Mar 04, 2025 • GreyNoise Blog
GreyNoise Observes Exploitation of Three Newly Added KEV Vulnerabilities
The Cybersecurity and Infrastructure Security Agency (CISA) updated its Known Exploited Vulnerabilities (KEV) catalog on March 3, 2025, adding multiple new...
Executive Summary
The Cybersecurity and Infrastructure Security Agency (CISA) updated its Known Exploited Vulnerabilities (KEV) catalog on March 3, 2025, adding multiple new entries confirmed to be actively exploited in the wild. While specific vulnerability identifiers remain undisclosed in this report, the inclusion signifies immediate risk requiring prioritized remediation. GreyNoise observed exploitation activity related to these additions, highlighting the urgency for organizations to patch affected systems. The discrepancy between the title citing three vulnerabilities and the text mentioning five suggests evolving intelligence. This update underscores the persistent threat landscape where unpatched software serves as a primary vector for compromise. Security teams should immediately review the official CISA KEV catalog to identify relevant CVEs and apply vendor patches. Proactive vulnerability management is critical to mitigate the risk of unauthorized access and potential data breaches associated with these confirmed exploitation campaigns targeting public and private sector infrastructure globally.
Summary
On March 3, 2025, the Cybersecurity and Infrastructure Security Agency added five vulnerabilities to its Known Exploited Vulnerabilities catalog, confirming their exploitation in the wild.
Published Analysis
The Cybersecurity and Infrastructure Security Agency (CISA) updated its Known Exploited Vulnerabilities (KEV) catalog on March 3, 2025, adding multiple new entries confirmed to be actively exploited in the wild. While specific vulnerability identifiers remain undisclosed in this report, the inclusion signifies immediate risk requiring prioritized remediation. GreyNoise observed exploitation activity related to these additions, highlighting the urgency for organizations to patch affected systems. The discrepancy between the title citing three vulnerabilities and the text mentioning five suggests evolving intelligence. This update underscores the persistent threat landscape where unpatched software serves as a primary vector for compromise. Security teams should immediately review the official CISA KEV catalog to identify relevant CVEs and apply vendor patches. Proactive vulnerability management is critical to mitigate the risk of unauthorized access and potential data breaches associated with these confirmed exploitation campaigns targeting public and private sector infrastructure globally. On March 3, 2025, the Cybersecurity and Infrastructure Security Agency added five vulnerabilities to its Known Exploited Vulnerabilities catalog, confirming their exploitation in the wild. On March 3, 2025, the Cybersecurity and Infrastructure Security Agency added five vulnerabilities to its Known Exploited Vulnerabilities catalog, confirming their exploitation in the wild.