Security

CSO

NIST turns to IT consultants to clear National Vulnerability Database backlog

Aims to get CVE logjam cleared by the end of FY 24


Facing a growing backlog of reported flaws, NIST has extended a commercial contract with an outside consultancy to help it get on top of its National Vulnerability Database (NVD).

NIST has an ongoing five-year $125 million contract with Maryland-based Analygence for various bits of IT and security-related work.

That deal was amended [PDF] late last month to include support specifically for clearing the NVD backlog, which has been growing beyond the US government agency's ability to process submissions since February. The NVD being a central repository, used the world over as well as by Uncle Sam, for CVE-tagged security vulnerabilities in products.

The contract documents available online don't directly state that NIST amended Analygence's contract for NVD work, though an agency spokesperson confirmed to The Register that Analygence was the unnamed awardee mentioned in a notice last week about efforts to tackle the logjam.

According to the agency's statement last week, it hopes to reach its pre-February processing rate of CVEs within the next few months. NIST predicted it should be caught up and back to processing current CVEs by the end of the fiscal year.

The NVD backlog has been steadily building up since February when NIST quietly announced it was working to improve its tools and methods in a way that might mean users "temporarily see delays in analysis efforts." 

That message, which we noted in March, quickly drew attention as the backup became worse. As of last month, more than 93 percent of vulnerabilities submitted since February 12 remain unanalyzed, threat intelligence firm VulnCheck reported recently.

For reference, VulnCheck notes (as of May 23) that there have been 12,720 fresh vulnerabilities submitted to the NVD since February 12. That's a lot of unanalyzed flaws. 

More technology, more vulnerabilities

Despite it having been months since the problems were first identified, the what and why of the NVD hold-up is still a bit unclear. When asked if it's gleaned anything from the past few months of trying to clear the jam, NIST only pointed us to a vague update from the NVD program from late April that provides a partial explanation. 

The growing backlog, NIST said that month, "is based on a variety of factors, including an increase in software and, therefore, vulnerabilities, as well as a change in interagency support."

NIST reiterated in April it's looking for long-term solutions to deal with the influx of vulnerability reports, "including the establishment of a consortium … that can collaborate on research to improve the NVD." 

In the meantime, it's still anyone's guess what the real reason for a sudden slam of CVEs at the beginning of 2024 could be, but one thing's for sure; it's not because NIST's current staff aren't doing their jobs.

If anything, bringing in outside help is more of a tacit admission that NIST staff are already overworked. The most recent US federal government budget, which will cut NIST funding by nearly 12 percent, is unlikely to help.

Analygence told us it started work on the backlog this week, and will be helping NIST process new NVD submissions as well. ®

Send us news
5 Comments

Tired of airport security queues? SQL inject yourself into the cockpit, claim researchers

Infosec hounds say they spotted vulnerability during routine travel in the US

Check your IP cameras: There's a new Mirai botnet on the rise

Also, US offering $2.5M for Belarusian hacker, Backpage kingpins jailed, additional MOVEit victims, and more

White House’s new fix for cyber job gaps: Serve the nation in infosec

Now do your patriotic duty and fill one of those 500k open roles, please?

US sues Georgia Tech over alleged cybersecurity failings as a Pentagon contractor

Rap sheet spells out major no-nos after disgruntled staff blow whistle

Brain Cipher claims attack on Olympic venue, promises 300 GB data leak

French police reckon financial system targeted during Summer Games

Multiple flaws in Microsoft macOS apps unpatched despite potential risks

Windows giant tells Cisco Talos it isn't fixing them

Deadline looms: Google Workspace mandates OAuth by September 30

27 days to get your users' third-party apps on Google’s sign-in

RansomHub hits 210 victims in just 6 months

The ransomware gang recruits high-profile affiliates from LockBit and ALPHV

AMD reverses course: Ryzen 3000 CPUs will get SinkClose patch after all

Still no love for 1000- or 2000-series

RansomHub-linked EDR-killing malware spotted in the wild

Also: Your external-facing NetSuite sites need a review; five popular malware varieties for Q2, and more

Ransomware batters critical industries, but takedowns hint at relief

Whether attack slowdown continues downward trend is the million dollar question that security researchers can't answer

110K domains targeted in 'sophisticated' AWS cloud extortion campaign

If you needed yet another reminder of what happens when security basics go awry