Sending Logs, Alerts, and Telemetry Through a Data Diode

Find Out How
We utilize artificial intelligence for site translations, and while we strive for accuracy, they may not always be 100% precise. Your understanding is appreciated.

Your Vulnerability Coverage Gap Just Expanded

By OPSWAT
Share this Post

For two decades, the NVD (National Vulnerability Database) served as the de facto foundation of vulnerability management. Scanners, SIEMs, patch tools, compliance frameworks, all relied on the assumption that when a CVE appeared in NVD, NIST's analysts would promptly add the severity scores, product version mappings, and contextual metadata that make a raw CVE ID actually useful.

On April 15, 2026, that assumption officially stopped being reliable.

NIST announced that the NVD is shifting to a risk-based enrichment model. Most new CVEs entering the database will no longer receive NIST-added CVSS score, no CPE product mapping, and no independent analysis by default. For organizations whose vulnerability workflows depend on NVD-enriched data, this creates a real and growing coverage problem. For security product developers and vendors who embed that data into their tools, it raises an even more pointed question: what exactly is your feed telling you now?

NVD Can No Longer Keep Up with Reported Vulnerabilities

According to NIST’s own announcement, CVE submissions increased 263% between 2020 and 2025, and submissions in the first quarter of 2026 were already running nearly one-third higher than the same period a year earlier.

NIST enriched nearly 42,000 CVEs in 2025, a 45% increase from any prior year. But this increased productivity has not been enough to keep up with growing submissions, resulting in a formalized triage system.

Starting April 15, 2026, NIST will only enrich vulnerabilities that appear in CISA's KVE (Known Exploited Vulnerabilities) catalog, software used by the federal government, or software designated as critical under Executive Order 14028. Everything else will be listed in the NVD but without NIST-added enrichment and will not be immediately processed.

Consequently, nearly 300,000 backlogged CVEs published before March 1, 2026 have been moved into a "Not Scheduled" category wholesale.

For CVEs falling outside NIST's priority criteria going forward, severity scores will now come from whatever was self-reported by the CVE Numbering Authority, often the vendor of the affected software, rather than from an independent NIST analysis. NIST will also stop recalculating severity scores when a CNA has already provided one.

Every major vulnerability scanner, every SIEM correlation rule, every third-party risk score, and every regulatory compliance framework from PCI DSS to FedRAMP depends on the NVD enrichment pipeline.

With the update, that pipeline has now formally narrowed, leading to potentially dangerous CVEs not being catalogued as such, or discovered in due time.

There's an additional acceleration factor worth understanding, as the reduction in enrichment is colliding with the rapid proliferation of AI-assisted threat discovery.

Advanced AI models and coding tools are significantly lowering the barrier for identifying exploitable weaknesses and complex attack paths in applications, driving a spike in CVE disclosures. In February 2026, the Forum of Incident Response and Security Teams (FIRST) forecast a record-breaking 50,000 additional CVEs to be reported in 2026. Current enrichment infrastructure is not equipped to handle this volume at previous quality levels.

Why Products Built on NVD Alone Have a Problem

A raw CVE record typically includes an ID, a description, and references. The metadata that drives automated vulnerability management has historically come from NVD's analysts. This data refers to independently validated CVSS severity scores, CPE product mappings, and CWE weakness classifications.

But "enrichment" is what makes a CVE actionable. Without it, workflows that depend on it degrade in predictable ways.

CVSS-Based Prioritization Weakens

When a scanner or patching tool expects an NVD-provided severity score and finds none, the vulnerability may surface as "unknown severity," fall outside SLA-driven patch policies, or get deprioritized.

NIST's April 2026 update confirmed that:

  • CVEs outside the new priority criteria won't automatically receive independent scoring
  • NIST will no longer generate its own CVSS score when a CNA has already supplied one (even if that CNA is the vendor of the affected software)

Weak or Missing CPE Mapping Causes Poor CVE Detection

NVD's own documentation describes product identification as a fundamental part of enrichment because it lets consumers programmatically check whether a known vulnerability affects products in their environment.

If CPE mappings are absent, incomplete, or delayed, tools that rely primarily on CPE matching may fail to surface the match, surface it late.

Security product vendors are among the most affected, since their products often depend on CPE matching, and CVE enrichment. Patch management, endpoint protection, network access control, and asset management tools rely on accurate vulnerability intelligence to determine what is affected, how severe the issue is, and what action should be taken next.

For teams building new security products, starting with NVD alone means building on a foundation where key gaps may already exist: limited zero-day coverage, missing enrichment for a growing share of CVEs, and update cycles that may struggle to keep pace with AI-speed vulnerability discovery and exploitation.

For teams that already have patching or remediation capabilities, the risk is different but just as important. A remediation engine is only as effective as the vulnerability intelligence it receives. If that intelligence is incomplete, delayed, or overly dependent on NVD-derived enrichment, downstream workflows may miss affected products, deprioritize unknown-severity vulnerabilities, or fail to act before exposure increases.

If those products inherit NVD's blind spots, those blind spots could be inherited by every downstream customer.

That is the gap OESIS Framework Vulnerability Assessment was designed to address: helping security product teams strengthen vulnerability intelligence without relying on NVD enrichment alone.

How OPSWAT Approaches This Differently

OPSWAT designed the OESIS Framework Vulnerability Assessment module specifically for security product developers who need reliable, actionable vulnerability data embedded in their tools.

Designed Around the Gap

The module aggregates multiple sources, instead of relying on a single source.

It leverages a variety of commercial and open vulnerability sources to ensure timely, accurate coverage across hundreds of vendors and applications.

The OESIS vulnerability catalog currently covers over 65,000 unique CVEs and more than 150,000 vulnerability instances, and is updated on a continuous basis — multiple times daily — rather than waiting for NVD processing cycles.

A proprietary severity score that goes beyond CVSS, providing more context.

OPSWAT's vulnerability data includes the OPSWAT Severity Score, a proprietary rating that goes beyond the CVSS base by incorporating additional signals, including CVE popularity, compromised risk, and CVE lifecycle.

In an environment where a growing share of CVSS scores could be CNA-self-reported, this independent layer of analysis could help security products give their users a more defensible prioritization signal.

OESIS vulnerability intelligence supports two integration paths, with no complex ramp-up:

  • Catalog Feed: Match OESIS vulnerability data against your existing software inventory server-side — no endpoint agent required. Existing products with software inventory capabilities can use OESIS data to detect vulnerabilities across managed assets.
  • Endpoint SDK (Software Development Kit): Embed the OESIS Framework directly into your product for real-time, on-device vulnerability detection. Well-suited for security products that run on the endpoint

Internal vulnerability research

OPSWAT's internal threat research team, Unit 515, conducts ongoing offensive security research, adversarial simulation, advanced testing, and responsible disclosure across critical infrastructure and enterprise software. The team has identified and reported more than 50 zero-day vulnerabilities, including critical findings in widely deployed software such as ICS/OT platforms like Delta PLCs and AI-native platforms.

The net effect for security product developers is that their tools could maintain broader vulnerability coverage even as NVD's enrichment scope narrows — without requiring customers to accept reduced visibility or manual workarounds.

Detection + Remediation: The Full Loop

Detection identifies what is vulnerable. Remediation fixes it. Together, they help close the risk loop as much as possible. OESIS Vulnerability Assessment handles detection and prioritization. OESIS Patch Management is available for teams that want both capabilities under one framework:

  • Detection: Vulnerable applications, version-matched, OPSWAT Score-ranked, and KEV-flagged
  • Prioritization: OPSWAT Score helps surface what to fix first, based on real-world exploitation signals
  • Remediation: Your existing pipeline can act on the OESIS output — or OESIS Patch Management can patch, enforce versions, or block access directly
  • Verification: OESIS re-scans post-fix to help confirm the endpoint is clean before access is restored

Detection without remediation is a report. Detection with remediation is a resolved risk. OESIS aims to give your product both, helping close detection and remediation loops more quickly to better match AI-speed threats.

AI-Speed Vulnerabilities Need AI-Speed Discovery

Security products cannot afford to treat vulnerability intelligence as a slow-moving backend dependency. As CVE volume grows and enrichment becomes less consistent, product teams need a way to keep detection, prioritization, and remediation workflows aligned with real-world exposure.

That is where OESIS Framework Vulnerability Assessment fits. It gives product builders a practical way to strengthen vulnerability coverage without rebuilding their endpoint or remediation stack from scratch. For teams launching a new product, it can help establish credible coverage earlier. For teams improving an existing product, it offers a lower-friction way to compare coverage, validate improvements, and decide what deeper integration should look like.

Explore the OESIS Framework

Stay Up-to-Date With OPSWAT!

Sign up today to receive the latest company updates, stories, event info, and more.