlantic.
Cortes said the debacle “exposed the fragility of the systems underpinning global vulnerability management”, adding that a new decentralized setup is a welcomed addition.
“By decentralizing vulnerability reporting and making it API friendly, GCVE reduces that single point of failure, and enables organizations to have access to timely, standardized vulnerability data,” he said.
“It’s not about replacing CVE, it’s about strengthening global resilience. Having a European alternative provides cybersecurity professionals with a further trusted source of information.”
Nigel Douglas, head of developer relations at Cloudsmith, echoed Cortes’ comments, adding that the GCVE will ensure security practitioners in Europe aren’t solely reliant on the MITRE system.
“We rely on security advisories and vulnerability databases to keep us safe, so removing any single point of failure is a smart, forward-thinking idea,” he said.
“I’m a huge fan of the fact that it’s decentralized and interoperable with the existing CVE ecosystem. Multiple authorities can publish and maintain vulnerability data, while still mapping it back to CVE identifiers that teams already use on a daily basis,” Douglas added.
“This gives the industry options, rather than forcing them to make a choice.”
FOLLOW US ON SOCIAL MEDIA
Make sure to follow ITPro on Google News to keep tabs on all our latest news, analysis, and reviews.
You can also follow ITPro on LinkedIn, X, Facebook, and BlueSky.

Ross Kelly is ITPro's News & Analysis Editor, responsible for leading the brand's news output and in-depth reporting on the latest stories from across the business technology landscape. Ross was previously a Staff Writer, during which time he developed a keen interest in cyber security, business leadership, and emerging technologies.
He graduated from Edinburgh Napier University in 2016 with a BA (Hons) in Journalism, and joined ITPro in 2022 after four years working in technology conference research.
For news pitches, you can contact Ross at ross.kelly@futurenet.com, or on Twitter and LinkedIn.
-
Beyond the handshake: Building a purpose-built partner economy that solves customer problemsIndustry Insights Quality over quantity will set partners up for sustained success…
-
Jensen Huang says the traditional computing stack will never look the same because of AINews The Nvidia chief says new applications will be built “on top of ChatGPT” as the technology redefines software
-
Veeam patches Backup & Replication vulnerabilities, urges users to updateNews The vulnerabilities affect Veeam Backup & Replication 13.0.1.180 and all earlier version 13 builds – but not previous versions.
-
Two Fortinet vulnerabilities are being exploited in the wild – patch nowNews Arctic Wolf and Rapid7 said security teams should act immediately to mitigate the Fortinet vulnerabilities
-
Everything you need to know about Google and Apple’s emergency zero-day patchesNews A serious zero-day bug was spotted in Chrome systems that impacts Apple users too, forcing both companies to issue emergency patches
-
Security experts claim the CVE Program isn’t up to scratch anymore — inaccurate scores and lengthy delays mean the system needs updatedNews CVE data is vital in combating emerging threats, yet inaccurate ratings and lengthy wait times are placing enterprises at risk
-
IBM AIX users urged to patch immediately as researchers sound alarm on critical flawsNews Network administrators should patch the four IBM AIX flaws as soon as possible
-
Critical Dell Storage Manager flaws could let hackers access sensitive data – patch nowNews A trio of flaws in Dell Storage Manager has prompted a customer alert
-
Flaw in Lenovo’s customer service AI chatbot could let hackers run malicious code, breach networksNews Hackers abusing the Lenovo flaw could inject malicious code with just a single prompt
-
Industry welcomes the NCSC’s new Vulnerability Research Initiative – but does it go far enough?News The cybersecurity agency will work with external researchers to uncover potential security holes in hardware and software