The CVE system is structurally incapable of tracking cross-vendor architectural vulnerabilities: in 2019 MITRE correspondence the authors were told CVE identifiers apply only to specific software implementation mistakes and that CVE-2019-14899 'should not have been assigned,' leaving the architectural VPN inference attack surface permanently untracked. Between CVE-2019-14899 (2019) and CVE-2024-49734 (2024), no new CVE was assigned despite continued reporting and confirmed exploitability, creating a five-year gap in the public record during which vendor patch claims went unchallenged.
From 2026-tolley-architectural — Architectural VPN Vulnerabilities, Disclosure Fatigue, and Structural Failures
· §3.1, §4.1, §6.4
· 2026
· Free and Open Communications on the Internet
Implications
Internet Freedom tool developers must not treat CVE absence or patch closure as evidence that an architectural vulnerability is resolved; maintain independent adversary-aligned re-testing on shipping builds across OS update cycles.
Contribute to or adopt a persistent cross-vendor architectural vulnerability registry so that metadata-inference risks remain continuously visible to security trainers, tool vetting programs, and high-risk users.