Enhanced VulnCheck Bug Listing for Efficient Monitoring of Emerging Threats

VulnCheck, an exploit intelligence specialist based in the US, has launched its own catalogue of Known Exploited Vulnerabilities (KEV). The aim is to make impactful common vulnerabilities and exposures (CVEs) more widely known among end-users. The tool will be accessible for free to members of the VulnCheck community, providing security teams and defenders with information on vulnerabilities being exploited in the wild. This will help them better manage threats, determine priority areas, and stay ahead of problematic bugs.

VulnCheck’s initiative is inspired by the well-known KEV catalogue operated by the US Cybersecurity Infrastructure and Security Agency (CISA), which tracks vulnerabilities that pose a threat to US government entities. However, this catalogue does not apply to private organizations or the general public. VulnCheck claims to track 876 (81%) more vulnerabilities being exploited in the wild than CISA, and it adds new bugs to its catalogue 27 days earlier than CISA.

VulnCheck’s Founder and CEO, Anthony Bettini, explained that while the CISA KEV catalogue is valuable, there is an opportunity for broader visibility and earlier indicators of known exploitation. Therefore, VulnCheck decided to offer a community resource that provides comprehensive knowledge on exploited vulnerabilities, delivered at machine speed.

Coalition, a provider of cyber risk and insurance services, conducted recent research that predicted a 25% growth in the total number of disclosed CVEs by 2024, reaching nearly 35,000. Given this rapid growth and the quick exploitation by malicious actors, VulnCheck believes that the ability to move quickly and access a wide range of data is invaluable for security teams, which it hopes to provide through its service.

The new service includes features such as comprehensive CVE tracking, contextual exploit intelligence, and exploit references. It provides citations for all listed CVEs, giving defenders insight into why a specific CVE is included in the catalogue. For example, it may provide evidence if a particular CVE is being used by a ransomware gang.

The VulnCheck KEV dashboard, machine-readable JSON, and the VulnCheck KEV API endpoint are now available for community members to access the tool.

As a demonstration of the service’s capabilities, VulnCheck shared a case study involving a recently disclosed CVE in Atlassian Confluence Server. The vulnerability (CVE-2023-22527), a remote code execution (RCE) flaw, was disclosed by Atlassian on 16 January 2024. VulnCheck observed exploitation of the vulnerability by 21 January and added it to the KEV catalogue that same day. Confirmation of exploitation came on 22 January, and exploit PoCs were added to GitHub. Finally, the bug was added to CISA’s catalogue on 24 January, with a remediation deadline of 14 February.

Unlock your business potential with our expert guidance. Get in touch now!

silenced-gagged-secret-Michael-adobe.jpg

Post Office Criticized for Deleting Comments on IT Scandal from Social Media

Whitehouse-fotolia-scaled.jpg

When Leaders Overlook Cybersecurity Guidelines, the Entire System Suffers

Police-crime-2-adobe.jpg

Police Digital Service Board Director Resigns Months After CISO’s Departure

surveillance-CCTV-facial-recognition-Gorodenkoff-adobe.jpg

Essex Police Reveals ‘Incoherent’ Facial Recognition Evaluation

chatbot-1-fotolia.jpg

Podcast: RSA 2025 – Navigating AI Risks and the CISO’s Role

hybrid-cloud-storage-fotolia.jpg

Trump’s Visit Strengthens Saudi Arabia’s AI Initiatives

threat-management-fotolia.jpg

Security Tests Uncover Major Vulnerability in Government’s One Login Digital ID System