Only a third of KEV vulnerabilities are truly critical; are you prioritizing the wrong ones?

Not every vulnerability on the CISA KEV catalog demands the same level of urgency, and treating them equally can overwhelm security teams with false priorities. Discover how KEVology and the KEV Collider help defenders cut through the noise by enriching KEV data with exploit scores, timelines, and real-world context.

About the CISA KEV

The CISA Known Exploited Vulnerabilities (KEV) catalog is one of the most referenced resources in vulnerability management, but how well do security teams actually understand what it tells them? In this Brand Highlight, Tod Beardsley, Vice President of Security Research at runZero and former CISA section chief who helped manage the KEV on a daily basis, breaks down what the catalog is designed to do and, just as importantly, what it is not.

What is the KEV catalog and who is it for?

The KEV is mandated by Binding Operational Directive 22-01 (BOD 22-01), which tasks CISA with identifying vulnerabilities that are known to be exploited and have an available fix. Its primary audience is federal civilian executive branch agencies, but because the catalog is public, organizations everywhere use it as a prioritization signal. Beardsley notes that inclusion on the KEV requires a CVE ID, evidence of active exploitation, a patch or mitigation, and relevance to federal interests, meaning zero-day vulnerabilities and end-of-life systems without CVEs never appear.

How should organizations think about KEV entries that are not equally dangerous?

Beardsley explains that only about a third of KEV-listed vulnerabilities represent straight-shot remote code execution with no user interaction and no authentication required. The rest span a wide spectrum of severity. EPSS data reveals an inverse bell curve: many KEV entries have extremely low probabilities of exploitation in the next 30 days, while others cluster at the high end with commodity exploits widely available. This means treating every KEV entry as equally critical leads to wasted effort and alert fatigue.

That gap between the catalog and real-world decision-making is exactly what KEVology addresses. The research, produced by Beardsley at runZero, enriches KEV data with CVSS metrics, EPSS scores, exploit tooling indicators, and ATT&CK mappings to help security teams filter and prioritize vulnerabilities based on what actually matters to their environment. Rather than prescribing a single priority list, KEVology treats the KEV as data to be analyzed, not doctrine to be followed blindly.

To make this analysis accessible and interactive, runZero built KEV Collider, a free, daily-updated web application. The tool lets defenders sort, filter, and layer multiple risk signals across the entire KEV catalog. Because every filter combination is encoded in URL parameters, teams can bookmark and share custom views with colleagues instantly. Beardsley describes KEV Collider as an evergreen companion to the research, updating automatically as new vulnerabilities are added to the catalog each week.

Meet Our Speakers

todb

VP of Security Research, runZero

Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Resources

Podcasts
Filtering the KEV was really hard … until now! (Risky Biz Interview)
Casey Ellis chats with Todd Beardsley about KEVology — an analysis of the CISA KEV. KEVology helps you identify the vulnerabilities most relevant...
Podcasts
The dangers of white label devices (Error Code Podcast)
Rob King, Director of Applied Security Research, explores white-labeled surveillance and IoT hardware, why some vendors are banned by governments,...
Podcasts
Lessons from the front lines of cybersecurity with HD Moore (Keep Austin Secure)
In this episode of Keep Austin Secure, Elliot Fielding sat down with HD Moore, Founder & CEO of runZero and it lived up to the hype.
Podcasts
Conversation with creator of Metasploit (The Abhisek Cast)
In this episode of The Abhisek Cast, HD Moore, the creator of Metasploit and founder of runZero, explores the real evolution of cybersecurity.

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.