Unmasking CISA’s Hidden KEV Ransomware Updates | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware


In 2025, 59 vulnerabilities silently flipped to “known ransomware use.” If CISA updates a vulnerability’s status in the Known Exploited Vulnerabilities (KEV) catalog and nobody notices, did it even matter?

Stick around to the end for a new tool that exposes these hidden flips. But first, some background.

The Silent Flip

In October 2023, CISA added a knownRansomwareCampaignUse field to KEV, designed to help organizations prioritize more effectively. Relying on KEV for prioritization is already a trailing indicator, and waiting for the ransomware flag is even slower. But I get it: practitioners often need substantial evidence to move the needle internally. (Another problem for another day.)

CISA doesn’t just flag ransomware usage when vulnerabilities are added. They also silently update existing entries.

When that field flips from “Unknown” to “Known,” CISA is saying: “We have evidence that ransomware operators are now using this vulnerability in their campaigns.” That’s a material change in your risk posture. Your prioritization calculus should shift. But there’s no alert, no announcement. Just a field change in a JSON file.

This has always frustrated me. So I dug into the 2025 data to surface every silent flip.

What Was Found

59 vulnerabilities flipped.

Tracking these changes required pulling down a daily snapshot of KEV throughout 2025 and diffing the dailies for field changes. Silly, right?

Within the 59 CVEs:
Most flipped vendor Microsoft (27%)
% edge/network CVEs 34%
% legacy CVEs (pre-2023) 39%
Fastest time-to-ransomware flip 1 day
Longest time-to-ransomware flip 1,353 days
Peak month of flips May (41%)
Most flipped vulnerability type Authentication Bypass (14%)

Edge Devices Everywhere

Fortinet SSL-VPN. Ivanti Connect Secure. Palo Alto GlobalProtect. Check Point Security Gateway. Ransomware operators are building playbooks around your perimeter.

19 of the 59 target network security appliances, the very devices deployed to protect organizations. Legacy bugs show up too; Adobe Reader vulnerabilities from years ago suddenly became ransomware-relevant.

Authentication bypasses and RCE vulnerabilities led the pack as ransomware operators prioritize “get in and go” attack chains.

The Usual Suspects

The vendor breakdown shouldn’t surprise anyone:

  • Microsoft: 16 CVEs (SharePoint, Print Spooler, Group Policy, Mark-of-the-Web bypasses, and more)
  • Ivanti: 6 CVEs (Connect Secure auth bypass, command injection, SSRF, EPM)
  • Fortinet: 5 CVEs (FortiOS SSL-VPN heap overflows)
  • Palo Alto Networks: 3 CVEs (PAN-OS auth bypass, GlobalProtect command injection, privilege escalation)
  • Zimbra: 3 CVEs (still a reliable vector for email compromise)

Ransomware operators are economic actors after all. They invest in exploit development for platforms with high deployment and high-value access. Firewalls, VPN concentrators, and email servers fit that profile perfectly.

The Acceleration Problem

While some CVEs sat in KEV for years before the ransomware flag, the 2025 crop moved fast:

 

Today, ransomware operators are integrating fresh exploits into their playbooks faster than defenders are patching.

So What Can You Do About the Silent Flips?

Watch knownRansomwareCampaignUse. When it flips from “Unknown” to “Known,” reassess, especially if you’ve been deprioritizing that patch because “it’s not ransomware-related yet.”

Since my presentation at BSidesLV in 2024, I’ve hoped to see CISA provide more transparency by releasing a changelog or an RSS feed whenever updates occur, similar to the additions feed they already maintain. After complaining expressing my desires, my boss made encouraged me to create a solution myself.

So here it is:

Subscribe to the RSS feed at https://kev.labs.greynoise.io/kev-ransom-feed.rss

It checks hourly and will notify you whenever a ransomware flag flips. No more silent changes.

Recent Flips (January 28, 2026)

As an aside, the most recent flips occurred just a few days ago:

  • CVE-2024-49039 (Unknown → Known) — Microsoft Windows Task Scheduler Privilege Escalation Vulnerability
  • CVE-2024-51567 (Unknown → Known) — CyberPanel Incorrect Default Permissions Vulnerability
  • CVE-2024-9680 (Unknown → Known) — Mozilla Firefox Use-After-Free Vulnerability
  • CVE-2024-30088 (Unknown → Known) — Microsoft Windows Kernel TOCTOU Race Condition Vulnerability

The Bigger Picture

This data dive exposed a blind spot in how we consume threat intelligence. We’re good at reacting to new disclosures. Decent at tracking active exploitation. But we’re not great at noticing when the characterization of existing threats evolves.

CISA is already tracking these ransomware campaigns, correlating TTPs, and updating assessments. That intelligence only matters if defenders are watching the delta, not just the headlines.

So consider this your heads-up: the tree fell, and it absolutely made a sound. The question is whether your detection was tuned to hear it and whether it will be tomorrow.

Artifacts

The 59 CVEs that silently flipped in 2025:

CVE ID Vendor Date Added Date Flipped
CVE-2024-24919 Check Point 2024-05-30 2025-02-26
CVE-2023-23376 Microsoft 2023-02-14 2025-03-17
CVE-2023-48365 Qlik 2025-01-13 2025-03-17
CVE-2024-55591 Fortinet 2025-01-14 2025-03-17
CVE-2025-24472 Fortinet 2025-03-18 2025-03-19
CVE-2025-26633 Microsoft 2025-03-11 2025-03-31
CVE-2022-27925 Synacor 2022-08-11 2025-04-03
CVE-2022-37042 Synacor 2022-08-11 2025-04-03
CVE-2022-42475 Fortinet 2022-12-13 2025-04-07
CVE-2024-3400 Palo Alto Networks 2024-04-12 2025-04-07
CVE-2024-30051 Microsoft 2024-05-14 2025-04-07
CVE-2024-38094 Microsoft 2024-10-22 2025-04-07
CVE-2018-8639 Microsoft 2025-03-03 2025-04-07
CVE-2025-31161 CrushFTP 2025-04-07 2025-04-09
CVE-2025-29824 Microsoft 2025-04-08 2025-04-09
CVE-2015-2291 Intel 2023-02-10 2025-04-26
CVE-2019-11580 Atlassian 2021-11-03 2025-05-12
CVE-2021-22205 GitLab 2021-11-03 2025-05-12
CVE-2014-1812 Microsoft 2021-11-03 2025-05-12
CVE-2015-7645 Adobe 2022-03-03 2025-05-12
CVE-2008-2992 Adobe 2022-03-03 2025-05-12
CVE-2022-30190 Microsoft 2022-06-14 2025-05-12
CVE-2022-41091 Microsoft 2022-11-08 2025-05-12
CVE-2017-6884 Zyxel 2023-09-18 2025-05-12
CVE-2024-0012 Palo Alto Networks 2024-11-18 2025-05-12
CVE-2024-55550 Mitel 2025-01-07 2025-05-12
CVE-2024-41713 Mitel 2025-01-07 2025-05-12
CVE-2025-0282 Ivanti 2025-01-08 2025-05-12
CVE-2025-23006 SonicWall 2025-01-24 2025-05-12
CVE-2025-22457 Ivanti 2025-04-04 2025-05-12
CVE-2021-43890 Microsoft 2021-12-15 2025-05-13
CVE-2022-21999 Microsoft 2022-03-25 2025-05-13
CVE-2022-2294 WebRTC 2022-08-25 2025-05-13
CVE-2025-31324 SAP 2025-04-29 2025-05-15
CVE-2024-57727 SimpleHelp 2025-02-13 2025-05-27
CVE-2012-4681 Oracle 2022-03-03 2025-05-29
CVE-2012-1710 Oracle 2022-05-25 2025-05-29
CVE-2022-27924 Synacor 2022-08-04 2025-05-29
CVE-2022-30333 RARLAB 2022-08-09 2025-05-29
CVE-2021-44529 Ivanti 2024-03-25 2025-05-31
CVE-2023-43208 NextGen Healthcare 2024-05-20 2025-06-03
CVE-2024-21762 Fortinet 2024-02-09 2025-06-09
CVE-2019-6693 Fortinet 2025-06-25 2025-07-14
CVE-2019-0708 Microsoft 2021-11-03 2025-07-18
CVE-2025-49704 Microsoft 2025-07-22 2025-07-24
CVE-2025-49706 Microsoft 2025-07-22 2025-07-24
CVE-2025-53770 Microsoft 2025-07-20 2025-08-04
CVE-2025-5777 Citrix 2025-07-10 2025-08-15
CVE-2025-10035 Fortra 2025-09-29 2025-10-07
CVE-2025-61882 Oracle 2025-10-06 2025-10-07
CVE-2023-46805 Ivanti 2024-01-10 2025-10-08
CVE-2024-21887 Ivanti 2024-01-10 2025-10-08
CVE-2024-21893 Ivanti 2024-01-31 2025-10-08
CVE-2024-21412 Microsoft 2024-02-13 2025-10-08
CVE-2025-61884 Oracle 2025-10-20 2025-10-22
CVE-2024-9474 Palo Alto Networks 2024-11-18 2025-10-30
CVE-2024-1086 Linux 2024-05-30 2025-10-31
CVE-2025-55182 Meta 2025-12-05 2025-12-12
CVE-2024-53704 SonicWall 2025-02-18 2025-12-19

——————————————————–


Click Here For The Original Source.

.........................

National Cyber Security

FREE
VIEW