CISA’s new KEV nomination form opens reporting to vendors and researchers
Overview
The Cybersecurity and Infrastructure Security Agency (CISA) has introduced a new nomination form that allows researchers, vendors, and industry partners to report known exploited vulnerabilities. This initiative aims to enhance collaboration between CISA and the cybersecurity community by providing a direct channel for submitting vulnerabilities for consideration in the Known Exploited Vulnerabilities (KEV) catalog. While the new form streamlines reporting, organizations can still use email to submit vulnerabilities if they prefer. This move is significant as it encourages more proactive engagement from the cybersecurity community, which is essential for identifying and mitigating threats more effectively.
Key Takeaways
- Timeline: Newly disclosed
Original Article Summary
The Cybersecurity and Infrastructure Security Agency launched a new nomination form that lets researchers, vendors, and industry partners report known exploited vulnerabilities for possible inclusion in its KEV catalog. The form gives outside contributors a direct way to submit vulnerabilities to CISA. Email submissions remain available at vulnerability@cisa.dhs.gov for organizations and individuals who prefer that route. “Every day, CISA collaborates with security researchers and industry partners that identify and report exploited vulnerabilities. This new reporting … More → The post CISA’s new KEV nomination form opens reporting to vendors and researchers appeared first on Help Net Security.
Impact
Not specified
Exploitation Status
The exploitation status is currently unknown. Monitor vendor advisories and security bulletins for updates.
Timeline
Newly disclosed
Remediation
Not specified
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.
Related Topics: This incident relates to Vulnerability.