← All FR Documents
Notice

Agency Information Collection Activities: Actively Exploited Vulnerability Submission Form

In Plain English

What is this Federal Register notice?

This is a notice published in the Federal Register by Homeland Security Department. Notices communicate information, guidance, or policy interpretations but may not create new binding obligations.

Is this rule final?

This document is classified as a notice. It may or may not create enforceable regulatory obligations depending on its specific content.

Who does this apply to?

Consult the full text of this document for specific applicability provisions. The affected parties depend on the regulatory scope defined within.

When does it take effect?

No specific effective date is indicated. Check the full text for date provisions.

Why it matters: This notice communicates agency policy or guidance regarding applicable regulations.

Document Details

Document Number2025-15888
TypeNotice
PublishedAug 20, 2025
Effective Date-
RIN-
Docket ID-
Text FetchedYes

Agencies & CFR References

Agency Hierarchy:
CFR References:
None

Linked CFR Parts

PartNameAgency
No linked CFR parts

Paired Documents

TypeProposedFinalMethodConf
No paired documents

External Links

⏳ Requirements Extraction Pending

This document's regulatory requirements haven't been extracted yet. Extraction happens automatically during background processing (typically within a few hours of document ingestion).

Federal Register documents are immutable—once extracted, requirements are stored permanently and never need re-processing.

Full Document Text (864 words · ~5 min read)

Text Preserved
<NOTICE> DEPARTMENT OF HOMELAND SECURITY <SUBJECT>Agency Information Collection Activities: Actively Exploited Vulnerability Submission Form</SUBJECT> <HD SOURCE="HED">AGENCY:</HD> Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security (DHS). <HD SOURCE="HED">ACTION:</HD> 30-Day notice and request for comments; new collection request and OMB control number is 1670-NEW. <SUM> <HD SOURCE="HED">SUMMARY:</HD> The Vulnerability Management (VM) within Cybersecurity and Infrastructure Security Agency (CISA) submits the following Information Collection Request (ICR) to the Office of Management and Budget (OMB) for review. CISA previously published this ICR in the <E T="04">Federal Register</E> on February 29, 2024, for a 60-day public comment period. One comment was received by CISA. The purpose of this notice is to allow an additional 30 days for public comments. </SUM> <DATES> <HD SOURCE="HED">DATES:</HD> Comments are encouraged and will be accepted until September 19, 2025. Submissions received after the deadline for receiving comments may not be considered. </DATES> <HD SOURCE="HED">ADDRESSES:</HD> Written comments and recommendations for the proposed information collection should be sent within 30 days of publication of this notice to <E T="03">www.reginfo.gov/public/do/PRAMain.</E> Find this particular information collection by selecting “Currently under 30-day Review—Open for Public Comments” or by using the search function. The Office of Management and Budget is particularly interested in comments which: 1. Evaluate whether the proposed collection of information is necessary for the proper performance of the functions of the agency, including whether the information will have practical utility; 2. Evaluate the accuracy of the agency's estimate of the burden of the proposed collection of information, including the validity of the methodology and assumptions used; 3. Enhance the quality, utility, and clarity of the information to be collected; and 4. Minimize the burden of the collection of information on those who are to respond, including through the use of appropriate automated, electronic, mechanical, or other technological collection techniques or other forms of information technology, <E T="03">e.g.,</E> permitting electronic submissions of responses. <FURINF> <HD SOURCE="HED">FOR FURTHER INFORMATION CONTACT:</HD> If additional information is required contact: Christopher Murray, 202-984-0874, <E T="03">christopher.murray@mail.cisa.dhs.gov.</E> </FURINF> <SUPLINF> <HD SOURCE="HED">SUPPLEMENTARY INFORMATION:</HD> The Cybersecurity and Infrastructure Security Agency (CISA) operates the federal information security incident center. Through this center, CISA provides technical assistance and guidance on detecting and handling security Vulnerability Disclosures, compile and analyze incident information that threatens information security, inform agencies of current and potential threats and vulnerabilities, and provide intelligence or other information about cyber threats, vulnerabilities, and incidents to agencies. 44 U.S.C. 3556(a), see also 6 U.S.C. 659(c) (providing for cybersecurity services for both Federal Government and non-Federal Government entities). CISA is responsible for performing coordinated Vulnerability Disclosure, which may originate outside the United States Government (USG) network/community and affect users within it or originate within the USG community and affect users outside of it. Often, therefore, the effective handling of security incidents relies on information sharing among individual users, industry, and the USG, which may be facilitated by and through CISA. A dedicated form on the CISA website will allow for external reporting of vulnerabilities that the reporting entity believes to be Known Exploited Vulnerabilities (KEV) eligible. Upon submission, CISA will evaluate the information provided, and then will add to the KEV Catalog, if all KEV requirements are met. For the digital copy of this information collection for review, please contact the POC listed above in this notice request. CISA received one comment (which didn't speak to any of salient aspects of the information collection) during the open window period that said “I am curious to learn more about this process as my team has built the world's premier exploit and vulnerability intelligence dataset—and we do track our own known exploited vulnerabilities and are looking at methods to coordinate with CISA KEV team.” CISA replied with the following information: “The intent of this form is to allow members of the public (vendors, researchers, essentially anyone) to propose vulnerabilities to CISA that they feel meet the CISA Known Exploited Vulnerabilities (KEV) requirements. These requirements are outlined on the CISA KEV website: <E T="03">https://www.cisa.gov/known-exploited-vulnerabilities.</E> Once the user submits the form, our CISA KEV Team is notified and then we triage the information provided. If it does not meet all requirements, we then use the provided information as a starting point, and we do our own research to see if we can find additional information to meet all three requirements. If we do have all required information, we then proceed with adding the vulnerability to the CISA KEV Catalog. I [have] attached the proposed layout of the webform. While the form will not include any additional questions, the verbiage itself is subject to change based on all required approvals.” <HD SOURCE="HD1">Analysis</HD> <E T="03">Agency:</E> Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security (DHS). <E T="03">Title:</E> Actively exploited Vulnerability Submission Form. <E T="03">OMB Number:</E> 1670-NEW. <E T="03">Frequency:</E> Per incident on a voluntary basis. <E T="03">Affected Public:</E> State, local, Territorial, and Tribal, International, private sector partners. <E T="03">Number of Respondents:</E> 2,725. <E T="03">Estimated Time per Respondent:</E> 0.167 hours. <E T="03">Total Burden Hours:</E> 454 hours. <E T="03">Total Annual Burden Cost:</E> $37,956. <E T="03">Total Government Burden Cost:</E> $145,924. <SIG> <NAME>Robert J. Costello,</NAME> Chief Information Officer, Department of Homeland Security, Cybersecurity and Infrastructure Security Agency. </SIG> </SUPLINF> <FRDOC>[FR Doc. 2025-15888 Filed 8-19-25; 8:45 am]</FRDOC> </NOTICE>
This text is preserved for citation and comparison. View the official version for the authoritative text.