Security

Patches

The truth about KEV: CISA’s vuln deadlines good influence on private-sector patching

More work to do as most deadlines are missed and worst bugs still take months to fix


The deadlines associated with CISA's Known Exploited Vulnerabilities (KEV) catalog only apply to federal agencies, but fresh research shows they're having a positive impact on private organizations too.

KEVs are remediated by organizations on average in under 175 days compared to 621 days for vulnerabilities that aren't in the catalog, a survey [PDF] of 1.4 million orgs by Bitsight shows.

While this is certainly a much longer lead time than federal agencies are afforded – typically just 21 days – it shows the KEV list is having a positive effect in the private sector as well as the highest levels of government.

By CISA's own admission, even its own agencies aren't averse to missing a deadline here and there. It revealed back in December that an unnamed federal civilian executive branch (FCEB) missed a KEV deadline by more than three months and got pwned via a critical Adobe ColdFusion vulnerability.

That said, FCEBs are still much better than organizations at patching on time – they're 56 percent more likely to meet a CISA-imposed deadline than a private sector organization, according to Bitsight. 

In all, deadlines are missed 60 percent of the time, but technology companies were shown to be the fastest radiators of vulnerabilities with an average of 93 days. It makes sense, though, given that they're also the most exposed to KEVs and have a reputation to maintain in the tech community especially.

When CISA adds a bug to its KEV list, it always includes details about whether it has been used by ransomware attackers. That might be an outright confirmation or an "unknown," but the data suggests that the information lights a fire up the backsides of organizations that closely follow the catalog.

KEVs associated with ransomware activity are patched two and a half times faster than KEVs that aren't, which again makes sense given the potential financial cost of an attack.

It also appears to have the most influence on the patch times, more so than CVSS severity ratings. For example, critical KEVs – the most severe, damaging, and exploitable bugs – are fixed on average after nearly four and a half months (137 days).

High-severity vulnerabilities are fixed in 238 days on average, roughly double the time, and medium-severity bugs are largely overlooked – patched on average nearly one and a half years after disclosure.

"CISA's KEV catalog is a critical tool for any organization, and we've seen a positive impact on global vulnerability remediation rates – but most organizations are still too slow to mitigate," said Derek Vadala, chief risk officer at Bitsight. 

"Even critical severity vulnerabilities take four and a half months to remediate on average. The situation creates significant risk and speaks to the need for business leaders on the board and in the C-suite to recognize these vulnerabilities as the serious threats they are and demand a security posture that prioritizes deep insight and swift action. From there, organizations have an opportunity to grow."

Bitsight recommended organizations to impose their own strict deadlines on patching vulnerabilities that vary depending on the severity. They don't necessarily need to be as tight as CISA's in every case, but a suggested range would be seven days for critical bugs and KEVs, sliding up to 180 days for the low-severity issues.

Zero-days require their own emergency plans too. These should include clear protocols on how security teams can work to apply patches as an absolute priority, but also include provisions for when vendor patches aren't available.

All of these should have executive-level support and give security teams the authority to take action to secure the organization from vulnerabilities, especially those actively under attack. ®

Send us news
Post a comment

Check your IP cameras: There's a new Mirai botnet on the rise

Also, US offering $2.5M for Belarusian hacker, Backpage kingpins jailed, additional MOVEit victims, and more

Tired of airport security queues? SQL inject yourself into the cockpit, claim researchers

Infosec hounds say they spotted vulnerability during routine travel in the US

RansomHub hits 210 victims in just 6 months

The ransomware gang recruits high-profile affiliates from LockBit and ALPHV

White House’s new fix for cyber job gaps: Serve the nation in infosec

Now do your patriotic duty and fill one of those 500k open roles, please?

US sues Georgia Tech over alleged cybersecurity failings as a Pentagon contractor

Rap sheet spells out major no-nos after disgruntled staff blow whistle

Multiple flaws in Microsoft macOS apps unpatched despite potential risks

Windows giant tells Cisco Talos it isn't fixing them

Brain Cipher claims attack on Olympic venue, promises 300 GB data leak

French police reckon financial system targeted during Summer Games

Homeland security hopes to scuttle maritime cyber-threats with port infosec testbed

Supply chains, 13M jobs and $649B a year at risk, so Uncle Sam is fighting back - with a request for info

Deadline looms: Google Workspace mandates OAuth by September 30

27 days to get your users' third-party apps on Google’s sign-in

AMD reverses course: Ryzen 3000 CPUs will get SinkClose patch after all

Still no love for 1000- or 2000-series

RansomHub-linked EDR-killing malware spotted in the wild

Also: Your external-facing NetSuite sites need a review; five popular malware varieties for Q2, and more

Ransomware batters critical industries, but takedowns hint at relief

Whether attack slowdown continues downward trend is the million dollar question that security researchers can't answer