NIST Drops Enrichment for Pre-March 2026 Vulnerabilities

NIST's National Vulnerability Database will stop enriching older CVEs due to a surge in submissions. This affects many relying on timely vulnerability updates. Stay informed to protect your systems.

VulnerabilitiesHIGHUpdated: Published:
Featured image for NIST Drops Enrichment for Pre-March 2026 Vulnerabilities

Original Reporting

IMInfosecurity Magazine

AI Summary

CyberPings AI·Reviewed by Rohit Rana

🎯Basically, NIST won't update older security flaws because there are too many new ones to handle.

What Happened

On April 15, 2026, at VulnCon26, NIST announced a significant operational change regarding its National Vulnerability Database (NVD). Due to a record surge in reported vulnerabilities, the NVD will no longer enrich vulnerabilities reported before March 1, 2026. This decision stems from an overwhelming backlog of Common Vulnerabilities and Exposures (CVEs) that the NVD cannot keep up with.

Who's Affected

This change directly impacts organizations and individuals relying on the NVD for vulnerability information. Specifically, it affects those who monitor or respond to vulnerabilities in software, especially if they involve federal government systems or critical software as defined by Executive Order 14028.

What Data Was Exposed

While all submitted CVEs will still be added to the NVD, those that do not meet the new criteria will be categorized as ‘Not Scheduled’. This means they will not receive enrichment, which includes important details and risk assessments necessary for effective vulnerability management.

What You Should Do

Organizations should prioritize monitoring the NVD for newly enriched vulnerabilities, particularly those related to critical software. Users can request enrichment of unscheduled CVEs by contacting the NVD directly. It's essential to stay informed about the vulnerabilities that affect your systems, especially as the volume of CVEs continues to rise.

The Flaw

The NVD's operational adjustments are a response to a 263% increase in CVE submissions from 2020 to 2025. NIST officials noted that submissions in the first quarter of 2026 are already one-third higher than the same period last year.

What's at Risk

With the NVD focusing on critical vulnerabilities, there is a risk that less critical vulnerabilities may not receive timely attention. This could leave systems exposed to threats that could have been mitigated with proper enrichment and analysis.

Patch Status

NIST will prioritize enriching vulnerabilities found in software used by the federal government and those listed in the CISA's Known Exploited Vulnerabilities (KEV) list. Users should ensure they are aware of these prioritized vulnerabilities and apply necessary patches promptly.

Immediate Actions

This shift in NIST's approach underscores the growing challenges in vulnerability management as the number of reported flaws continues to escalate. Organizations must adapt to these changes to maintain robust security practices.

Containment

  • 1.Monitor the NVD: Regularly check for updates on enriched vulnerabilities.
  • 2.Request Enrichment: If you find an unscheduled CVE relevant to your systems, reach out to NVD for enrichment.

🔒 Pro Insight

🔒 Pro insight: NIST's shift to a risk-based approach may create gaps in vulnerability management for less critical flaws, impacting overall security posture.

IMInfosecurity Magazine
Read Original

Related Pings