cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
akkem
Contributor III

CISA KEV Catalog and prioritize remediation

CISA strongly recommends all organizations review and monitor the Known Exploited Vulnerability (KEV) catalog and prioritize remediation of the listed vulnerabilities to reduce the likelihood of compromise by known threat actors.

  • The KEV catalog is a curated list of vulnerabilities with CVE IDs that are actively being exploited in the wild.
  • Its goal is to help organizations prioritize their remediation efforts toward vulnerabilities that pose immediate risk.

KEV catalog includes:

  1. Public CVE identifier
  2. Reliable evidence of active exploitation
  3. Clear remediation path

Organizations should also consider using automated vulnerability and patch management tools that automatically incorporate and flag or prioritize KEV vulnerabilities. 

 

 

1 Reply
mvl
Newcomer I

Thanks for the insights!