NIST Deprioritizes Pre-2018 CVEs Amid Backlog and New Threats

Article Highlights
Off On

The US National Institute of Standards and Technology (NIST) recently made a significant decision affecting the cybersecurity landscape by marking all Common Vulnerabilities and Exposures (CVEs) published before January 1, 2018, as “Deferred” in the National Vulnerability Database (NVD). This move impacts over 20,000 entries and potentially up to 100,000, signaling that these CVEs will no longer be prioritized for further enrichment data updates unless they appear in the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) catalog. NIST’s decision comes in response to an ongoing struggle with a growing backlog in processing vulnerability data, exacerbated by a 32% surge in submissions in the past year.

An Overwhelming Backlog and Strategic Reprioritization

NIST’s challenges in processing and enriching the vast amount of incoming data have delayed its goal of clearing the backlog by the end of fiscal year 2024. In response, NIST is developing new systems to handle these issues more efficiently. Industry experts consider this move practical given the complexities of managing vulnerabilities at scale. Ken Dunham from Qualys describes it as an evolution in the face of changing cyber threats. Meanwhile, Jason Soroko from Sectigo interprets this as a strategic reprioritization, with resources redirected towards addressing emerging threats, assuming that legacy issues have been mitigated through routine patch management practices. The responsibility for managing deferred CVEs now shifts more heavily onto organizations. For security teams, this means identifying and monitoring legacy systems, prioritizing the patching of deferred vulnerabilities, and hardening or segmenting outdated infrastructure. Using real-time threat intelligence to detect attempts at exploiting these vulnerabilities becomes crucial. This shift highlights a broader trend where organizations must adopt proactive risk management strategies due to the increasing volume of CVEs and limited resources available to handle them.

Embracing Advanced Technology for Improved Efficiency

In addressing its backlog, NIST is also exploring the potential use of artificial intelligence (AI) and machine learning to streamline the processing of vulnerability data. This move reflects an ongoing trend in the cybersecurity industry toward leveraging advanced technologies for more efficient management of vulnerabilities. By incorporating AI and machine learning, NIST aims to ensure that both older and newer vulnerabilities receive appropriate attention within the constraints of available resources. This nuanced approach to cybersecurity management underscores the need for a balance between addressing legacy vulnerabilities and staying ahead of emerging threats. Organizations are encouraged to adopt similar strategies, using technology to enhance their cybersecurity efforts and ensure comprehensive coverage of potential vulnerabilities. This shift in focus not only addresses immediate backlog issues but also sets the stage for more sustainable and scalable vulnerability management practices in the future.

New Paradigm for Cybersecurity Management

The US National Institute of Standards and Technology (NIST) has recently made a crucial decision that impacts the cybersecurity domain by designating all Common Vulnerabilities and Exposures (CVEs) published before January 1, 2018, as “Deferred” in the National Vulnerability Database (NVD). This adjustment affects over 20,000 entries and potentially up to 100,000, indicating that these CVEs will no longer receive prioritized updates for enrichment data unless they are listed in the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) catalog. NIST’s decision is a response to an ongoing challenge with a growing accumulation of vulnerability data, which has been aggravated by a 32% increase in submissions over the past year. This strategic shift aims to address the backlog more effectively and allocate resources more efficiently, ensuring newer and more critical vulnerabilities receive the attention they require for maintaining robust cybersecurity measures.

Explore more

Tether Invests in SQRIL for Stablecoin QR Code Payments

The familiar glow of a smartphone payment app often fades into a frustrating symbol of financial disconnect the moment a traveler crosses an international border, rendering a powerful digital wallet effectively useless for small, everyday purchases. This friction, born from incompatible banking systems, high currency conversion fees, and the practical difficulties of international card use for minor transactions, has long

Being Too Reliable Can Become a Career Trap

The very quality that makes a professional an indispensable team member—unwavering reliability—can paradoxically become the invisible anchor holding their career firmly in place. Many high-performers find themselves in this frustrating position, celebrated for their consistency and flawless execution, yet consistently bypassed for the roles that promise growth, influence, and leadership. They have become so good at their current job that

Leaders Ask AI Better Questions Than Their Own Teams

The resignation email from a top-performing employee often arrives as a complete shock to a leadership team that believed everything was running with exceptional efficiency, yet this jarring event is frequently the final symptom of a problem that has been quietly building for months. This phenomenon reveals a critical paradox in modern management: leaders are meticulously trained to formulate precise,

The Entry-Level Hiring Crisis Strands Gen Z

The crisp parchment of a newly earned diploma feels strangely weightless in the hands of a generation that was promised it would be the key to unlocking the future, yet now finds most doors are not only closed but have had their locks changed. For Generation Z graduates, the traditional rite of passage—transitioning from lecture halls to corner offices—has been

Global Aviation Hiring Soars Amid Complex Rules

The roar of jet engines returning to full volume across the globe signals not just a resurgence in travel, but an unprecedented and urgent search for the skilled professionals needed to keep the world flying. The global aviation industry is in the midst of a historic hiring boom, driven by soaring passenger demand and a wave of retirements creating a