Defense Dept. expands vulnerability disclosure program to all publicly accessible defense systems
This move allows greater research and reporting of bugs to Pentagon


The US Department of Defense (DoD) has expanded its Vulnerability Disclosure Program (VDP) to include all publicly accessible DoD websites and systems.
The VDP is run by the Department of Defense Cyber Crime Center (DC3) to enable security researchers to report vulnerabilities on the DoD Information Network (DoDIN) to improve network defense.
The expansion announced today allows for research and reporting of vulnerabilities related to all DOD publicly accessible networks, frequency-based communication, internet of things (IoT), and industrial control systems, according to Brett Goldstein, the director of the Defense Digital Service. Originally, the program was limited to DoD public-facing websites and applications.
"This expansion is a testament to transforming the government's approach to security and leapfrogging the current state of technology within DOD," he said.
Before the program’s launch, researchers had no way of reporting bugs they found in publicly accessible DoD systems.
“Because of this, many vulnerabilities went unreported," said Goldstein. "The DOD Vulnerability Policy launched in 2016 because we demonstrated the efficacy of working with the hacker community and even hiring hackers to find and fix vulnerabilities in systems."
Since the launch of the Vulnerability Disclosure Program, security researchers have submitted over 29,000 vulnerability reports. Officials said that over 70% of them were determined to be valid.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Experts believe the expansion will lead to a massive increase in the number of bugs reported to them.
"The department has always maintained the perspective that DOD websites were only the beginning as they account for a fraction of our overall attack surface," said DOD Cyber Crime Center director Kristopher Johnson.
In April, the DoD Cyber Crime Center unveiled a 12-month Defense Industrial Base Vulnerability Disclosure Program (DIB-VDP) pilot to enable security researchers to report flaws in DoD contractor partner’s information systems, web properties, and other identified scoped assets. The 12-month program aspires to employ the lessons learned from existing reports made through the Pentagon’s Vulnerability Disclosure Program.
“The expansion of vulnerability research to participating DoD contractor networks replicates the DoD’s’ success by making participating DoD contractor networks available for vulnerability research,” said the DoD's Cyber Crime Center on its HackerOne webpage. “No technology is perfect, but DC3 believes that working with skilled security researchers across the globe is crucial to identifying their weaknesses.”
Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
IDC warns US tariffs will impact tech sector spending
News IDC has warned that the US government's sweeping tariffs could cut global IT spending in half over the next six months.
By Bobby Hellard Published
-
US government urged to overhaul outdated technology
News A review from the US Government Accountability Office (GAO) has found legacy technology and outdated IT systems are negatively impacting efficiency.
By George Fitzmaurice Published
-
US proposes new ‘know-your-customer’ restrictions on cloud providers
News The US aims to stifle Chinese AI competition with new restrictions on cloud providers to verify foreign data center users
By Solomon Klappholz Published
-
SEC passes rules compelling US public companies to report data breaches within four days
News Foreign entities trading publicly in the US will also be held to comparative standards
By Rory Bathgate Published
-
US says National Cybersecurity Strategy will focus on market resilience and private partnerships
News The recently announced implementation plans alow for more aggressive action against ransomware gangs
By Rory Bathgate Published
-
US ‘Tech Hubs’ drive aims to boost innovation in American heartlands
News The development of the hubs will could help drive regional innovation and support for tech companies
By Ross Kelly Published
-
Offensive Security bans use of ChatGPT in cyber security certification exams
News It becomes the second major IT organisation to ban the use of the powerful tool that's taken the industry by storm
By Zach Marzouk Published
-
Biden sets June deadline for $42 billion broadband funding outline
News The announced deadline come prior to a much-awaited update to the FCC's US broadband map, giving a clearer image of the internet challenges facing the nation
By Rory Bathgate Published