CISA KEV Scraper - CVE Threat Intelligence Feed avatar

CISA KEV Scraper - CVE Threat Intelligence Feed

Pricing

from $2.00 / 1,000 results

Go to Apify Store
CISA KEV Scraper - CVE Threat Intelligence Feed

CISA KEV Scraper - CVE Threat Intelligence Feed

Extract CISA Known Exploited Vulnerabilities (KEV) catalog data. Filter by vendor, product, date range, and ransomware flag. Includes computed remediation due-date fields.

Pricing

from $2.00 / 1,000 results

Rating

0.0

(0)

Developer

Professional Edge

Professional Edge

Maintained by Community

Actor stats

0

Bookmarked

2

Total users

1

Monthly active users

10 days ago

Last modified

Share

CISA Known Exploited Vulnerabilities (KEV) Scraper

Extract structured vulnerability data from the CISA Known Exploited Vulnerabilities (KEV) catalog — the authoritative list of CVEs actively exploited in the wild, maintained by the U.S. Cybersecurity and Infrastructure Security Agency. This Actor fetches the complete KEV catalog and provides powerful filtering, computed remediation fields, and clean JSON output ready for security automation pipelines.

The KEV catalog is the foundation of Binding Operational Directive (BOD) 22-01, which requires all U.S. federal agencies to remediate listed vulnerabilities by their due dates. Security teams worldwide use it as a prioritization signal — if a CVE is in the KEV, it is being actively exploited and should be patched immediately.

Key Features

  • Complete KEV catalog extraction — All 1,500+ actively exploited vulnerabilities in a single request
  • Vendor and product filtering — Case-insensitive partial match (e.g., "Microsoft", "Chrome", "Apache")
  • Date range filtering — Filter by date added to catalog or remediation due date
  • Ransomware flag — Isolate CVEs known to be used in ransomware campaigns
  • Computed fieldsdaysSinceAdded and daysUntilDue calculated at extraction time (negative = overdue)
  • No authentication required — Public CISA API, no keys or credentials needed
  • Batch-optimized output — Clean JSON ready for SIEM ingestion, ticketing systems, or RAG pipelines

Output Data Fields

FieldTypeDescription
cveIDstringCVE identifier (e.g., CVE-2024-12345)
vendorProjectstringVendor or project name (e.g., Microsoft, Apache)
productstringAffected product (e.g., Windows, Exchange Server)
vulnerabilityNamestringHuman-readable vulnerability name
dateAddedstringDate the CVE was added to the KEV catalog (YYYY-MM-DD)
dueDatestringRemediation due date per BOD 22-01 (YYYY-MM-DD)
daysSinceAddedintegerDays since the CVE was added (computed at run time)
daysUntilDueintegerDays until remediation deadline (negative = overdue)
shortDescriptionstringBrief description of the vulnerability
requiredActionstringCISA-recommended remediation action
knownRansomwareCampaignUsebooleanWhether the CVE is known to be used in ransomware
notesstringAdditional notes (may contain URLs)
catalogVersionstringKEV catalog version at time of extraction
catalogDateReleasedstringKEV catalog release date

How to Scrape the CISA KEV Catalog

  1. Navigate to the CISA KEV Scraper Actor page on Apify Store.
  2. Click Start to open the input configuration form.
  3. (Optional) Enter a Vendor Filter to narrow results to a specific vendor (e.g., "Microsoft").
  4. (Optional) Enter a Product Filter to narrow results to a specific product (e.g., "Exchange").
  5. (Optional) Set Date Added After to only retrieve recently added CVEs (e.g., "2025-01-01").
  6. (Optional) Toggle Ransomware Only to isolate CVEs with known ransomware exploitation.
  7. Set Max Results to control the output size (default: 1000, set to 0 for unlimited).
  8. Click Start to run the Actor.
  9. Download results as JSON, CSV, or Excel from the Dataset tab.

Input Example

{
"vendorFilter": "Microsoft",
"dateAddedAfter": "2025-01-01",
"ransomwareOnly": false,
"maxResults": 50
}

Output Example

{
"cveID": "CVE-2025-21391",
"vendorProject": "Microsoft",
"product": "Windows",
"vulnerabilityName": "Microsoft Windows Storage Link Following Vulnerability",
"dateAdded": "2025-02-11",
"dueDate": "2025-03-04",
"daysSinceAdded": 33,
"daysUntilDue": -12,
"shortDescription": "Microsoft Windows Storage contains a link following vulnerability that could allow for privilege escalation.",
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"knownRansomwareCampaignUse": false,
"notes": "",
"catalogVersion": "2025.03.13",
"catalogDateReleased": "2025-03-13"
}

Pricing

This Actor fetches data from a free public API in a single HTTP request. Compute costs are minimal.

  • Cost per run: ~$0.001 (single API call, no browser required)
  • Actor start event: Default platform rate
  • Per-result pricing: $0.001/result

Typical run time is under 10 seconds regardless of filter settings.

Use Cases

  • Vulnerability management automation — Feed KEV data into Jira, ServiceNow, or custom ticketing to auto-create remediation tickets for overdue CVEs
  • SOC dashboards — Integrate with Splunk, Elastic, or Sentinel to flag KEV-listed CVEs in your environment
  • Compliance monitoring — Track BOD 22-01 compliance by comparing your asset inventory against KEV due dates
  • Threat intelligence enrichment — Enrich your CVE feeds with KEV status and ransomware exploitation flags
  • Security research — Analyze trends in actively exploited vulnerabilities by vendor, product, or time period
  • RAG pipeline ingestion — Clean structured output ready for LLM-based security analysis

FAQ

How often is the KEV catalog updated? CISA updates the catalog as new actively exploited vulnerabilities are confirmed. Updates can happen multiple times per week.

Do I need an API key? No. The KEV catalog is publicly available with no authentication required.

What does a negative daysUntilDue mean? A negative value means the remediation deadline has passed. For example, -30 means the CVE was due for remediation 30 days ago.

Can I get only ransomware-related CVEs? Yes. Set the ransomwareOnly input to true to filter exclusively for CVEs known to be exploited in ransomware campaigns.

Is this data suitable for compliance reporting? Yes. The KEV catalog is the official CISA source used for BOD 22-01 compliance. This Actor preserves all original fields and adds computed date fields.

This Actor extracts publicly available data from the CISA Known Exploited Vulnerabilities catalog, which is published as open government data. No authentication or terms-of-service bypass is involved. Users are responsible for ensuring their use of the extracted data complies with applicable laws and regulations. For support, contact the Actor developer through the Apify Store.