The Problem GCVE Solves
- Single contract controls the namespace
- Vendors assign their own CVEs
- Researchers can't mint identifiers
- Disputed findings disappear
- Multiple authorities share the namespace
- Independent GNAs can allocate IDs
- Researchers get identifier authority
- Findings persist regardless of vendor
When a vendor CNA declines to issue a CVE, the finding effectively disappears from the shared identifier namespace. This has been documented across major cloud providers—see Tenable’s Azure Service Tags research[2], Orca’s AutoWarp disclosure[2], and Wiz’s BingBang finding[2].
GCVE changes this: qualified independent authorities can mint identifiers for the same vulnerability, creating a parallel record that exists regardless of vendor cooperation.
GCVE Identifier Format
Who Operates GCVE
GCVE infrastructure: Operates db.gcve.eu, maintains Vulnerability-Lookup reference implementation. EU co-funded via FETTA initiative under ECCC.[7][8]
Important clarification: GCVE is not “the EU’s CVE alternative.” It is CIRCL’s project, EU co-funded, designed to complement CVE—not replace it. The system maintains full backward compatibility with existing CVE identifiers.
Federation Architecture
Each GNA publishes vulnerability records independently. Records propagate across the federation without central control over the namespace.[9]
Registered Authorities
GNA 1GNA 2GNA 106GNA 112GNA 680GNA 1291GNA 3GNA 101GNA 107GNA 114GNA 118GNA 100GNA 108GNA 110GNA 404GNA 31337GNA 2342GNA 1337GNA 116GNA 111GNA 115GNA 119Why Cloud Security Needs GCVE
The cloud breaks the CVE model: No version numbers. No scanner signatures for service-level flaws. Vendor controls the narrative—declining a CVE removes it from the shared namespace.
GCVE restores visibility: When a vendor declines to acknowledge a finding, an independent GNA mints an identifier. The silent-patch window becomes visible. The finding persists regardless of vendor cooperation.
olearysec as GNA 119
Limitations
GCVE is infrastructure, not a solution. It expands who can create trackable vulnerability records. Whether that improves outcomes depends on how the security community uses it.
References
- CyberScoop: GCVE vulnerability database launches — April 2025 CVE funding crisis context
- Disputed cloud findings: Tenable Azure Service Tags, Orca AutoWarp, Wiz BingBang
- GCVE About Page — "The GCVE initiative is operated by CIRCL"
- GCVE FAQ — Decentralized allocation without block pre-allocation
- GCVE FAQ — CVE compatibility via GNA ID 0
- GCVE-BCP-04 — ID format, naming conventions, 255-char limit
- CIRCL Official Site — Luxembourg CERT, ENISA CNA, NIS 2 CVD coordinator, FETTA
- Vulnerability-Lookup — GCVE reference implementation
- Socket.dev — Federation model analysis
- gcve.eu/dist/gcve.json — Live GNA directory
- GCVE-BCP-06 — GNA requirements
- GCVE-BCP-02 — Vulnerability handling guide
- GCVE-BCP-04 — Multiple IDs per vulnerability permitted
Last updated: 2026-05-22