Skip to content
Tech News
← Back to articles

NIST Revamps CVE Framework to Focus on High-Impact Vulnerabilities

read original get CVE-Details Vulnerability Database → more articles
Why This Matters

NIST's revamp of the CVE framework highlights the increasing challenge of managing the vast number of software vulnerabilities, shifting focus toward high-impact, risk-based prioritization. This change aims to improve cybersecurity efforts by concentrating on the most critical flaws, benefiting both industry professionals and consumers by enhancing vulnerability management and response. It underscores the need for more targeted and efficient vulnerability assessment in an era of rapid digital growth.

Key Takeaways

The National Institute of Standards and Technology (NIST) is changing its criteria for determining which software flaws fall under its Common Vulnerabilities and Exposures (CVEs) framework, citing challenges in keeping up with an ever-increasing volume of vulnerabilities.

It's not easy for enterprise defenders to know how to organize the many vulnerabilities in their environments or know where to focus their patch management activities. Many of them rely on NIST, which manages the National Vulnerability Database (NVD), to help prioritize the more critical flaws. However, NIST is also overwhelmed by the number of vulnerabilities reported daily and has struggled to classify them and assign scores based on various exploitation risk factors, such as required privileges and user interaction. There is a significant backlog, and multiple efforts over the past five years have focused on helping NIST analyze vulnerability reports and enter them into the NVD.

Related:Automotive Cybersecurity Threats Grow in Era of Connected, Autonomous Vehicles

The announcement, posted on NIST's website this week, indicate the situation may be more dire than previously understood. The agency is struggling to "keep up with growing submissions" and starting April 15, will provide details only for a subset of CVEs, NIST said.

How Will Vulnerabilities Be Prioritized?

NIST said the new approach will be "risk-based." All submitted vulnerabilities will continue to be added to the NVD, but how they will be prioritized will change. The flaws that will be analyzed will fall under one of the following categories: those that are added to Cybersecurity and Infrastructure Security Agency's Known Exploited Vulnerabilities (KEV) catalog and flaws found in critical software as defined by the Executive Order (EO 14028) on Improving the Nation's Cybersecurity. The KEV catalog lists vulnerabilities in software used by the federal government that are actively being exploited and EO 14028 prioritizes flaws based on whether they run with elevated privileges and are designed to control access or operational technology, among other criteria.

Previously, NIST provided its own severity score for all CVEs along with descriptions and affected products. That will now change "reduce duplication of effort and allow us to focus our resources more effectively."

The agency also addressed its ongoing extensive backlog challenges, which started in early 2024. NIST attributed its inability to clear the backlog to increasing submission rates. All backlogged CVEs will now be deferred and moved to the "Not Scheduled" category. One caveat: KEV are not included.

Related:Beauty in Destruction: Exploring Malware's Impact Through Art

'Real-world Exploitability'

... continue reading