CISA Opens KEV Catalog to External Vulnerability Reports

CISA Opens KEV Catalog to External Vulnerability Reports

The Cybersecurity and Infrastructure Security Agency (CISA) has launched a new nomination form, allowing external researchers, vendors, and industry partners to submit vulnerabilities for inclusion in its Known Exploited Vulnerabilities (KEV) catalog. This move, reported by The Record by Recorded Future, broadens the input stream for CISA’s critical list of actively exploited flaws.

Historically, the KEV catalog has been a CISA-curated list, primarily informing federal agencies of urgent patching requirements. Opening it up to the broader security community acknowledges the distributed nature of vulnerability discovery and exploitation intelligence. It’s a pragmatic step to improve the catalog’s comprehensiveness and timeliness.

For defenders, this means the KEV catalog should become an even more robust and current resource. The attacker’s calculus remains the same: find and exploit zero-days or N-days before patches are widely deployed. CISA’s initiative aims to shrink that window by accelerating the identification of exploited vulnerabilities, pushing organizations to patch critical flaws faster.

What This Means For You

  • Your organization's patching strategy must prioritize KEV catalog entries. If CISA, with external help, identifies a vulnerability as actively exploited, it means attackers are already weaponizing it. Regularly cross-reference your asset inventory against the KEV catalog and ensure immediate patching for any identified overlaps.

Related ATT&CK Techniques

Indicators of Compromise

IDTypeIndicator
Advisory Security Patch Known Exploited
Take action on this incident
📡 Monitor cisa.gov Free · 1 watchlist slot · instant alerts on new breaches 🔍 Threat intel on Cybersecurity and Infrastructure Security Agency All breaches, IOCs & vendor exposure

Related coverage on Cybersecurity and Infrastructure Security Agency

Ghostwriter Targets Ukraine Government with Prometheus Phishing

The Belarus-aligned threat actor, Ghostwriter (also tracked as UAC-0057 and UNC1151), is actively targeting Ukrainian government entities. According to The Hacker News, this group is...

threat-intelvulnerabilitymalwarephishing
/SCW Vulnerability Desk /MEDIUM /⚑ 3 IOCs /⚙ 3 Sigma

Huawei Router Flaw Triggered Telecom Blackout, SecurityWeek Reports

SecurityWeek reports on a critical flaw in Huawei routers that led to a significant telecom blackout. While details are sparse, the incident underscores the inherent...

threat-intelvulnerabilityidentity
/SCW Vulnerability Desk /MEDIUM /⚑ 3 IOCs /⚙ 3 Sigma

Trend Micro Apex One Zero-Day Under Active Exploitation

Trend Micro has confirmed a zero-day vulnerability in its Apex One security product, actively exploited on Windows systems. BleepingComputer reports that this critical flaw allows...

threat-inteldata-breachmalwarevulnerabilitymicrosoft
/SCW Vulnerability Desk /HIGH /⚑ 2 IOCs /⚙ 3 Sigma