HomeCII/OTKeep an Eye on KEV List for Changes to Help Security Teams

Keep an Eye on KEV List for Changes to Help Security Teams

Published on

spot_img

At the BSides Las Vegas conference on August 7th, an analysis presented highlighted that organizations relying on the Known Exploited Vulnerabilities (KEV) catalog to prioritize patching may be overlooking crucial changes that could indicate a shift in the severity of certain issues. The KEV catalog currently includes more than 1,140 vulnerabilities known to have been exploited in the wild. These vulnerabilities are tracked by their Common Vulnerabilities and Exposures (CVE) identifier, with the date of confirmation of exploitation and an indicator of ransomware group usage.

The analysis pointed out that specific modifications to the data, such as unusually quick remediation times and alterations to the ransomware status, can provide valuable insights for security teams. However, Glenn Thorpe, the senior director of security research and detection engineering at GreyNoise Intelligence, noted that the Cybersecurity and Infrastructure Security Agency (CISA), the entity in charge of managing the list, does not always highlight these changes and outliers, potentially leading to oversight by organizations utilizing the catalog for prioritization.

Introduced in November 2021 with 290 exploited vulnerabilities, the KEV catalog serves as a resource for organizations to focus on patching flaws currently under attack. Despite its usefulness, the catalog does not rank vulnerabilities by severity, and there is often a delay in adding vulnerabilities even after evidence of exploitation emerges.

Over the years, the KEV catalog has gone through several phases. In one period during the Russia-Ukraine conflict, there was a surge in exploited vulnerabilities, totaling 396 issues with an average age of 1,898 days. Despite the perception that the conflict’s duration may have reduced the number of vulnerabilities, Thorpe warned that once the conflict ends, both sides are likely to resume seeking vulnerabilities for exploitation.

Five major organizations — Microsoft, Apple, Cisco, Adobe, and Google — account for approximately half of all vulnerabilities on the KEV list, showcasing cyber attackers’ preference for targeting prominent software platforms.

In recent years, changes in CISA’s policies regarding the KEV catalog have been observed. For instance, CISA started setting shorter remediation deadlines for specific critical vulnerabilities. This shift is evident in the case of severe vulnerabilities affecting appliances connected to networks, such as Ivanti and Juniper routers, Cisco devices, and Atlassian’s Confluence server.

Moreover, CISA has been updating the known ransomware usage field without explicit notifications, indicating the increased use of these vulnerabilities by ransomware groups. To assist organizations in prioritizing issues, Thorpe advised paying attention to updates released on Fridays, vulnerabilities with due dates less than 21 days away, and modifications to the known ransomware usage field.

By analyzing the patterns and signals provided by CISA’s updates to the KEV catalog, organizations can better understand the agency’s prioritization of critical vulnerabilities. Being aware of these changes can help security teams stay proactive in addressing potential threats and enhancing their overall cybersecurity posture.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...