WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships CISA Announces CVE “Vulnrichment” Program to Fill CVE Enrichment Gap
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

CISA Announces CVE “Vulnrichment” Program to Fill CVE Enrichment Gap

Author: Chase Snow

Created: Thursday, May 9, 2024 - 18:25

Categories: Cybersecurity, Federal & State Resources, Security Preparedness

The recent slowdown in NIST’s National Vulnerability Database, which oversees CVE enrichment and provides the valuable cataloging of vulnerabilities that cyber professionals rely upon, has caused CISA to take action. NIST’s analysts have managed to analyze only 4523 of the 14,280 CVEs they received since the start of the year, making this an increasingly urgent problem. CISA has announced it is creating a new program, called “Vulnrichment,”, that aims to fill the CVE enrichment gap.

Analyst Comment (Jennifer Lyn Walker): Given the success of CISA’s Known Exploited Vulnerabilities (KEV) Catalog in improving patching and vulnerability management (Organizations patch CISA KEV list bugs 3.5 times faster than others, researchers find), this “Vulnrichment” program looks like something to keep an eye on.

How will CISA’s “Vulnrichment” work?

“The CISA Vulnrichment project is the public repository of CISA’s enrichment of public CVE records through CISA’s ADP (Authorized Data Publisher) container. In this phase of the project, CISA is assessing new and recent CVEs and adding key SSVC decision points,” the agency explains on the project’s GitHub repository. CISA has thus far enriched 1,300 CVEs.

Using a SSVC decision tree model CISA puts vulnerabilities into one of four categories based on exploitation status, technical impact, impact on mission essential functions, public well-being, and whether the exploitation is automatable.

CISA encourages the IT cybersecurity professional community to provide feedback on its effort, and expects the project to evolve quickly. For more details about CISA’s Vulnrichment program, visit Help Net Security.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 7, 2026)

May 7, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness
Members Only

(TLP:GREEN) Gate 15 TARGET Report – Identity Centric Attacks: The Shift from Network to Identity as the Primary Attack Surface

May 7, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) CISA and Partners Release Guidance for Careful Adoption of Agentic AI Services

May 7, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar