National Vulnerability Database Backlog Highlights Need for Proactive Security Measures

Understanding the impact of the NVD backlog on cybersecurity measures, plus the latest security alerts.  

Welcome to the April Security Update from Origina Security Services. This month, we are examining the importance of proactive software security measures, as well as sharing up-to-date information on recent security alerts. 

 

Understanding the NVD Backlog 

The National Vulnerability Database (NVD) is the U.S. government database of standards-based vulnerability management data using Security Content Automation Protocol (SCAP). The NVD includes catalogs of security checklist references, security-related software flaws, product names, and impact metrics.  

Recently, the NVD has been experiencing significant backlogs in processing and analyzing reported vulnerabilities. This has led to concerns within the cybersecurity community. 

Last year, the NVD began experiencing delays in processing new vulnerabilities. By May 2024, reports indicated that 93.4% of new vulnerabilities had not been analyzed, and 50.8% of known exploited vulnerabilities were still awaiting assessment. This backlog was attributed to various factors, including an increase in reported vulnerabilities and changes in support.   

To address this issue, the National Institute of Standards and Technology (NIST) the organization that operates the National Vulnerability Database, awarded a contract to Analygence in late May 2024, with the goal to clear the congestion. Despite these efforts, thousands of CVEs have yet to be analyzed. 

Origina’s approach 

 In light of these delays, Origina has taken a proactive stance to ensure our customers remain protected against emerging threats. Our Vulnerability Advisory Service is designed to monitor security bulletins and respond with solutions that mitigate identified threats. Despite the delays experienced by the NVD backlog, Origina’s team of security experts have been able to promptly inform customers of new critical security threats affecting their organizations.  

Additionally, our Vulnerability Advisory Portal provides customers with unlimited access to proactive mitigation advisories, even in scenarios where original equipment manufacturer (OEM) patches or fixes are unavailable. The VA Portal offers up-to-date threat intelligence and mitigation strategies, regardless of the product version or third-party components involved.  

While the National Vulnerability Database plays a crucial role in maintaining cybersecurity standards, current backlogs highlight the need for organizations to adopt proactive measures. Origina remains committed to delivering timely and effective vulnerability advisories, ensuring that our customers are well-protected against potential threats, despite delays in external databases. 

 

Recent security alerts 

Here are links to the latest and updated software security vulnerabilities available through the Origina Vulnerability Advisory Portal. 

The Vulnerability Advisory Portal is a vital resource, offering unlimited access to proactive mitigation advisories, even when OEM patches or fixes are unavailable. You’ll also find hardening guides and publications with regularly updated information on secure configurations and regulations. 

Ask Origina how we can assist with new functionalities, policy compliance, or regulatory needs — from MFA integration to advanced cryptographic implementation. 

Common Vulnerabilities and Exposures (CVE) ID
(Click on ID to open in Origina VA Portal)
Security Alert
Common Vulnerability Scoring System (CVSS) Score
Affected Versions
vCenter Server Appliance versions prior to 7.0 update 3k is affected by local privilege escalation vulnerability.
9.8
vCenter Server Appliance versions prior to 7.0 update 3k
VMware Avi Load Balancer versions 30.1.1, 30.1.2, 30.2.1 and 30.2.2 are affected by an unauthent-icated Blind SQL Injection Vulnerability.
8.5
VMware Avi Load Balancer 30.1.1, 30.1.2, 30.2.1,30.2.2 
VMware NSX versions 3.x and 4.x are affected by a Local Privilege Escalation Vulnerability. 
6.7
VMware NSX 3.x, VMware NSX 4.x
VMware Aria Operations for Logs (Versions Affected: 8.18 and earlier). 
6.8
VMware Aria Operations for Logs versions 8.18 and earlier
VMware Aria Operations for Logs version 8.x are affected by privilege escalation vulnerability.
5.3
8.x 
VMware Aria Operations for Logs 8.18.2 and earlier versions affected by stored cross-site scripting vulnerability.
5.2
VMware Aria Operations for Logs versions 8.18.2 and earlier.
VMware Aria Operations versions 8.x before 8.18.3 are affected by an information disclosure vulnerability.
7.7
VMware’s Aria Operations versions 8.x to 8.18.3
VMware ESXi and Workstation versions 7.0 and 8.0 are affected by a TOCTOU race condition vulnerability.
9.3
VMware ESXi and Workstation versions 7.0 and 8.0 
VMware ESXi versions 7.0 and prior are affected by an arbitrary write vulnerability.
8.2
VMware ESXi 7.0 and 8.0 (and earlier)
VMware ESXi versions 7.0 and 8.0 are affected by memory leak and potential injection attacks.
7.1
VMware ESXI versions 7.0 and 8.0
IBM WebSphere Application Server Versions 7.0, 8.0, 8.5, and 9.0, as well as WebSphere Application Server Liberty Versions 17.0.0.3 through 22.0.0.9, are vulnerable to cross-site scripting attacks (XSS).
5.4
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 and the Liberty version 17.0.0.3 to 22.0.0.9
IBM WebSphere Application Server Liberty and Open Liberty versions 17.0.0.3 through 22.0.0.7 are affected by an identity spoofing vulnerability.
5.0
IBM WebSphere Application Server Liberty and Open Liberty 17.0.0.3 through 22.0.0.7
IBM Storage Protect version 8.1 is affected by an out of bounds read/write and injection vulnerability.
7.3
IBM Storage Protect version 8.1
vCenter versions 7.0.x prior to 7.0 update 3c, 6.7.x  prior to 6.7 update 3q, and 6.5.x prior to 6.5 update 3s are affected by a remote code execution vulnerability.
10.0
vCenter versions 7.0.x prior to 7.0 update 3c, 6.7.x prior to 6.7 update 3q, and 6.5.x prior to 6.5 update 3s 
vCenter versions 7.0.x prior to 7.0 update 3c, 6.7.x  prior to 6.7 update 3q, and 6.5.x prior to 6.5 update 3s are affected by a remote code execution vulnerability. 
9.0
 vCenter versions 7.0.x prior to 7.0 update 3c, 6.7.x prior to 6.7 update 3q, and 6.5.x prior to 6.5 update 3s 

Important Update on CVE-2025-22230 and VMware Tools 

CVE-2025-22230 opens the door for a malicious actor with non-administrative privileges on a Windows guest virtual machine to perform certain high-privilege operations within that VM. 

One critical point is that VMware Tools is freely accessible to anyone with a Broadcom login, even without an active support contract. This raises concerns in environments where VM access isn’t strictly controlled. Additionally, VMware Tools is versioned separately from VMware Fusion or ESXi, meaning security fixes—like version 12.5.1, that addresses this CVE—can be applied even if the hypervisor hasn’t been updated. 

For more information, please visit our Vulnerability Advisory Portal.

 

Security is at the heart of everything we do. Our focus goes beyond addressing individual risks and vulnerabilities. If you’re facing a security, risk, or regulatory challenge and need expert guidance, we’re here to help. Reach out to your Customer Success Manager or submit a request through the Origina SelfService Portal. 

FOR THE LATEST TECHNOLOGY TIPS SUBSCRIBE TO OUR NEWSLETTER - THE UPTIME

Gain insight into industry-only news, access to webinars, tips and tricks, blog posts, podcasts, and guides, surrounding topics like cybersecurity, reducing software support and maintenance costs and much more, all delivered to your inbox each month.

LEARN MORE