59 KEV Entries Quietly Flagged for Ransomware Use in 2025
GreyNoise reveals CISA silently updated ransomware indicators on 59 vulnerabilities without alerts. New RSS feed tool catches changes within an hour.
CISA quietly updated the ransomware status of 59 vulnerabilities in its Known Exploited Vulnerabilities (KEV) catalog throughout 2025—without issuing public alerts or notifications. Security teams tracking the catalog for patch prioritization may have missed these critical updates, leaving systems exposed to ransomware operators who had already weaponized the flaws.
GreyNoise published the research on February 2, revealing that the KEV's knownRansomwareCampaignUse field silently flipped from "Unknown" to "Known" on dozens of entries. The changes happened over months, with 41% concentrated in a single May spike. Organizations relying on KEV additions alone missed the signal that existing vulnerabilities had graduated to ransomware-grade threats.
The Silent Update Problem
The KEV catalog serves as CISA's authoritative list of vulnerabilities confirmed under active exploitation. Security teams use it to prioritize patching, and BOD 22-01 mandates federal agencies remediate cataloged vulnerabilities within specific timeframes. But the ransomware flag—arguably the most urgent indicator—updates without any accompanying alert.
When a vulnerability shifts to "Known" ransomware use, the risk profile changes dramatically. Ransomware operators have industrialized their exploitation chains. A vulnerability flagged for ransomware use isn't a theoretical risk; it's actively being deployed against organizations for extortion.
GreyNoise found that some vulnerabilities waited over 1,353 days between KEV entry and ransomware designation. Others flipped within a single day. The inconsistency means organizations can't assume a "clean" ransomware status will remain stable.
Vendor Breakdown
Microsoft led the silent updates with 16 CVEs—27% of all ransomware flag changes. The concentration makes sense given Windows' dominance in enterprise environments and ransomware operators' corresponding focus on Microsoft attack surfaces. The January 2026 Patch Tuesday updates included several flaws that could follow this pattern—reaching KEV first, then quietly gaining ransomware designation months later.
Other heavily represented vendors:
- Ivanti: 6 CVEs
- Fortinet: 5 CVEs
- Palo Alto Networks: 3 CVEs
- Zimbra: 3 CVEs
The Fortinet and Palo Alto numbers are particularly concerning. Network perimeter devices provide initial access for ransomware operations, and both vendors have faced ongoing vulnerability disclosures throughout the past year.
Vulnerability Characteristics
GreyNoise's analysis revealed patterns in which vulnerabilities attract ransomware attention:
- 34% targeted edge and network devices—firewalls, VPN concentrators, and remote access gateways
- 39% were legacy vulnerabilities (pre-2023)—patching debt continues to create opportunities
- 14% were authentication bypass flaws—the most common vulnerability type
Authentication bypass is the perfect ransomware prerequisite. Skip the login, deploy the payload. The preference for edge devices reflects ransomware groups' operational patterns: compromise perimeter systems first, then move laterally toward data worth encrypting.
January 2026 Updates
The most recent batch of ransomware designations, from January 28, 2026, included:
- CVE-2024-49039: Windows Task Scheduler privilege escalation
- CVE-2024-51567: CyberPanel default permissions issue
- CVE-2024-9680: Mozilla Firefox use-after-free
These updates happened without announcement. Organizations that patched based on the original KEV addition but didn't revisit prioritization missed the signal that ransomware operators now use these flaws routinely.
The GreyNoise Solution
GreyNoise released an RSS feed that monitors the KEV catalog hourly and alerts subscribers when ransomware flags change:
https://kev.labs.greynoise.io/kev-ransom-feed.rss
The feed addresses the transparency gap by providing near-real-time notification when CISA updates ransomware status. Security teams can subscribe through standard RSS readers or integrate the feed into SIEM platforms and ticketing systems.
Recommendations
The silent update pattern creates a monitoring burden that most organizations haven't addressed. Steps to close the gap:
- Subscribe to the GreyNoise RSS feed for hourly ransomware flag updates
- Audit current KEV coverage against the
knownRansomwareCampaignUsefield—don't assume past assessments remain valid - Prioritize edge device patching—one-third of ransomware-flagged vulnerabilities target network perimeter systems
- Revisit legacy vulnerabilities—the 39% legacy figure means 2023 and older CVEs are still being weaponized
CISA's catalog remains the gold standard for exploitation intelligence, but its notification practices haven't kept pace with how security teams actually use the data. Until that changes, third-party monitoring fills a gap that shouldn't exist.
Related Articles
Three Days to Patch: CISA's Urgent SolarWinds Deadline Explained
Federal agencies face an aggressive Friday deadline to patch CVE-2025-40551 in SolarWinds Web Help Desk. The compressed timeline signals serious active exploitation.
Feb 4, 2026CISA Adds SolarWinds, Sangoma, GitLab Flaws to KEV
Four actively exploited vulnerabilities added to CISA's catalog including SolarWinds Web Help Desk deserialization flaw with CVSS 9.8. Federal agencies have until February 6 to patch.
Feb 4, 2026Ivanti EPMM Zero-Days Under Attack, CISA Sets Friday Deadline
Two critical code injection flaws in Ivanti Endpoint Manager Mobile enable unauthenticated RCE. Federal agencies must remediate by February 1.
Jan 30, 2026Microsoft Office Zero-Day Under Active Attack Gets Emergency Patch
CVE-2026-21509 bypasses OLE security protections across Office 2016-2024. CISA adds it to KEV catalog with February 16 deadline.
Jan 27, 2026