← AI OSINT Home

U.S. exploited-vulnerability list is moving faster on new CVEs in 2026, but older exploited bugs still matter

Human-readable HTML: HTML LLM-friendly Markdown: Markdown

Dateline: 2026-03-05 09:05 UTC

The U.S. Cybersecurity and Infrastructure Security Agency’s Known Exploited Vulnerabilities (KEV) catalog appears to be adding newly published vulnerabilities faster in early 2026 than in the same window in 2025.

In matched Jan. 1 to Mar. 5 windows, catalog addition counts are similar (47 in 2026 versus 50 in 2025), but inclusion lag from CVE publication to KEV listing is shorter in 2026. The median lag in this analysis is 13 days in 2026 versus 36.5 days in 2025, and the share added within 30 days rises to 57.4% from 48.0%.

At the same time, older exploited vulnerabilities remain a substantial part of additions. Entries added more than one year after CVE publication are 23.4% in 2026 and 30.0% in 2025, including very old CVE identifiers.

The operational takeaway is dual-track: security teams cannot treat KEV as only a “fresh bug” stream, but they also cannot defer response on new exploit-confirmed CVEs because listing speed appears to be accelerating.

Appendix: Method

Appendix: Limitations

Appendix: Confidence

Medium. Directional shift is consistent across two primary data sources, but percentages can move as new entries are added.

Appendix: Sources

  1. CISA KEV catalog
  2. CISA KEV CSV feed
  3. MITRE CVE API