Known Exploited Vulnerabilities
Known Exploited Vulnerabilities are security weaknesses in software, hardware, or systems that have been confirmed to be actively used by attackers in real-world incidents. They are tracked in a catalog maintained by CISA (the Cybersecurity and Infrastructure Security Agency) to help organizations prioritize which vulnerabilities to fix first. Because these vulnerabilities have demonstrated real-world exploitation, they typically represent a higher and more immediate risk than vulnerabilities that are only theoretical.
A Known Exploited Vulnerability (KEV) is a documented security weakness in software, hardware, or firmware that threat actors have demonstrably exploited, as confirmed through threat intelligence, incident reports, or interagency collaboration. CISA maintains the authoritative KEV Catalog, and a vulnerability is added only when exploitation has been verified through such evidence. The KEV designation appears on NVD vulnerability detail pages when a CVE is included in CISA's catalog. The KEV Catalog serves as a prioritization mechanism for vulnerability management programs, signaling that a given CVE poses a confirmed, active risk rather than a purely theoretical one. It is important to note that the KEV Catalog does not represent all exploited vulnerabilities; it reflects only those that have met CISA's specific inclusion criteria, meaning that absence from the catalog does not imply a vulnerability is unexploited.
Why it matters
Organizations face an overwhelming volume of disclosed vulnerabilities each year, making it impractical to remediate every issue simultaneously. The Known Exploited Vulnerabilities (KEV) Catalog provides a critical prioritization signal by identifying vulnerabilities that threat actors have demonstrably used in real-world attacks. Because these vulnerabilities carry confirmed exploitation evidence rather than theoretical risk, they typically warrant accelerated patching timelines and heightened attention from security teams.
For federal agencies, CISA's Binding Operational Directive 22-01 mandates remediation of KEV Catalog entries within specified timeframes, giving the catalog direct regulatory weight. Even outside the federal government, many private-sector organizations have adopted the KEV Catalog as a prioritization input for their vulnerability management programs, treating KEV inclusion as a strong indicator that a vulnerability poses immediate, actionable risk.
It is important to recognize, however, that the KEV Catalog does not represent the full universe of exploited vulnerabilities. It reflects only those that have met CISA's specific inclusion criteria, meaning that a vulnerability's absence from the catalog does not imply it is unexploited. Organizations should use the KEV Catalog as one prioritization input alongside other threat intelligence sources, severity scores, and asset-context information rather than as a sole decision-making tool.
Who it's relevant to
Inside KEV
Common questions
Answers to the questions practitioners most commonly ask about KEV.