CISA strongly recommends all organizations review and monitor the Known Exploited Vulnerability (KEV) catalog and prioritize remediation of the listed vulnerabilities to reduce the likelihood of compromise by known threat actors.
KEV catalog includes:
Organizations should also consider using automated vulnerability and patch management tools that automatically incorporate and flag or prioritize KEV vulnerabilities.