web analytics

NIST Defers Pre-2018 CVEs to Tackle Growing Vulnerability Backlog – Source: www.infosecurity-magazine.com

Rate this post

Source: www.infosecurity-magazine.com – Author:

All Common Vulnerabilities and Exposures (CVEs) published before January 1 2018, will now be marked as Deferred in the National Vulnerability Database (NVD), the US National Institute of Standards and Technology (NIST) has confirmed.

CVEs assigned this status will no longer be prioritized for enrichment data updates unless they appear in the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) catalog. 

NIST said banners will be added to affected CVE pages to make the change visible. This shift began recently and has already impacted over 20,000 entries, with the total potentially reaching 100,000.

The decision comes as NIST continues to battle a growing backlog in processing vulnerability data.

Last year, it experienced a 32% surge in submissions and failed to meet its goal of clearing the backlog by the end of fiscal year 2024. The agency attributed the delay to challenges in importing and enriching incoming data efficiently.

“To address this issue, we are developing new systems that will allow us to process incoming ADP data more efficiently,” NIST said last November.

Read more on CVE data processing challenges: NIST National Vulnerability Database Disruption Sees CVE Enrichment on Hold

Experts view the move as a practical response to a complex issue.

“A movement by NIST to mark older vulnerabilities as deferred is an expected evolution of the scale of management of vulnerabilities,” said Ken Dunham, cyber threat director at Qualys Threat Research Unit.

“Organizations should take this action by NIST as an indicator of the challenge to manage and prioritize their own risk.”

Jason Soroko, Senior Fellow at Sectigo, said the decision reflects a strategic reprioritization.

“This move reallocates scarce resources toward emerging threats. It relies on the premise that legacy issues are already well documented and mitigated by routine patch management,” Soroko explained.

While the deferred CVEs will remain accessible and metadata updates can still be requested, the responsibility for managing these older vulnerabilities now rests more heavily on organizations themselves.

Security teams are advised to:

  • Identify and monitor legacy systems
  • Prioritize patching of deferred vulnerabilities where feasible
  • Harden or segment outdated infrastructure
  • Use real-time threat intelligence to detect exploitation attempts

As the volume of CVEs continues to rise, NIST is also exploring the use of AI and machine learning to streamline vulnerability data processing.

Original Post URL: https://www.infosecurity-magazine.com/news/nist-defers-pre-2018-cves/

Category & Tags: –

Views: 2

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post