Files
2025-11-29 17:51:02 +08:00

7.3 KiB

CISA Known Exploited Vulnerabilities (KEV) Catalog

CISA's Known Exploited Vulnerabilities (KEV) catalog identifies CVEs with confirmed active exploitation in the wild.

Table of Contents

What is KEV

The Cybersecurity and Infrastructure Security Agency (CISA) maintains a catalog of vulnerabilities that:

  1. Have confirmed active exploitation in real-world attacks
  2. Present significant risk to federal enterprise and critical infrastructure
  3. Require prioritized remediation

Key Points:

  • KEV listings indicate active, ongoing exploitation, not theoretical risk
  • Being in KEV catalog means attackers have weaponized the vulnerability
  • KEV CVEs should be treated as highest priority regardless of CVSS score

Why KEV Matters

Active Threat Indicator

KEV presence means:

  • Exploit code is publicly available or in active use by threat actors
  • Attackers are successfully exploiting this vulnerability
  • Your organization is likely a target if running vulnerable software

Prioritization Signal

CVSS vs KEV:

  • CVSS: Theoretical severity based on technical characteristics
  • KEV: Proven real-world exploitation

Example:

  • CVE with CVSS 6.5 (Medium) but KEV listing → Prioritize over CVSS 9.0 (Critical) without KEV
  • Active exploitation trumps theoretical severity

Compliance Requirement

BOD 22-01: Federal agencies must remediate KEV vulnerabilities within specified timeframes

  • Many commercial organizations adopt similar policies
  • SOC2, PCI-DSS, and other frameworks increasingly reference KEV

KEV in Grype

Detecting KEV in Scans

Grype includes KEV data in vulnerability assessments:

# Standard scan includes KEV indicators
grype <image> -o json > results.json

# Check for KEV matches
grep -i "kev" results.json

Grype output indicators:

  • dataSource field may include KEV references
  • Some vulnerabilities explicitly marked as CISA KEV

Filtering KEV Vulnerabilities

Use the prioritization script to extract KEV matches:

./scripts/prioritize_cves.py results.json

Output shows [KEV] indicator for confirmed KEV vulnerabilities.

Automated KEV Alerting

Integrate KEV detection into CI/CD:

# Fail build on any KEV vulnerability
grype <image> -o json | \
  jq '.matches[] | select(.vulnerability.dataSource | contains("KEV"))' | \
  jq -s 'if length > 0 then error("KEV vulnerabilities found") else empty end'

Remediation Urgency

BOD 22-01 Timeframes

CISA Binding Operational Directive 22-01 requires:

Vulnerability Type Remediation Deadline
KEV listed before directive 2 weeks from BOD publication
Newly added KEV 2 weeks from KEV addition
Critical KEV (discretionary) Immediate (24-48 hours)

Commercial Best Practices

Recommended SLAs for KEV vulnerabilities:

  1. Immediate Response (0-24 hours):

    • Assess exposure and affected systems
    • Implement temporary mitigations (disable feature, block network access)
    • Notify security leadership and stakeholders
  2. Emergency Patching (24-48 hours):

    • Deploy patches to production systems
    • Validate remediation with re-scan
    • Document patch deployment
  3. Validation and Monitoring (48-72 hours):

    • Verify all instances patched
    • Check logs for exploitation attempts
    • Update detection rules and threat intelligence

Temporary Mitigations

If immediate patching is not possible:

Network-Level Controls:

  • Block external access to vulnerable services
  • Segment vulnerable systems from critical assets
  • Deploy Web Application Firewall (WAF) rules

Application-Level Controls:

  • Disable vulnerable features or endpoints
  • Implement additional authentication requirements
  • Enable enhanced logging and monitoring

Operational Controls:

  • Increase security monitoring for affected systems
  • Deploy compensating detective controls
  • Schedule emergency maintenance window

Federal Requirements

Binding Operational Directive 22-01

Scope: All federal civilian executive branch (FCEB) agencies

Requirements:

  1. Remediate KEV vulnerabilities within required timeframes
  2. Report remediation status to CISA
  3. Document exceptions and compensating controls

Penalties: Non-compliance may result in:

  • Required reporting to agency leadership
  • Escalation to Office of Management and Budget (OMB)
  • Potential security authorization impacts

Extending to Commercial Organizations

Many commercial organizations adopt KEV-based policies:

Rationale:

  • KEV represents highest-priority threats
  • Federal government invests in threat intelligence
  • Following KEV reduces actual breach risk

Implementation:

  • Monitor KEV catalog for relevant CVEs
  • Integrate KEV data into vulnerability management
  • Define internal KEV remediation SLAs
  • Report KEV status to leadership and audit teams

Monitoring KEV Updates

CISA KEV Catalog

Access the catalog:

Automated Monitoring

Track new KEV additions:

# Download current KEV catalog
curl -s https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json \
  -o kev-catalog.json

# Compare against previous download
diff kev-catalog-previous.json kev-catalog.json

Subscribe to updates:

Response Workflow

KEV Vulnerability Detected

Progress: [ ] 1. Identify affected systems: Run Grype scan across all environments [ ] 2. Assess exposure: Determine if vulnerable systems are internet-facing or critical [ ] 3. Contain risk: Implement temporary mitigations (network blocks, feature disable) [ ] 4. Remediate: Deploy patches or upgrades to all affected systems [ ] 5. Validate: Re-scan with Grype to confirm vulnerability resolved [ ] 6. Monitor: Review logs for exploitation attempts during vulnerable window [ ] 7. Document: Record timeline, actions taken, and lessons learned

Work through each step systematically. Check off completed items.

Post-Remediation Analysis

After resolving KEV vulnerability:

  1. Threat Hunting: Search logs for indicators of compromise (IOC)
  2. Root Cause: Determine why vulnerable software was deployed
  3. Process Improvement: Update procedures to prevent recurrence
  4. Reporting: Notify stakeholders and compliance teams

References