CISA KEV Catalog Expanded 20% in 2025, Topping 1,480 Entries
With 24 new vulnerabilities known to be exploited by ransomware groups, the list now includes 1,484 software and hardware flaws. The post CISA KEV Catalog Expanded 20% in 2025, Topping 1,480 Entries appeared first on SecurityWeek .
AI Analysis
Technical Summary
The Cybersecurity and Infrastructure Security Agency (CISA) maintains the Known Exploited Vulnerabilities (KEV) catalog, which identifies software and hardware vulnerabilities actively exploited in the wild. In 2025, this catalog expanded by approximately 20%, now encompassing 1,484 entries. Among these, 24 new vulnerabilities have been specifically linked to exploitation by ransomware groups, indicating an ongoing and evolving threat landscape. The KEV catalog is a prioritized list designed to help organizations focus their patching and mitigation efforts on vulnerabilities with confirmed exploitation, thereby reducing risk exposure. Although the provided information lacks detailed technical specifics such as CVSS scores, affected product versions, or exploit mechanisms, the inclusion of ransomware exploitation highlights the criticality of these vulnerabilities. Ransomware attacks leveraging these flaws can lead to significant confidentiality breaches, data integrity loss, and operational downtime. The absence of known exploits in the wild for some entries suggests emerging threats that could become active soon. The catalog's expansion reflects both the discovery of new vulnerabilities and increased exploitation activity, underscoring the need for continuous vigilance. Organizations are advised to integrate KEV catalog data into their vulnerability management workflows, prioritize patch deployment, and enhance detection capabilities for ransomware behaviors. This approach is vital to mitigate the risk posed by these actively exploited vulnerabilities and to protect critical infrastructure and business operations.
Potential Impact
European organizations face substantial risks from the expanded KEV catalog, particularly due to the ransomware exploitation of 24 new vulnerabilities. The impact includes potential data breaches, operational disruptions, financial losses, and reputational damage. Critical sectors such as finance, healthcare, energy, and government are especially vulnerable given their reliance on complex IT and OT systems that may contain unpatched KEV-listed flaws. The widespread presence of affected software and hardware across Europe increases the attack surface, facilitating lateral movement and ransomware propagation. Additionally, ransomware attacks often lead to secondary impacts such as regulatory fines under GDPR for data breaches and increased insurance costs. The medium severity rating may underestimate the real-world impact since ransomware exploitation can cause critical availability and integrity losses. The evolving threat landscape necessitates urgent attention to patch management and incident response readiness to mitigate these risks effectively.
Mitigation Recommendations
1. Integrate the CISA KEV catalog into vulnerability management processes to ensure timely identification and prioritization of patches for known exploited vulnerabilities. 2. Deploy patches and updates for affected software and hardware promptly, focusing first on vulnerabilities linked to ransomware exploitation. 3. Implement network segmentation and least privilege principles to limit ransomware lateral movement and reduce attack surface. 4. Enhance endpoint detection and response (EDR) capabilities to identify ransomware behaviors early and contain infections. 5. Conduct regular backups with offline or immutable storage to enable recovery without paying ransom. 6. Train staff on phishing and social engineering tactics commonly used to deliver ransomware payloads exploiting these vulnerabilities. 7. Collaborate with threat intelligence providers to stay informed on emerging exploitation trends related to KEV entries. 8. Perform regular penetration testing and red teaming exercises simulating ransomware attacks targeting KEV-listed vulnerabilities to validate defenses. 9. Establish incident response plans specifically addressing ransomware scenarios involving KEV vulnerabilities. 10. Engage with vendors and suppliers to ensure timely patch availability and deployment for critical systems.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CISA KEV Catalog Expanded 20% in 2025, Topping 1,480 Entries
Description
With 24 new vulnerabilities known to be exploited by ransomware groups, the list now includes 1,484 software and hardware flaws. The post CISA KEV Catalog Expanded 20% in 2025, Topping 1,480 Entries appeared first on SecurityWeek .
AI-Powered Analysis
Technical Analysis
The Cybersecurity and Infrastructure Security Agency (CISA) maintains the Known Exploited Vulnerabilities (KEV) catalog, which identifies software and hardware vulnerabilities actively exploited in the wild. In 2025, this catalog expanded by approximately 20%, now encompassing 1,484 entries. Among these, 24 new vulnerabilities have been specifically linked to exploitation by ransomware groups, indicating an ongoing and evolving threat landscape. The KEV catalog is a prioritized list designed to help organizations focus their patching and mitigation efforts on vulnerabilities with confirmed exploitation, thereby reducing risk exposure. Although the provided information lacks detailed technical specifics such as CVSS scores, affected product versions, or exploit mechanisms, the inclusion of ransomware exploitation highlights the criticality of these vulnerabilities. Ransomware attacks leveraging these flaws can lead to significant confidentiality breaches, data integrity loss, and operational downtime. The absence of known exploits in the wild for some entries suggests emerging threats that could become active soon. The catalog's expansion reflects both the discovery of new vulnerabilities and increased exploitation activity, underscoring the need for continuous vigilance. Organizations are advised to integrate KEV catalog data into their vulnerability management workflows, prioritize patch deployment, and enhance detection capabilities for ransomware behaviors. This approach is vital to mitigate the risk posed by these actively exploited vulnerabilities and to protect critical infrastructure and business operations.
Potential Impact
European organizations face substantial risks from the expanded KEV catalog, particularly due to the ransomware exploitation of 24 new vulnerabilities. The impact includes potential data breaches, operational disruptions, financial losses, and reputational damage. Critical sectors such as finance, healthcare, energy, and government are especially vulnerable given their reliance on complex IT and OT systems that may contain unpatched KEV-listed flaws. The widespread presence of affected software and hardware across Europe increases the attack surface, facilitating lateral movement and ransomware propagation. Additionally, ransomware attacks often lead to secondary impacts such as regulatory fines under GDPR for data breaches and increased insurance costs. The medium severity rating may underestimate the real-world impact since ransomware exploitation can cause critical availability and integrity losses. The evolving threat landscape necessitates urgent attention to patch management and incident response readiness to mitigate these risks effectively.
Mitigation Recommendations
1. Integrate the CISA KEV catalog into vulnerability management processes to ensure timely identification and prioritization of patches for known exploited vulnerabilities. 2. Deploy patches and updates for affected software and hardware promptly, focusing first on vulnerabilities linked to ransomware exploitation. 3. Implement network segmentation and least privilege principles to limit ransomware lateral movement and reduce attack surface. 4. Enhance endpoint detection and response (EDR) capabilities to identify ransomware behaviors early and contain infections. 5. Conduct regular backups with offline or immutable storage to enable recovery without paying ransom. 6. Train staff on phishing and social engineering tactics commonly used to deliver ransomware payloads exploiting these vulnerabilities. 7. Collaborate with threat intelligence providers to stay informed on emerging exploitation trends related to KEV entries. 8. Perform regular penetration testing and red teaming exercises simulating ransomware attacks targeting KEV-listed vulnerabilities to validate defenses. 9. Establish incident response plans specifically addressing ransomware scenarios involving KEV vulnerabilities. 10. Engage with vendors and suppliers to ensure timely patch availability and deployment for critical systems.
Threat ID: 695bd5ff3dc84013b27dde6c
Added to database: 1/5/2026, 3:17:19 PM
Last enriched: 1/5/2026, 3:17:37 PM
Last updated: 1/7/2026, 8:33:22 AM
Views: 32
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
⚡ Weekly Recap: IoT Exploits, Wallet Breaches, Rogue Extensions, AI Abuse & More
MediumRondoDox Botnet Exploiting React2Shell Vulnerability
MediumChained Quiz 1.3.5 - Unauthenticated Insecure Direct Object Reference via Cookie
MediumWordPress Quiz Maker 6.7.0.56 - SQL Injection
MediumThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.