Cybersecurity12 Aug 2025 3m cisa.gov

CISA Expands Vulnerability Catalog with Three New Entries

CISA has identified three critical vulnerabilities that pose risks due to active exploitation, urging organizations to address these threats promptly.
CISA Expands Vulnerability Catalog with Three New Entries

Key Takeaways

  • 1."The BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats," stated CISA in their announcement.
  • 2.CISA's bond with proactive cybersecurity stems from the implementation of the Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities.
  • 3."CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice," the agency reiterated.

In a move to strengthen cybersecurity measures, the Cybersecurity and Infrastructure Security Agency (CISA) has incorporated three newly identified vulnerabilities into its Known Exploited Vulnerabilities (KEV) Catalog as of August 12, 2025. The announcement highlights the increasing urgency for both federal and private sector organizations to mitigate risks associated with these vulnerabilities.

The new entries include CVE-2025-8088, a RARLAB WinRAR Path Traversal Vulnerability; CVE-2007-0671, which pertains to Microsoft Office Excel's potential for remote code execution; and CVE-2013-3893, relating to resource management errors in Microsoft Internet Explorer. These vulnerabilities have shown to be common attack vectors for malicious cyber actors, raising alarm about the potential threats they pose to federal enterprises.

CISA's bond with proactive cybersecurity stems from the implementation of the Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities. This directive creates a dynamic catalog of Common Vulnerabilities and Exposures (CVEs) that present substantial risks within federal networks. "The BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats," stated CISA in their announcement.

"The BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats,"

Person using laptop with holographic cybersecurity shield and digital interface elements
Person using laptop with holographic cybersecurity shield and digital interface elements

While the directive specifically targets FCEB agencies, CISA emphasizes that all organizations should prioritize remediation of vulnerabilities listed in the KEV Catalog as part of their standard vulnerability management strategies. "CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice," the agency reiterated. This guidance underscores the need for not just federal agencies, but all sectors to strengthen their defenses.

"CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice,"

Multiple computer monitors displaying cybersecurity dashboards, world maps, and data analytics in a dark control room
Multiple computer monitors displaying cybersecurity dashboards, world maps, and data analytics in a dark control room

As the cybersecurity landscape continues to evolve, CISA maintains a commitment to regularly update the KEV Catalog by incorporating vulnerabilities that meet certain criteria. This proactive approach is crucial for staying ahead of emerging threats. "CISA will continue to add vulnerabilities to the catalog that meet the specified criteria," the agency mentioned, reinforcing its role in maintaining cybersecurity resilience.

"CISA will continue to add vulnerabilities to the catalog that meet the specified criteria,"

Organizations are strongly motivated to act on these vulnerabilities, engaging in timely remediation efforts to safeguard their systems. By addressing these risks effectively, businesses can enhance their overall cyber hygiene and defensive strategies.

In light of these developments, it remains critical for entities across different industries to stay informed and proactive regarding cybersecurity threats. The swift update of the KEV Catalog serves as a reminder of the constant vigilance required in cybersecurity efforts to thwart potential attacks. CISA’s ongoing commitment to expanding this list is an essential aspect of ensuring both federal and private sector organizations maintain robust security postures against evolving cyber threats.