Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Vulnerabilities in CISA KEV Are Not Equally Critical: Report

Vulnerabilities in CISA KEV Are Not Equally Critical: Report

Posted on May 28, 2025May 28, 2025 By CWS

Safety flaws in CISA’s Recognized Exploited Vulnerabilities (KEV) catalog needs to be handled with urgency based mostly on environmental context assessments, in line with a brand new report from Israeli startup Ox Safety.

With roughly 1,300 vulnerabilities flagged as exploited within the wild, the KEV catalog is a trusted supply for defenders, however the broad areas it covers implies that these bugs shouldn’t be handled with equal urgency.

A “patch every little thing” method, Ox says in its report, is ineffective, because it creates pointless workloads and diverts assets from necessary points. As an alternative, organizations ought to depend on context to find out the criticality of those safety defects and their impression on their environments.

Ox Safety stated it analyzed the impression of the KEV record on cloud containerized environments and located that 10 of the 25 bugs in KEV that impression cloud native purposes (out of 10,000 most typical CVEs) don’t signify an precise menace to them.

Analyzing greater than 200 separate environments, the report concluded that these 10 vulnerabilities are both technically unexploitable or require particular situations to use in cloud containerized environments (though a few of these have been detected tens of hundreds of occasions in open supply containers).

Of the ten vulnerabilities, six require Android-specific environments, bodily entry, or terminal entry (albeit two impression all platforms utilizing Linux kernel and will be chained with different flaws), three impression Chrome, and one impacts Apple’s Safari browser.

4 of the six Android defects are usually not exploitable on cloud environments, whereas the opposite two require a repair provided that native entry or web entry is offered. The Chrome flaws will be exploited provided that the service is used for picture, video, or font processing, whereas the Safari bug will be ignored on non-browser platforms.

In response to Ox Safety, the software program defects listed in CISA’s KEV catalog shouldn’t be ignored, as they signify vital threats, many impacting cloud environments, and their remediation ought to stay a excessive precedence. As an alternative, every CVE needs to be handled based mostly on its relevancy to the group.Commercial. Scroll to proceed studying.

Defenders ought to by no means strip a CVE of its unique context however fastidiously assess the necessity for patching and its urgency based mostly on the impression it has on their organizations’ surroundings, as some vulnerabilities may show totally innocent, Ox says.

Figuring out the platforms impacted by a CVE, figuring out publicly out there exploits, understanding how the bug will be exploited in real-world eventualities, assessing its relationship to delicate data, and understanding the end result of profitable exploitation are important in figuring out the impression of a vulnerability.

“This extra contextual data would allow safety groups to implement a extra exact and environment friendly workflow when dealing with crucial vulnerabilities of their environments, decreasing alert fatigue and focusing assets the place they matter most,” the corporate stated.

The safety agency, which breaks down every of those vulnerabilities and explains why they don’t have any or little impression on containerized environments, means that platform-specific relevance indicators, CVE origin data, and context on assault paths and assault chains may improve the KEV catalog.

The report comes one week after CISA and NIST proposed LEV (Probably Exploited Vulnerabilities), a brand new cybersecurity metric meant to boost KEV by assessing the chance {that a} safety defect has been exploited in assaults.

Associated: Exploitation Lengthy Recognized for Most of CISA’s Newest KEV Additions

Associated: Sooner Patching Tempo Validates CISA’s KEV Catalog Initiative

Associated: EU Cybersecurity Company ENISA Launches European Vulnerability Database

Security Week News Tags:CISA, Critical, Equally, KEV, Report, Vulnerabilities

Post navigation

Previous Post: The Root of AI Hallucinations: Physics Theory Digs Into the ‘Attention’ Flaw
Next Post: Mimo Hackers Exploit CVE-2025-32432 in Craft CMS to Deploy Cryptominer and Proxyware

Related Posts

200,000 Harbin Clinic Patients Impacted by NRS Data Breach 200,000 Harbin Clinic Patients Impacted by NRS Data Breach Security Week News
Chinese Spies Lurked in Networks for 393 Days, Hunted for Zero-Day Intel Chinese Spies Lurked in Networks for 393 Days, Hunted for Zero-Day Intel Security Week News
Check Point Boosts AI Security with New Acquisitions Check Point Boosts AI Security with New Acquisitions Security Week News
ZeroRISC Raises  Million for Open Source Silicon Security Solutions ZeroRISC Raises $10 Million for Open Source Silicon Security Solutions Security Week News
Encryption Backdoors: The Security Practitioners’ View Encryption Backdoors: The Security Practitioners’ View Security Week News
Tens of Thousands of Malicious NPM Packages Distribute Self-Replicating Worm Tens of Thousands of Malicious NPM Packages Distribute Self-Replicating Worm Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark