Vulnerabilities & CVEs

AI's CVE Surge & NVD's Retreat: The New Vulnerability Crisis

The vulnerability management playbook just got ripped up. AI is spitting out thousands of zero-days, while the very system meant to help us prioritize them is throwing in the towel.

Abstract digital network with data streams flowing rapidly, representing an overwhelming surge of information.

Key Takeaways

  • AI-driven discovery is accelerating CVE generation, leading to an expected 59,000 vulnerabilities in 2026.
  • NIST is drastically reducing CVE enrichment in the NVD, leaving most vulnerabilities without critical metadata like severity scores.
  • Organizations relying on traditional NVD data for prioritization will face significant blind spots, making proactive patching far more difficult.

The coffee was still steaming on the desk when the alerts started pinging, not just one or two, but a persistent, relentless cascade. It felt like the digital equivalent of a dam bursting, and we were all standing ankle-deep in the torrent.

This isn’t hyperbole, folks. April 2026 wasn’t just another month; it was the moment the vulnerability management landscape shattered. Three seismic events, happening in rapid succession, have fundamentally rewired how we’ll chase down digital threats. If your security strategy still relies on spreadsheets and a prayer, buckle up – the ride just got a whole lot bumpier.

The AI Avalanche Has Begun

First, on April 7th, Anthropic dropped Project Glasswing, a cybersecurity initiative powered by its Claude Mythos AI. The core idea? Frontier AI can sniff out zero-day vulnerabilities at a pace and scale that human researchers can only dream of. This isn’t some academic thought experiment; it’s backed by heavy hitters like CrowdStrike, Palo Alto Networks, and Cisco, and early results are, frankly, terrifyingly credible. They’re showing us that the ability to find flaws is no longer the bottleneck. No, the bottleneck has shifted, like a tectonic plate grinding into a new position.

As Forrester analysts Allie Mellen and Jeff Pollard bluntly put it: “Discovery accelerates, but inventory lags behind reality.” Their analysis, published on April 8th, was a brutal wake-up call: “The limiting factor in security is no longer the ability and knowledge to find problems — it’s the ability to absorb, prioritize, and act on them before adversaries do.”

And then, the kicker. On April 15th, NIST, the very guardian of our vulnerability intelligence, announced it’s pulling back. They’ll now only enrich CVEs in three super-specific categories: those already on CISA’s KEV catalog, software used by federal agencies, and critical software tied to Executive Order 14028. Everything else — the vast majority of the estimated 59,000 CVEs FIRST projects for 2026 — will be listed, but naked. Stripped of the metadata we’ve all come to depend on.

Think about that for a second. A CVE without a CVSS score, without CPE mapping, without CWE classification? For most of our automated tools, it’s functionally invisible. It exists, sure, but it tells you squat about its severity, what it actually affects, or the nature of the weakness. It’s like finding a locked door with no keyhole and no idea if there’s treasure or a trapdoor behind it.

The Domino Effect: AI vs. The Void

These three developments don’t just sit side-by-side; they create a devastating one-two punch. The AI-powered discovery engines, like Anthropic’s Claude Mythos and OpenAI’s GPT-5.4-Cyber, are practically printing new CVEs. Submissions are already up 33% in Q1 2026 compared to last year, and the trend is steeper than a ski slope: a 263% jump between 2020 and 2025. NIST, bless their hearts, even managed to enrich a record 42,000 CVEs in 2025, a 45% leap from previous years, but it wasn’t nearly enough to stem the tide.

So, we’re seeing an exponential increase in the number of vulnerabilities pouring into the system, precisely at the moment the public infrastructure designed to help us make sense of them is scaling back. The gap between what defenders desperately need to know and what the free, baseline intelligence can provide is widening with terrifying speed.

Is “Good Enough” Officially Dead?

For security teams running on fumes and hoping for the best, this is where it gets personal. If your patching strategy kicks off with a simple “check NVD for severity,” you’ve just discovered a gaping structural hole.

Most of those new CVEs will land with zero NIST severity assessment. If you’re relying on CVSS scores from the NVD to tell you which fires to put out first, a significant chunk of your attack surface is becoming blind to your process. The metadata you need to even see the vulnerability isn’t coming.

And for teams already buried under manual triage, relying on gut instincts, and playing whack-a-mole with whatever lands in the inbox? The math is about to get brutal. Those 48,448 CVEs from 2025? We’re looking at 59,000 this year, with some very real scenarios predicting 70,000 to 100,000. This isn’t a blip; FIRST’s forecast shows sustained increases through 2028. It’s a whole new era of vulnerability overload.

This is where companies like Tenable, who’ve long moved beyond reliance on NVD enrichment, have a distinct advantage. They saw this coming, building their own exposure intelligence infrastructure. Their customers, at least, aren’t suddenly staring into the abyss without a flashlight.

The Historical Echo: The Gutenberg Press of Vulnerabilities

It’s easy to get lost in the technical weeds, but let’s zoom out. This feels uncannily like the invention of the printing press. Before Gutenberg, knowledge was painstakingly copied by hand, a slow, deliberate process. Then, boom – information could be replicated and disseminated at an unprecedented rate. Suddenly, the bottleneck wasn’t creation; it was understanding, interpreting, and distributing all that newfound knowledge.

AI is acting as our Gutenberg press for vulnerabilities. It’s democratizing and accelerating discovery to an unimaginable degree. But unlike printed books, vulnerabilities aren’t necessarily a net positive for humanity. They are active threats waiting to be exploited. And without the corresponding infrastructure to process, prioritize, and act on them, we’re essentially handing adversaries a vastly expanded attack surface with a much shorter lead time.

The old playbook is gone. We need new tools, new processes, and a completely new mindset. The deluge is here, and survival depends on adapting. Fast.


🧬 Related Insights

Frequently Asked Questions

Will AI-driven vulnerability discovery replace human researchers?

No, but it will change their roles significantly. AI is excellent at scale and pattern recognition for finding known types of vulnerabilities or novel variations at speed. Human researchers will likely focus on more complex, nuanced exploits, reverse engineering sophisticated malware, and developing novel defense strategies. It’s a powerful augmentation, not a wholesale replacement.

What does NIST’s NVD retreat mean for small businesses?

It means small businesses will need to rely more heavily on commercial threat intelligence platforms or managed security service providers (MSSPs) that can provide the necessary enrichment and prioritization. Relying solely on the free NVD will leave them dangerously exposed to a growing number of unknown threats.

How can organizations prepare for this “flood” of vulnerabilities?

Organizations need to invest in exposure intelligence platforms that don’t depend solely on NVD data. This includes advanced asset management, real-time threat intelligence feeds that correlate vulnerabilities with exploitability, and AI-powered prioritization engines that can handle the sheer volume. Traditional manual triage processes will become unsustainable.

Maya Thompson
Written by

Threat intelligence reporter. Tracks CVEs, ransomware groups, and major breach investigations.

Frequently asked questions

Will AI-driven vulnerability discovery replace human researchers?
No, but it will change their roles significantly. AI is excellent at scale and pattern recognition for finding known *types* of vulnerabilities or novel variations at speed. Human researchers will likely focus on more complex, nuanced exploits, reverse engineering sophisticated malware, and developing novel defense strategies. It's a powerful augmentation, not a wholesale replacement.
What does NIST's NVD retreat mean for small businesses?
It means small businesses will need to rely more heavily on commercial threat intelligence platforms or managed security service providers (MSSPs) that can provide the necessary enrichment and prioritization. Relying solely on the free NVD will leave them dangerously exposed to a growing number of unknown threats.
How can organizations prepare for this "flood" of vulnerabilities?
Organizations need to invest in exposure intelligence platforms that don't depend solely on NVD data. This includes advanced asset management, real-time threat intelligence feeds that correlate vulnerabilities with exploitability, and AI-powered prioritization engines that can handle the sheer volume. Traditional manual triage processes will become unsustainable.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Tenable Blog

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.