WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships CISA Announces CVE “Vulnrichment” Program to Fill CVE Enrichment Gap
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

CISA Announces CVE “Vulnrichment” Program to Fill CVE Enrichment Gap

Author: Chase Snow

Created: Thursday, May 9, 2024 - 18:25

Categories: Cybersecurity, Federal & State Resources, Security Preparedness

The recent slowdown in NIST’s National Vulnerability Database, which oversees CVE enrichment and provides the valuable cataloging of vulnerabilities that cyber professionals rely upon, has caused CISA to take action. NIST’s analysts have managed to analyze only 4523 of the 14,280 CVEs they received since the start of the year, making this an increasingly urgent problem. CISA has announced it is creating a new program, called “Vulnrichment,”, that aims to fill the CVE enrichment gap.

Analyst Comment (Jennifer Lyn Walker): Given the success of CISA’s Known Exploited Vulnerabilities (KEV) Catalog in improving patching and vulnerability management (Organizations patch CISA KEV list bugs 3.5 times faster than others, researchers find), this “Vulnrichment” program looks like something to keep an eye on.

How will CISA’s “Vulnrichment” work?

“The CISA Vulnrichment project is the public repository of CISA’s enrichment of public CVE records through CISA’s ADP (Authorized Data Publisher) container. In this phase of the project, CISA is assessing new and recent CVEs and adding key SSVC decision points,” the agency explains on the project’s GitHub repository. CISA has thus far enriched 1,300 CVEs.

Using a SSVC decision tree model CISA puts vulnerabilities into one of four categories based on exploitation status, technical impact, impact on mission essential functions, public well-being, and whether the exploitation is automatable.

CISA encourages the IT cybersecurity professional community to provide feedback on its effort, and expects the project to evolve quickly. For more details about CISA’s Vulnrichment program, visit Help Net Security.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar