CISA KEV — Known Exploited Vulnerabilities

CISA · US Federal
Definition

The CISA KEV (Known Exploited Vulnerabilities) catalog is a list maintained by the US Cybersecurity and Infrastructure Security Agency of vulnerabilities that have been confirmed to be actively exploited in real-world attacks. Unlike the full CVE database which contains tens of thousands of theoretical vulnerabilities, the KEV catalog only includes ones where exploitation has been observed in the wild.

Why KEV is more useful than raw CVE counts

There are over 200,000 CVEs in the NVD. The vast majority will never be exploited against most organizations. Trying to fix everything is impossible — and not necessary. The CISA KEV catalog cuts through the noise: if a CVE is on this list, it's being used in attacks right now. Fix these first.

US federal civilian agencies are legally required to remediate KEV entries within defined timeframes (usually 2 weeks for internet-facing systems). But the list is valuable for any organization — it's the clearest signal available for prioritization.

Open source packages on CISA KEV

The KEV catalog isn't just for government systems — it includes vulnerabilities in widely-used open source packages. Some notable entries relevant to developers:

How PackageFix uses CISA KEV

PackageFix checks every scanned package against the live CISA KEV catalog, which updates daily. Packages on the KEV list get a red 🔴 CISA KEV badge and appear in the ACTIVELY EXPLOITED banner at the top of scan results — separate from the regular CVE table.

Check your dependencies for CVEs, CISA KEV entries, and supply chain risks.

Open PackageFix →

Free · No signup · No CLI · Runs in your browser

Common questions

How often does the CISA KEV catalog update?
Daily. CISA adds new entries whenever exploitation of a vulnerability is confirmed. This is why PackageFix checks the live catalog rather than a cached version — a CVE added yesterday needs to be flagged today.
Does CISA KEV only apply to US government systems?
The remediation mandate applies to US federal civilian agencies. But the catalog itself is public and valuable for any organization. If a vulnerability is being actively exploited, it's relevant regardless of what country you're in.
Is a CISA KEV entry more serious than a CVSS 10.0?
They measure different things. CVSS 10.0 means theoretically the worst possible vulnerability. CISA KEV means it's confirmed being exploited right now. In practice, a KEV entry with CVSS 7.5 is often more urgent than a non-KEV CVSS 9.0 — because the 7.5 is actively being used.
Where can I see the full CISA KEV catalog?
The full catalog is at cisa.gov/known-exploited-vulnerabilities-catalog. PackageFix checks the live catalog at scan time. The /cisa-kev page on PackageFix shows the subset relevant to open source package managers.

Related guides