top of page
Scheider_300x600.jpeg
nvidio_728x90.png
TechNewsHub_Strip_v1.jpg

LATEST NEWS

NIST abandons comprehensive CVE enrichment following 263% surge in submissions

  • Marijan Hassan - Tech Journalist
  • 5 hours ago
  • 2 min read

The National Institute of Standards and Technology (NIST) has announced a radical overhaul of the National Vulnerability Database (NVD), effectively ending the era of universal vulnerability "enrichment." Facing an unprecedented backlog and a 263% explosion in CVE submissions over the last five years, the agency will now only provide detailed analysis for a select group of high-priority threats.



The policy shift, effective April 15, 2026, transitions the NVD to a "risk-based" model. While all reported Common Vulnerabilities and Exposures (CVEs) will still be listed, the majority will no longer receive the human-verified severity scores, affected product lists, or remediation context that security teams have relied on for decades.


The "not scheduled" triage

In a move that industry experts are calling "admitting defeat," NIST has cleared its existing backlog by moving approximately 29,000 unenriched vulnerabilities published before March 1, 2026, into a new "Not Scheduled" category. These records will likely never receive official NIST analysis unless specifically requested via email.


Going forward, NIST will prioritize enrichment for only three categories:

  • CISA KEV list: Vulnerabilities appearing in the Cybersecurity and Infrastructure Security Agency's "Known Exploited Vulnerabilities" catalog.

  • Federal software: Vulnerabilities impacting software used within the U.S. federal government.

  • Critical infrastructure: Software defined as "critical" under Executive Order 14028, such as operating systems, web browsers, and identity management tools.


Why the system collapsed

The crisis is driven by a "perfect storm" of rising software complexity and the advent of AI-driven vulnerability discovery. NIST enriched a record 42,000 CVEs in 2025, but even this 45% productivity boost couldn't keep pace with Q1 2026 submissions, which are running 33% higher than last year.


Security researchers note that tools like Anthropic’s Mythos and OpenAI’s GPT-5.4-Cyber are finding bugs at "machine speed," overwhelming human-led cataloging efforts.


The shift follows a reported 12% funding cut to NIST this fiscal year, forcing the agency to prioritize "systemic risk" over comprehensive coverage.


Impact on cybersecurity defenders

The decision leaves thousands of organizations with a massive "blind spot." Most commercial vulnerability scanners rely on NVD data to trigger alerts; without NIST’s severity scores, many automated systems will default to a low-priority status for potentially dangerous bugs.


"The era of free, comprehensive vulnerability intelligence is ending," noted a recent industry report. Defenders are being urged to pivot toward private intelligence feeds and CISA’s "Vulnrichment" program to fill the gap left by the NVD’s retreat.

wasabi.png
Gamma_300x600.jpg
paypal.png
bottom of page