TOOLS / CISA KEV
CISA Known Exploited Vulnerabilities
Search the official CISA KEV catalog by CVE, vendor, or product. KEV-listed vulnerabilities are confirmed exploited in the wild — federal agencies are required to patch them within strict deadlines.
What it does
CISA’s Known Exploited Vulnerabilities (KEV) catalog is the most authoritative "patch this first" list available. Inclusion requires evidence of active exploitation in the wild — not theoretical, not POC, actually being abused. Federal civilian agencies are required by Binding Operational Directive 22-01 to patch KEV-listed CVEs by the specified due date. Even outside federal scope, KEV serves as the gold-standard prioritization signal: if it’s on this list, criminal and APT actors are exploiting it right now.
How to use it
- Search by CVE ID (e.g. "CVE-2024-3400") for a specific entry.
- Search by vendor (e.g. "fortinet", "microsoft") for all that vendor’s KEV entries.
- Search by product (e.g. "exchange", "ivanti") to see all entries for that product line.
- Click "50 most recent" to scan what’s been added in the last few weeks.
- Each result shows the required action and due date — these are federal mandates but apply to any prudent enterprise.
Common use cases
Frequently asked questions
How often is KEV updated? +
What triggers a KEV addition? +
Why isn’t a famous CVE on KEV? +
Are KEV due dates legally binding? +
Related tools
Related coverage on Ciphers Security
- CVE-2026-9082: Critical Drupal SQL Injection Under Attack on Thousands of Sites
- CVE-2026-20182: Cisco Catalyst SD-WAN CVSS 10.0 Auth Bypass Actively Exploited
- Megalodon: Supply Chain Attack Backdoors 5,561 GitHub Repos in Six Hours via CI/CD Workflow Injection
- Stolen Gemini API Keys and AI Fraud: How 'Quantum Patriot' Drained Crypto Wallets via Fake QAnon Content
- YARA-X 1.16.0: Faster Scans, Panic Fixes, and Neovim LSP Support
Free for everyone, no signup required. Tool runs at /tools/cisa-kev/ — bookmark or share.