Hillicon Valley: Telecom industry to fundraise for Senate chair ahead of privacy hearing | Report finds apps sharing personal data with Facebook | DNC offers campaigns cybersecurity tips
GOP lawmakers urge improvements to cyber vulnerabilities resource
GOP lawmakers on the House Energy and Commerce Committee are urging the Department of Homeland Security (DHS) to improve a platform listing common cyber vulnerabilities.
Committee Chairman Greg Walden (R-Ore.) joined Reps. Gregg Harper (R-Miss.), Marsha Blackburn (R-Tenn.) and Rob Latta (R-Ohio) to write a letter to Homeland Security Secretary Kirstjen Nielsen on Monday suggesting that the program is granted a line item in the DHS budget instead of receiving uneven funding through contracts.
The lawmakers also recommended that the program be reviewed biennially by both DHS and MITRE, the nonprofit that also manages the platform.
The platform - known as the Comment Vulnerabilities and Exposures (CVE) program - was established nearly two decades ago to help companies, groups, agencies and others identify and share bugs.
"The historical practices for managing the CVE program are clearly insufficient. Barring significant improvements, they will likely lead again to challenges that have direct, negative impacts on stakeholders across society," the lawmakers wrote in the letter.
The Republicans noted that they had requested copies of all reviews of the program by DHS or MITRE, but received none from the department and only a few slides from the federal contractor. "The Committee finds the lack of documentation produced by DHS and MITRE to be revealing in and of itself," the letter reads.
The committee members also called the current funding mechanisms for the resource "unstable and prone to acute fluctuations," asking how officials "were expected to maintain a stable and effective program" under the conditions.
DHS declined to comment on the letter to The Hill, citing an agency policy on not commenting on congressional correspondence.
The committees had requested the documents after media reports stated that those who submitted bugs to the platform were not receiving numbers for the vulnerabilities, meaning that they were not formally being added to the list and shared with others who lean on the resource.
The reports also stated that the platform could no longer keep up with the number of requests for CVE numbers, citing the different kinds of devices that were now open to vulnerabilities.