Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Vulnerabilities in CISA KEV Are Not Equally Critical: Report

Posted on May 28, 2025May 28, 2025 By CWS

Safety flaws in CISA’s Recognized Exploited Vulnerabilities (KEV) catalog needs to be handled with urgency based mostly on environmental context assessments, in line with a brand new report from Israeli startup Ox Safety.

With roughly 1,300 vulnerabilities flagged as exploited within the wild, the KEV catalog is a trusted supply for defenders, however the broad areas it covers implies that these bugs shouldn’t be handled with equal urgency.

A “patch every little thing” method, Ox says in its report, is ineffective, because it creates pointless workloads and diverts assets from necessary points. As an alternative, organizations ought to depend on context to find out the criticality of those safety defects and their impression on their environments.

Ox Safety stated it analyzed the impression of the KEV record on cloud containerized environments and located that 10 of the 25 bugs in KEV that impression cloud native purposes (out of 10,000 most typical CVEs) don’t signify an precise menace to them.

Analyzing greater than 200 separate environments, the report concluded that these 10 vulnerabilities are both technically unexploitable or require particular situations to use in cloud containerized environments (though a few of these have been detected tens of hundreds of occasions in open supply containers).

Of the ten vulnerabilities, six require Android-specific environments, bodily entry, or terminal entry (albeit two impression all platforms utilizing Linux kernel and will be chained with different flaws), three impression Chrome, and one impacts Apple’s Safari browser.

4 of the six Android defects are usually not exploitable on cloud environments, whereas the opposite two require a repair provided that native entry or web entry is offered. The Chrome flaws will be exploited provided that the service is used for picture, video, or font processing, whereas the Safari bug will be ignored on non-browser platforms.

In response to Ox Safety, the software program defects listed in CISA’s KEV catalog shouldn’t be ignored, as they signify vital threats, many impacting cloud environments, and their remediation ought to stay a excessive precedence. As an alternative, every CVE needs to be handled based mostly on its relevancy to the group.Commercial. Scroll to proceed studying.

Defenders ought to by no means strip a CVE of its unique context however fastidiously assess the necessity for patching and its urgency based mostly on the impression it has on their organizations’ surroundings, as some vulnerabilities may show totally innocent, Ox says.

Figuring out the platforms impacted by a CVE, figuring out publicly out there exploits, understanding how the bug will be exploited in real-world eventualities, assessing its relationship to delicate data, and understanding the end result of profitable exploitation are important in figuring out the impression of a vulnerability.

“This extra contextual data would allow safety groups to implement a extra exact and environment friendly workflow when dealing with crucial vulnerabilities of their environments, decreasing alert fatigue and focusing assets the place they matter most,” the corporate stated.

The safety agency, which breaks down every of those vulnerabilities and explains why they don’t have any or little impression on containerized environments, means that platform-specific relevance indicators, CVE origin data, and context on assault paths and assault chains may improve the KEV catalog.

The report comes one week after CISA and NIST proposed LEV (Probably Exploited Vulnerabilities), a brand new cybersecurity metric meant to boost KEV by assessing the chance {that a} safety defect has been exploited in assaults.

Associated: Exploitation Lengthy Recognized for Most of CISA’s Newest KEV Additions

Associated: Sooner Patching Tempo Validates CISA’s KEV Catalog Initiative

Associated: EU Cybersecurity Company ENISA Launches European Vulnerability Database

Security Week News Tags:CISA, Critical, Equally, KEV, Report, Vulnerabilities

Post navigation

Previous Post: The Root of AI Hallucinations: Physics Theory Digs Into the ‘Attention’ Flaw
Next Post: Mimo Hackers Exploit CVE-2025-32432 in Craft CMS to Deploy Cryptominer and Proxyware

Related Posts

Coinbase Rejects $20M Ransom After Rogue Contractors Bribed to Leak Customer Data Security Week News
Russian Qakbot Gang Leader Indicted in US Security Week News
Cellcom Service Disruption Caused by Cyberattack Security Week News
Security Firm Andy Frain Says 100,000 People Impacted by Ransomware Attack Security Week News
Cisco Patches Critical ISE Vulnerability With Public PoC Security Week News
Up to 25% of Internet-Exposed ICS Are Honeypots: Researchers Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Empower Users and Protect Against GenAI Data Loss
  • Cybersecurity M&A Roundup: 42 Deals Announced in May 2025
  • US to Offer $10 Million Reward for Details About RedLine Malware Developer
  • MIND Raises $30 Million for Data Loss Prevention
  • Why More Security Leaders Are Selecting AEV

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Empower Users and Protect Against GenAI Data Loss
  • Cybersecurity M&A Roundup: 42 Deals Announced in May 2025
  • US to Offer $10 Million Reward for Details About RedLine Malware Developer
  • MIND Raises $30 Million for Data Loss Prevention
  • Why More Security Leaders Are Selecting AEV

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News