CISA’s 2024 KEV Catalog Update: Insights on Vulnerabilities and Emerging Trends

Published:

spot_img

2024 Update: Expansion of CISA’s Known Exploited Vulnerabilities (KEV) Catalog

CISA Expands Cybersecurity Catalog Amid Rising Threats

In a proactive move to bolster national cybersecurity, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) catalog, adding 185 new vulnerabilities in 2024. This brings the total to 1,238 software and hardware flaws that are actively targeted by cybercriminals, posing significant risks to critical infrastructure and data security across various sectors.

Launched in November 2021, the KEV catalog has seen a steady increase in entries, reflecting the persistent threat of cyberattacks. While the number of new vulnerabilities added this year is slightly lower than the previous year, the catalog continues to include a mix of recent and older vulnerabilities, some dating back to 2002. Notably, vulnerabilities like CVE-2012-4792, a flaw in Microsoft Internet Explorer, remain actively exploited, underscoring the importance of addressing both new and legacy vulnerabilities.

Among the newly added vulnerabilities, OS Command Injection (CWE-78) emerged as the most common, appearing in 14 entries. This type of vulnerability allows attackers to execute unauthorized commands on a system, potentially leading to severe breaches. Other prevalent weaknesses include Deserialization of Untrusted Data (CWE-502) and Use After Free (CWE-416), highlighting the diverse nature of threats facing organizations today.

Microsoft continues to lead the list of vendors with vulnerabilities, accounting for 36 entries in 2024, followed by Ivanti with 11. The presence of vulnerabilities across major companies like Google, Adobe, and Apple illustrates the widespread nature of cybersecurity challenges.

As cyber threats evolve, CISA’s KEV catalog serves as a crucial resource for IT security teams, emphasizing the need for vigilance and proactive measures to safeguard against potential exploits.

spot_img

Related articles

Recent articles

Layoffs Ignite Dark Web Demand for Tech Talent

Overall, in 2025, resumes outnumber vacancies 55 per cent to 45 per cent, driven by global layoffs and an influx of younger candidates. |...

UAE Announces Significant Tax Rule Changes Effective January 1, 2026

Updates to UAE Tax Procedures Framework The United Arab Emirates has announced notable changes in its tax procedures with the introduction of Federal Decree-Law No....

French Football Federation Reveals Data Breach Following Administrative Software Compromise

Stolen Credentials Lead to Major Data Breach in French Football The French Football Federation (FFF) has recently confirmed a significant cyber breach affecting club memberships...

Legacy Python Bootstrap Scripts Expose Domain Takeover Risks in Several PyPI Packages

Vulnerabilities Found in Python Packages: A Growing Threat Discovery of Legacy Vulnerabilities Recent investigations by cybersecurity experts at ReversingLabs have revealed significant vulnerabilities within older Python...