The National Institute of Standards and Technology (NIST) has announced a strategic shift in its vulnerability analysis priorities to address an overwhelming surge in reported security defects. The federal agency, tasked with maintaining the National Vulnerability Database (NVD), revealed on Wednesday that it will now prioritize analysis for CVEs that meet specific high-impact criteria.
Under the new approach, NIST will focus exclusively on CVEs that appear in the Cybersecurity and Infrastructure Security Agency’s (CISA) known exploited vulnerabilities catalog, software used in the federal government, and critical software defined under Executive Order 14028. This decision aims to achieve long-term sustainability and stabilize the NVD program, which has faced significant challenges, including a funding lapse in early 2024 that temporarily halted key metadata updates for many vulnerabilities.
Despite these efforts, NIST continues to grapple with a substantial backlog of unenriched CVEs that accumulated during the funding pause and has since grown. The agency reported analyzing nearly 42,000 vulnerabilities in 2025, while CVE submissions surged by 263% from 2020 to 2025. In a blog post announcing the change, NIST warned that the trend shows no signs of slowing:
“We don’t expect this trend to let up anytime soon. Submissions during the first three months of 2026 are nearly one-third higher than the same period last year.”
Vulnerability trends underscore the urgency of NIST’s new strategy. For example, Microsoft addressed 165 vulnerabilities in a single day, marking the second-largest monthly batch of defects on record. Under the revised criteria, CVEs that do not meet NIST’s prioritization standards will still be listed in the NVD but will not receive automatic enrichment with additional details. NIST explained the rationale behind this approach:
“This will allow us to focus on CVEs with the greatest potential for widespread impact. While CVEs that do not meet these criteria may have a significant impact on affected systems, they generally do not present the same level of systemic risk as those in the prioritized categories.”
Industry Experts Acknowledge the Necessity of NIST’s Shift
Security researchers and threat hunters, including those affiliated with CVE Numbering Authorities (CNA) and vendors, view NIST’s new approach as an inevitable response to an unsustainable workload. Dustin Childs, head of threat awareness at Trend Micro’s Zero Day Initiative, commented on the necessity of the change:
“They had to do something. NIST was woefully behind on classifying CVEs and would likely never have caught up. I’m not sure if it was a herculean task or a sisyphean one, but either way, they were set up for failure under their previous system. This change allows them to prioritize their work.”
The shift in NIST’s priorities is expected to have far-reaching implications for the vulnerability research community. It may also empower private companies and organizations to take on a more prominent role as defenders seek alternative sources of vulnerability intelligence. Caitlin Condon, vice president of security research at VulnCheck, previously highlighted the broader issue of prioritization in vulnerability management. She noted that only 1% of the more than 40,000 newly published vulnerabilities cataloged by VulnCheck in 2025 were exploited in the wild, totaling just 422 defects.
NIST’s revised strategy also aims to reduce duplicative efforts across the cybersecurity landscape, ensuring that critical vulnerabilities receive the attention they demand in an era of escalating threats.