{"id":7245,"date":"2022-08-25T08:05:49","date_gmt":"2022-08-25T08:05:49","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7245"},"modified":"2024-04-19T09:35:02","modified_gmt":"2024-04-19T16:35:02","slug":"top-scanners-fail-to-flag-dhs-cisa-warned-known-exploited-vulnerabilities-kev","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/top-scanners-fail-to-flag-dhs-cisa-warned-known-exploited-vulnerabilities-kev\/","title":{"rendered":"Top Scanners Fail to Flag DHS CISA-warned Known Exploited Vulnerabilities (KEV)"},"content":{"rendered":"
\n

Did you know 58\u00a0actively exploited vulnerabilities in the CISA KEV catalog are not being detected by popular scanners?<\/p>\n<\/blockquote>\n

Security teams rely on vulnerability scanners to scan their network, systems, and assets for vulnerabilities. When the same scanners fail to detect critical vulnerabilities, organizations are exposed to risks and threats that could have been prevented.<\/p>\n

On November 3, 2021, a directive from the Department of Homeland Security CISA was published to reduce the significant risk of exploited vulnerabilities. Since then, CISA has maintained a list of known exploited vulnerabilities that\u2019s being updated multiple times in a week, if not more. Considering that previously exploited vulnerabilities are a common vector for malevolent cyber actors, CISA emphasizes these vulnerabilities as the most serious threats and must be promptly remediated.<\/p>\n

We looked into the catalog and found that 58 actively known exploited CVEs were missed by top scanners such as Nessus, Nexpose, and Qualys.<\/p>\n\n\n\n<\/colgroup>\n\n\n\n\n\n\n\n
\n

CISA Known Exploited Vulnerabilities<\/p>\n<\/td>\n

\n

892<\/p>\n<\/td>\n<\/tr>\n

\n

Known Exploited Vulnerabilities Undetected by Scanners<\/p>\n<\/td>\n

\n

58<\/p>\n<\/td>\n<\/tr>\n

\n

RCE\/PE<\/p>\n<\/td>\n

\n

8<\/p>\n<\/td>\n<\/tr>\n

\n

Trending CVEs<\/p>\n<\/td>\n

\n

27<\/p>\n<\/td>\n<\/tr>\n

\n

Ransomware Association<\/p>\n<\/td>\n

\n

4<\/p>\n<\/td>\n<\/tr>\n

\n

APT Groups<\/p>\n<\/td>\n

\n

2<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

On a positive note, we see many vulnerabilities having received their plugins with more recent updates. This is a step in the right direction and we look forward to scanners releasing plugins for the rest of the vulnerabilities as well.<\/span><\/p>\n

Vulnerabilities Missed by Scanners<\/b><\/h2>\n

We examined the vulnerabilities missed by top scanners and found that organizations that depend on these scanners to have their back are at a huge disadvantage -Vulnerabilities missed by Scanners<\/p>\n