NIST Deprioritizes Pre-2018 CVEs Amid Backlog and New Threats

Article Highlights
Off On

The US National Institute of Standards and Technology (NIST) recently made a significant decision affecting the cybersecurity landscape by marking all Common Vulnerabilities and Exposures (CVEs) published before January 1, 2018, as “Deferred” in the National Vulnerability Database (NVD). This move impacts over 20,000 entries and potentially up to 100,000, signaling that these CVEs will no longer be prioritized for further enrichment data updates unless they appear in the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) catalog. NIST’s decision comes in response to an ongoing struggle with a growing backlog in processing vulnerability data, exacerbated by a 32% surge in submissions in the past year.

An Overwhelming Backlog and Strategic Reprioritization

NIST’s challenges in processing and enriching the vast amount of incoming data have delayed its goal of clearing the backlog by the end of fiscal year 2024. In response, NIST is developing new systems to handle these issues more efficiently. Industry experts consider this move practical given the complexities of managing vulnerabilities at scale. Ken Dunham from Qualys describes it as an evolution in the face of changing cyber threats. Meanwhile, Jason Soroko from Sectigo interprets this as a strategic reprioritization, with resources redirected towards addressing emerging threats, assuming that legacy issues have been mitigated through routine patch management practices. The responsibility for managing deferred CVEs now shifts more heavily onto organizations. For security teams, this means identifying and monitoring legacy systems, prioritizing the patching of deferred vulnerabilities, and hardening or segmenting outdated infrastructure. Using real-time threat intelligence to detect attempts at exploiting these vulnerabilities becomes crucial. This shift highlights a broader trend where organizations must adopt proactive risk management strategies due to the increasing volume of CVEs and limited resources available to handle them.

Embracing Advanced Technology for Improved Efficiency

In addressing its backlog, NIST is also exploring the potential use of artificial intelligence (AI) and machine learning to streamline the processing of vulnerability data. This move reflects an ongoing trend in the cybersecurity industry toward leveraging advanced technologies for more efficient management of vulnerabilities. By incorporating AI and machine learning, NIST aims to ensure that both older and newer vulnerabilities receive appropriate attention within the constraints of available resources. This nuanced approach to cybersecurity management underscores the need for a balance between addressing legacy vulnerabilities and staying ahead of emerging threats. Organizations are encouraged to adopt similar strategies, using technology to enhance their cybersecurity efforts and ensure comprehensive coverage of potential vulnerabilities. This shift in focus not only addresses immediate backlog issues but also sets the stage for more sustainable and scalable vulnerability management practices in the future.

New Paradigm for Cybersecurity Management

The US National Institute of Standards and Technology (NIST) has recently made a crucial decision that impacts the cybersecurity domain by designating all Common Vulnerabilities and Exposures (CVEs) published before January 1, 2018, as “Deferred” in the National Vulnerability Database (NVD). This adjustment affects over 20,000 entries and potentially up to 100,000, indicating that these CVEs will no longer receive prioritized updates for enrichment data unless they are listed in the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) catalog. NIST’s decision is a response to an ongoing challenge with a growing accumulation of vulnerability data, which has been aggravated by a 32% increase in submissions over the past year. This strategic shift aims to address the backlog more effectively and allocate resources more efficiently, ensuring newer and more critical vulnerabilities receive the attention they require for maintaining robust cybersecurity measures.

Explore more

How Can AI-First Models Transform Wealth Management?

The traditional cadence of wealth management, once anchored by the “once-a-quarter” portfolio review and heavy binders of historical data, has officially reached its expiration date in a world that demands instant clarity. Modern investors no longer find value in retrospective reports that explain what happened three months ago; instead, they seek a forward-looking partner capable of navigating market volatility as

Mega-Mergers and Boutique Firms Reshape Wealth Management

The traditional boundaries of the financial world are dissolving as a relentless wave of consolidation transforms once-independent institutions into sprawling, multi-trillion-dollar behemoths that dominate the global economic landscape. This movement is not merely a series of isolated business transactions but a fundamental shift in how capital is managed, protected, and grown for millions of investors across the globe. As the

How Can CRM Intelligence Redefine the Modern Guest Experience?

Traveling today often feels like navigating a digital assembly line where every interaction is perfectly timed but utterly devoid of actual warmth or personal recognition. While technology promised to bring hosts and guests closer together, it frequently serves as a barrier that reduces a human being to a single confirmation number. The hospitality industry currently grapples with a confusing paradox:

How Will Google’s New AI Lookalike Signals Impact Your Ads?

Digital marketers are currently witnessing the complete dismantling of the traditional audience silos that once provided a sense of security and predictable reach within the Google Ads ecosystem. For years, the ability to define a specific similarity percentage offered a semblance of control over who saw an advertisement and why. However, the current transition marks the definitive end of that

Equals Money Accelerates Embedded Finance via BaaS Solutions

The global financial landscape is currently undergoing a radical transformation where the traditional barriers between commerce and banking are dissolving into a single, fluid digital experience. While the prospect of a multi-billion-dollar embedded finance market is undeniably enticing, many organizations still find their ambitious roadmaps stalled by the immense complexity of the global financial grid. Integrating financial services into non-financial