Skip to content

Commit db1d847

Browse files
committed
Deployed fbf5c75 with MkDocs version: 1.5.3
1 parent f7edaae commit db1d847

6 files changed

Lines changed: 125 additions & 5 deletions

File tree

cisa_kev/cisa_kev/index.html

Lines changed: 95 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -779,6 +779,17 @@
779779

780780

781781

782+
<label class="md-nav__link md-nav__link--active" for="__toc">
783+
784+
785+
<span class="md-ellipsis">
786+
CISA Known Exploited Vulnerabilities (CISA KEV)
787+
</span>
788+
789+
790+
<span class="md-nav__icon md-icon"></span>
791+
</label>
792+
782793
<a href="./" class="md-nav__link md-nav__link--active">
783794

784795

@@ -789,6 +800,52 @@
789800

790801
</a>
791802

803+
804+
805+
<nav class="md-nav md-nav--secondary" aria-label="Table of contents">
806+
807+
808+
809+
810+
811+
812+
<label class="md-nav__title" for="__toc">
813+
<span class="md-nav__icon md-icon"></span>
814+
Table of contents
815+
</label>
816+
<ul class="md-nav__list" data-md-component="toc" data-md-scrollfix>
817+
818+
<li class="md-nav__item">
819+
<a href="#cisa-kev_1" class="md-nav__link">
820+
<span class="md-ellipsis">
821+
CISA KEV
822+
</span>
823+
</a>
824+
825+
</li>
826+
827+
<li class="md-nav__item">
828+
<a href="#criteria-for-cisa-to-add-a-vulnerability-to-the-kev-catalog" class="md-nav__link">
829+
<span class="md-ellipsis">
830+
Criteria For Cisa To Add A Vulnerability To The Kev Catalog
831+
</span>
832+
</a>
833+
834+
</li>
835+
836+
<li class="md-nav__item">
837+
<a href="#applying-cisa-kev" class="md-nav__link">
838+
<span class="md-ellipsis">
839+
Applying CISA KEV
840+
</span>
841+
</a>
842+
843+
</li>
844+
845+
</ul>
846+
847+
</nav>
848+
792849
</li>
793850

794851

@@ -1238,6 +1295,41 @@
12381295

12391296

12401297

1298+
<label class="md-nav__title" for="__toc">
1299+
<span class="md-nav__icon md-icon"></span>
1300+
Table of contents
1301+
</label>
1302+
<ul class="md-nav__list" data-md-component="toc" data-md-scrollfix>
1303+
1304+
<li class="md-nav__item">
1305+
<a href="#cisa-kev_1" class="md-nav__link">
1306+
<span class="md-ellipsis">
1307+
CISA KEV
1308+
</span>
1309+
</a>
1310+
1311+
</li>
1312+
1313+
<li class="md-nav__item">
1314+
<a href="#criteria-for-cisa-to-add-a-vulnerability-to-the-kev-catalog" class="md-nav__link">
1315+
<span class="md-ellipsis">
1316+
Criteria For Cisa To Add A Vulnerability To The Kev Catalog
1317+
</span>
1318+
</a>
1319+
1320+
</li>
1321+
1322+
<li class="md-nav__item">
1323+
<a href="#applying-cisa-kev" class="md-nav__link">
1324+
<span class="md-ellipsis">
1325+
Applying CISA KEV
1326+
</span>
1327+
</a>
1328+
1329+
</li>
1330+
1331+
</ul>
1332+
12411333
</nav>
12421334
</div>
12431335
</div>
@@ -1262,6 +1354,7 @@ <h1 id="cisa-kev"><abbr title="Cybersecurity &amp; Infrastructure Security Agenc
12621354
<li><a href="../../risk/Log4Shell/">Log4Shell Example</a> for an example of a <abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr> <abbr title="Known Exploited Vulnerability">KEV</abbr> entry.</li>
12631355
</ul>
12641356
</div>
1357+
<h2 id="cisa-kev_1"><abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr> <abbr title="Known Exploited Vulnerability">KEV</abbr><a class="headerlink" href="#cisa-kev_1" title="Permanent link">&para;</a></h2>
12651358
<div class="admonition quote">
12661359
<p class="admonition-title">Quote</p>
12671360
<p>For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity — <abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr> maintains the authoritative source of vulnerabilities that have been exploited in the wild: the Known Exploited Vulnerability (<abbr title="Known Exploited Vulnerability">KEV</abbr>) catalog <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">https://www.cisa.gov/known-exploited-vulnerabilities-catalog</a>. </p>
@@ -1270,6 +1363,7 @@ <h1 id="cisa-kev"><abbr title="Cybersecurity &amp; Infrastructure Security Agenc
12701363
<p>Vulnerability management frameworks—such as the Stakeholder-Specific Vulnerability Categorization (<abbr title="SSVC Stakeholder-Specific Vulnerability Categorization">SSVC</abbr>) model—consider a vulnerability's exploitation status.</p>
12711364
<p><a href="https://www.cisa.gov/known-exploited-vulnerabilities">https://www.cisa.gov/known-exploited-vulnerabilities</a> </p>
12721365
</div>
1366+
<h2 id="criteria-for-cisa-to-add-a-vulnerability-to-the-kev-catalog">Criteria For Cisa To Add A Vulnerability To The Kev Catalog<a class="headerlink" href="#criteria-for-cisa-to-add-a-vulnerability-to-the-kev-catalog" title="Permanent link">&para;</a></h2>
12731367
<div class="admonition info">
12741368
<p class="admonition-title">There are three criteria for <abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr> to add a vulnerability to the <abbr title="Known Exploited Vulnerability">KEV</abbr> catalog</p>
12751369
<ul>
@@ -1300,6 +1394,7 @@ <h1 id="cisa-kev"><abbr title="Cybersecurity &amp; Infrastructure Security Agenc
13001394
<p><a href="https://www.cisa.gov/known-exploited-vulnerabilities">https://www.cisa.gov/known-exploited-vulnerabilities</a> </p>
13011395
</div>
13021396
</div>
1397+
<h2 id="applying-cisa-kev">Applying <abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr> <abbr title="Known Exploited Vulnerability">KEV</abbr><a class="headerlink" href="#applying-cisa-kev" title="Permanent link">&para;</a></h2>
13031398
<div class="admonition quote">
13041399
<p class="admonition-title">Quote</p>
13051400
<p>“All federal civilian executive branch (FCEB) agencies are required to <abbr title="The neutralization or elimination of a vulnerability or the likelihood of its exploitation.">remediate</abbr> vulnerabilities in the <abbr title="Known Exploited Vulnerability">KEV</abbr> catalog within prescribed timeframes under Binding Operational Directive (BOD) 22-01, Reducing the Significant <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> of Known Exploited Vulnerabilities. Although not bound by BOD 22-01, every organization, including those in state, local, tribal, and territorial (SLTT) governments and <strong>private industry can significantly strengthen their security and resilience posture by prioritizing the remediation of the vulnerabilities listed in the <abbr title="Known Exploited Vulnerability">KEV</abbr> catalogue as well</strong>. <abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr> strongly recommends all stakeholders include a requirement to immediately address <abbr title="Known Exploited Vulnerability">KEV</abbr> catalogue vulnerabilities as part of their vulnerability management plan.</p>

print_page/index.html

Lines changed: 16 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2129,8 +2129,9 @@ <h3 id="risk-understanding_risk-threat-likelihood-of-exploit-data-sources">Threa
21292129
</ol>
21302130
</li>
21312131
<li><strong>Known Actively Exploited in the wild</strong><ol>
2132-
<li><abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr> <abbr title="Known Exploited Vulnerability">KEV</abbr> lists <strong>a subset</strong> of known actively
2133-
exploited Vulnerabilities in the wild.</li>
2132+
<li><a href="#cisa_kev-cisa_kev"><abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr> <abbr title="Known Exploited Vulnerability">KEV</abbr></a> lists <strong>a subset</strong> of known actively
2133+
exploited Vulnerabilities in the wild. </li>
2134+
<li><a href="https://vulncheck.com/kev">Vulncheck <abbr title="Known Exploited Vulnerability">KEV</abbr></a> lists additional known actively exploited Vulnerabilities in the wild (and includes <abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr> <abbr title="Known Exploited Vulnerability">KEV</abbr> CVEs)</li>
21342135
<li><strong>There isn't an authoritative common public list of ALL Vulnerabilities that are Known Actively Exploited in the wild.</strong></li>
21352136
</ol>
21362137
</li>
@@ -2420,6 +2421,11 @@ <h2 id="risk-data_sources-likelihood-of-exploit-data-sources">Likelihood of Expl
24202421
<td style="text-align: right;">1</td>
24212422
</tr>
24222423
<tr>
2424+
<td><a href="https://vulncheck.com/kev">Vulncheck <abbr title="Known Exploited Vulnerability">KEV</abbr></a></td>
2425+
<td style="text-align: center;"><strong>Active</strong> Exploitation</td>
2426+
<td style="text-align: right;">2</td>
2427+
</tr>
2428+
<tr>
24232429
<td><a href="https://github.com/rapid7/metasploit-framework">Metasploit modules</a></td>
24242430
<td style="text-align: center;"><strong>Weaponized</strong> Exploit</td>
24252431
<td style="text-align: right;">3</td>
@@ -2436,6 +2442,11 @@ <h2 id="risk-data_sources-likelihood-of-exploit-data-sources">Likelihood of Expl
24362442
</tr>
24372443
</tbody>
24382444
</table>
2445+
<div class="admonition note">
2446+
<p class="admonition-title">Note</p>
2447+
<p><a href="https://vulncheck.com/press/vulncheck-kev">Vulncheck <abbr title="Known Exploited Vulnerability">KEV</abbr></a> was launched just before this guide was released.
2448+
So it has not been included in any analysis for this guide initial release - but will likely be for future releases.</p>
2449+
</div>
24392450
<p><a href="https://www.first.org/epss/api"><abbr title="Exploit Prediction Scoring System">EPSS</abbr> Scores</a> are available for all published CVEs - and cover the range of Likelihood of Exploit from 0 to 100%. </p>
24402451
<div class="admonition tip">
24412452
<p class="admonition-title">The population sizes for Likelihood of Exploit decrease, as Likelihood of Exploit increases</p>
@@ -3841,6 +3852,7 @@ <h3 id="epss-epss_thresholds-monte-carlo-simulation-for-a-typical-enterprise">Mo
38413852
<li><a href="#risk-log4shell">Log4Shell Example</a> for an example of a <abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr> <abbr title="Known Exploited Vulnerability">KEV</abbr> entry.</li>
38423853
</ul>
38433854
</div>
3855+
<h2 id="cisa_kev-cisa_kev-cisa-kev_1"><abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr> <abbr title="Known Exploited Vulnerability">KEV</abbr><a class="headerlink" href="#cisa_kev-cisa_kev-cisa-kev_1" title="Permanent link">&para;</a></h2>
38443856
<div class="admonition quote">
38453857
<p class="admonition-title">Quote</p>
38463858
<p>For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity — <abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr> maintains the authoritative source of vulnerabilities that have been exploited in the wild: the Known Exploited Vulnerability (<abbr title="Known Exploited Vulnerability">KEV</abbr>) catalog <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">https://www.cisa.gov/known-exploited-vulnerabilities-catalog</a>. </p>
@@ -3849,6 +3861,7 @@ <h3 id="epss-epss_thresholds-monte-carlo-simulation-for-a-typical-enterprise">Mo
38493861
<p>Vulnerability management frameworks—such as the Stakeholder-Specific Vulnerability Categorization (<abbr title="SSVC Stakeholder-Specific Vulnerability Categorization">SSVC</abbr>) model—consider a vulnerability's exploitation status.</p>
38503862
<p><a href="https://www.cisa.gov/known-exploited-vulnerabilities">https://www.cisa.gov/known-exploited-vulnerabilities</a> </p>
38513863
</div>
3864+
<h2 id="cisa_kev-cisa_kev-criteria-for-cisa-to-add-a-vulnerability-to-the-kev-catalog">Criteria For Cisa To Add A Vulnerability To The Kev Catalog<a class="headerlink" href="#cisa_kev-cisa_kev-criteria-for-cisa-to-add-a-vulnerability-to-the-kev-catalog" title="Permanent link">&para;</a></h2>
38523865
<div class="admonition info">
38533866
<p class="admonition-title">There are three criteria for <abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr> to add a vulnerability to the <abbr title="Known Exploited Vulnerability">KEV</abbr> catalog</p>
38543867
<ul>
@@ -3879,6 +3892,7 @@ <h3 id="epss-epss_thresholds-monte-carlo-simulation-for-a-typical-enterprise">Mo
38793892
<p><a href="https://www.cisa.gov/known-exploited-vulnerabilities">https://www.cisa.gov/known-exploited-vulnerabilities</a> </p>
38803893
</div>
38813894
</div>
3895+
<h2 id="cisa_kev-cisa_kev-applying-cisa-kev">Applying <abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr> <abbr title="Known Exploited Vulnerability">KEV</abbr><a class="headerlink" href="#cisa_kev-cisa_kev-applying-cisa-kev" title="Permanent link">&para;</a></h2>
38823896
<div class="admonition quote">
38833897
<p class="admonition-title">Quote</p>
38843898
<p>“All federal civilian executive branch (FCEB) agencies are required to <abbr title="The neutralization or elimination of a vulnerability or the likelihood of its exploitation.">remediate</abbr> vulnerabilities in the <abbr title="Known Exploited Vulnerability">KEV</abbr> catalog within prescribed timeframes under Binding Operational Directive (BOD) 22-01, Reducing the Significant <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> of Known Exploited Vulnerabilities. Although not bound by BOD 22-01, every organization, including those in state, local, tribal, and territorial (SLTT) governments and <strong>private industry can significantly strengthen their security and resilience posture by prioritizing the remediation of the vulnerabilities listed in the <abbr title="Known Exploited Vulnerability">KEV</abbr> catalogue as well</strong>. <abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr> strongly recommends all stakeholders include a requirement to immediately address <abbr title="Known Exploited Vulnerability">KEV</abbr> catalogue vulnerabilities as part of their vulnerability management plan.</p>

risk/Data_Sources/index.html

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1416,6 +1416,11 @@ <h2 id="likelihood-of-exploit-data-sources">Likelihood of Exploit Data Sources<a
14161416
<td style="text-align: right;">1</td>
14171417
</tr>
14181418
<tr>
1419+
<td><a href="https://vulncheck.com/kev">Vulncheck <abbr title="Known Exploited Vulnerability">KEV</abbr></a></td>
1420+
<td style="text-align: center;"><strong>Active</strong> Exploitation</td>
1421+
<td style="text-align: right;">2</td>
1422+
</tr>
1423+
<tr>
14191424
<td><a href="https://github.com/rapid7/metasploit-framework">Metasploit modules</a></td>
14201425
<td style="text-align: center;"><strong>Weaponized</strong> Exploit</td>
14211426
<td style="text-align: right;">3</td>
@@ -1432,6 +1437,11 @@ <h2 id="likelihood-of-exploit-data-sources">Likelihood of Exploit Data Sources<a
14321437
</tr>
14331438
</tbody>
14341439
</table>
1440+
<div class="admonition note">
1441+
<p class="admonition-title">Note</p>
1442+
<p><a href="https://vulncheck.com/press/vulncheck-kev">Vulncheck <abbr title="Known Exploited Vulnerability">KEV</abbr></a> was launched just before this guide was released.
1443+
So it has not been included in any analysis for this guide initial release - but will likely be for future releases.</p>
1444+
</div>
14351445
<p><a href="https://www.first.org/epss/api"><abbr title="Exploit Prediction Scoring System">EPSS</abbr> Scores</a> are available for all published CVEs - and cover the range of Likelihood of Exploit from 0 to 100%. </p>
14361446
<div class="admonition tip">
14371447
<p class="admonition-title">The population sizes for Likelihood of Exploit decrease, as Likelihood of Exploit increases</p>

risk/Understanding_Risk/index.html

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1650,8 +1650,9 @@ <h3 id="threat-likelihood-of-exploit-data-sources">Threat Likelihood of Exploit
16501650
</ol>
16511651
</li>
16521652
<li><strong>Known Actively Exploited in the wild</strong><ol>
1653-
<li><abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr> <abbr title="Known Exploited Vulnerability">KEV</abbr> lists <strong>a subset</strong> of known actively
1654-
exploited Vulnerabilities in the wild.</li>
1653+
<li><a href="../../cisa_kev/cisa_kev/"><abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr> <abbr title="Known Exploited Vulnerability">KEV</abbr></a> lists <strong>a subset</strong> of known actively
1654+
exploited Vulnerabilities in the wild. </li>
1655+
<li><a href="https://vulncheck.com/kev">Vulncheck <abbr title="Known Exploited Vulnerability">KEV</abbr></a> lists additional known actively exploited Vulnerabilities in the wild (and includes <abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr> <abbr title="Known Exploited Vulnerability">KEV</abbr> CVEs)</li>
16551656
<li><strong>There isn't an authoritative common public list of ALL Vulnerabilities that are Known Actively Exploited in the wild.</strong></li>
16561657
</ol>
16571658
</li>

search/search_index.json

Lines changed: 1 addition & 1 deletion
Large diffs are not rendered by default.

sitemap.xml.gz

0 Bytes
Binary file not shown.

0 commit comments

Comments
 (0)