{"id":7358,"date":"2022-03-02T07:50:44","date_gmt":"2022-03-02T14:50:44","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7358"},"modified":"2023-04-20T02:08:21","modified_gmt":"2023-04-20T09:08:21","slug":"latency-analysis-of-dhs-cisa-kev","status":"publish","type":"post","link":"https:\/\/10.42.32.162\/articles\/latency-analysis-of-dhs-cisa-kev\/","title":{"rendered":"Latency Analysis of DHS CISA KEVs"},"content":{"rendered":"
In this blog, CSW experts analyzed CISA\u2019s Known Exploited Vulnerabilities (KEV) list for latencies in publishing, exploiting, and patching to understand how fast attackers are weaponizing them for attacks.<\/strong><\/p>\n On November 3, 2021, CISA released a directive of Known Exploited Vulnerabilities (KEVs) and advised organizations to address them within stipulated deadlines. This was followed by regular additions to the vulnerabilities list that stands at 787<\/b>\u00a0KEVs today.\u00a0 Our researchers found that 647<\/b>\u00a0vulnerabilities out of 787<\/b>\u00a0are trending in the wild with high internet and dark web chatter which is a clarion call for organizations to patch them immediately – well before the deadline.<\/p>\n Latencies in publishing vulnerabilities and releasing patches are enabling attackers to launch crippling and devastating supply chain attacks on critical entities. In recent times, the trend of exploitation of zero-day vulnerabilities even before NVD disclosure has picked up momentum, as called out by our research in ransomware<\/a>.<\/p>\n In this blog, we analyze the latencies and strive to find answers to the following question-<\/p>\n \u201cAre latencies in identifying, publishing, and releasing patches for vulnerabilities providing further impetus to foraging cyber attackers?\u201d<\/p>\n<\/blockquote>\n Our research points to three types of latencies in vulnerabilities that can prove costly to organizations. And unfortunately, all three apply to the CISA KEVs –<\/p>\n NVD disclosure latency – The average time taken for the NVD to publish the vulnerabilities in their database<\/p>\n<\/li>\n Exploit latency – The average time taken for the weaponization of the vulnerabilities<\/p>\n<\/li>\n Patch latency – The average time taken for the patch to be released by the vendor.<\/p>\n<\/li>\n<\/ol>\n Our research shows that attackers typically go after all vulnerabilities irrespective of their patching status.<\/p>\n\n
Latencies in Vulnerabilities<\/h2>\n
\n