The U.S. National Institute of Standards and Technology (NIST) has announced a fundamental change to its management of the National Vulnerability Database (NVD), a cornerstone of global vulnerability management programs. Effective April 15, 2026, NIST will no longer attempt to "enrich" every submitted Common Vulnerability and Exposure (CVE) with metadata like CVSS scores, CWEs, and CPEs. Citing an exponential growth in submissions that has overwhelmed its resources, the agency is shifting to a risk-based triage model. This policy change has immediate and significant implications for cybersecurity professionals, who must now adapt their vulnerability management processes and seek alternative sources for the data that NIST will no longer universally provide.
Under the new policy, NIST will focus its analysis and enrichment efforts on a prioritized subset of vulnerabilities. The criteria for prioritization include:
CVEs that do not meet these criteria will be placed in a "Not Scheduled" state within the NVD. These entries will exist as placeholders with a CVE ID and basic description but will lack the crucial enriched data (CVSS, CPE, CWE) that automated scanners and security teams rely on for risk assessment and prioritization.
This policy change affects virtually every organization worldwide that conducts vulnerability management. This includes:
The new policy took effect immediately on April 15, 2026. NIST also announced it would retroactively move all unenriched CVEs published before March 1, 2026, into the "Not Scheduled" category to address its current backlog.
The operational impact on security teams will be substantial. The lack of universal enrichment means:
This is a policy change by a government agency, not a regulation with penalties. The "enforcement" is the reality that the NVD will no longer be the all-encompassing resource it once was.
Organizations should take the following steps to adapt to the new reality:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats