WHY ONLY THESE VULNERABILITIES?
n many information systems, it is inconceivable (for administrators) to successfully apply patches to the entire system. Therefore, it is necessary to adopt a risk-oriented approach. In this type of approach, knowing that a vulnerability in our system is actively exploited by attackers allows obtaining the human and technical resources needed to quickly fix this flaw.
WHY CISA?
Unfortunately, in France, we lack high-quality feedback on such vulnerabilities. Therefore, I preferred to use an RSS feed from a reliable and recognized authority, even if it is American. Feel free to adapt the script to use another source.
DEFINING A KEV?
KEV (Known Exploited Vulnerabilities): Known and exploited vulnerabilities.
CRITERIA
1 - HAVE A CVE IDENTIFIER
The first criterion for adding a vulnerability to the KEV catalog is the assignment of a CVE identifier. The CVE identifier, also called CVE record, CVE name, CVE number, is a unique and common identifier for a cybersecurity vulnerability known to the public.
2 - ACTIVELY EXPLOITED
A vulnerability actively exploited is one for which there is reliable evidence that the execution of malicious code has been carried out by an actor on a system without the owner's authorization.
Events that do not constitute active exploitation, concerning the KEV catalog, include:
Scanning
Security exploit search
Proof of concept (PoC)
3 - CLEAR CORRECTION GUIDELINES
CISA adds known exploited vulnerabilities to the catalog when there is a clear action for the concerned organization to take. Measures may include updating, implementing mitigation measures, or deploying workarounds.
Last updated