Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Relations between Anthropic and the Trump administration appear to be thawing.

Experimental drug doubles 1-year survival rate for pancreatic cancer

The App Store is booming again, and AI may be the reason

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » NIST limits CVE enrichment after vulnerability submissions spike by 263%
Identity

NIST limits CVE enrichment after vulnerability submissions spike by 263%

By April 17, 2026No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananApril 17, 2026Vulnerability management

The National Institute of Standards and Technology (NIST) announced changes to how it handles cybersecurity vulnerabilities and exposures (CVEs) listed in the National Vulnerability Database (NVD), saying that due to a sharp increase in CVE submissions, it will enrich only those that meet certain criteria.

“CVEs that do not meet these criteria will continue to be listed in the NVD, but will not be automatically enhanced by NIST,” the report said. “This shift is being driven by a sharp increase in CVE filings, which increased by 263% between 2020 and 2025, and we don’t see this trend slowing down anytime soon.”

The prioritization criteria outlined by NIST, effective April 15, 2026, are:

CVEs are listed in the U.S. Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) Catalog. CVE for software used within the federal government. CVE for critical software as defined in Executive Order 14028: This includes software that is designed to run with elevated or managed privileges, has privileged access to networking or computing resources, has controlled access to data or operational technology, and operates outside normal trust boundaries with elevated access.

CVE submissions that do not meet these thresholds are marked as “not scheduled.” The idea, according to NIST, is to focus on CVEs that have the greatest potential for widespread impact.

“CVEs that do not meet these criteria can have a significant impact on affected systems, but generally do not present the same level of system risk as CVEs that are included in priority categories,” it added.

NIST said the number of CVE applications in the first three months of 2026 is up nearly one-third from last year, and it is working faster than ever to enrich its claims. It also said it will strengthen nearly 42,000 CVEs in 2025, an increase of 45% from the previous year.

If a high-impact CVE is classified as unscheduled, users can request enrichment by emailing ‘nvd@nist’.[.]“NIST is expected to consider these requests and schedule CVE enhancements as needed.

Changes have also been made to various other aspects of NVD operation. These include –

NIST will no longer routinely provide a separate severity score for a CVE if the CVE numbering authority already provides a severity score. Changed CVEs will only be reanalyzed if they have a “significant impact” on the enrichment data. Users can request re-analysis of a particular CVE by sending an email to the same address listed above. All unhardened CVEs that are currently in the backlog and have an NVD publication date before March 1, 2026 will be moved to the “Unscheduled” category. This does not apply to CVEs already in the KEV catalog. NIST has updated CVE status labels and descriptions and the NVD dashboard to accurately reflect the status and other statistics of all CVEs in real time.

“This announcement from NIST is not a huge surprise, given that NIST has previously signaled its intention to move to a ‘risk-based’ prioritization model for hardening CVE,” Caitlin Condon, vice president of security research at VulnCheck, said in a statement shared with Hacker News.

“On the positive side, NIST is clearly and publicly setting out its expectations for the community as new vulnerabilities proliferate. On the other hand, for organizations that rely on NIST as the authoritative (or only) source of CVE enrichment data, it appears that a significant portion of vulnerabilities do not have a clear path to enrichment.”

According to data from cybersecurity companies, there will still be approximately 10,000 vulnerabilities without a CVSS score in 2025. NIST estimates that it has hardened 14,000 “CVE-2025” vulnerabilities, representing approximately 32% of the CVE population in 2025.

“This announcement reinforces what we already know: We no longer live in a world where manually hardening new vulnerabilities is a viable or effective strategy,” Condon said.

“Even if AI-driven vulnerability discovery doesn’t accelerate the volume and validation challenges of CVE, today’s threat landscape demands a decentralized, machine-speed approach to vulnerability identification and hardening, and a truly global risk perspective that recognizes the interconnected and interdependent nature of software ecosystems around the world, and the attackers who target them. After all, what we don’t prioritize for ourselves, our adversaries will prioritize for us.”

David Lindner, chief information security officer at Contrast Security, said NIST’s decision to prioritize only high-impact vulnerabilities marks the end of the days when defenders could rely on a single, government-controlled database to assess security risks, forcing organizations to pivot to a proactive approach to risk management based on threat intelligence.

“Modern defenders must move beyond the noise of total CVE volumes and focus their limited resources on CISA’s KEV list and indicators of exploitability,” Lindner said.

“While this shift may disrupt traditional audit workflows, it will ultimately mature the industry by requiring us to prioritize real-world exposure over theoretical seriousness. Relying on a select subset of actionable data is far more effective for national resilience than maintaining a comprehensive but unmanageable archive of every little bug.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleC-Lock builds a universal livestock methane measurement framework
Next Article EU injects €1.07 billion into new defense projects under EDF

Related Posts

$13.74 million hack shuts down authorized Grinex exchange after tip-off

April 18, 2026

Mirai Variant Nexcorium exploits CVE-2024-3721 to hijack TBK DVR and attack DDoS botnet

April 18, 2026

Three Microsoft Defender zero-days were actively exploited. 2 are not yet patched

April 17, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Relations between Anthropic and the Trump administration appear to be thawing.

Experimental drug doubles 1-year survival rate for pancreatic cancer

The App Store is booming again, and AI may be the reason

This week in science news: Physicists see pinpricks of darkness faster than light, humans are still evolving and some polar bears are fatter than ever

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.