What’s going on with the National Vulnerability Database? (2024)

The National Vulnerability Database is so overwhelmed with a steadily increasing number of software and hardware flaws that the National Institute of Standards and Technology, which maintains the common vulnerabilities and exposures repository, called for a slight pause to regroup and reprioritize its efforts.

NIST scaled back the NVD program in mid-February, and is currently prioritizing analysis of the most significant or actively exploited vulnerabilities. The slowdown was precipitated by “an increase in software and, therefore, vulnerabilities, as well as a change in interagency support,” NIST said in the announcement.

The federal agency is seeking more support from within the government and reassigning staff as it assembles a public-private consortium to address long-term challenges and determine how to improve the NVD program. In the interim, the temporary delays in CVE analysis will result in less detailed analysis of vulnerabilities deemed non-urgent.

The work and output of NIST’s NVD program is remarkable. The agency reported an all-time high of 33,137 disclosures last year, a 318% increase from 2005 when the NVD first came online, according to Flashpoint research.

Government agencies, private companies, researchers and threat hunters use NVD’s standards-based vulnerability management data to automate security measurement and compliance, and assess, mitigate and spot potential risks lurking in these CVEs.

“So many folks have, honestly, probably been taking it for granted for years,” said Caitlin Condon, director of vulnerability research at Rapid7.

NVD has long been an authoritative and widely trusted source for vulnerability information, despite occasional disputes about NIST’s timeliness or transparency, CVSS scores, common platform enumeration (CPE), or root cause identification.

“Security professionals across a variety of disciplines like research and vulnerability management have come to rely on NVD,” said Emily Austin, principal security researcher at Censys. “It's built into vulnerability management tools and processes across many organizations, and its importance really can't be overstated.”

NVD slowdown creates difficulties downstream

Impacts from the NVD slowdown are expected to materialize over time, and cybersecurity experts anticipate a snowball effect as some vulnerabilities receive less attention from NIST.

Some vendors disclose very little information about vulnerabilities in their products. When NIST isn’t filling that analysis gap, the responsibility ultimately falls on threat hunters, researchers and security companies.

Other vulnerability catalogs exist, such as the Mitre Corp.’s CVE.org and the Cybersecurity and Infrastructure Security Agency’s known exploited vulnerabilities catalog, but the former doesn’t have the federal government’s official backing as a trusted source of truth and the latter is limited in scope.

“There’s value in being able to use a common language to discuss CVEs. That said, I also see concerns with having a single point of failure, as we’re experiencing now,” Austin said.

The temporary delays have already made it much more difficult for organizations to understand what software and products in their environments are vulnerable to a given CVE, according to Austin.

“Those working in vulnerability management and the tools they rely on are at a major disadvantage as a result of the NVD issues,” Austin said.

Challenges confronting the NVD

The sheer glut of vulnerabilities that NIST must analyze combined with the agency’s resource constraints has created a backlog in the NVD.

“Even before the start of the NVD slowdown, NVD has been significantly behind in analysis of the growing number of disclosures for years, often ranging from two to six weeks to analyze a given vulnerability. Over time, this gap in coverage has culminated to over 100,000 vulnerabilities missed by CVE and NVD,” Flashpoint research found.

Budget alone cannot fix NIST's constraints because people with the specialized skills required to analyze issues confronting AI, climate, communications, cybersecurity, health, infrastructure, manufacturing and quantum science are scarce. The agency has an expansive remit to promote U.S. innovation and competitiveness by advancing measurement science, standards and technology.

That kind of lofty mission requires resources.

The agency, which has a workforce of approximately 3,400 people and a fiscal year 2023 budget of $1.6 billion, is struggling to compete for and retain specialized talent in a competitive market, according to a 2023 report by the U.S. Government Accountability Office.

NIST did not answer questions about how many employees are responsible for the NVD or when it expects to complete the improvement process and return to normal operations.

A large portion of NIST’s analysis resources are spent on CPE generation, which, in theory, is work best suited for the software vendor, according to Condon.

“I would wonder whether any software vendors even know that that's their responsibility, or that they are in the best position to be doing it,” she said.

The current model isn’t working and this underscores the extent to which more entities and experts across the cybersecurity industry need to step up and rely less on NIST.

“I’m not sure what they owe us,” Condon said. “I would hope that a larger portion of our energy and brainpower and discussion goes toward understanding the process as it works today, where the pain points are, what we need it to do, and then where there are opportunities for scalability improvements.”

What’s going on with the National Vulnerability Database? (2024)

FAQs

Who runs the National Vulnerability Database? ›

Maintained by the National Institute of Standards and Technology (NIST), the NVD serves as the U.S. government repository of standards-based vulnerability management data.

What is the difference between NVD and NIST? ›

NIST maintains the National Vulnerability Database (NVD), a repository of information on software and hardware flaws that can compromise computer security. This is a key piece of the nation's cybersecurity infrastructure.

What is the national vulnerability database protocol? ›

The NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance.

Which is the national vulnerability database primarily built upon? ›

The national vulnerability database, known as the National Vulnerability Database (NVD), is primarily built upon the Common Vulnerabilities and Exposures (CVE) system. The CVE system is a standardized method for identifying and naming vulnerabilities in software and hardware products.

What is the difference between NVD and CVE? ›

Differences between CVE and NVD

The CVE list feeds into the NVD, so both are synchronized at all times. The NVD provides enhanced information above and beyond what's in the CVE list, including patch availability and severity scores.

What is the purpose of the NVD? ›

The NVD performs analysis on Cybersecurity Vulnerabilities and Exposures (CVEs) published to the CVE Dictionary. CVE is a list of publicly disclosed cybersecurity vulnerabilities launched in 1999 by MITRE Corp. CVE enables organizations to identify a baseline for their security tools coverage.

When did NIST change its name? ›

Founded as the National Bureau of Standards in 1901, it was renamed Bureau of Standards in 1903. In 1934, the word "national" was affixed again to its name. For more than 50 years it remained the National Bureau of Standards, or NBS. It became the National Institute of Standards and Technology, or NIST, in 1988.

When would you use the NVD? ›

NVD is a resource that provides detailed information about security vulnerabilities. It includes security updates, descriptions, affected systems, and links to related documentation. You can use this data source to keep your resources updated with the latest patches and repairs.

Does DoD use NIST? ›

In this publication, NIST outlines cybersecurity standards meant to protect the confidentiality and integrity of government data shared with non-federal entities. The DoD adopted the standards outlined in NIST SP 800-171, meaning that all DoD contractors now must be compliant with these cybersecurity guidelines.

Which rating is included in the national vulnerability database? ›

NVD notates qualitative severity ratings of "Low", "Medium", and "High" for CVSS v2. 0 base score ranges in addition to the severity ratings for CVSS v3.

What is the national vulnerability database dataset? ›

The NVD is the U.S. Government repository of security automation data based on security automation specifications. This data provides a standards-based foundation for the automation of software asset, vulnerability, and security configuration management; security measurement; and compliance activities.

What is a weakness in the computational logic? ›

CVE defines a vulnerability as: "A weakness in the computational logic (e.g., code) found in software and hardware components that, when exploited, results in a negative impact to confidentiality, integrity, or availability.

Who maintains the National Vulnerability Database? ›

NVD supports the Information Security Automation Program (ISAP). NVD is managed by the U.S. government agency the National Institute of Standards and Technology (NIST).

What is the meaning of NVD disputed? ›

DISPUTED. When one party disagrees with another party's assertion that a particular issue in software is a vulnerability, a CVE Entry assigned to that issue may be designated as being "DISPUTED".

What or who is the most common source of vulnerability in the security chain? ›

Network vulnerabilities come in many forms but the most common types are: Malware, short for malicious software, such as Trojans, viruses, and worms that are installed on a user's machine or a host server. Social engineering attacks that fool users into giving up personal information such as a username or password.

Who manages CVE database? ›

Founded in 1999, the CVE program is maintained by the MITRE corporation and sponsored by the U.S. Department of Homeland Security (DHS) and the Cybersecurity and Infrastructure Security Agency (CISA).

Who is responsible for vulnerability management? ›

The owner of the whole vulnerability management process is the security officer. The security officer is responsible for designing the whole process and making sure that it's getting implemented correctly.

Who manages CVSS? ›

The CVSS specifications are owned and managed by FIRST.Org, Inc. (FIRST), a US-based non-profit organization, whose mission is to help computer security incident response teams across the world.

Who owns CVE details? ›

CVE and NVD are two separate programs. The CVE List was launched by the MITRE Corporation as a community effort in 1999. The U.S. National Vulnerability Database (NVD) was launched by the National Institute of Standards and Technology (NIST) in 2005.

Top Articles
German Potato Salad {Crock Pot} - Recipes That Crock!
⏲️ 5-Minute Recipe: Easy Grape Salad
Dunhams Treestands
Lifewitceee
13 Easy Ways to Get Level 99 in Every Skill on RuneScape (F2P)
12 Rue Gotlib 21St Arrondissem*nt
What happened to Lori Petty? What is she doing today? Wiki
Lexington Herald-Leader from Lexington, Kentucky
Pike County Buy Sale And Trade
Lycoming County Docket Sheets
Vocabulario A Level 2 Pp 36 40 Answers Key
Employeeres Ual
Nestle Paystub
Where does insurance expense go in accounting?
Alexandria Van Starrenburg
Craigslist Blackshear Ga
Busted Barren County Ky
How Much You Should Be Tipping For Beauty Services - American Beauty Institute
Vintage Stock Edmond Ok
Buy Swap Sell Dirt Late Model
91 East Freeway Accident Today 2022
Aris Rachevsky Harvard
Kountry Pumpkin 29
Milanka Kudel Telegram
LCS Saturday: Both Phillies and Astros one game from World Series
Boston Dynamics’ new humanoid moves like no robot you’ve ever seen
Hellraiser 3 Parents Guide
Craigslist Rome Ny
The Eight of Cups Tarot Card Meaning - The Ultimate Guide
Bfsfcu Truecar
35 Boba Tea & Rolled Ice Cream Of Wesley Chapel
How To Make Infinity On Calculator
Nextdoor Myvidster
Tenant Vs. Occupant: Is There Really A Difference Between Them?
Mistress Elizabeth Nyc
Daily Jail Count - Harrison County Sheriff's Office - Mississippi
5 Tips To Throw A Fun Halloween Party For Adults
Spectrum Outage in Genoa City, Wisconsin
Puretalkusa.com/Amac
Dcilottery Login
Updates on removal of DePaul encampment | Press Releases | News | Newsroom
All Characters in Omega Strikers
Homeloanserv Account Login
Candise Yang Acupuncture
Phmc.myloancare.com
Willkommen an der Uni Würzburg | WueStart
American Bully Puppies for Sale | Lancaster Puppies
Plumfund Reviews
Wood River, IL Homes for Sale & Real Estate
Steam Input Per Game Setting
Msatlantathickdream
Naughty Natt Farting
Latest Posts
Article information

Author: Domingo Moore

Last Updated:

Views: 5994

Rating: 4.2 / 5 (53 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Domingo Moore

Birthday: 1997-05-20

Address: 6485 Kohler Route, Antonioton, VT 77375-0299

Phone: +3213869077934

Job: Sales Analyst

Hobby: Kayaking, Roller skating, Cabaret, Rugby, Homebrewing, Creative writing, amateur radio

Introduction: My name is Domingo Moore, I am a attractive, gorgeous, funny, jolly, spotless, nice, fantastic person who loves writing and wants to share my knowledge and understanding with you.