Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA KEV Catalog Expanded 20% in 2025, Topping 1,480 Entries

CISA KEV Catalog Expanded 20% in 2025, Topping 1,480 Entries

Posted on January 5, 2026January 5, 2026 By CWS

The US cybersecurity company CISA is now conscious of 1,484 software program and {hardware} vulnerabilities which have been exploited within the wild.

All through 2025, the company added 245 safety defects to its Identified Exploited Vulnerabilities (KEV) listing, together with 24 bugs which have been exploited in ransomware assaults.

CISA’s KEV listing has been rising steadily since its public launch in November 2021, and final 12 months marked its largest growth fee over a three-year interval, at 20%.

“After an preliminary surge of added vulnerabilities after the database first launched, progress stabilized in 2023 and 2024, with 187 vulnerabilities added in 2023 and 185 in 2024,” cybersecurity agency Cyble explains.

Many of the weaknesses added to the KEV catalog in 2025 have been new vulnerabilities, however CISA didn’t ignore older bugs both. Final 12 months, 94 flaws disclosed in 2024 and prior have been added to the listing.

The oldest vulnerability added to the CISA KEV in 2025 was CVE-2007-0671, a distant code execution (RCE) difficulty in Microsoft Workplace.

As Cyble notes, “the oldest vulnerability within the catalog stays one from 2002 – CVE-2002-0367, a privilege escalation vulnerability within the Home windows NT and Home windows 2000 smss.exe debugging subsystem that has been identified for use in ransomware assaults.”

Of the 24 safety defects exploited by ransomware teams, the extensively exploited CitrixBleed 2 (CVE-2025-5777) and Oracle E-Enterprise Suite (CVE-2025-61882 and CVE-2025-61884) flaws stand out, primarily as a consequence of their broad affect.Commercial. Scroll to proceed studying.

New vulnerabilities in Fortinet, Ivanti, Microsoft, Mitel, SAP, and SonicWall merchandise have been focused in ransomware assaults as effectively.

Cyble’s evaluation of the 2025 additions to the CISA KEV listing reveals that OS command injection, deserialization of untrusted knowledge, path traversal, use-after-free, out-of-bounds write, XSS, code injection, and improper authentication have been probably the most distinguished kinds of bugs.

Federal companies, organizations of all sizes, and software program builders ought to monitor the KEV listing to higher defend their environments and improve consciousness of the most typical weaknesses that risk actors are focusing on in assaults.

Associated: CISA Warns of Exploited Flaw in Asus Replace Instrument

Associated: CISA Warns of ScadaBR Vulnerability After Hacktivist ICS Assault

Associated: CISA Confirms Exploitation of Latest Oracle Identification Supervisor Vulnerability

Associated: CISA Updates Steerage on Patching Cisco Units Focused in China-Linked Assaults

Security Week News Tags:Catalog, CISA, Entries, expanded, KEV, Topping

Post navigation

Previous Post: Cyberattack on Higham Lane School Forced to Close its Doors to all Students and Staff
Next Post: Gmail to Drop POP3 mail Fetching to Collect Mail from other Email Accounts

Related Posts

CrewAI Flaws Enable Remote Code Attacks CrewAI Flaws Enable Remote Code Attacks Security Week News
Critical Vulnerabilities Patched in Trend Micro Apex Central, Endpoint Encryption Critical Vulnerabilities Patched in Trend Micro Apex Central, Endpoint Encryption Security Week News
Adobe Issues Out-of-Band Patches for AEM Forms Vulnerabilities With Public PoC Adobe Issues Out-of-Band Patches for AEM Forms Vulnerabilities With Public PoC Security Week News
Google Paid Out 8,000 at Live Hacking Event Google Paid Out $458,000 at Live Hacking Event Security Week News
Mate Emerges From Stealth Mode With .5 Million in Seed Funding Mate Emerges From Stealth Mode With $15.5 Million in Seed Funding Security Week News
U.S. Targets Russian Cyber Exploit Network with Sanctions U.S. Targets Russian Cyber Exploit Network with Sanctions Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark