CISA strongly recommends all organizations review and monitor the Known Exploited Vulnerability (KEV) catalog and prioritize remediation of the listed vulnerabilities to reduce the likelihood of compromise by known threat actors.
- The KEV catalog is a curated list of vulnerabilities with CVE IDs that are actively being exploited in the wild.
- Its goal is to help organizations prioritize their remediation efforts toward vulnerabilities that pose immediate risk.
KEV catalog includes:
- Public CVE identifier
- Reliable evidence of active exploitation
- Clear remediation path
Organizations should also consider using automated vulnerability and patch management tools that automatically incorporate and flag or prioritize KEV vulnerabilities.