NVD’s Decision Changes the Practice of Vulnerability Management More Than Most Teams Realize

NIST’s April 15, 2026 update to NVD operations is easy to summarize and easy to underread. The headline change is familiar by now: NIST will continue listing all CVEs, but it will only immediately enrich a subset, prioritizing CISA KEV, software used within the federal government, and software covered by Executive Order 14028’s critical software definition. Everything else can land in NVD as “Lowest Priority - not scheduled for immediate enrichment,” and NIST will no longer routinely add a second severity score when a CNA already supplied one. NIST says CVE submissions grew 263% from 2020 to 2025, that Q1 2026 volume is nearly one-third higher year over year, and that it enriched nearly 42,000 CVEs in 2025, still not enough to keep pace. (NIST)
For people who live in vulnerability management, this is a change in where authority sits. For years, NVD was more than a database. It was the place where many teams waited for a vulnerability to become operationally legible: a CVE plus a normalized score, a CPE mapping, a CWE, reference links, and enough structure for scanners, dashboards, SLAs, and exception processes to start moving. That model is now explicitly selective, not universal. (NIST)
What actually changed
NIST’s new model has three practical consequences.
First, enrichment is now risk-triaged, not default. KEV, federal-use software, and EO 14028 critical software get priority; other CVEs may remain listed without immediate enrichment, even if they matter deeply to a specific enterprise or product team. NIST also says users can request enrichment or reanalysis by email, which is a useful escape hatch but not a scalable operating model for high-volume programs. (NIST)
Second, the old “NIST as second scorer” assumption is weaker. NIST says it will no longer routinely provide a separate severity score when the CNA already has. That reduces duplicate work, but it also means the ecosystem will lean harder on CNA scoring quality and consistency. (NIST)
Third, the backlog is being formalized, not merely tolerated. NIST said earlier backlogged CVEs with an NVD publish date before March 1, 2026 would move into a “Not Scheduled” category under the new workflow. That is not a transient queue-management artifact. It is a visible declaration that universal manual enrichment is no longer the model. (NIST)
The non-obvious implication: NVD is ceasing to be the universal translation layer
Among practitioners, the common reaction has been: “Fine, we already knew the backlog was bad.” That reaction is too shallow.
The deeper issue is that NVD historically served as a translation layer between disclosure and operations. Many enterprise workflows were not consuming raw CVE records as first-class objects. They were consuming NVD-enriched CVEs. When that translation layer becomes partial, a large amount of downstream automation becomes probabilistic. That includes CPE-based matching, severity thresholding, some forms of exception handling, and the very human process of deciding whether an issue has enough shape to escalate. SecureWorld’s writeup gets this point right: practitioners can no longer wait for NVD to provide the “final word” before acting. Inside Cybersecurity quotes Katie Moussouris making the same point more bluntly: if your risk program depended on NVD enrichment, you now have blind spots you cannot see. (SecureWorld)
This matters even more for the people who show up at conferences like VulnCon, FIRST, or VB with strong opinions about signal quality, scoring drift, exploit maturity, and disclosure hygiene. A large part of vulnerability management has been built around the assumption that someone upstream will eventually normalize the record. NIST just told the market that this assumption does not scale. (Resilient Cyber)
Why Mythos matters here, even if it is not the headline
The Mythos connection is not “AI is scary” or “AI will flood the queue.” That framing is too generic.
The more relevant point is that Anthropic’s Mythos Preview appears to meaningfully compress the time between bug discovery, exploitability assessment, and exploit construction. Anthropic says Mythos autonomously wrote a remote code execution exploit for FreeBSD’s NFS server, that non-experts inside Anthropic have used it to find remote code execution bugs overnight and wake up to complete working exploits, and that in benchmark reruns against Firefox bugs, Mythos produced working exploits 181 times where an earlier model had almost no autonomous exploit development success. Mozilla testing reported by Help Net Security says Mythos found 271 vulnerabilities in Firefox 150. (Red Anthropic)
For vulnerability management, that does not mean every AI-found issue should suddenly be treated as imminent catastrophe. It means the old rhythm of the process is being disrupted. When discovery gets cheaper and exploit analysis gets faster, the bottleneck shifts downstream into validation, normalization, deduplication, and prioritization. That is the core point in Latio’s analysis: vulnerability discovery is becoming more accessible while the enrichment infrastructure is falling further behind. Resilient Cyber makes the economics even clearer: the cost of finding a vulnerability is approaching zero, while the cost of enriching it in NVD is not. (pulse.latio.tech)
That is the real Mythos implication. It is not that Mythos breaks NVD by itself. It is that systems like Mythos accelerate the parts of the pipeline that produce candidate vulnerability information, while NVD is stepping back from being the universal place where those candidates become standardized operational objects. In other words, we are entering a period where vulnerability discovery scales faster than vulnerability meaning. (pulse.latio.tech)
This will change what “good” vulnerability management looks like
The old maturity story was often built around completeness: ingest more feeds, map more assets, patch more CVSS 7+, close more tickets. That story was already cracking. NIST’s move makes the break harder to ignore.
For mature programs, the center of gravity moves in at least four ways.
The first shift is from score-centric to evidence-centric triage. If NIST is no longer routinely supplying a second score, and if more CVEs arrive without prompt enrichment, then the question becomes less “what is the canonical score?” and more “what do we know about exploitation, exposure, affected configurations, and exploit preconditions in our environment?” That aligns with SecureWorld’s observation that vulnerability management is fundamentally a prioritization problem, not a scoring problem. (SecureWorld)
The second shift is from NVD-first to CNA-first plus verification. Many teams will need to treat CVE.org, CNA disclosures, vendor advisories, GitHub advisories, and CISA KEV as primary operational sources rather than precursors to eventual NVD enrichment. NIST itself is effectively telling the market to do this. (NIST)
The third shift is from static metadata dependency to local context synthesis. The organizations that handle this period best will not be the ones with the most feeds. They will be the ones that can combine sparse upstream records with local reality: asset inventory, package provenance, runtime exposure, internet reachability, control effectiveness, exploit telemetry, and patchability constraints. This is the practical extension of the Latio and Resilient Cyber arguments, and it is increasingly what “AI-ready vulnerability management” actually means. (pulse.latio.tech)
The fourth shift is cultural. Vulnerability management teams will have to get more comfortable operating with partial records. That means more analyst judgment, more provisional prioritization, more direct engagement with raw advisories, and less waiting for the metadata halo that used to make a CVE look settled. (NIST)
The uncomfortable part: the ecosystem may become less neutral
There is another non-obvious implication that researchers should care about. When NIST stops being the universal enrichment backstop, the ecosystem becomes more dependent on whoever is producing the context: CNAs, private enrichment vendors, platform providers, and internal risk engines.
That may improve speed. It may also reduce neutrality. NIST’s second score was imperfect, but it provided a kind of public arbitration layer. Without that, severity and scope can become more source-dependent. In many cases, the CNA is the right party to score. In some cases, it is not. The practical result is that vulnerability intelligence may become more distributed, faster in some places, and less consistent across sources. Mature teams will adapt. Less mature teams may simply replace one brittle dependency with another. (NIST)
This is why the right question for a VulnCon audience is not “is NVD dying?” It is “what replaces NVD’s function as the shared normalization and arbitration layer, and who gets to define the operational meaning of a CVE when the public system declines to do it quickly?” Right now, the honest answer is: no single actor does. (Resilient Cyber)
What teams should do now
The near-term actions are straightforward, even if the strategic shift is not:
- Audit every place your program implicitly assumes timely NVD enrichment, especially around CPE matching, SLAs, scoring thresholds, and dashboard logic. Those assumptions are now fragile. (SecureWorld)
- Treat CNA and vendor advisories as first-class inputs. Stop waiting for NVD to bless records before triage starts. (NIST)
- Use KEV and exploitation evidence more aggressively. NIST’s own prioritization logic is telling you what matters operationally. (NIST)
- Build workflows for incomplete records. If a CVE lands with weak structure but strong local relevance, your process should still move. (NIST)
- And finally, plan for AI-accelerated disclosure as a sustained condition, not a spike. Whether the source is Mythos, internal tooling, researcher pipelines, or adversarial automation, the core problem is the same: generation is getting cheaper than interpretation. (Red Anthropic)
Final thoughts
NIST’s announcement is not the end of NVD. It is the end of pretending that universal public enrichment can keep up with the modern disclosure environment. The more interesting consequence is not the backlog itself. It is that vulnerability management now has to operate with less centralized normalization at the same time that systems like Mythos are compressing discovery and exploit-analysis cycles. (NIST)
For researchers and VM practitioners, this is the real inflection point. The field is moving from a world where the database eventually caught up to one where teams must act before the record is fully standardized. That is a different discipline. It rewards source criticism, exploit literacy, environmental context, and the ability to make defensible decisions from incomplete data. The teams that adapt will not just patch faster. They will reason better.
References
- Anthropic. (2026, April 7). Claude Mythos Preview. https://red.anthropic.com/2026/mythos-preview/ (Red Anthropic)
- Beard, J. (2026, April 21). NIST announcement to scale down vulnerability enrichment efforts raises questions on alternative sources. Inside Cybersecurity. https://insidecybersecurity.com/daily-news/nist-announcement-scale-down-vulnerability-enrichment-efforts-raises-questions (Inside Cybersecurity)
- Berthoty, J. (2026, April 21). Building an AI ready vulnerability management program after NVD changes and Claude Mythos. Latio Pulse. https://pulse.latio.tech/p/building-an-ai-ready-vulnerability (pulse.latio.tech)
- CISA. (n.d.). Known Exploited Vulnerabilities Catalog. https://www.cisa.gov/known-exploited-vulnerabilities-catalog (NIST)
- Hughes, C. (2026, April 22). The NVD just threw in the towel - now what? Resilient Cyber. https://www.resilientcyber.io/p/the-nvd-just-threw-in-the-towel-now (Resilient Cyber)
- Kovacs, E. (2026, April 22). Claude Mythos finds 271 Firefox flaws, Mozilla believes it shifts security toward defenders. Help Net Security. https://www.helpnetsecurity.com/2026/04/22/claude-mythos-mozilla-vulnerabilities-scanning/ (Help Net Security)
- NIST. (2026, April 15). NIST updates NVD operations to address record CVE growth. National Institute of Standards and Technology. https://www.nist.gov/news-events/news/2026/04/nist-updates-nvd-operations-address-record-cve-growth (NIST)
- Sivesind, C. (2026, April 17). The NVD course correction: Navigating NIST’s strategic pivot for 2026. SecureWorld. https://www.secureworld.io/industry-news/nist-nvd-course-correction (SecureWorld)
Related blogs

CanisterSprawl: A Self-Propagating npm Supply Chain Worm Targeting Developer Credentials
The campaign tracked as CanisterSprawl is a supply chain intrusion in which malicious npm package versions execute at install time, harvest credentials from developer environments, exfiltrate that material to attacker-controlled infrastructure and then attempt to republish poisoned packages using stolen publisher tokens.
4

Adobe Reader Zero-Day Exploited Through Malicious PDFs
A zero-day vulnerability in Adobe Reader was actively exploited for several months through malicious PDF files. The campaign allowed attackers to steal sensitive data, fingerprint victims, deliver follow-on payloads and potentially achieve arbitrary code execution and full system compromise.
3

Malicious npm Packages Deploy Persistent Implants in Redis & PostgreSQL Environments
A newly discovered supply-chain campaign introduced 36 malicious npm packages across multiple versions disguised as Strapi plugins, designed to target Redis and PostgreSQL instances accessible within runtime environments, including localhost, to extract credentials, execute commands and deploy persistent implants.
2
A Primer on Runtime Intelligence
See how Kodem's cutting-edge sensor technology revolutionizes application monitoring at the kernel level.
Platform Overview Video
Watch our short platform overview video to see how Kodem discovers real security risks in your code at runtime.
The State of the Application Security Workflow
This report aims to equip readers with actionable insights that can help future-proof their security programs. Kodem, the publisher of this report, purpose built a platform that bridges these gaps by unifying shift-left strategies with runtime monitoring and protection.
.png)
Get real-time insights across the full stack…code, containers, OS, and memory
Watch how Kodem’s runtime security platform detects and blocks attacks before they cause damage. No guesswork. Just precise, automated protection.

