The National Institute of Standards and Technology (NIST) announced significant progress in addressing the backlog of unanalyzed vulnerabilities in its National Vulnerability Database (NVD). However, the agency admitted that its ambitious goal of fully clearing the backlog by the end of the year is unlikely to be met.
Clearing the Backlog with Assistance
Following months of criticism over delays in analyzing thousands of critical vulnerabilities, NIST confirmed that it has successfully addressed all Known Exploited Vulnerabilities (KEVs) in its backlog. The agency credited the progress to support from the Cybersecurity and Infrastructure Security Agency (CISA) and private sector partners.
“We now have a full team of analysts on board,” NIST stated, adding that they are now processing all incoming CVEs (Common Vulnerabilities and Exposures) as they are uploaded.
Ongoing Challenges in Enrichment
Despite progress, the broader goal of clearing the backlog of both exploited and unexploited vulnerabilities remains out of reach. The primary hurdle lies in efficiently importing and enriching data from Authorized Data Providers (ADPs) like CISA. NIST acknowledged that its systems are not yet equipped to handle the data format provided by ADPs, necessitating the development of new processing systems.
“While we’ve made significant strides, our initial estimate of clearing the backlog by year-end was overly optimistic,” NIST said.
Context and Criticism
Earlier this year, it was revealed that thousands of vulnerabilities had gone unanalyzed after NIST announced cutbacks in February. Enrichment — the process of adding contextual data such as severity, affected products, and remediation information — was stalled for over 18,000 CVEs, according to researchers at VulnCheck.
This led to widespread concern across the cybersecurity industry. In April, dozens of experts addressed a letter to Congress and Commerce Secretary Gina Raimondo, urging greater funding and protection for the NVD, which they called “critical infrastructure” for cybersecurity products.
Industry Implications
Former NSA cybersecurity director Rob Joyce, who retired earlier this year, called the backlog a “significant risk” in May, warning that the lack of vulnerability analysis leaves the cybersecurity industry vulnerable to emerging threats.
Between February and September, 12,720 vulnerabilities were added to the database, but 11,885 of them remained unanalyzed, leaving security professionals with insufficient data to assess the evolving attack surface.
Moving Forward
To address these challenges, NIST is working to enhance its data processing systems, aiming for greater efficiency in handling information from ADPs. Currently, CISA remains the only officially recognized ADP listed on the CVE website.
While the backlog of exploited vulnerabilities has been cleared, NIST’s acknowledgment of ongoing inefficiencies highlights the need for sustained improvements to the NVD. As cybersecurity threats grow in complexity, ensuring that vulnerabilities are thoroughly analyzed and enriched is critical to safeguarding infrastructure and maintaining trust in the industry.
A Call for Continued Investment
Cybersecurity experts and stakeholders continue to advocate for stronger support for the NVD, emphasizing its importance in identifying, analyzing, and mitigating vulnerabilities. With the digital threat landscape constantly evolving, the need for a robust and efficient vulnerability database remains more crucial than ever.

