There are 270,000+ CVEs in the National Vulnerability Database. Your scanner just found 500 of them in your environment. Which ones are actual emergencies?
The answer: check the KEV.
What Is the KEV Catalog?
The KEV (Known Exploited Vulnerabilities) catalog is maintained by CISA (Cybersecurity and Infrastructure Security Agency). It lists vulnerabilities with confirmed evidence of active exploitation — not theoretical risk, not proof-of-concepts, but real attacks happening right now.
As of 2026, the KEV catalog contains 1,200+ entries. That might sound like a lot, but compared to 270,000+ total CVEs, it's 0.4%. These are the vulnerabilities that actually matter.
KEV Entry Requirements
For a CVE to be added to KEV, it must meet all three criteria:
The third criterion is important — CISA won't add a vulnerability to KEV if there's nothing you can do about it.
Why KEV Matters More Than CVSS
| Metric | What It Tells You |
|--------|-------------------|
| CVSS 9.8 | "This COULD be very bad" |
| KEV Listed | "This IS being used to attack organizations right now" |
CVSS is theoretical. KEV is empirical. A CVSS 6.5 vulnerability on the KEV list is more dangerous than a CVSS 9.8 vulnerability that nobody knows how to exploit.
The Numbers
Research from Mandiant and FIRST shows:
KEV → BOD 22-01: The Legal Mandate
For federal agencies, KEV isn't optional. CISA's Binding Operational Directive 22-01 requires:
While BOD 22-01 only legally applies to federal agencies, CISA strongly recommends all organizations use KEV as their primary prioritization source. Many enterprise security teams now treat KEV as mandatory.
How to Use KEV in Your Workflow
Step 1: Monitor the Catalog Daily
The KEV catalog is updated multiple times per week. New entries mean new active threats. Monitor via:
https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.jsonStep 2: Cross-Reference Your Scan Results
When a KEV entry matches a CVE in your environment:
Step 3: Set SLAs Based on KEV
| Finding Category | Remediation SLA |
|-----------------|-----------------|
| On KEV + internet-facing | 48 hours |
| On KEV + internal | 7 days |
| EPSS > 10% (not on KEV yet) | 14 days |
| High CVSS, low EPSS, no KEV | 30 days |
Step 4: Report to Leadership
KEV provides a defensible, government-backed framework for prioritization decisions. When your CISO asks "why didn't we patch that 9.8?", you can point to KEV-based prioritization:
"We patched 15 KEV-listed CVEs with confirmed exploitation in week 1. The CVSS 9.8 with 0.03% EPSS and no KEV listing was scheduled for week 3 per our risk-based SLA policy."
Top KEV Entry Patterns
Looking at the catalog reveals clear patterns:
Most Common Product Categories
Attack Vectors
Timing
How Vulnios Implements KEV
Vulnios integrates KEV data throughout the platform:
Getting Started
---
Monitor KEV in real time at vulnios.com. Automatic KEV matching, EPSS correlation, and compliance-ready reporting.
Ready to secure your organization?
Start scanning with 32 security engines — free tier available.
Get Started Free