Risk Management

Faster Patching Pace Validates CISA’s KEV Catalog Initiative

CISA says Known Exploited Vulnerabilities Catalog has helped federal agencies significantly accelerate their vulnerability remediation pace.

CISA says Known Exploited Vulnerabilities Catalog has helped federal agencies significantly accelerate their vulnerability remediation pace.

The Known Exploited Vulnerabilities (KEV) Catalog maintained by the US cybersecurity agency CISA has led to significant improvements in federal agencies’ patching efforts, with more than 1,000 vulnerabilities now included in the list.

Launched in November 2021, the KEV Catalog lists flaws that CISA has proof are being exploited in malicious attacks, and is accompanied by the Binding Operational Directive (BOD) 22-01, which requires federal agencies to patch newly added bugs within a specified timeframe.

Since November 2021, CISA says, federal agencies have patched over 12 million instances of KEV entries, with 7 million of them being addressed in 2023 alone.

Overall, federal agencies have experienced a 72% decrease of KEVs exposed for 45 days or more, while local governments and critical infrastructure entities have seen a 31% decrease.

According to CISA, the KEV catalog has helped federal agencies and other enrolled entities significantly accelerate their patching efforts, with mean-time-to-remediate for KEVs being nine days faster compared to that of non-KEVs. For internet-facing issues in the catalog, the remediation was 36 days faster.

The purpose of the KEV Catalog, CISA underlines, is to help organizations prioritize vulnerability management, based on how a vulnerable product is being used and the impact exploitation could have.

“A KEV in an Internet-facing web server providing privileged access to customer accounts would, reasonably, be a much higher priority for mitigation than the exact same KEV in an internal system providing unprivileged access to the organization’s cafeteria menu,” CISA explains.

While the idea behind the KEV Catalog is to reduce cybersecurity risks, organizations should not rely solely on this list when implementing a vulnerability response plan.

Advertisement. Scroll to continue reading.

CISA explains that new entries are added to the KEV Catalog only if there is irrefutable proof of in-the-wild exploitation, and if there are means to address it, such as a patch or mitigation information.

“Sometimes it’s impossible to find an official patch. In these instances, we coordinate alternative messaging to inform the public about the vulnerability with actions that should be taken so there’s something that can be done to prevent exploitation. In any event, we don’t add a vulnerability to the KEV unless there is an actionable patch or other suitable mitigation,” CISA notes.

The cybersecurity agency encourages organizations to consult decision models such as the Stakeholder Specific Vulnerability Categorization (SSVC) and prioritize vulnerability management based on them.

Moving forward, CISA is exploring the idea of adding more information on the exploitation of each vulnerability in the KEV Catalog, and to find ways to incorporate the KEV Catalog into existing tools that help organizations prioritize patching.

In time, CISA says, the addition of new entries to the catalog should become a rare occurrence, which can be achieved by implementing a secure-by-design approach that will reduce the prevalence of vulnerabilities.

“Consistent with the National Cybersecurity Strategy, we will continue to drive the ecosystem toward a future where nearly all KEVs are eliminated before a product is released to the market,” CISA notes.

Related: CISA Warns of Another Exploited Adobe ColdFusion Vulnerability

Related: CISA Tells US Agencies to Patch Exploited Roundcube, VMware Flaws

Related: CISA Instructs Federal Agencies to Secure Internet-Exposed Devices

Related Content

Vulnerabilities

CISA’s Vulnrichment project is adding important information to CVE records to help improve vulnerability management processes.

Vulnerabilities

CISA and the FBI warn of threat actors abusing path traversal software vulnerabilities in attacks targeting critical infrastructure.

Government

The White House has published a national security memorandum focusing on critical infrastructure security and resilience.

ICS/OT

Government agencies are sharing recommendations following attacks claimed by pro-Russian hacktivists on ICS/OT systems.

Artificial Intelligence

CEOs of major tech companies are joining a new artificial intelligence safety board to advise the federal government on how to protect the nation’s...

Artificial Intelligence

New CISA guidelines categorize AI risks into three significant types and pushes a four-part mitigation strategy.

Vulnerabilities

CISA warns organizations of a two-year-old Windows Print Spooler vulnerability being exploited in the wild.

Artificial Intelligence

While over 400 AI-related bills are being debated this year in statehouses nationwide, most target one industry or just a piece of the technology...

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version