In a recent development, the Cybersecurity and Infrastructure Security Agency (CISA) has incorporated three new vulnerabilities into its Known Exploited Vulnerabilities (KEV) Catalog. This update, made on July 28, 2025, signals a heightened awareness of the cyber threats that could exploit these flaws.
The vulnerabilities include CVE-2023-2533, a Cross-Site Request Forgery (CSRF) vulnerability in PaperCut NG/MF, and two injection vulnerabilities in the Cisco Identity Services Engine, identified as CVE-2025-20337 and CVE-2025-20281. These vulnerabilities are not merely technical details; they represent frequent attack vectors for cybercriminals that can significantly jeopardize federal networks.
CISA's action stems from its ongoing commitment to enhance cybersecurity across federal entities. Acknowledging the risks associated with these vulnerabilities, CISA declared, "These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise." This statement underlines the importance of the ongoing vigilance needed to address these security flaws.

The addition of these vulnerabilities to the KEV Catalog is rooted in the Binding Operational Directive 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities. This directive established the KEV Catalog as a dynamic resource, compiling Common Vulnerabilities and Exposures (CVEs) that threaten federal infrastructure. It explicitly requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by a set deadline to shield their systems from active threats.
Echoing the need for comprehensive cybersecurity practices, CISA emphasizes that although BOD 22-01 primarily targets FCEB agencies, all organizations should adopt similar vigilance. "CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice," said a CISA representative. This advocacy for broader compliance reflects a growing recognition of the interconnectedness of cybersecurity across both governmental and private sectors.
"CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice,"

CISA's catalog is not static; it will continue to evolve as new vulnerabilities are identified and assessed. The agency's proactive stance illustrates an ongoing dedication to safeguarding digital infrastructures from ever-evolving cyber threats. As vulnerabilities are added, so too is the expectation that organizations take swift action.
For those managing cybersecurity within their organizations, this update serves as a crucial reminder of the importance of strong vulnerability management. Ensuring timely remediation is a vital step in mitigating the risks posed by cyber actors.
Looking Ahead
Looking Ahead
Looking Ahead
As CISA deliberates on future updates to the KEV Catalog, stakeholders in all sectors must remain engaged and informed. Continuous improvement of cybersecurity practices will be essential to combat the increasing frequency and sophistication of cyberattacks. The active response to these vulnerabilities not only fortifies the integrity of federal networks but also contributes to a more resilient overall cyber environment.


