NIST Drops NVD Enrichment for Most CVEs After 263% Surge
NIST will only enrich CVEs in CISA KEV, federal software, or critical infrastructure. Pre-March 2026 backlog moved to 'Not Scheduled.' Here's what security teams need to know.
The National Institute of Standards and Technology announced a fundamental shift in how the National Vulnerability Database operates. Effective April 15, 2026, NIST will only provide full enrichment for CVEs meeting specific risk criteria—leaving thousands of vulnerabilities without CVSS scores, severity ratings, or remediation guidance.
The change stems from a 263% increase in CVE submissions between 2020 and 2025. NIST simply cannot keep pace with the volume while maintaining comprehensive coverage.
What Changed
Under the new prioritization model, NIST will fully enrich CVEs only if they meet one of three criteria:
- Listed in CISA's Known Exploited Vulnerabilities (KEV) catalog
- Affecting software used within the federal government
- Impacting "critical software" as defined by Executive Order 14028
Everything else falls into a category NIST calls "Not Scheduled"—meaning no CVSS score, no severity rating, just a CVE ID and whatever description the CVE Numbering Authority provided.
The Backlog Problem
All CVEs with an NVD publish date before March 1, 2026 have been moved to "Not Scheduled" status. This affects thousands of vulnerabilities that may still pose risks to organizations running older software.
NIST will no longer routinely re-analyze modified CVEs either. If a CNA updates a vulnerability record, NIST will only re-enrich it "if aware of a modification that materially impacts the enrichment data."
What Counts as Critical Software
Executive Order 14028 defines critical software broadly:
- Software designed to run with elevated privileges
- Software that manages privileged access to networking or computing resources
- Software that controls access to data or operational technology
- Software operating outside normal trust boundaries with elevated access
This captures operating systems, hypervisors, security tools, and identity management systems—but leaves significant gaps for application-layer vulnerabilities in non-critical software categories.
Impact on Security Teams
For organizations that rely on NVD as their primary vulnerability intelligence source, this creates immediate challenges:
Patch prioritization becomes harder. Without CVSS scores, security teams lose a key input for risk-based prioritization. A CVE affecting your CRM software might receive no NIST analysis at all.
Scanning tools may miss context. Vulnerability scanners that pull enrichment data from NVD will return less actionable results for non-prioritized CVEs.
Manual research increases. Teams will need to check CNA-provided scores, vendor advisories, and alternative sources like VulnCheck or Qualys for CVEs outside NIST's scope.
VulnCheck's Caitlin Condon noted that while NIST sets clear expectations, "a significant portion of vulnerabilities now appear to have no clear path to enrichment for organizations relying on NIST as their authoritative source."
Workarounds for Security Teams
- Don't rely solely on NVD. Integrate multiple vulnerability intelligence feeds including vendor advisories, CNA databases, and commercial threat intel
- Monitor CISA KEV directly. Vulnerabilities that matter most for exploitation will appear there regardless of NVD status
- Request enrichment for critical CVEs. Organizations can email [email protected] to request analysis of specific vulnerabilities
- Use CNA-provided scores. NIST will no longer provide separate severity scores when CNAs have already assigned them
The Bigger Picture
This isn't the first time NVD has struggled with scale. The database faced similar backlogs in 2024, and the growing complexity of software supply chains continues to generate CVEs faster than any single organization can analyze.
CISA's KEV catalog has emerged as the de facto priority list for vulnerability management—we've covered multiple additions recently including Apache ActiveMQ and Fortinet EMS. Organizations that align patching priorities with KEV are likely better positioned than those chasing every CVE.
But for the long tail of vulnerabilities—the ones affecting niche software, legacy systems, or applications outside federal use—security teams are increasingly on their own.
The full announcement is available on NIST's website.
Related Articles
Chrome 146 Ships Device-Bound Sessions to Kill Cookie Theft
Google's DBSC ties authentication cookies to hardware TPM chips, making stolen sessions worthless. Chrome 146 for Windows now protects against infostealer attacks.
Apr 12, 2026Betterleaks: Gitleaks Creator Launches Faster Secrets Scanner
Zach Rice, creator of Gitleaks, releases Betterleaks with BPE tokenization achieving 98.6% recall vs entropy's 70.4%. Drop-in replacement now available.
Mar 15, 2026What Is EDR? Endpoint Detection and Response Explained
Endpoint detection and response (EDR) monitors devices to catch threats antivirus misses. Learn how EDR works, key features, and how it compares to EPP and XDR.
Feb 9, 2026Tirith Blocks Homoglyph Attacks Before They Hit Your Shell
Open-source Tirith tool hooks into bash, zsh, fish, and PowerShell to catch Unicode imposter commands, ANSI injection, and pipe-to-shell tricks in real time.
Feb 8, 2026