Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
NIST Updates CVE Enrichment Process for Critical Software

NIST Updates CVE Enrichment Process for Critical Software

Posted on April 16, 2026 By CWS

The National Institute of Standards and Technology (NIST) has announced key updates to its National Vulnerability Database (NVD) operations. These changes are designed to enhance the processing and enrichment of Common Vulnerabilities and Exposures (CVEs) in response to the escalating number of submissions.

Adopting a Risk-Based CVE Enrichment Model

NIST has shifted to a risk-based approach for CVE enrichment, a process aimed at adding detailed information to vulnerabilities. Historically, the institute endeavored to enrich all submitted CVEs, but the influx of new entries has made this increasingly challenging. The updated strategy will prioritize enriching CVEs listed in the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) catalog and those related to critical software used by federal agencies.

This change is a response to a significant surge in CVE submissions, which have increased by 263% between 2020 and 2025. NIST anticipates that this upward trend will persist, with the first quarter of 2026 already showing a one-third increase over the previous year.

Focus on Critical and Federal Software Vulnerabilities

Under the new guidelines, CVEs meeting specific criteria will receive priority enrichment status within one day of submission. This includes vulnerabilities categorized under CISA’s KEV and those affecting critical software as defined by Executive Order 14028. CVEs that do not meet these criteria will be marked as ‘Not Scheduled’ for enrichment, although detailed information can still be requested by users via email.

Despite enriching 42,000 CVEs last year, NIST continues to face a backlog of unenriched entries. The adjustments will allow the institute to concentrate on vulnerabilities that pose the most significant systemic risks.

Implications of New Prioritization Criteria

The implementation of these new criteria means that any unenriched CVEs published before March 1, 2026, will be moved to the Not Scheduled category. Furthermore, NIST will not assign its own severity scores to CVEs if a CVE Numbering Authority has already provided one. Reanalysis will only occur if subsequent changes materially affect the enrichment data.

To improve communication and transparency, NIST will update CVE status labels and descriptions. This risk-based model is essential for managing the increased CVE submissions while ensuring alignment with the needs of the NVD community. The changes also facilitate the development of automated systems and workflow improvements to sustain the program long-term.

NIST acknowledges the impact of these adjustments on users but emphasizes the necessity of this strategic shift to manage its workload effectively and enhance the NVD’s capabilities.

Security Week News Tags:CISA KEV, Critical Software, CVE, Cybersecurity, federal agencies, Information Security, NIST, NVD, Risk-Based Model, vulnerability management

Post navigation

Previous Post: Obsidian Plugin Exploitation Delivers PHANTOMPULSE RAT
Next Post: McGraw-Hill Data Breach Exposes 13.5 Million Users

Related Posts

Oneleet Raises  Million for Security Compliance Platform Oneleet Raises $33 Million for Security Compliance Platform Security Week News
RaccoonO365 Phishing Service Disrupted, Leader Identified RaccoonO365 Phishing Service Disrupted, Leader Identified Security Week News
User Data Compromised in SoundCloud Hack  User Data Compromised in SoundCloud Hack  Security Week News
AI-Driven Breach Exposes FortiGate Firewalls Globally AI-Driven Breach Exposes FortiGate Firewalls Globally Security Week News
In Other News: HashJack AI Browser Attack, Charming Kitten Leak, Hacker Unmasked In Other News: HashJack AI Browser Attack, Charming Kitten Leak, Hacker Unmasked Security Week News
Google Ships Android ‘Advanced Protection’ Mode to Thwart Surveillance Spyware Google Ships Android ‘Advanced Protection’ Mode to Thwart Surveillance Spyware Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • PowMix Botnet Targets Czech Workforce with Stealth Tactics
  • Critical Cisco Webex Flaw Enables User Impersonation
  • SpankRAT Threatens Windows Security with Stealth Techniques
  • Private Sector Vital in Cybersecurity Battle
  • McGraw-Hill Data Breach Exposes 13.5 Million Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • PowMix Botnet Targets Czech Workforce with Stealth Tactics
  • Critical Cisco Webex Flaw Enables User Impersonation
  • SpankRAT Threatens Windows Security with Stealth Techniques
  • Private Sector Vital in Cybersecurity Battle
  • McGraw-Hill Data Breach Exposes 13.5 Million Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark