What's Happening?
The National Institute of Standards and Technology (NIST) has announced a strategic shift in its approach to analyzing security vulnerabilities due to an overwhelming increase in submissions. The agency will now prioritize Common Vulnerabilities and Exposures
(CVEs) that are listed in the Cybersecurity and Infrastructure Security Agency’s (CISA) known exploited vulnerabilities catalog, as well as software used in federal government operations and critical software defined under Executive Order 14028. This decision comes as NIST aims to achieve long-term sustainability for its National Vulnerability Database (NVD), which has faced challenges such as a funding lapse in early 2024. The backlog of unenriched CVEs has continued to grow, with submissions increasing by 263% from 2020 to 2025. In the first quarter of 2026 alone, submissions were nearly one-third higher than the same period in the previous year.
Why It's Important?
This adjustment by NIST is significant as it reflects the growing challenge of managing cybersecurity threats in an era of increasing digital vulnerabilities. By focusing on CVEs with the greatest potential for widespread impact, NIST aims to better allocate its resources and provide more effective support to the cybersecurity community. This change is expected to influence how vulnerabilities are prioritized and addressed, potentially shifting more responsibility to private companies and organizations to manage and assess vulnerabilities. The decision underscores the critical need for efficient vulnerability management to protect national security and critical infrastructure from cyber threats.
What's Next?
As NIST implements this new approach, it is likely that private sector entities and other organizations will need to step up their efforts in vulnerability assessment and management. This shift may lead to increased collaboration between government agencies and private cybersecurity firms to ensure comprehensive coverage of potential threats. Additionally, the cybersecurity community may need to adapt to these changes by developing new strategies for prioritizing and addressing vulnerabilities that fall outside NIST's narrowed focus.












