NVD has been a cornerstone of cyber security research for years. Now, it's under threat. Here's what we know.
The National Vulnerability Database (NVD) is a crucial component of the cyber security ecosystem.
Organizations worldwide rely on the NVD to identify, assess, and mitigate vulnerabilities in their software and systems. Managed by the National Institute of Standards and Technology (NIST), it serves as the world’s most comprehensive repository of publicly known cyber security vulnerabilities.
Or, at least, it did.
Recent events have shaken confidence in the NVD’s reliability, leading to widespread concern and confusion within the cyber security community. This blog post aims to unpack the current turmoil surrounding the NVD and its implications for global cyber security.
The NVD operates by aggregating and cataloging data on known vulnerabilities from various sources, including the Common Vulnerabilities and Exposures (CVE) database. Each CVE entry includes a unique identifier for a specific vulnerability. Once a CVE is added to the NVD, it undergoes a process of enrichment, where additional details are provided, such as:
This enriched information is critical for cyber security professionals to understand the potential impact of vulnerabilities and to implement appropriate mitigations. When kept up to date, the NVD’s comprehensive and detailed entries enable organizations to stay ahead of potential threats by ensuring timely updates and patches.
Since February 12, 2024, the NVD has experienced significant disruptions in its operations. NIST halted the enrichment of Common Vulnerabilities and Exposures (CVEs) in the database. While new CVEs continued to be added, they lacked crucial metadata, such as CWE, CPE and CVSS scores.
The situation was further complicated in May 2024 when NIST attempted to upgrade the NVD to a new CVE JSON format. This transition encountered numerous issues, exacerbating the already strained system. The upgrade was intended to modernize the database and improve its functionality, but the implementation challenges only added to the confusion and frustration.
In response to these challenges, NIST announced on March 28, 2024, the formation of a new industry consortium to support and potentially take over the operation of the NVD. This consortium aims to bring together industry experts and resources to stabilize and enhance the database. Despite this announcement, the cyber security community remains concerned about the prolonged disruption and the uncertainty surrounding the NVD’s future.
The disruptions within the NVD have far-reaching implications for the cyber security community and beyond. Here are the key reasons why this crisis matters:
$4.45m
The average global cost of a data breach in 2023 rose to $4.45 million, reflecting an increase of $100,000 from 2022.
The current crisis within the NVD highlights the interconnectedness of the cyber security ecosystem. The database’s role as a central repository of vulnerability information means that any disruption has a ripple effect, impacting a wide range of stakeholders and increasing the overall risk landscape.
With the NVD being a cornerstone of cyber security research, it’s no surprise to see that this story has been making waves:
The recent issues at NVD are a reminder that security teams must think more broadly about vulnerability prioritization; the straight reality is that those IT security teams with a more mature vulnerability management program likely have the processes in place to better mitigate the fallout from NVD’s current challenges.
The Vulcan Cyber mission is to help organizations bridge this gap and take ownership of their exposure risk. Contextual prioritization provides an accurate reflection of the threats that matter most. Here are some the of factors that the Vulcan Cyber ExposureOS(TM) risk prioritization engine is built upon:
Prioritize risk based on customizable logical groups like business unit, network segment, application and/or asset type, compliance requirements, CMDB context or any other grouping relevant to your environment. The ‘Security Posture Rating’ (SPR) capability enables companies to contextualize and give priority to risks according to their specific business requirements. SPR is calculated by intelligent asset groupings and demonstrates overtime the impact of incremental vulnerability response activities.
Vulcan Cyber enriches vulnerability data with 20+ threat intelligence feeds and threat temporal factors (e.g. exploitability, usage in the wild).
Vulcan Cyber provides unique and comprehensive threat insights beyond generic and technical vulnerability criticality scores such as CVSS. For example, the platform automatically adds the EPSS score of every vulnerability.
Gain comprehensive visibility across all of your cyber attack surfaces and see vulnerability risk through the eyes of an attacker using Attack Path Graph.
To learn more about how Vulcan Cyber can enrich prioritization efforts, get a demo today.