In the realm of cybersecurity, staying ahead of threats is paramount.
To aid this effort, the Cybersecurity and Infrastructure Security Agency (CISA) curates the Known Exploited Vulnerability (KEV) catalog, a pivotal resource for cybersecurity community & network defenders. This catalog compiles vulnerabilities that have been actively exploited, offering insights into immediate threats. It is imperative for organizations to prioritize remediation of these vulnerabilities to thwart potential compromises by threat actors.All Federal Civilian Executive Branch (FCEB) agencies are mandated to address KEV catalog vulnerabilities under Binding Operational Directive (BOD) 22-01, all organizations, regardless of sector, can fortify their security posture by heeding these recommendations. Incorporating KEV catalog vulnerabilities into their vulnerability management plans fosters collective resilience across the cybersecurity posture of the organizations.
How to use the KEV Catalog:
Organizations should integrate the KEV catalog into their vulnerability management prioritization frameworks. This involves leveraging automated vulnerability and patch management tools that highlight or prioritize KEV vulnerabilities.The criteria for each of the three thresholds in updating the KEV Catalog are summarised as below:
- Assigned CVE ID: The process begins with the assignment of a Common Vulnerabilities and Exposures (CVE) ID. This unique identifier is issued by a CVE Numbering Authority (CNA) upon discovery of a cybersecurity vulnerability. MITRE Corporation oversees this process, with information published on the CVE and National Vulnerability Database (NVD) websites.
- Active Exploitation: A vulnerability's inclusion in the KEV catalog hinges on evidence of active exploitation in the wild. This entails unauthorized execution of malicious code by threat actors. Notably, attempted and successful exploitations are considered, while activities such as scanning or security research do not qualify.
- Clear Remediation Guidance: CISA adds vulnerabilities to the KEV catalog only when clear remediation actions are available. This typically involves applying updates per vendor instructions or, if necessary, removing affected products from networks. Mitigations may serve as temporary measures to prevent exploitation.
No comments:
Post a Comment