Technology

NIST is cataloging so many vulnerabilities it can only assign severity scores to the highest priority threats

2026-04-20 13:59
301 views
NIST is cataloging so many vulnerabilities it can only assign severity scores to the highest priority threats

The volume has almost tripled in five years, forcing NIST to change its MO.

  1. Pro
  2. Security
NIST is cataloging so many vulnerabilities it can only assign severity scores to the highest priority threats News By Sead Fadilpašić published 20 April 2026

The volume has almost tripled in five years

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Concept art representing cybersecurity principles Nytt DDoS-rekord (Image credit: Shutterstock / ZinetroN)
  • Copy link
  • Facebook
  • X
  • Whatsapp
  • Reddit
  • Pinterest
  • Flipboard
  • Threads
  • Email
Share this article 0 Join the conversation Follow us Add us as a preferred source on Google Newsletter Tech Radar Pro Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

Become a Member in Seconds

Unlock instant access to exclusive member features.

Contact me with news and offers from other Future brands Receive email from us on behalf of our trusted partners or sponsors By submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.

You are now subscribed

Your newsletter sign-up was successful

Join the club

Get full access to premium articles, exclusive features and a growing list of member rewards.

Explore An account already exists for this email address, please log in. Subscribe to our newsletter
  • NIST changes enrichment process for National Vulnerability Database due to surge in CVE submissions
  • 263% increase since 2020; prioritization now given to KEV entries, federal software, and critical software under EO 14028
  • Other CVEs deemed “lowest priority,” but users can request enrichment via email if needed

The number of reported vulnerabilities has surged so sharply that it forced the National Institute of Standards and Technology (NIST) to change how it ‘enriches’ each entry.

Until now, NIST would take a basic CVE record and add structured analysis, to make it more useful in the National Vulnerability Database (NVD). That usually includes severity scoring (CVSS), affected products (CPE), weakness classification (CWE), and additional metadata.

However, between 2020 and 2025, there has been a 263% increase in CVE submissions, NIST said, adding that it doesn’t expect the trend to let up anytime soon. "Submissions during the first three months of 2026 are nearly one-third higher than the same period last year,” it said.

Article continues below You may like
  • Password recovery concept image showing man typing on a keyboard with an overlay imitating password recovery and data recovery principles Forget zero-days - 'N-days' could be the most worrying security threat facing your systems today, here's why
  • Best free Linux firewalls Fortinet patches FortiGate Firewall vulnerabilities that allowed hackers to steal enterprise credentials
  • Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol Critical Citrix NetScaler flaw gets official patch warning from CISA

Prioritizing KEV-listed ones

To be able to keep up with rising demand, NIST is setting up certain criteria. Submissions that meet them will be enriched as soon as possible, while those that do not, will have to wait. NIST did not say it would not enrich these “lowest priority” submissions at all, but if the agency is being flooded with new entries every day, it’s safe to assume many will never be covered.

Starting April 15, NIST said it would prioritize CVEs appearing in CISA’s Known Exploited Vulnerabilities (KEV) catalog, CVEs for software used within the federal government, and CVEs for critical software as defined by Executive Order 14028.

Everything else will be deemed “lowest priority”, but NIST says it doesn’t mean other CVEs won’t have a significant impact on affected systems.

“These criteria may not catch every potentially high-impact CVE,” it warned. “Therefore, users can request enrichment of any lowest priority CVEs by emailing us at [email protected]. We will review those requests and schedule the CVEs for enrichment as resources allow.”

Are you a pro? Subscribe to our newsletterContact me with news and offers from other Future brandsReceive email from us on behalf of our trusted partners or sponsorsBy submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.

A full definition of critical software and a description of the new workflow can be found on this page.

Best antivirus software headerThe best antivirus for all budgetsOur top picks, based on real-world testing and comparisons

➡️ Read our full guide to the best antivirus1. Best overall:Bitdefender Total Security2. Best for families:Norton 360 with LifeLock3. Best for mobile:McAfee Mobile Security

Google logo on a black background next to text reading 'Click to follow TechRadar'

Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds.

Sead FadilpašićSocial Links Navigation

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

View More

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Logout Read more Password recovery concept image showing man typing on a keyboard with an overlay imitating password recovery and data recovery principles Security Forget zero-days - 'N-days' could be the most worrying security threat facing your systems today, here's why    Best free Linux firewalls Security Fortinet patches FortiGate Firewall vulnerabilities that allowed hackers to steal enterprise credentials    Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol Security Critical Citrix NetScaler flaw gets official patch warning from CISA    Hands on a laptop with overlaid logos representing network security Security This Wing FTP Server flaw is being actively exploited in attacks – CISA says mitigate now    Security Pro Why traditional metrics are giving CISOs a false sense of security    An image of an n8n workflow Security Critical n8n flaws discovered - here's how to stay safe    Latest in Security Sign in with Apple Button for your privacy. Man holds a smartphone and authorizes the Internet service Security Hackers abuse Apple account notifications to distribute malware    business cloud Security Vercel confirms data breach    digital data lock on screen Security Cisco tells Webex users to patch critical security flaws immediately    Google ads theme menu on device screen pixelated close up view Security Google claims Gemini AI helped it block over 8.3 billion malicious ads in 2025    Malware attack virus alert , malicious software infection , cyber security awareness training to protect business Security Disgruntled researcher releases second major Defender zero-day    DDoS inscribed on a digital background made up of numbers Security Europol launches Operation PowerOFF — warns 75,000 DDoS users and takes down 53 domains    Latest in News Adobe Summit 2025 Pro Adobe Summit 2026: we're live at Adobe's annual keynotes to hear what's new this year    Honor Lightning AI Platforms & Assistants Humanoid robots beat humans at the Beijing half marathon for the first time    Jeff Bezos Inspects Blue Origin's Shepard Rocket Tech Blue origin just hit a major milestone — and then failed its mission    Fitbit Flex 2 Fitness Trackers Fitbit Air: The latest Whoop rival rumors say that's the name of the mystery Fitbit — and your Fitbit Premium subscription could also change    Apple Watch 6 Blood Oxygen app Smartwatches A key Apple Watch health feature could be returning to your wrist    Sign in with Apple Button for your privacy. Man holds a smartphone and authorizes the Internet service Security Hackers abuse Apple account notifications to distribute malware    LATEST ARTICLES