Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
NIST Adopts Risk-Based Approach Amid Rising CVE Submissions

NIST Adopts Risk-Based Approach Amid Rising CVE Submissions

Posted on April 20, 2026 By CWS

The National Institute of Standards and Technology (NIST) has introduced a significant change in its vulnerability management strategy within the National Vulnerability Database (NVD). As of April 15, 2026, NIST is transitioning from a comprehensive analysis method to a targeted, risk-based approach. This move is designed to provide more timely intelligence on high-impact threats, while managing an ever-increasing amount of vulnerability reports.

Reasons Behind the Shift

The decision to adopt a risk-based model stems from a dramatic 263% rise in Common Vulnerabilities and Exposures (CVE) submissions from 2020 to 2025. Despite enhancing productivity by 45% and enriching nearly 42,000 CVEs with severity scores and affected product lists last year, NIST struggled to keep up with the escalating submission rate. In the first quarter of 2026 alone, submissions increased by 33% compared to the previous year.

New Criteria for Prioritization

To navigate this surge, NIST will no longer attempt to enrich every CVE immediately. Instead, the NVD program will focus on vulnerabilities posing the greatest systemic risk. Prioritization will be given to vulnerabilities listed in the CISA’s Known Exploited Vulnerabilities (KEV) Catalog, those affecting software used by federal government agencies, and vulnerabilities involving critical software as outlined in Executive Order 14028.

Submissions outside these parameters will still be published to the NVD but will be labeled as “Lowest Priority” and will not receive immediate enrichment data. Security professionals can request manual analysis by contacting NIST directly.

Operational Adjustments

As part of the new approach, NIST will eliminate redundant efforts in severity scoring. If a CVE Numbering Authority provides a severity score, the NVD will not generate a separate score. Additionally, analysts will only reanalyze modified CVEs if changes significantly impact the core enrichment data.

This streamlined method also addresses the NVD’s processing backlog, which began accumulating in early 2024. Older, unenriched CVEs published before March 1, 2026, have been moved to a “Not Scheduled” category and will be processed gradually as resources permit, based on new risk criteria.

Future Outlook

To maintain transparency, NIST has updated the NVD Dashboard to accurately reflect the real-time status and statistics of all CVEs. By focusing solely on critical vulnerabilities and reducing duplicate administrative tasks, NIST aims to stabilize current operations while working towards the development of automated systems for sustainable long-term management.

Stay informed by following us on Google News, LinkedIn, and X for daily updates on cybersecurity developments. Contact us if you wish to feature your stories.

Cyber Security News Tags:CISA, CVE, cyber threats, Cybersecurity, data enrichment, Executive Order 14028, NIST, NVD, Risk-Based Model, Security, Technology, vulnerability management

Post navigation

Previous Post: Hackers Struggle with TP-Link Router Vulnerability
Next Post: ZionSiphon Malware Targets Israeli Water Systems

Related Posts

Cloudflare Fixes Critical Pingora Vulnerabilities Cloudflare Fixes Critical Pingora Vulnerabilities Cyber Security News
Trend Micro Apex One Vulnerability Allow Attackers to Inject Malicious Code Trend Micro Apex One Vulnerability Allow Attackers to Inject Malicious Code Cyber Security News
Critical XSS Flaw in Angular i18n Risks Malicious Attacks Critical XSS Flaw in Angular i18n Risks Malicious Attacks Cyber Security News
macOS Gatekeeper Explained: Strengthening System Defenses macOS Gatekeeper Explained: Strengthening System Defenses Cyber Security News
Critical Roundcube Flaw Allows Email Tracking Critical Roundcube Flaw Allows Email Tracking Cyber Security News
Linux UDisks daemon Vulnerability Let Attackers Gaining Access to Files Owned by Privileged Users Linux UDisks daemon Vulnerability Let Attackers Gaining Access to Files Owned by Privileged Users Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybercriminals Exploit QEMU for Stealthy Attacks
  • Why AI Projects Often Falter Post-Demo
  • NSA Utilizes Anthropic’s AI Amid Pentagon Ban
  • Bluesky Faces Major Disruption Amid DDoS Attack
  • Critical Flaw in MCP Protocol Poses Major AI Supply Chain Risk

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybercriminals Exploit QEMU for Stealthy Attacks
  • Why AI Projects Often Falter Post-Demo
  • NSA Utilizes Anthropic’s AI Amid Pentagon Ban
  • Bluesky Faces Major Disruption Amid DDoS Attack
  • Critical Flaw in MCP Protocol Poses Major AI Supply Chain Risk

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark