What's Happening?
The National Institute of Standards and Technology (NIST) has announced changes to its National Vulnerability Database (NVD) operations to better manage the increasing volume of new Common Vulnerabilities and Exposures (CVEs). The update involves adopting
a risk-based model for enriching CVE entries, focusing on those added to the Cybersecurity and Infrastructure Security Agency's (CISA) Known Exploited Vulnerabilities (KEV) catalog and critical software used by federal agencies. This change is driven by a surge in CVE submissions, which increased by 263% between 2020 and 2025. NIST aims to address the backlog of unenriched CVEs by prioritizing those that pose systemic risks.
Why It's Important?
The prioritization of CVEs in critical software is crucial for national security and the protection of federal systems. By focusing on vulnerabilities that are actively exploited or pose significant risks, NIST can allocate resources more effectively, ensuring that the most dangerous vulnerabilities are addressed promptly. This approach helps mitigate potential threats to government infrastructure and enhances the overall cybersecurity posture of federal agencies. The changes also aim to improve transparency and communication regarding CVE status, which is vital for stakeholders relying on NVD data for security decisions.
What's Next?
NIST plans to develop automated systems and workflow enhancements to ensure the long-term sustainability of the NVD program. Users can request enrichment for unscheduled CVEs, and NIST will update CVE status labels and descriptions to better communicate their status. These efforts are part of a broader strategy to align NVD operations with the needs of the cybersecurity community, ensuring that critical vulnerabilities are addressed efficiently.












