By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechReport.grTechReport.grTechReport.gr
Search
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Reading: CISA Expands KEV Catalog with 1,484 New Vulnerabilities as Active Exploitation Surges 20% in 2025
Share
Sign In
Notification Show More
Font ResizerAa
TechReport.grTechReport.gr
Font ResizerAa
Search
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
TechReport.gr > Security > CISA Expands KEV Catalog with 1,484 New Vulnerabilities as Active Exploitation Surges 20% in 2025
Security

CISA Expands KEV Catalog with 1,484 New Vulnerabilities as Active Exploitation Surges 20% in 2025

Marizas Dimitris
Last updated: 6 Ιανουαρίου 2026 12:39
Marizas Dimitris
Share
CISA Expands KEV Catalog with 1,484 New Vulnerabilities as Active Exploitation Surges 20% in 2025
CISA Expands KEV Catalog with 1,484 New Vulnerabilities as Active Exploitation Surges 20% in 2025
SHARE


Contents
  • Understanding the KEV Catalog Framework
  • Ransomware Exploitation: A Critical Threat Vector
  • Vendor and Product Distribution Analysis
  • Common Weakness Enumeration (CWE) Patterns
  • KEV Growth
  • High-Impact Additions and Threat Intelligence

The United States Cybersecurity and Infrastructure Security Agency (CISA) has significantly expanded its Known Exploited Vulnerabilities (KEV) Catalog to 1,484 vulnerabilities as of December 2025, marking a critical milestone in the federal government’s efforts to combat actively exploited security flaws.

This comprehensive database, which began with 311 vulnerabilities in November 2021, has grown substantially over the past four years, reflecting the increasingly sophisticated threat landscape facing both public and private sector organizations.​

The KEV catalog experienced accelerated growth in 2025, with 245 new vulnerabilities added throughout the year—representing a 20% increase and more than 30% above the trend seen in 2023 and 2024.

This surge underscores the persistent and evolving nature of cyber threats, as malicious actors continue to exploit known vulnerabilities across a wide range of software and hardware platforms.

The catalog serves as a critical resource under CISA’s Binding Operational Directive (BOD) 22-01, which mandates Federal Civilian Executive Branch (FCEB) agencies to remediate listed vulnerabilities within specific timeframes.​

Understanding the KEV Catalog Framework

CISA’s KEV catalog represents a paradigm shift in vulnerability management, moving beyond traditional Common Vulnerability Scoring System (CVSS) severity ratings to focus specifically on vulnerabilities with confirmed evidence of active exploitation.

The catalog is updated regularly based on reliable intelligence that threat actors are actively using these vulnerabilities to exploit public or private organizations.​

Each vulnerability entry in the KEV catalog includes critical information such as the CVE identifier, vendor and product details, vulnerability name, date added, short description, required remediation actions, and a mandated due date for federal agencies.

Under BOD 22-01, federal agencies must remediate vulnerabilities assigned CVE IDs in 2021 or later within two weeks of addition to the catalog, while older vulnerabilities from before 2021 require remediation within six months.

While these directives are compulsory only for federal agencies, CISA strongly encourages all organizations, including private sector entities, to adopt the KEV catalog as part of their vulnerability management prioritization framework.​

Ransomware Exploitation: A Critical Threat Vector

One of the most alarming findings from the 2025 KEV catalog data is the significant role that these vulnerabilities play in ransomware campaigns. Analysis shows that 304 of 1,484 vulnerabilities (20.5%) have been exploited by ransomware groups, posing a substantial threat to organizations worldwide.

In 2025 alone, CISA marked 24 newly added vulnerabilities as known to be exploited by ransomware operators, including high-profile flaws such as CVE-2025-5777 (dubbed “CitrixBleed 2”) and multiple Oracle E-Business Suite vulnerabilities targeted by the CL0P ransomware group.​

The table below highlights the top vulnerabilities actively used in ransomware attacks:

CVE ID Vendor Product Vulnerability Type
CVE-2025-55182 Meta React Server Components Meta React Server Components Remote Code Execution Vulnerability
CVE-2025-61884 Oracle E-Business Suite Oracle E-Business Suite Server-Side Request Forgery (SSRF) Vulnerability
CVE-2025-61882 Oracle E-Business Suite Oracle E-Business Suite Unspecified Vulnerability
CVE-2025-10035 Fortra GoAnywhere MFT Fortra GoAnywhere MFT Deserialization of Untrusted Data Vulnerability
CVE-2025-49704 Microsoft SharePoint Microsoft SharePoint Code Injection Vulnerability
CVE-2025-49706 Microsoft SharePoint Microsoft SharePoint Improper Authentication Vulnerability
CVE-2025-53770 Microsoft SharePoint Microsoft SharePoint Deserialization of Untrusted Data Vulnerability
CVE-2025-5777 Citrix NetScaler ADC and Gateway Citrix NetScaler ADC and Gateway Out-of-Bounds Read Vulnerability
CVE-2019-6693 Fortinet FortiOS Fortinet FortiOS Use of Hard-Coded Credentials Vulnerability
CVE-2025-31324 SAP NetWeaver SAP NetWeaver Unrestricted File Upload Vulnerability

Microsoft leads all vendors with 100 ransomware-related vulnerabilities, followed by Fortinet with 13, Ivanti with 12, and Oracle with 11.

This concentration of ransomware-exploited vulnerabilities among major enterprise vendors highlights the critical importance of timely patch management and security updates for organizations using these widely deployed platforms.​

Vendor and Product Distribution Analysis

The KEV catalog data reveals significant disparities in vulnerability distribution across vendors, with Microsoft accounting for 350 vulnerabilities, nearly 24% of the entire catalog.

This dominance reflects Microsoft’s extensive market presence across operating systems, productivity software, and enterprise applications. Apple ranks second with 86 vulnerabilities, followed by Cisco with 82, Adobe with 76, and Google with 67.​

The vendor distribution underscores the reality that widely deployed enterprise technologies present attractive targets for threat actors. Microsoft Windows alone accounts for 159 product-specific vulnerabilities, while other frequently targeted products include Chromium V8 (37 vulnerabilities), Internet Explorer (34), Flash Player (33), and various Microsoft Office products.​

Vendor Total Vulnerabilities
Microsoft 350
Apple 86
Cisco 82
Adobe 76
Google 67
Oracle 42
Apache 38
Ivanti 30
VMware 26
D-Link 25

Interestingly, several vendors demonstrated improved security postures in 2025, with fewer vulnerabilities added compared to 2024. Adobe, Android, Apache, Ivanti, Palo Alto Networks, and VMware all saw declines in KEV additions, suggesting enhanced security controls and more robust development practices.

However, Microsoft’s count increased from 36 vulnerabilities added in 2024 to 39 in 2025, maintaining its position as the vendor requiring the most sustained remediation attention.

Common Weakness Enumeration (CWE) Patterns

Analysis of the vulnerability types represented in the KEV catalog reveals distinct patterns in the categories of flaws most frequently exploited by threat actors. The most prevalent Common Weakness Enumeration (CWE) categories provide insight into the attack vectors favored by malicious actors and the fundamental security challenges facing software development.​

CWE-20 (Improper Input Validation) leads all vulnerability types with 113 occurrences, representing approximately 7.6% of all KEV entries. This category encompasses flaws where software fails to properly validate, sanitize, or verify user-supplied input, allowing attackers to inject malicious data or commands. The prevalence of this weakness underscores persistent challenges in secure coding practices and the critical importance of robust input validation mechanisms.​

CWE-78 (OS Command Injection) ranks second with 97 instances, accounting for 18 of the 245 vulnerabilities added in 2025 alone. This vulnerability type allows attackers to execute arbitrary operating system commands, often leading to complete system compromise. The continued exploitation of command injection flaws highlights the dangers of incorporating unsanitized user input into system-level operations.​

CWE Count Description
CWE-20 113 Improper Input Validation
CWE-78 97 OS Command Injection
CWE-787 96 Out-of-bounds Write
CWE-416 86 Use After Free
CWE-119 80 Improper Restriction of Operations within Memory Bounds
CWE-22 68 Path Traversal
CWE-502 58 Deserialization of Untrusted Data
CWE-94 53 Code Injection
CWE-843 36 Access of Resource Using Incompatible Type
CWE-287 31 Improper Authentication

Memory corruption vulnerabilities also feature prominently, with CWE-787 (Out-of-bounds Write) appearing 96 times and CWE-416 (Use After Free) occurring 86 times.

These memory safety issues, predominantly found in software written in C and C++, continue to provide exploitation opportunities despite decades of security research and the availability of memory-safe programming languages.

CWE-502 (Deserialization of Untrusted Data) appears 58 times and was responsible for 14 of the 2025 additions, highlighting the risks associated with processing serialized data from untrusted sources.​

KEV Growth

The KEV catalog’s growth trajectory provides valuable insights into the evolving threat landscape and CISA’s expanding intelligence capabilities.

Following the catalog’s November 2021 launch with 311 initial vulnerabilities, 2022 saw explosive growth with 555 additions—an increase of nearly 78%. This surge likely reflected both the backlog of known exploited vulnerabilities requiring documentation and CISA’s ramping intelligence collection efforts.​

Growth subsequently stabilized in 2023 and 2024, with 187 and 186 vulnerabilities added, respectively, representing approximately 17-21% annual growth rates.

However, 2025 saw renewed acceleration, with 245 additions, marking a 20% expansion and signaling either increased vulnerability exploitation activity or enhanced detection and reporting mechanisms.​

Year Vulnerabilities Added Cumulative Total
2021 311 311
2022 555 866
2023 187 1,053
2024 186 1,239
2025 245 1,484

A notable trend in 2025 was the increased addition of older vulnerabilities to the catalog. CISA added 94 vulnerabilities from 2024 and earlier—a 45% increase from the 2023-2024 average of 65 older vulnerabilities per year.

The oldest vulnerability added in 2025 was CVE-2007-0671, a Microsoft Office Excel Remote Code Execution vulnerability, while the oldest entry in the entire catalog remains CVE-2002-0367, a privilege escalation flaw in Windows NT and Windows 2000 that continues to be exploited by ransomware groups.​

High-Impact Additions and Threat Intelligence

Throughout 2025, CISA added numerous critical vulnerabilities with significant exploitation potential. Recent additions spanning October through December highlight the breadth of affected technologies and the diverse attack vectors employed by threat actors.​

In October 2025, CISA confirmed active exploitation of five significant vulnerabilities, including CVE-2025-61884, a Server-Side Request Forgery (SSRF) vulnerability in Oracle E-Business Suite that allows attackers unauthorized access to critical data.

This flaw, with a CVSS score of 7.5, has been particularly concerning as it targets a widely deployed enterprise resource planning system used by numerous Fortune 500 companies.

Also added were CVE-2025-33073, an improper access control vulnerability in Microsoft Windows SMB Client enabling privilege escalation, and CVE-2025-2746 and CVE-2025-2747, authentication bypass issues in Kentico CMS that permit complete administrative takeover.​

September 2025 saw the addition of five diverse vulnerabilities spanning database management tools, enterprise file transfer systems, network operating systems, and core Unix utilities.

CVE-2025-10035, affecting Fortra GoAnywhere MFT, represents a deserialization vulnerability in the License Servlet component that ransomware operators have actively exploited.

CVE-2025-20352, a stack-based buffer overflow in Cisco IOS/IOS XE SNMP functionality, and CVE-2025-32463, a sudo inclusion vulnerability enabling local privilege escalation, demonstrate the continued targeting of fundamental network and operating system components.​

December 2025 additions included CVE-2025-55182, a remote code execution vulnerability in Meta’s React Server Components that has been confirmed for use in ransomware campaigns. The rapid exploitation of this relatively new framework component illustrates threat actors’ agility in weaponizing newly disclosed vulnerabilities.​

Threat intelligence from darknet forums has provided early warning signals for several KEV additions. Security researchers monitoring underground cybercrime marketplaces observed discussions of Oracle and SMB payloads labeled as “ClickFix modules” weeks before official CISA advisories, confirming that cybercriminals actively test exploits against unpatched targets before public disclosure. This darknet intelligence represents an invaluable early warning system for security teams working to stay ahead of emerging threats.​

The implications of the expanding KEV catalog extend far beyond federal agencies, though the requirements of BOD 22-01 create specific obligations for government entities.

Federal agencies must adhere to strict remediation timelines: critical vulnerabilities must be addressed within 15 calendar days of initial detection, while high-severity vulnerabilities require remediation within 30 days. For KEV-listed vulnerabilities specifically, agencies must remediate flaws with CVE IDs from 2021 onward within two weeks, while pre-2021 vulnerabilities require remediation within six months.​

CISA’s Known Exploited Vulnerabilities Catalog, now encompassing 1,484 actively exploited flaws, represents a critical resource for organizations seeking to prioritize vulnerability remediation based on real-world threat intelligence rather than theoretical risk assessments.

The 245 vulnerabilities added in 2025 mark a 20% increase and reflect the dynamic nature of cyber threats, with ransomware operators, APT groups, and opportunistic attackers continuing to weaponize known vulnerabilities across diverse technology platforms.​

The concentration of ransomware-exploited vulnerabilities among major enterprise vendors, particularly Microsoft’s 100 confirmed ransomware-related flaws, underscores the critical importance of timely patch management for widely deployed enterprise systems.

The prevalence of fundamental vulnerability classes, such as improper input validation, command injection, and memory corruption issues, highlights persistent secure coding challenges that the software industry must address through improved development practices and increased adoption of memory-safe languages.​

For federal agencies, compliance with BOD 22-01 requirements remains mandatory, with strict remediation timelines and reporting obligations.

However, the value of the KEV catalog extends far beyond federal compliance, offering all organizations actionable intelligence on the vulnerabilities most likely to be exploited in real-world attacks.

By prioritizing KEV remediation, implementing robust patch management processes, maintaining comprehensive asset inventories, and leveraging threat intelligence for early warning, organizations can significantly reduce their attack surface and resilience against the most pressing cyber threats of 2025 and beyond.​



VIA: cybersecuritynews.com

Το γαλλικό πρακτορείο Pajemploi αναφέρει παραβίαση δεδομένων που επηρεάζει 1,2 εκατομμύρια ανθρώπους
Οι «Προληπτικές Ειδοποιήσεις» του NCSC προειδοποιούν τους οργανισμούς για ελαττώματα σε εκτεθειμένες συσκευές
Το Lumma Stealer χρησιμοποιεί τα δακτυλικά αποτυπώματα του προγράμματος περιήγησης για τη συλλογή δεδομένων και για μυστικές επικοινωνίες διακομιστή C&C
Το Cloudflare επλήγη από διακοπές που επηρεάζουν τις παγκόσμιες υπηρεσίες δικτύου
Ενημερωμένη έκδοση κώδικα Microsoft Δεκεμβρίου 2025 Τρίτη
TAGGED:cyber securitycyber security newsVulnerability

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
[mc4wp_form]
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
Share
ByMarizas Dimitris
Follow:
Ο Δημήτρης είναι παθιασμένος με την τεχνολογία και τις καινοτομίες. Λατρεύει να εξερευνά νέες ιδέες, να επιλύει σύνθετα προβλήματα και να βρίσκει τρόπους ώστε η τεχνολογία να γίνεται πιο ανθρώπινη, απολαυστική και προσιτή για όλους. Στον ελεύθερο χρόνο του ασχολείται με το σκάκι και το poker, απολαμβάνοντας την στρατηγική και τη δημιουργική σκέψη που απαιτούν.
Previous Article Όλα να παίξουν ακόμα για | Γνώμη Όλα να παίξουν ακόμα για | Γνώμη
Δεν υπάρχουν Σχόλια

Αφήστε μια απάντηση Ακύρωση απάντησης

Η ηλ. διεύθυνση σας δεν δημοσιεύεται. Τα υποχρεωτικά πεδία σημειώνονται με *

Stay Connected

248.1KLike
69.1KFollow
134KPin
54.3KFollow
banner banner
Create an Amazing Newspaper
Discover thousands of options, easy to customize layouts, one-click to import demo and much more.
Learn More

Latest News

Όλα να παίξουν ακόμα για | Γνώμη
Όλα να παίξουν ακόμα για | Γνώμη
Entertainment Gaming
Απίστευτο! Cosmote TV με μόλις 13 ευρώ και χωρίς δεσμευτικά συμβόλαια!
Απίστευτο! Cosmote TV με μόλις 13 ευρώ και χωρίς δεσμευτικά συμβόλαια!
Technology
«Ανακαλύφθηκε Κρυφό Μυστήριο στο Red Dead Redemption 2 που Αφήνει άφωνους τους Παίκτες!»
«Ανακαλύφθηκε Κρυφό Μυστήριο στο Red Dead Redemption 2 που Αφήνει άφωνους τους Παίκτες!»
Technology
7 Απίθανοι Τρόποι να Χρησιμοποιήσεις το Χριστουγεννιάτικο Δέντρο σου που δεν Φαντάστηκες!
7 Απίθανοι Τρόποι να Χρησιμοποιήσεις το Χριστουγεννιάτικο Δέντρο σου που δεν Φαντάστηκες!
Android Phones Technology

You Might also Like

Security

Το πρόγραμμα περιήγησης Tor 15.0.1 κυκλοφόρησε με επιδιόρθωση για πολλαπλά τρωτά σημεία ασφαλείας

Marizas Dimitris
Marizas Dimitris
3 Min Read
Security

Νέο Nova Stealer που επιτίθεται σε χρήστες macOS ανταλλάσσοντας νόμιμες εφαρμογές για κλοπή δεδομένων πορτοφολιού κρυπτονομισμάτων

Marizas Dimitris
Marizas Dimitris
5 Min Read
Singularity Linux Kernel Rootkit με νέα δυνατότητα που αποτρέπει τον εντοπισμό
Security

Singularity Linux Kernel Rootkit με νέα δυνατότητα που αποτρέπει τον εντοπισμό

Marizas Dimitris
Marizas Dimitris
4 Min Read
//

We influence 20 million users and is the number one business and technology news network on the planet

Quick Link

  • Phones
    • iPhone – iOS
    • Android
    • Samsung
  • Computer
  • Internet
    • Security
  • Entertainment
    • Gaming
  • Business
  • Economics
    • Cryptos
  • Gadgets
  • Technology
    • Science
    • Reviews
    • How-To
  • Health
    • Psychology
  • Blog
  • My Bookmarks
  • Customize Interests
  • Home Technology
  • Contact
  • Technology Home 2
  • Technology Home 3
  • Technology Home 4
  • Technology Home 5

Support

  • Home
  • Πολιτική απορρήτου
  • Σχετικά με εμάς
  • Contact With TechReport
  • Greek Live Channels IPTV 2025

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

[mc4wp_form id=”1616″]

TechReport.grTechReport.gr
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Join Us!
Subscribe to our newsletter and never miss our latest news, podcasts etc..
[mc4wp_form]
Zero spam, Unsubscribe at any time.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?