Skip to main content

A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog

Project description

Python versions

KEV Checker

This tool retrieves and processes the latest CISA's Known Exploited Vulnerabilities (KEV) data. The data is stored in a CSV file and is processed using the pandas library.

Main Requirements

  • Python 3
  • pandas
  • requests
  • argparse

Installation

pip3 install --upgrade git+https://github.com/santosomar/kev_checker

Make an editable install if you want to make changes/enhancements to the code

git clone https://github.com/santosomar/kev_checker
cd kev_checker
pip3 install --upgrade -e .

Usage

kev-checker <search>

<search> can be either:

  • a CVE ID in the format "CVE-YYYY-NNNNN"
  • a vendor or open source project
  • a product name (keyword search)
  • or a date range in the format "YYYY-MM-DD:YYYY-MM-DD".

All input is case insensitive.

Examples

CVE ID

This command will retrieve and process the KEV data, and output all records that have a "cveID" field that matches "CVE-2023-21674".

kev-checker CVE-2023-21674

Output:

              cveID vendorProject  product  dateAdded
869  CVE-2023-21674     Microsoft  Windows 2023-01-10

Vendor or Open Source Project

This command will retrieve and process the KEV data, and output all records that have a "vendorProject" field that matches "Microsoft".

kev-checker openssl

Output:

             cveID vendorProject  product  dateAdded
658  cve-2014-0160       openssl  openssl 2022-05-04

Product

This command will retrieve and process the KEV data, and output all records that have a "product" field that matches "Cisco IOS XR products".

kev-checker "IOS XR"

Output:

              cveID vendorProject product
59    CVE-2020-3118         Cisco  IOS XR
60    CVE-2020-3566         Cisco  IOS XR
61    CVE-2020-3569         Cisco  IOS XR
564   CVE-2010-3035         Cisco  IOS XR
566   CVE-2009-2055         Cisco  IOS XR
662  CVE-2022-20821         Cisco  IOS XR

Time Range

This command will retrieve and process the KEV data, and output all records that have a "dateAdded" field within the range of January 1, 2023 to December 31, 2023.

kev-checker 2023-01-01:2023-12-31

Output:

              cveID vendorProject                               product  dateAdded
868  CVE-2022-41080     Microsoft                       Exchange Server 2023-01-10
869  CVE-2023-21674     Microsoft                               Windows 2023-01-10
870  CVE-2022-44877           CWP                     Control Web Panel 2023-01-17
871  CVE-2022-47966          Zoho                          ManageEngine 2023-01-23
872  CVE-2017-11357       Telerik  User Interface (UI) for ASP.NET AJAX 2023-01-26
873  CVE-2022-21587        Oracle                      E-Business Suite 2023-02-02
874  CVE-2023-22952      SugarCRM                     Multiple Products 2023-02-02

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

kev_checker-0.1.0.tar.gz (4.4 kB view hashes)

Uploaded Source

Built Distribution

kev_checker-0.1.0-py3-none-any.whl (4.8 kB view hashes)

Uploaded Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page