Volume finally forced a model change
NIST said CVE submissions rose 263% between 2020 and 2025 and continued climbing in early 2026. That statistic matters because the NVD has long been treated as a universal enrichment layer for the industry. Once that assumption breaks, downstream security programs have to change too.
The new model focuses enrichment on KEV-listed CVEs and software used within the federal government. That is a sensible prioritization move, but it is also a signal that defenders should stop treating completeness as the default state of public vulnerability data.
Advertisement
The center of gravity shifts to exposure-aware judgment
Security teams now need stronger local context: asset inventories, exploit intelligence, internet exposure mapping, compensating controls, and faster decision-making about which issues truly threaten operations. Public databases remain essential, but they are increasingly inputs into judgment rather than substitutes for it.
This is why CISA’s KEV catalog has become more influential. It translates the abstract flood of CVEs into a smaller set of vulnerabilities with demonstrated real-world urgency. The shift rewards programs that can combine public signal with internal exposure context.
What mature programs will do next
The strongest teams will tighten their feedback loops. They will ask whether a vulnerable asset is reachable, business-critical, exploitable, and already targeted in the wild. They will also improve communication so executives understand why some medium-severity issues deserve immediate action while some high-severity issues do not.
NIST’s move should therefore be read as a modernization event, not a retreat. The industry is leaving behind a world where enrichment alone could organize the problem. The next era of vulnerability management belongs to teams that can reason faster than the queue grows.
Frequently Asked Questions
What did NIST change about NVD enrichment?
NIST said the NVD will prioritize enrichment for CVEs in CISA’s KEV catalog and software used by the federal government. The change responds to a 263% increase in CVE submissions between 2020 and 2025.
Why does this change vulnerability triage?
Teams can no longer assume every CVE will receive complete public enrichment quickly. Mature programs need to combine public data with local exposure, exploit intelligence, compensating controls, and business impact.
How should security teams respond in practice?
They should identify internet-facing assets, track KEV entries, and rank remediation by exploitability and operational importance. Executive reporting should also explain why some medium-severity issues require faster action than some high-severity ones.














