{"id":7218,"date":"2022-09-12T07:05:51","date_gmt":"2022-09-12T14:05:51","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7218"},"modified":"2023-06-15T03:45:12","modified_gmt":"2023-06-15T10:45:12","slug":"cisa-launches-known-exploited-vulnerabilities-catalog","status":"publish","type":"post","link":"https:\/\/10.42.32.162\/articles\/cisa-launches-known-exploited-vulnerabilities-catalog\/","title":{"rendered":"CISA Launches Known Exploited Vulnerabilities (KEV) Catalog"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

DHS CISA released a Binding Directive mandating organizations to patch a list of Known Exploited Vulnerabilities on November 03, 2021, with specified deadlines. This catalog started with\u00a0287 vulnerabilities, and the count stands at 947 today.\u00a0<\/strong><\/p>

This blog performs risk-based scrutiny of the vulnerabilities included in the catalog and provides additional threat context for each vulnerability. Our team of experts has also mapped each vulnerability <\/a>to tactics, techniques, and procedures used by hackers to exploit them.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"\"\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

Our researchers deep-dived into these vulnerabilities to understand the criticality of these CVEs and why they need to be addressed within the deadlines specified by CISA.<\/p>

Firstly, let us look at how many vulnerabilities ought to be patched immediately.<\/p>

\u00a0<\/h2>

CVEs to be patched by June 2023<\/h2>