Colleagues, The CVE Program<https://www.cve.org/> is pleased to announce that we are expanding our partnership with CERT@VDE<https://www.cve.org/PartnerInformation/ListofPartners/partner/CERTVDE>, which is now designated as a Root<https://www.cve.org/ResourcesSupport/Glossary?activeTerm=glossaryRoot> for organizations that are cooperative partners of CERT@VDE.
As a Root, CERT@VDE is now responsible for ensuring the effective assignment of CVE IDs, implementing the CVE Program rules and guidelines, and managing the CNAs<https://www.cve.org/ProgramOrganization/CNAs> within its purview. It is also responsible for recruitment and onboarding of new CNAs and resolving disputes within its scope. Currently, CERT@VDE<https://www.cve.org/PartnerInformation/ListofPartners/partner/CERTVDE> and CISA ICS<https://www.cve.org/PartnerInformation/ListofPartners/partner/icscert> are Roots under the CISA Top-Level Root<https://www.cve.org/PartnerInformation/ListofPartners/partner/CISA>. Google<https://www.cve.org/PartnerInformation/ListofPartners/partner/Google>, JPCERT/CC<https://www.cve.org/PartnerInformation/ListofPartners/partner/jpcert>, Red Hat<https://www.cve.org/PartnerInformation/ListofPartners/partner/redhat>, Spanish National Cybersecurity Institute (INCIBE)<https://www.cve.org/PartnerInformation/ListofPartners/partner/INCIBE>, and Thales Group<https://www.cve.org/PartnerInformation/ListofPartners/partner/THA-PSIRT> are Roots under the MITRE Top-Level Root<https://www.cve.org/PartnerInformation/ListofPartners/partner/mitre>. We welcome CERT@VDE in its new role! Respectfully, CVE Program Secretariat cve-prog-secretar...@mitre.org<mailto:cve-prog-secretar...@mitre.org> [A picture containing text, clipart Description automatically generated]