đź“° Full Story
The U.S. National Institute of Standards and Technology said on April 15, 2026 it is narrowing how it enriches entries in the National Vulnerability Database (NVD) to manage a sustained surge in reported software flaws.
NIST will prioritize analysis and automatic enrichment for CVEs that appear in the Cybersecurity and Infrastructure Security Agency’s Known Exploited Vulnerabilities (KEV) catalog, for software used by the federal government, and for critical software as defined under Executive Order 14028.
The agency said submissions rose 263% from 2020 to 2025 and that it enriched nearly 42,000 vulnerabilities last year; CVE submissions in Q1 2026 were about one-third higher than a year earlier.
CVEs outside the priority criteria will still be listed but receive a “Lowest Priority” label and will not automatically get CVSS scores or other metadata unless requested by users (nvd@nist.gov). NIST also said it will avoid duplicate scoring where CNAs provide severity and will reanalyse modified CVEs only when changes materially affect core enrichment data.
The move follows a backlog that began after a 2024 funding lapse and aims to stabilise long-term NVD operations while NIST develops automation.
đź”— Based On
Cyber Security NewsNIST Shifts to Risk-Based NVD Model as CVE Submissions Surge 263% Since 2020
🕰️ The Story So Far: An Evolving Timeline
Monday, April 20, 2026 23:30 UTC
NIST narrows NVD focus amid CVE surge
Thursday, April 16, 2026 14:25 UTC
NIST narrows NVD analysis amid CVE surge







đź’¬ Commentary