On May 21, 2026, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced a significant evolution in its vulnerability management strategy by launching a public submission process for its Known Exploited Vulnerabilities (KEV) catalog. This new initiative allows any party, including security vendors, researchers, and organizations, to submit vulnerabilities they have observed being actively exploited. The goal is to enhance the timeliness and scope of the KEV catalog, which is central to Binding Operational Directive (BOD) 22-01. By crowdsourcing threat intelligence, CISA aims to accelerate the identification and remediation of critical risks across Federal Civilian Executive Branch (FCEB) agencies and the broader public and private sectors, transforming the KEV from a potential lagging indicator into a more real-time defensive tool.
The new process is facilitated through a web form on CISA's website. Submitters are required to provide specific information to validate the submission, including:
This initiative directly supports BOD 22-01, which mandates that FCEB agencies remediate vulnerabilities listed in the KEV catalog within specified timeframes. While the directive is only mandatory for federal agencies, the KEV catalog is widely regarded as a best-practice prioritization tool for all organizations. The public submission process is designed to make this tool more effective by incorporating a wider range of data sources beyond CISA's own intelligence gathering.
For FCEB agencies, the compliance requirement remains unchanged: they must remediate any vulnerability added to the KEV catalog by the specified due date. This new submission process does not alter that obligation but may increase the frequency of updates to the catalog. For private organizations, there are no direct compliance requirements, but aligning patching priorities with the KEV is a widely adopted best practice and is often expected by cyber insurance providers and regulators.
The public submission form was made available on May 21, 2026, and is active immediately. There is no end date for this initiative. CISA will review submissions on an ongoing basis and, upon successful validation of active exploitation, will add the corresponding CVE to the KEV catalog with a defined remediation deadline.
This policy change is expected to have a significant positive impact on the nation's collective cybersecurity posture. By decentralizing intelligence gathering, CISA can tap into the vast network of security professionals who have frontline visibility into emerging threats. This should reduce the time between the discovery of an exploit in the wild and its inclusion in the KEV, shrinking the window of opportunity for attackers. For organizations, this means the KEV catalog will become an even more critical and dynamic tool for prioritizing the vast number of vulnerabilities disclosed each year. However, it may also increase the operational tempo for security teams, as more vulnerabilities could be added to the high-priority list more frequently.
The core mitigation for vulnerabilities listed in the KEV catalog is to apply the vendor-provided patches or updates within the CISA-mandated timeframe.
CISA's initiative to crowdsource the KEV catalog makes a rapid and efficient software update process more critical than ever. Organizations must treat every entry in the KEV catalog as a high-priority, time-sensitive threat. The recommendation is to establish a 'fast track' patching process specifically for KEV vulnerabilities. This process should bypass standard, slower-moving change control cycles. Automate the ingestion of the KEV catalog feed into your vulnerability management platform. Configure the system to automatically generate high-priority tickets for system owners the moment a new KEV vulnerability is found on an asset. Define a Service Level Agreement (SLA) for KEV remediation that aligns with CISA's deadlines (typically 7-21 days) and hold teams accountable. This proactive and aggressive patching posture, driven by the community-enhanced KEV, is the most direct countermeasure to active exploitation.
CISA announces the launch of a public submission form for the KEV catalog.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.