CISA Launches Initiative for Public Nomination to Known Exploited Vulnerabilities (KEV) Catalog

CISA Opens KEV Catalog to Public Submissions to Speed Up Threat Response

INFORMATIONAL
May 21, 2026
4m read
Policy and ComplianceVulnerabilitySecurity Operations

Related Entities

Organizations

Cybersecurity and Infrastructure Security Agency Federal Civilian Executive Branch

Full Report

Executive Summary

On May 21, 2026, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced a significant evolution in its vulnerability management strategy by launching a public submission process for its Known Exploited Vulnerabilities (KEV) catalog. This new initiative allows any party, including security vendors, researchers, and organizations, to submit vulnerabilities they have observed being actively exploited. The goal is to enhance the timeliness and scope of the KEV catalog, which is central to Binding Operational Directive (BOD) 22-01. By crowdsourcing threat intelligence, CISA aims to accelerate the identification and remediation of critical risks across Federal Civilian Executive Branch (FCEB) agencies and the broader public and private sectors, transforming the KEV from a potential lagging indicator into a more real-time defensive tool.

Regulatory Details

The new process is facilitated through a web form on CISA's website. Submitters are required to provide specific information to validate the submission, including:

  • The CVE number of the vulnerability.
  • Concrete evidence of active exploitation (e.g., log files, forensic reports, public threat intelligence reports).
  • Details on whether the vulnerability affects multiple vendors or products, indicating a systemic risk.
  • Any available mitigation guidance.

This initiative directly supports BOD 22-01, which mandates that FCEB agencies remediate vulnerabilities listed in the KEV catalog within specified timeframes. While the directive is only mandatory for federal agencies, the KEV catalog is widely regarded as a best-practice prioritization tool for all organizations. The public submission process is designed to make this tool more effective by incorporating a wider range of data sources beyond CISA's own intelligence gathering.

Affected Organizations

  • Directly Affected: U.S. Federal Civilian Executive Branch (FCEB) agencies, which are bound by BOD 22-01.
  • Indirectly Affected: All public and private sector organizations worldwide. CISA strongly encourages these entities to use the KEV catalog to prioritize their own vulnerability management efforts. The enhanced accuracy and timeliness of the catalog will benefit any organization that uses it for risk management.
  • Contributors: The entire cybersecurity ecosystem, including security researchers, technology vendors, bug bounty hunters, and incident response firms, are now formally invited to contribute.

Compliance Requirements

For FCEB agencies, the compliance requirement remains unchanged: they must remediate any vulnerability added to the KEV catalog by the specified due date. This new submission process does not alter that obligation but may increase the frequency of updates to the catalog. For private organizations, there are no direct compliance requirements, but aligning patching priorities with the KEV is a widely adopted best practice and is often expected by cyber insurance providers and regulators.

Implementation Timeline

The public submission form was made available on May 21, 2026, and is active immediately. There is no end date for this initiative. CISA will review submissions on an ongoing basis and, upon successful validation of active exploitation, will add the corresponding CVE to the KEV catalog with a defined remediation deadline.

Impact Assessment

This policy change is expected to have a significant positive impact on the nation's collective cybersecurity posture. By decentralizing intelligence gathering, CISA can tap into the vast network of security professionals who have frontline visibility into emerging threats. This should reduce the time between the discovery of an exploit in the wild and its inclusion in the KEV, shrinking the window of opportunity for attackers. For organizations, this means the KEV catalog will become an even more critical and dynamic tool for prioritizing the vast number of vulnerabilities disclosed each year. However, it may also increase the operational tempo for security teams, as more vulnerabilities could be added to the high-priority list more frequently.

Compliance Guidance

  1. Monitor the KEV Catalog: All organizations, not just federal agencies, should integrate the KEV catalog into their vulnerability management workflow. Subscribe to CISA's alerts and automated feeds for KEV updates.
  2. Establish a Rapid Patching Process: Develop and test a process for rapidly deploying patches for KEV-listed vulnerabilities. This should be treated as an incident response-level activity, not standard operational patching.
  3. Contribute to the Program: Organizations with threat intelligence or incident response capabilities should consider establishing a process to submit evidence of new exploits to CISA. Contributing to the ecosystem provides a collective benefit and can help get critical vulnerabilities patched more widely, reducing overall risk.
  4. Update Prioritization Models: Adjust vulnerability prioritization models to assign the highest weight to any CVE that appears in the KEV catalog. This should override standard CVSS-based scoring, as the KEV provides definitive proof of active risk.

Timeline of Events

1
May 21, 2026
CISA announces the launch of a public submission form for the KEV catalog.
2
May 21, 2026
This article was published

MITRE ATT&CK Mitigations

The core mitigation for vulnerabilities listed in the KEV catalog is to apply the vendor-provided patches or updates within the CISA-mandated timeframe.

Audit

M1047enterprise

Organizations should continuously audit their assets against the KEV catalog to ensure timely remediation and compliance.

D3FEND Defensive Countermeasures

CISA's initiative to crowdsource the KEV catalog makes a rapid and efficient software update process more critical than ever. Organizations must treat every entry in the KEV catalog as a high-priority, time-sensitive threat. The recommendation is to establish a 'fast track' patching process specifically for KEV vulnerabilities. This process should bypass standard, slower-moving change control cycles. Automate the ingestion of the KEV catalog feed into your vulnerability management platform. Configure the system to automatically generate high-priority tickets for system owners the moment a new KEV vulnerability is found on an asset. Define a Service Level Agreement (SLA) for KEV remediation that aligns with CISA's deadlines (typically 7-21 days) and hold teams accountable. This proactive and aggressive patching posture, driven by the community-enhanced KEV, is the most direct countermeasure to active exploitation.

Timeline of Events

1
May 21, 2026

CISA announces the launch of a public submission form for the KEV catalog.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

CISAKEVBOD 22-01Vulnerability ManagementPolicyCybersecurity

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.