The runZero CNA is the newest CVE Numbering Authority!

|
Updated

Hey gang, it’s your internet pal Tod Beardsley, and I wanted to take just a sec to let y’all know that runZero is now officially a CVE Numbering Authority

I’m genuinely thrilled to help stand up this program at runZero, as I’m a well-known CVE superfan. I’m on the CVE Board, chair a CVE working group, run the CNA Slack workspace, and I hold some pretty deeply held beliefs on the value of precise, well-referenced vulnerability records. Becoming a CNA gives us the opportunity to contribute directly to that body of public knowledge, not just as producers of high-quality security research, but as stewards of the data defenders rely on every day to make confident patching and risk-management decisions.

At runZero, we spend a great deal of time neck-deep in the parts of the network most organizations struggle to see clearly. OT gear running on fragile stacks, IoT devices chatting on proprietary protocols, and all those oddball embedded systems that never show up on traditional scanners. These systems break in ways that are often undocumented, subtle, or downright weird, and the industry has historically struggled to present those issues in a structured, reproducible way. Now that we can assign and publish CVE IDs ourselves, we can bring much more transparency and technical rigor to the kinds of bugs we routinely encounter in this space. As protocol nerds, this lets us do the work the way we think it ought to be done: carefully, thoroughly, and with enough context that others can actually learn from it.

Of course, this also applies to our own products. Nobody ships perfect software, and when we (rarely!) find an issue in our own code we want to document it publicly, accurately, and without delay. CNA status allows us to streamline that entire process. Instead of relying on external bottlenecks or waiting for someone else’s queue to clear, we can publish timely, well-structured CVEs that reflect the exact details defenders need. Coordinated disclosure should make the world safer, not slower, and this designation helps us close that gap.

What excites me most is how this fits into the larger ecosystem of coordinated vulnerability disclosure. OT and IoT vendors often have limited experience engaging with coordinated vulnerability disclosure (CVD) norms, and many operate without a clear path for publishing advisories or requesting CVE IDs. By taking on CNA responsibilities, we can meet those vendors where they are, help them navigate responsible disclosure, and elevate the overall quality of vulnerability reporting in domains that desperately need more daylight. The result benefits everyone: researchers, suppliers, operators, and crucially, defenders tasked with keeping these environments running safely. Patching OT gear is often slow and painful, so anything we can do to help defenders make prioritization calls for fixes or other compensating controls is crazy valuable across critical infrastructure.

This milestone is a natural extension of the work we already do in exposure identification, deep fingerprinting, and protocol analysis across IT, OT, IoT, mobile, and cloud environments. Now we can channel that expertise into a sustained contribution to the CVE Program, strengthening the shared foundation the entire security community depends on.

So, keep an eye on this blog for our next coordinated disclosure, and you can review the last few bugs we’ve worked on so far this year over at our revamped security advisories page.

Written by todb

Tod Beardsley is VP of Security Research at runZero, where he "kicks assets and fakes frames." Prior to 2025, he was the Section Chief for the Vulnerability Response section for CSD/VM/VRC at CISA, the Cybersecurity and Infrastructure Security Agency, part of the US government, and a seasonal Travis County Election Judge in Texas. He's also a founder and CNA point of contact for AHA!.

Tod spends much of his time involved in vulnerability research and coordinated vulnerability disclosure (CVD). He has over 30 years of hands-on security experience, stretching from in-band telephony switching to modern ICS/OT implementations. He has held IT ops, security, software engineering, and management positions in large organizations such as the US Government, Rapid7, 3Com, Dell, and Westinghouse, as both an offensive and defensive practitioner. Tod is a CVE Board member, has authored several research papers, and is an internationally-tolerated horror fiction expert.

More about todb
Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.