
π―NIST is cutting back on how it handles information about software vulnerabilities, which is causing worry among cybersecurity experts. To help, different groups in the industry are teaming up to make sure important vulnerability information is still available.
What Happened
The National Institute of Standards and Technology (NIST) has announced a significant cutback in its handling and enrichment of Common Vulnerabilities and Exposures (CVE) data. This decision has raised concerns among cybersecurity professionals who rely on this data for effective vulnerability management and threat assessment. NIST will now prioritize enrichment for CVEs listed in CISAβs Known Exploited Vulnerabilities (KEV) catalog, focusing on critical software and federal government applications. Other CVEs will be categorized as 'not scheduled' for enrichment, leading to a backlog of over 30,000 entries.
Why It Matters
CVE data is crucial for identifying and mitigating vulnerabilities in software and systems. With NIST stepping back, there is a potential gap in the quality and availability of enriched CVE information. This could lead to delays in patching vulnerabilities and increased risk for organizations. The backlog of CVEs, which has surged by 263% from 2020 to 2025, is expected to complicate matters further, as companies may struggle to keep up with the sheer volume of vulnerabilities being reported.
Industry Impact
The reduction in NIST's CVE data enrichment is prompting a collaborative response from various industry stakeholders. Coalitions are forming to ensure that essential vulnerability information remains accessible and actionable. Experts predict that the number of CVEs submitted could exceed 59,000 in 2026, with some scenarios estimating over 100,000. This surge in vulnerability discovery, partly driven by advancements in AI, underscores the urgency for industry players to step in and support cybersecurity teams in navigating the evolving landscape.
What's Next
As the cybersecurity community adapts to NIST's changes, it will be crucial to monitor how these new coalitions perform. Their effectiveness in filling the gap left by NIST will significantly impact how organizations manage vulnerabilities moving forward. Security leaders will need to reassess their technology inventories to determine if their software falls under NIST's new priority categories. Moreover, the reliance on AI and automation in vulnerability management could play a pivotal role in addressing the backlog and improving response times. Cyber teams should stay informed about developments in this area to ensure they can effectively protect their systems and data.
With NIST narrowing its focus, organizations must adapt quickly to the new landscape of vulnerability management. The collaboration among industry players could be vital in maintaining effective cybersecurity practices.



