NIST Deprioritizes Pre-2018 CVEs Amid Backlog and New Threats

Article Highlights
Off On

The US National Institute of Standards and Technology (NIST) recently made a significant decision affecting the cybersecurity landscape by marking all Common Vulnerabilities and Exposures (CVEs) published before January 1, 2018, as “Deferred” in the National Vulnerability Database (NVD). This move impacts over 20,000 entries and potentially up to 100,000, signaling that these CVEs will no longer be prioritized for further enrichment data updates unless they appear in the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) catalog. NIST’s decision comes in response to an ongoing struggle with a growing backlog in processing vulnerability data, exacerbated by a 32% surge in submissions in the past year.

An Overwhelming Backlog and Strategic Reprioritization

NIST’s challenges in processing and enriching the vast amount of incoming data have delayed its goal of clearing the backlog by the end of fiscal year 2024. In response, NIST is developing new systems to handle these issues more efficiently. Industry experts consider this move practical given the complexities of managing vulnerabilities at scale. Ken Dunham from Qualys describes it as an evolution in the face of changing cyber threats. Meanwhile, Jason Soroko from Sectigo interprets this as a strategic reprioritization, with resources redirected towards addressing emerging threats, assuming that legacy issues have been mitigated through routine patch management practices. The responsibility for managing deferred CVEs now shifts more heavily onto organizations. For security teams, this means identifying and monitoring legacy systems, prioritizing the patching of deferred vulnerabilities, and hardening or segmenting outdated infrastructure. Using real-time threat intelligence to detect attempts at exploiting these vulnerabilities becomes crucial. This shift highlights a broader trend where organizations must adopt proactive risk management strategies due to the increasing volume of CVEs and limited resources available to handle them.

Embracing Advanced Technology for Improved Efficiency

In addressing its backlog, NIST is also exploring the potential use of artificial intelligence (AI) and machine learning to streamline the processing of vulnerability data. This move reflects an ongoing trend in the cybersecurity industry toward leveraging advanced technologies for more efficient management of vulnerabilities. By incorporating AI and machine learning, NIST aims to ensure that both older and newer vulnerabilities receive appropriate attention within the constraints of available resources. This nuanced approach to cybersecurity management underscores the need for a balance between addressing legacy vulnerabilities and staying ahead of emerging threats. Organizations are encouraged to adopt similar strategies, using technology to enhance their cybersecurity efforts and ensure comprehensive coverage of potential vulnerabilities. This shift in focus not only addresses immediate backlog issues but also sets the stage for more sustainable and scalable vulnerability management practices in the future.

New Paradigm for Cybersecurity Management

The US National Institute of Standards and Technology (NIST) has recently made a crucial decision that impacts the cybersecurity domain by designating all Common Vulnerabilities and Exposures (CVEs) published before January 1, 2018, as “Deferred” in the National Vulnerability Database (NVD). This adjustment affects over 20,000 entries and potentially up to 100,000, indicating that these CVEs will no longer receive prioritized updates for enrichment data unless they are listed in the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) catalog. NIST’s decision is a response to an ongoing challenge with a growing accumulation of vulnerability data, which has been aggravated by a 32% increase in submissions over the past year. This strategic shift aims to address the backlog more effectively and allocate resources more efficiently, ensuring newer and more critical vulnerabilities receive the attention they require for maintaining robust cybersecurity measures.

Explore more

Omantel vs. Ooredoo: A Comparative Analysis

The race for digital supremacy in Oman has intensified dramatically, pushing the nation’s leading mobile operators into a head-to-head battle for network excellence that reshapes the user experience. This competitive landscape, featuring major players Omantel, Ooredoo, and the emergent Vodafone, is at the forefront of providing essential mobile connectivity and driving technological progress across the Sultanate. The dynamic environment is

Can Robots Revolutionize Cell Therapy Manufacturing?

Breakthrough medical treatments capable of reversing once-incurable diseases are no longer science fiction, yet for most patients, they might as well be. Cell and gene therapies represent a monumental leap in medicine, offering personalized cures by re-engineering a patient’s own cells. However, their revolutionary potential is severely constrained by a manufacturing process that is both astronomically expensive and intensely complex.

RPA Market to Soar Past $28B, Fueled by AI and Cloud

An Automation Revolution on the Horizon The Robotic Process Automation (RPA) market is poised for explosive growth, transforming from a USD 8.12 billion sector in 2026 to a projected USD 28.6 billion powerhouse by 2031. This meteoric rise, underpinned by a compound annual growth rate (CAGR) of 28.66%, signals a fundamental shift in how businesses approach operational efficiency and digital

du Pay Transforms Everyday Banking in the UAE

The once-familiar rhythm of queuing at a bank or remittance center is quickly fading into a relic of the past for many UAE residents, replaced by the immediate, silent tap of a smartphone screen that sends funds across continents in mere moments. This shift is not just about convenience; it signifies a fundamental rewiring of personal finance, where accessibility and

European Banks Unite to Modernize Digital Payments

The very architecture of European finance is being redrawn as a powerhouse consortium of the continent’s largest banks moves decisively to launch a unified digital currency for wholesale markets. This strategic pivot marks a fundamental shift from a defensive reaction against technological disruption to a forward-thinking initiative designed to shape the future of digital money. The core of this transformation