Security

CSO

NIST turns to IT consultants to clear National Vulnerability Database backlog

Aims to get CVE logjam cleared by the end of FY 24


Facing a growing backlog of reported flaws, NIST has extended a commercial contract with an outside consultancy to help it get on top of its National Vulnerability Database (NVD).

NIST has an ongoing five-year $125 million contract with Maryland-based Analygence for various bits of IT and security-related work.

That deal was amended [PDF] late last month to include support specifically for clearing the NVD backlog, which has been growing beyond the US government agency's ability to process submissions since February. The NVD being a central repository, used the world over as well as by Uncle Sam, for CVE-tagged security vulnerabilities in products.

The contract documents available online don't directly state that NIST amended Analygence's contract for NVD work, though an agency spokesperson confirmed to The Register that Analygence was the unnamed awardee mentioned in a notice last week about efforts to tackle the logjam.

According to the agency's statement last week, it hopes to reach its pre-February processing rate of CVEs within the next few months. NIST predicted it should be caught up and back to processing current CVEs by the end of the fiscal year.

The NVD backlog has been steadily building up since February when NIST quietly announced it was working to improve its tools and methods in a way that might mean users "temporarily see delays in analysis efforts." 

That message, which we noted in March, quickly drew attention as the backup became worse. As of last month, more than 93 percent of vulnerabilities submitted since February 12 remain unanalyzed, threat intelligence firm VulnCheck reported recently.

For reference, VulnCheck notes (as of May 23) that there have been 12,720 fresh vulnerabilities submitted to the NVD since February 12. That's a lot of unanalyzed flaws. 

More technology, more vulnerabilities

Despite it having been months since the problems were first identified, the what and why of the NVD hold-up is still a bit unclear. When asked if it's gleaned anything from the past few months of trying to clear the jam, NIST only pointed us to a vague update from the NVD program from late April that provides a partial explanation. 

The growing backlog, NIST said that month, "is based on a variety of factors, including an increase in software and, therefore, vulnerabilities, as well as a change in interagency support."

NIST reiterated in April it's looking for long-term solutions to deal with the influx of vulnerability reports, "including the establishment of a consortium … that can collaborate on research to improve the NVD." 

In the meantime, it's still anyone's guess what the real reason for a sudden slam of CVEs at the beginning of 2024 could be, but one thing's for sure; it's not because NIST's current staff aren't doing their jobs.

If anything, bringing in outside help is more of a tacit admission that NIST staff are already overworked. The most recent US federal government budget, which will cut NIST funding by nearly 12 percent, is unlikely to help.

Analygence told us it started work on the backlog this week, and will be helping NIST process new NVD submissions as well. ®

Send us news
5 Comments

Admins better Spring into action over latest critical open source vuln

Patch up: The Spring framework dominates the Java ecosystem

macOS HM Surf vuln might already be under exploit by major malware family

Like keeping your camera and microphone private? Patch up

Jetpack fixes 8-year-old flaw affecting millions of WordPress sites

Also, new EU cyber reporting rules are live, exploiters hit the gas pedal, free PDNS for UK schools, and more

Tech firms to pay millions in SEC penalties for misleading SolarWinds disclosures

Unisys, Avaya, Check Point, and Mimecast settled with the agency without admitting or denying wrongdoing

Thousands of Fortinet instances vulnerable to actively exploited flaw

No excuses for not patching this nine-month-old issue

Here's a NIS2 compliance checklist since no one cares about deadlines anymore

Only two EU members have completed the transposition into domestic law

CISA adds fresh Ivanti vuln, critical Fortinet bug to hall of shame

Usual three-week window to address significant risks to federal agencies applies

Penn State pays DoJ $1.25M to settle cybersecurity compliance case

Fight On, State? Not this time

Mozilla patches critical Firefox vuln that attackers are already exploiting

Firefixed: It's maintenance time for low-complexity, high-impact security flaw

Senator accuses sloppy domain registrars of aiding Russian disinfo campaigns

Also, Change Healthcare sets a record, cybercrime cop suspect indicted, a new Mallox decryptor, and more

Microsoft says tougher punishments needed for state-sponsored cybercriminals

Although it also reaffirmed commitment to secure-by-design initiatives

Samsung phone users under attack, Google warns

Don't ignore this nasty zero day exploit says TAG