NVD battles against CVE backlog as attackers evolve their tactics

September 18, 2024
1 min read

TL;DR:

As the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) faces a backlog in processing vulnerabilities, attackers are changing tactics to exploit lesser-known vulnerabilities. The backlog is partially due to budget cuts, with 93.4% of new vulnerabilities and 50.8% of known exploited vulnerabilities still waiting on analysis. NIST has a plan to address this backlog, but security teams need to adapt their strategies to prioritize exploitability, enhance visibility, share the security burden across departments, and leverage alternative resources.

Summary:

In a recent study, it was found that the NVD is struggling to process vulnerabilities efficiently, with a significant backlog in analysis. This backlog is a result of budget cuts and the sheer volume of reported vulnerabilities. Despite these challenges, NIST has a plan in place to clear the backlog with the help of a cybersecurity analysis contract.

However, attackers are not waiting for NIST to catch up. They are shifting their focus to exploit vulnerabilities that may not be as well-known or severe, as these are often overlooked by security teams. To stay ahead of attackers, security teams need to prioritize visibility, focus on exploitability, share the security burden across departments, and leverage alternative resources such as the CISA Vulnrichment program and the CVE Program.

While NIST aims to eliminate the backlog by September 2024, there are no guarantees of success. Enterprises must adapt their security strategies to align with the changing tactics of attackers and prioritize high-risk threats to effectively mitigate cyber risks.

Latest from Blog

EU push for unified incident report rules

TLDR: The Federation of European Risk Management Associations (FERMA) is urging the EU to harmonize cyber incident reporting requirements ahead of new legislation. Upcoming legislation such as the NIS2 Directive, DORA, and