CISA KEV Catalog Expanded 20% in 2025, Topping 1,480 Entries
Overview
The Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) catalog by 20% in 2025, now listing a total of 1,484 vulnerabilities. Among these, 24 new vulnerabilities have been identified as being actively exploited by ransomware groups. This expansion is significant as it highlights the ongoing risk posed by these vulnerabilities to various software and hardware systems. Organizations that rely on affected products need to take immediate action to secure their systems, as these vulnerabilities can lead to severe security breaches if left unaddressed. The increase in vulnerabilities also reflects the evolving tactics of cybercriminals, making it crucial for companies to stay informed and proactive in their cybersecurity efforts.
Key Takeaways
- Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
- Affected Systems: Software and hardware flaws listed in CISA's KEV catalog, including specific products yet to be detailed.
- Action Required: Organizations should review the KEV catalog and apply relevant patches or updates to affected systems as soon as possible.
- Timeline: Newly disclosed
Original Article Summary
With 24 new vulnerabilities known to be exploited by ransomware groups, the list now includes 1,484 software and hardware flaws. The post CISA KEV Catalog Expanded 20% in 2025, Topping 1,480 Entries appeared first on SecurityWeek.
Impact
Software and hardware flaws listed in CISA's KEV catalog, including specific products yet to be detailed.
Exploitation Status
This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.
Timeline
Newly disclosed
Remediation
Organizations should review the KEV catalog and apply relevant patches or updates to affected systems as soon as possible.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.
Related Topics: This incident relates to Ransomware.