Connect with us
CISA KEV update

Security

CISA Adds Four Actively Exploited Flaws to KEV Catalog

CISA Adds Four Actively Exploited Flaws to KEV Catalog

The U.S. cybersecurity and Infrastructure Security Agency (CISA) updated its Known Exploited Vulnerabilities (KEV) catalog on Tuesday, adding four security flaws. The agency cited evidence that these vulnerabilities are currently being exploited by malicious actors in real-world attacks.

This action requires federal civilian executive branch agencies to apply available patches or implement other mitigations by a specified deadline. Private sector organizations and other entities are strongly urged to review the catalog and prioritize remediation of these vulnerabilities in their own systems.

Details of the Newly Listed Vulnerabilities

The four vulnerabilities added to the catalog span multiple widely used software products. They include high-severity issues that could allow attackers to execute arbitrary code, bypass security features, or cause system crashes.

One of the listed flaws is tracked as CVE-2026-2441, which carries a CVSS severity score of 8.8. This is a use-after-free vulnerability in the Google Chrome web browser. A remote attacker could potentially exploit heap corruption through this flaw.

The other three vulnerabilities, whose identifiers and details were confirmed by CISA, affect different vendors and products. The agency’s binding operational directive mandates that federal agencies must address vulnerabilities added to the KEV catalog within strict timeframes, typically between two and three weeks.

Purpose and Impact of the KEV Catalog

CISA’s Known Exploited Vulnerabilities catalog is a publicly available list of security flaws that have reliable evidence of active exploitation. While the directive to remediate them is legally binding only for U.S. federal agencies, the catalog serves as a critical resource for all organizations worldwide.

By highlighting vulnerabilities that are actively being used in attacks, CISA aims to drive urgent patching efforts across the global ecosystem. Security professionals widely regard the KEV catalog as a prioritized to-do list for vulnerability management, as it focuses on defects that pose an immediate, demonstrable threat.

The catalog’s updates are closely monitored by corporate security teams, software vendors, and cybersecurity researchers. Inclusion in the list signifies that proof-of-concept code or active exploit scripts are likely circulating in criminal forums or deployed in ongoing campaigns.

Response and Recommended Actions

Upon CISA’s announcement, the affected vendors typically reiterate their patching guidance. Organizations are advised to immediately inventory their systems for the affected software versions and apply the latest security updates provided by the vendors.

For vulnerabilities where a patch is not yet available, or cannot be immediately applied, CISA and the vendors provide recommended mitigation strategies. These may include configuration changes, network segmentation, or the deployment of additional security controls to reduce the risk of exploitation.

Cybersecurity experts consistently recommend that organizations treat KEV catalog entries with the highest priority. The window between a vulnerability’s addition to the catalog and its widespread exploitation by automated tools can often be very short.

Looking ahead, CISA is expected to continue its regular updates to the KEV catalog as new threat intelligence is gathered. The agency, along with partners in industry and international computer emergency response teams (CERTs), routinely investigates reports of in-the-wild exploitation to inform these updates. Organizations should establish processes to monitor the catalog routinely and integrate its data into their vulnerability and patch management programs.

Source: U.S. Cybersecurity and Infrastructure Security Agency (CISA)

More in Security