
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) concluded 2025 with its Known Exploited Vulnerabilities (KEV) Catalog reaching 1,484 entries, reflecting a nearly 20% increase from the 1,239 vulnerabilities listed at the end of 2024. Throughout the year, CISA added a record 245 vulnerabilities—over 30% more than the 185–187 additions seen in 2023 and 2024—driven by heightened evidence of active exploitation across software and hardware ecosystems. This surge, including 24 flaws weaponized in ransomware campaigns, signals an intensifying threat landscape where attackers rapidly capitalize on both new and legacy weaknesses.
The KEV Catalog serves as CISA’s authoritative resource for vulnerabilities with confirmed in-the-wild exploitation, prioritizing real-world risks over theoretical CVSS scores. Launched in November 2021, it has grown steadily, but 2025 marked an acceleration with 245 new entries, including a nearly 45% rise in pre-2025 flaws (94 total). The oldest new addition was CVE-2007-0671, a Microsoft Office Excel remote code execution bug, while the catalog’s most ancient entry remains CVE-2002-0367—a Windows privilege escalation flaw still abused today.
Microsoft dominated affected vendors with 39 additions (up from 36 in 2024), followed by Apple, Cisco, Google Chromium, Ivanti, and Linux kernels. Dominant weakness types included OS command injection (CWE-78, prominent in 18 entries), deserialization of untrusted data (CWE-502), path traversal, use-after-free, and out-of-bounds write.
As exploitation trends accelerate into 2026, treating the KEV Catalog as a core defense benchmark is no longer optional—it’s essential for staying ahead of real-world adversaries.
“For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.” Cybersecurity and Infrastructure Security Agency (CISA
Read the full CISA Known Exploited Vulnerabilities Catalog here:
https://www.cisa.gov/known-exploited-vulnerabilities-catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) concluded 2025 with its Known Exploited Vulnerabilities (KEV) Catalog reaching 1,484 entries, reflecting a nearly 20% increase from the 1,239 vulnerabilities listed at the end of 2024. Throughout the year, CISA added a record 245 vulnerabilities—over 30% more than the 185–187 additions seen in 2023 and 2024—driven by heightened evidence of active exploitation across software and hardware ecosystems. This surge, including 24 flaws weaponized in ransomware campaigns, signals an intensifying threat landscape where attackers rapidly capitalize on both new and legacy weaknesses.
The KEV Catalog serves as CISA’s authoritative resource for vulnerabilities with confirmed in-the-wild exploitation, prioritizing real-world risks over theoretical CVSS scores. Launched in November 2021, it has grown steadily, but 2025 marked an acceleration with 245 new entries, including a nearly 45% rise in pre-2025 flaws (94 total). The oldest new addition was CVE-2007-0671, a Microsoft Office Excel remote code execution bug, while the catalog’s most ancient entry remains CVE-2002-0367—a Windows privilege escalation flaw still abused today.
Microsoft dominated affected vendors with 39 additions (up from 36 in 2024), followed by Apple, Cisco, Google Chromium, Ivanti, and Linux kernels. Dominant weakness types included OS command injection (CWE-78, prominent in 18 entries), deserialization of untrusted data (CWE-502), path traversal, use-after-free, and out-of-bounds write.
As exploitation trends accelerate into 2026, treating the KEV Catalog as a core defense benchmark is no longer optional—it’s essential for staying ahead of real-world adversaries.
“For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.” Cybersecurity and Infrastructure Security Agency (CISA
Read the full CISA Known Exploited Vulnerabilities Catalog here:
https://www.cisa.gov/known-exploited-vulnerabilities-catalog