Decoding CISA Known Exploited Vulnerabilities

Decoding CISA KEV - A Latency Analysis

Through Decoding CISA KEV reports, CSW experts take a step back to provide a holistic view of the KEV Catalog and its vulnerabilities to understand what types of vulnerabilities are being added to this list and to bring forward the threat context associated with each vulnerability.

In this edition, we analyzed the latency of NVD, patch release, and scanner plugins in relation to the CISA KEV catalog to understand the exposures and windows of attack that make FCEB and Public Sector organizations vulnerable to crippling cyber attacks.