Skip to content
Known Exploited Vulnerabilities
ConceptUS

Known Exploited Vulnerabilities

CISA's KEV catalogue of CVEs with confirmed active exploitation; 9 CVEs added in 30 days including CitrixBleed 3, F5 BIG-IP RCE, and a 17-year-old Office bug.

Last refreshed: 17 April 2026 · Appears in 1 active topic

Key Question

What happens to CISA's must-patch list if the agency loses 860 staff?

Timeline for Known Exploited Vulnerabilities

#117 Apr

Mentioned in: CitrixBleed 3 lands on SAML broker

Cybersecurity: Threats and Defences
#117 Apr

Mentioned in: F5 reclassifies DoS bug to 9.8 RCE

Cybersecurity: Threats and Defences
#117 Apr

Mentioned in: 17-year-old Office RCE back on KEV

Cybersecurity: Threats and Defences
#117 Apr
View full timeline →
Common Questions
What is CISA's Known Exploited Vulnerabilities catalogue?
CISA's KEV catalogue lists CVEs with confirmed active exploitation. Federal agencies must patch KEV CVEs within set deadlines under Binding Operational Directive 22-01. In 30 days ending April 2026, CISA added 9 CVEs including CitrixBleed 3, F5 BIG-IP RCE, and a 17-year-old Microsoft Office vulnerability.Source: CISA
Does the CISA KEV list apply to private companies?
CISA's KEV catalogue is mandatory only for Federal Civilian Executive Branch agencies. Private-sector organisations are not legally required to patch KEV CVEs but widely use KEV addition as the strongest available signal of active exploitation to prioritise their own patch programmes.Source: CISA BOD 22-01

Background

The CISA Known Exploited Vulnerabilities (KEV) catalogue is the primary operational mechanism for communicating mandatory patch obligations to Federal Civilian Executive Branch (FCEB) agencies and urgency signals to private-sector organisations. In the 30-day window covered by this update, CISA added nine CVEs including CVE-2026-3055 (CitrixBleed 3), CVE-2025-53521 (F5 BIG-IP APM, reclassified to CVSS 9.8 RCE), CVE-2009-0238 (17-year-old Microsoft Office RCE), CVE-2026-21643 (Fortinet SQL injection) and CVE-2026-32201 (SharePoint spoofing zero-day).

The KEV catalogue was established under CISA's Binding Operational Directive 22-01 in November 2021. FCEB agencies must remediate KEV CVEs within specified windows (typically 14 days for non-critical and 2–7 days for critical). Private-sector organisations are not bound by BOD 22-01 but treat KEV addition as the strongest available public signal of active exploitation. The KEV catalogue is the data feed that drives patch-prioritisation tooling in Qualys, Tenable, Rapid7 and most Major vulnerability management platforms.

For enterprise patch-management teams, the KEV's nine-CVE addition rate in 30 days, against the backdrop of a proposed $707m CISA cut, is the core tension: the catalogue's obligations are growing while the agency responsible for maintaining and enforcing them faces a proposed one-third budget reduction.