Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Risk Management

Faster Patching Pace Validates CISA’s KEV Catalog Initiative

CISA says Known Exploited Vulnerabilities Catalog has helped federal agencies significantly accelerate their vulnerability remediation pace.

The Known Exploited Vulnerabilities (KEV) Catalog maintained by the US cybersecurity agency CISA has led to significant improvements in federal agencies’ patching efforts, with more than 1,000 vulnerabilities now included in the list.

Launched in November 2021, the KEV Catalog lists flaws that CISA has proof are being exploited in malicious attacks, and is accompanied by the Binding Operational Directive (BOD) 22-01, which requires federal agencies to patch newly added bugs within a specified timeframe.

Since November 2021, CISA says, federal agencies have patched over 12 million instances of KEV entries, with 7 million of them being addressed in 2023 alone.

Overall, federal agencies have experienced a 72% decrease of KEVs exposed for 45 days or more, while local governments and critical infrastructure entities have seen a 31% decrease.

According to CISA, the KEV catalog has helped federal agencies and other enrolled entities significantly accelerate their patching efforts, with mean-time-to-remediate for KEVs being nine days faster compared to that of non-KEVs. For internet-facing issues in the catalog, the remediation was 36 days faster.

The purpose of the KEV Catalog, CISA underlines, is to help organizations prioritize vulnerability management, based on how a vulnerable product is being used and the impact exploitation could have.

“A KEV in an Internet-facing web server providing privileged access to customer accounts would, reasonably, be a much higher priority for mitigation than the exact same KEV in an internal system providing unprivileged access to the organization’s cafeteria menu,” CISA explains.

While the idea behind the KEV Catalog is to reduce cybersecurity risks, organizations should not rely solely on this list when implementing a vulnerability response plan.

Advertisement. Scroll to continue reading.

CISA explains that new entries are added to the KEV Catalog only if there is irrefutable proof of in-the-wild exploitation, and if there are means to address it, such as a patch or mitigation information.

“Sometimes it’s impossible to find an official patch. In these instances, we coordinate alternative messaging to inform the public about the vulnerability with actions that should be taken so there’s something that can be done to prevent exploitation. In any event, we don’t add a vulnerability to the KEV unless there is an actionable patch or other suitable mitigation,” CISA notes.

The cybersecurity agency encourages organizations to consult decision models such as the Stakeholder Specific Vulnerability Categorization (SSVC) and prioritize vulnerability management based on them.

Moving forward, CISA is exploring the idea of adding more information on the exploitation of each vulnerability in the KEV Catalog, and to find ways to incorporate the KEV Catalog into existing tools that help organizations prioritize patching.

In time, CISA says, the addition of new entries to the catalog should become a rare occurrence, which can be achieved by implementing a secure-by-design approach that will reduce the prevalence of vulnerabilities.

“Consistent with the National Cybersecurity Strategy, we will continue to drive the ecosystem toward a future where nearly all KEVs are eliminated before a product is released to the market,” CISA notes.

Related: CISA Warns of Another Exploited Adobe ColdFusion Vulnerability

Related: CISA Tells US Agencies to Patch Exploited Roundcube, VMware Flaws

Related: CISA Instructs Federal Agencies to Secure Internet-Exposed Devices

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.