Explore the Enriched CISA KEV Catalog
The CISA KEV Vulnerability Enrichment Dashboard enables vulnerability researchers to quickly analyze trends of known and exploitable vulnerabilities identified by CISA. The table is free to use and provides a complete list of the CISA Known Exploitable Vulnerabilities Catalog which is then enriched with CVSS, EPSS, and GreyNoise Threat Intelligence. You can easily sort, search and export the data in the table below. Give it a try!
The Dashboard above provides a complete list of the CISA Known Exploitable Vulnerabilities Catalog, as well as essential information about each vulnerability, including:
- CVE Identifier: The unique Common Vulnerabilities and Exposures (CVE) identification number assigned to each vulnerability.
- Vendor: The organization who developed the product associated with the CVE.
- Product: The product associated with the CVE.
- Date Added: The date CISA added the vulnerability to the CISA KEV list.
- Due Date: Federal organizations are required to comply with remediation dates that are set by CISA BOD 22-01. The due date reflects the date federal agencies must comply with the mandate by.
Frequently Asked Questions
Why did Nucleus create the CISA KEV Enrichment Dashboard?
We created this tool out of our own curiosity to learn more about the vulnerabilities CISA identifies on the CISA KEV catalog as the information provided by CISA is extremely limited. We believe having additional context can help organizations better understand the value of incorporating CISA KEV, Greynoise, EPSS, and other threat intelligence into vulnerability management prioritization and remediation efforts.
What is the CISA KEV (Known Exploitable Vulnerabilities) Catalog?
The CISA KEV Catalog is a managed threat intelligence source that provides a list of known exploited vulnerabilities that carry a significant risk to federal agencies. CISA KEV was developed as a part of the CISA Binding Operating Directive 22-01. The catalog is available for free from CISA and we recommend any organizations should consider using this and other threat intelligence sources to help prioritize vulnerability remediation.
What vulnerability enrichment is included on the dashboard?
Nucleus CISA KEV Vulnerability Enrichment Dashboard mirrors the CISA KEV list, and is enriched with CVSS, EPSS and GreyNoise Threat Intelligence.
How can I identify CISA Known Exploitable Vulnerabilities within my environment?
Lucky you should ask! Enriching your vulnerabilities findings data with vulnerability intelligence is a key way to prioritize vulnerability remediation efforts and significantly reduce your risk of being the victim of an exploited vulnerability. Nucleus enables you to aggregate all of your assets and vulnerabilities and quickly identify what CISA Known Exploitable Vulnerabilities are within your environment.
Watch a Demo Today
Learn more about the Nucleus Unified Vulnerability Management platform right away.
Watch our in-depth, on-demand demo to see us in action.