Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Government

NIST Still Struggling to Clear Vulnerability Submissions Backlog in NVD

The effects of the backlog are already being felt in vulnerability management circles where NVD data promises an enriched source of truth.

The National Institute of Standards and Technology (NIST) is still struggling to clear the growing backlog of CVEs in the official national vulnerability database and the problem will only get worse this year.

That’s the gist of a fresh NIST update with an admission that the current pace of processing vulnerabilities is simply not enough to keep up with the surge in submissions.

According to the update, while the National Vulnerability Database (NVD) is processing incoming CVEs at the same rate as before the slowdown in spring and early summer 2024, a 32 percent jump in submissions last year means that the backlog continues to grow.

“We anticipate that the rate of submissions will continue to increase in 2025,” the institute said, noting that it is exploring the use of AI and machine learning to automate certain processing tasks.

The effects of the backlog are already being felt in vulnerability management circles where NVD data is presented as a source of truth with ongoing triaging and enrichment of data.

Without faster processing of vulnerability data, the gap between reported issues and actionable intelligence has widened and is causing major problems for organizations relying on timely information to protect their systems.

NIST has explained that the NVD’s current workflows and data ingestion systems were designed for lower CVE submission volumes and that outdated formats and manual enrichment procedures created significant bottlenecks.

Despite efforts to bolster staffing, the number of trained analysts and automated tools has not scaled to match the surge in CVE reports. 

Advertisement. Scroll to continue reading.

Related: NIST Explains Why It Failed to Clear CVE Backlog

Related: CVE and NVD – A Weak and Fractured Source of Vulnerability Truth

Related: Vulnerability Management Fatigue Fueled by Non-Exploitable Bugs

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Wendi Whitmore has taken the role of Chief Security Intelligence Officer at Palo Alto Networks.

Phil Venables, former CISO of Google Cloud, has joined Ballistic Ventures as a Venture Partner.

David Currie, former CISO of Nubank and Klarna, has been appointed CEO of Vaultree.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.