News

NIST, Overrun by Massive Numbers of Submitted CVEs, Limits Analysis Work

  • Jeffrey Burt--securityboulevard.com
  • published date: 2026-04-17 00:00:00 UTC

None

<p>The federal agency that for years has tracked, analyzed, and cataloged software vulnerabilities and made the information widely available is being overwhelmed by the massive numbers of security flaws being submitted and is now narrowing the scope of what it will do.</p><p>The National Institute of Standards and Technology (NIST) said this week that it will only add details to common vulnerabilities and exposures (CVEs) that <a href="https://www.nist.gov/news-events/news/2026/04/nist-updates-nvd-operations-address-record-cve-growth" target="_blank" rel="noopener">meet particular criteria</a>, including those that are listed by CISA in its catalog of vulnerabilities that are being exploited, are found in software used by federal agencies, or are defined in <a href="https://www.nist.gov/itl/executive-order-14028-improving-nations-cybersecurity" target="_blank" rel="noopener">Executive Order 14028</a> issued by then-President Biden in 2021.</p><p>CVEs that don’t meet any of those categories will still be listed by NIST in the <a href="https://nvd.nist.gov/" target="_blank" rel="noopener">National Vulnerability Database</a> (NVD), but the agency won’t add any more information about them. Until this week, NIST researchers would give each submitted CVE a severity score and other information to every submitted CVE, but the exponential growth in the number of submissions in recent years has made that work impossible, they said.</p><p>That number grew 263% between 2020 and last year, and NIST officials said they expect the numbers to grow in the future. The number of submissions during the first quarter this year was almost a third higher than the same three months in 2025. The agency noted that last year, agency researchers enriched almost 42,000 CVEs, a 45% year-over-year increase.</p><h3>Years in the Making</h3><p>The strain on the agency began to show in 2024 in the wake of budget and staff cuts, and spilled over into 2025 when <a href="https://securityboulevard.com/2025/04/nist-deprioritizes-pre-2018-cves-as-backlog-struggles-continue/" target="_blank" rel="noopener">NIST made changes</a> to how they were handling the growing backlog of submissions.</p><p>The agency’s struggles rattled the security teams both with public agencies at all levels and at private companies, all of which had relied on NIST’s data to more quickly find and fix vulnerabilities. Dozens of security experts and organizations sent a <a href="https://docs.google.com/document/d/1y6JXhh52b1OMxLMQyl_WH0R2-85iYEBzjSm_fhv8-GY/edit?tab=t.0" target="_blank" rel="noopener">letter to Congress</a> in April 2024 asking to put more resources back into NIST and the NVD.</p><p>“This shutdown has disrupted essential resilience efforts across the public and private sectors,” they wrote. “This situation must be corrected with a sense of urgency appropriate to the broader strategic imperative of securing our systems infrastructure.”</p><h3>Companies Will Need to Step Up</h3><p>This shouldn’t come as a surprise, given the earlier warning signs and the growing number of CVEs, according to security pros. The private sector will have to take on many of the responsibilities that once belonged to NIST, and they’ll need to do it quickly, given that the surge in AI innovation means that not only are autonomous systems able to detect and identify even greater numbers of security flaws, but – as seen with the announcements this month by Anthropic of its <a href="https://securityboulevard.com/2026/04/anthropic-unveils-restricted-ai-cyber-model-in-unprecedented-industry-alliance/" target="_blank" rel="noopener">Mythos Preview AI</a> and OpenAI’s similar <a href="https://securityboulevard.com/2026/04/openai-follows-anthropic-in-limiting-access-to-its-cyber-focused-model/" target="_blank" rel="noopener">GPT-5.4-Cyber foundations</a> models – they’re also more easily be able to create exploits to use against them.</p><p>“We’ve seen a dramatic spike in AI-reported valid vulnerabilities,” said Vincenzo Iozzo, co-founder and CEO of SlashID. “As a result, the new NIST policy is sensible and the categories still covered are the most critical ones. Further, LLMs [large language models] are approaching the point where they are good enough to allow individual organizations to prioritize and contextualize vulnerabilities in their environment reducing the need for enriched CVEs.”</p><h3>A New Model Needed</h3><p>NIST is showing that the model it’s relied on for years can’t hold up in this era of more and faster detection of vulnerabilities, according to cybersecurity experts.</p><p>Doc McConnell, Head of Policy at Finite State and a former CISA branch chief and cybersecurity advisor to the U.S. Office of Budget and Management, said there needs to be two significant changes, the first being that manufacturers need to invest more in security-by-design that includes vulnerability testing and risk assessment early in the design process and fixing flaws before they reach users.</p><p>“Second, as NIST has acknowledged, we can no longer rely on universal severity scores,” McConnell said. “Organizations need to be able to analyze the exploitability of a vulnerability within their own environment, enriched with their own context.”</p><p>Trey Ford, chief strategy and trust officer at Bugcrowd, echoed the sentiment.</p><p>“What NIST is acknowledging is something the research community has understood for years: you cannot centralize vulnerability triage at this volume and expect it to hold,” Ford said. “The signal that actually drives remediation priority has always come from real-world exploitability, not database metadata, and that requires human researchers with adversarial instincts working continuously against live environments.”</p><p>“The next generation of vulnerability programs will be built around that kind of active, distributed signal, not quarterly enrichment cycles,” he said.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/nist-overrun-by-massive-numbers-of-submitted-cves-limits-analysis-work/" data-a2a-title="NIST, Overrun by Massive Numbers of Submitted CVEs, Limits Analysis Work"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fnist-overrun-by-massive-numbers-of-submitted-cves-limits-analysis-work%2F&amp;linkname=NIST%2C%20Overrun%20by%20Massive%20Numbers%20of%20Submitted%20CVEs%2C%20Limits%20Analysis%20Work" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fnist-overrun-by-massive-numbers-of-submitted-cves-limits-analysis-work%2F&amp;linkname=NIST%2C%20Overrun%20by%20Massive%20Numbers%20of%20Submitted%20CVEs%2C%20Limits%20Analysis%20Work" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fnist-overrun-by-massive-numbers-of-submitted-cves-limits-analysis-work%2F&amp;linkname=NIST%2C%20Overrun%20by%20Massive%20Numbers%20of%20Submitted%20CVEs%2C%20Limits%20Analysis%20Work" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fnist-overrun-by-massive-numbers-of-submitted-cves-limits-analysis-work%2F&amp;linkname=NIST%2C%20Overrun%20by%20Massive%20Numbers%20of%20Submitted%20CVEs%2C%20Limits%20Analysis%20Work" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fnist-overrun-by-massive-numbers-of-submitted-cves-limits-analysis-work%2F&amp;linkname=NIST%2C%20Overrun%20by%20Massive%20Numbers%20of%20Submitted%20CVEs%2C%20Limits%20Analysis%20Work" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>