Orange Cyberdefense, one of Europe's leading cybersecurity service providers, has been officially designated as a CVE Numbering Authority (CNA) by the Common Vulnerabilities and Exposures (CVE) Program. This authorization allows Orange Cyberdefense to assign CVE Identifiers (CVE IDs) to security vulnerabilities. The scope of this authority covers both vulnerabilities discovered in the company's own proprietary products and, importantly, vulnerabilities that its extensive research teams uncover in third-party software and hardware. Becoming a CNA solidifies the company's position as a key contributor to the global cybersecurity ecosystem, enabling it to accelerate responsible disclosure and improve threat intelligence for the entire community.
The CVE Program is an international, community-based effort to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. A CNA is an organization that has been authorized by the program to assign CVE IDs to vulnerabilities within a distinct, agreed-upon scope.
By becoming a CNA, Orange Cyberdefense gains several key capabilities and responsibilities:
This move aligns with Orange Cyberdefense's strategy to enhance its threat research, detection, and response capabilities.
The impact of Orange Cyberdefense becoming a CNA is broadly positive for the cybersecurity community. It streamlines the process of turning a vulnerability discovery into a publicly tracked and actionable piece of intelligence. For Orange Cyberdefense, it elevates its brand and credibility as a leading security research organization. For defenders worldwide, it means that vulnerabilities found by one of Europe's largest security teams will be documented and shared more quickly and efficiently, reducing the window of opportunity for attackers to exploit undisclosed flaws. This contributes to a more transparent and responsive global security posture.
As a CNA, Orange Cyberdefense must adhere to the rules and guidelines set forth by the CVE Program. This includes:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.