Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Vulnerabilities in CISA KEV Are Not Equally Critical: Report

Posted on May 28, 2025May 28, 2025 By CWS

Safety flaws in CISA’s Recognized Exploited Vulnerabilities (KEV) catalog needs to be handled with urgency based mostly on environmental context assessments, in line with a brand new report from Israeli startup Ox Safety.

With roughly 1,300 vulnerabilities flagged as exploited within the wild, the KEV catalog is a trusted supply for defenders, however the broad areas it covers implies that these bugs shouldn’t be handled with equal urgency.

A “patch every little thing” method, Ox says in its report, is ineffective, because it creates pointless workloads and diverts assets from necessary points. As an alternative, organizations ought to depend on context to find out the criticality of those safety defects and their impression on their environments.

Ox Safety stated it analyzed the impression of the KEV record on cloud containerized environments and located that 10 of the 25 bugs in KEV that impression cloud native purposes (out of 10,000 most typical CVEs) don’t signify an precise menace to them.

Analyzing greater than 200 separate environments, the report concluded that these 10 vulnerabilities are both technically unexploitable or require particular situations to use in cloud containerized environments (though a few of these have been detected tens of hundreds of occasions in open supply containers).

Of the ten vulnerabilities, six require Android-specific environments, bodily entry, or terminal entry (albeit two impression all platforms utilizing Linux kernel and will be chained with different flaws), three impression Chrome, and one impacts Apple’s Safari browser.

4 of the six Android defects are usually not exploitable on cloud environments, whereas the opposite two require a repair provided that native entry or web entry is offered. The Chrome flaws will be exploited provided that the service is used for picture, video, or font processing, whereas the Safari bug will be ignored on non-browser platforms.

In response to Ox Safety, the software program defects listed in CISA’s KEV catalog shouldn’t be ignored, as they signify vital threats, many impacting cloud environments, and their remediation ought to stay a excessive precedence. As an alternative, every CVE needs to be handled based mostly on its relevancy to the group.Commercial. Scroll to proceed studying.

Defenders ought to by no means strip a CVE of its unique context however fastidiously assess the necessity for patching and its urgency based mostly on the impression it has on their organizations’ surroundings, as some vulnerabilities may show totally innocent, Ox says.

Figuring out the platforms impacted by a CVE, figuring out publicly out there exploits, understanding how the bug will be exploited in real-world eventualities, assessing its relationship to delicate data, and understanding the end result of profitable exploitation are important in figuring out the impression of a vulnerability.

“This extra contextual data would allow safety groups to implement a extra exact and environment friendly workflow when dealing with crucial vulnerabilities of their environments, decreasing alert fatigue and focusing assets the place they matter most,” the corporate stated.

The safety agency, which breaks down every of those vulnerabilities and explains why they don’t have any or little impression on containerized environments, means that platform-specific relevance indicators, CVE origin data, and context on assault paths and assault chains may improve the KEV catalog.

The report comes one week after CISA and NIST proposed LEV (Probably Exploited Vulnerabilities), a brand new cybersecurity metric meant to boost KEV by assessing the chance {that a} safety defect has been exploited in assaults.

Associated: Exploitation Lengthy Recognized for Most of CISA’s Newest KEV Additions

Associated: Sooner Patching Tempo Validates CISA’s KEV Catalog Initiative

Associated: EU Cybersecurity Company ENISA Launches European Vulnerability Database

Security Week News Tags:CISA, Critical, Equally, KEV, Report, Vulnerabilities

Post navigation

Previous Post: The Root of AI Hallucinations: Physics Theory Digs Into the ‘Attention’ Flaw
Next Post: Mimo Hackers Exploit CVE-2025-32432 in Craft CMS to Deploy Cryptominer and Proxyware

Related Posts

Ransomware Groups, Chinese APTs Exploit Recent SAP NetWeaver Flaws Security Week News
US Student to Plead Guilty Over PowerSchool Hack Security Week News
CISA Says Russian Hackers Targeting Western Supply-Lines to Ukraine Security Week News
Victoria’s Secret Says It Will Postpone Earnings Report After Recent Security Breach Security Week News
US Announces Botnet Takedown, Charges Against Russian Administrators Security Week News
Thousands Hit by The North Face Credential Stuffing Attack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Audit Your Personal Online Presence
  • How To Detect Them Early 
  • New Crocodilus Malware That Gain Complete Control of Android Device
  • How Anat Heilper Orchestrates Breakthroughs In Silicon And Software
  • Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • How to Audit Your Personal Online Presence
  • How To Detect Them Early 
  • New Crocodilus Malware That Gain Complete Control of Android Device
  • How Anat Heilper Orchestrates Breakthroughs In Silicon And Software
  • Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News