Understanding CISA KEV and EPSS threat intelligence

Two threat intelligence sources have fundamentally changed how security teams approach vulnerability prioritization: CISA's Known Exploited Vulnerabilities (KEV) catalog and the Exploit Prediction Scoring System (EPSS). Together, they provide a powerful complement to traditional CVSS scoring by answering the questions that matter most: "Is this being exploited?" and "Will this be exploited?"

CISA KEV: The "Confirmed Exploited" List

Launched in November 2021, the Known Exploited Vulnerabilities catalog is maintained by the Cybersecurity and Infrastructure Security Agency (CISA). It is a curated list of CVEs that have been confirmed as actively exploited in real-world attacks.

What Makes KEV Unique

Unlike CVSS, which rates a vulnerability's theoretical severity, KEV answers a binary question: has this vulnerability been exploited in the wild? Every entry in the catalog meets strict criteria:

For U.S. federal agencies, remediating KEV entries is mandatory under Binding Operational Directive (BOD) 22-01, with specific deadlines. But even for private organizations, the KEV catalog serves as an authoritative signal that a vulnerability represents immediate, real-world risk.

KEV by the Numbers

As of late 2025, the KEV catalog contains over 1,100 entries. While that may seem like a lot, it represents a tiny fraction of the 200,000+ total CVEs published. This selectivity is exactly what makes it valuable: if a vulnerability appears on KEV, it has been vetted by CISA analysts and confirmed as a genuine threat.

Key patterns in the KEV data reveal important insights for security teams:

EPSS: Predicting Future Exploitation

While KEV tells you what has been exploited, the Exploit Prediction Scoring System (EPSS) estimates what is likely to be exploited. Developed by the Forum of Incident Response and Security Teams (FIRST), EPSS uses machine learning to produce a probability score for each CVE.

How EPSS Works

EPSS analyzes a wide range of features for each vulnerability, including:

The output is a probability between 0 and 1, representing the estimated likelihood that a vulnerability will be exploited in the next 30 days. For example, an EPSS score of 0.85 means the model estimates an 85% chance of exploitation within the next month.

Why EPSS Matters

EPSS addresses a critical gap in traditional prioritization. Consider two vulnerabilities, both with a CVSS score of 9.8 (Critical):

Without EPSS, both vulnerabilities would receive the same urgency based on CVSS alone. With EPSS, the security team can make an informed decision about which to patch first.

EPSS Performance

EPSS has been independently validated and shows strong predictive power. The model is updated daily, incorporating the latest threat intelligence data. Research has shown that using EPSS in combination with CVSS significantly outperforms either metric alone for prioritization accuracy.

Using KEV and EPSS Together

KEV and EPSS serve complementary roles in a modern vulnerability management program:

A practical prioritization framework might look like this:

Integrating Into Your Workflow

To get the most from KEV and EPSS, integrate them directly into your vulnerability management tooling:

The Bottom Line

CISA KEV and EPSS represent the most significant advancement in vulnerability prioritization in the past decade. By moving beyond static CVSS scores and incorporating real-world exploitation data and predictive intelligence, security teams can finally answer the question that matters: "Which vulnerabilities are most likely to be used against us, and which should we fix first?"

KEV + EPSS + ML, all in one platform

Exploit Score automatically integrates CISA KEV, EPSS scores, and proprietary ML predictions to give you a single, actionable priority for every vulnerability.

Request a Demo