MCP server for CISA's Known Exploited Vulnerabilities catalog
npm install @hrbrmstr/kev-mcpThis MCP (Model Context Protocol) server provides access to CISA's Catalog of Known Exploited Vulnerabilities (KEV). It allows AI assistants and other clients to query and analyze vulnerability data using the Model Context Protocol.
- Loads and caches the KEV data with daily refresh
- Exposes comprehensive tools to query and search the KEV database
- Provides statistical analysis of vulnerability data
- Implements filtering by multiple criteria
- Follows the Model Context Protocol for standardized AI assistant integration
- Delivers type-safe responses
``bash`
npm install
npm run build
The easiest way to use the KEV MCP server is via npx. The published package includes self-contained bundles that don't require local dependencies:
#### STDIO Transport (Default)
`bashMain command - defaults to stdio transport
npx @hrbrmstr/kev-mcp
$3
`bash
Using the main command with flag
npx @hrbrmstr/kev-mcp --transport httpUsing the dedicated HTTP command
npx @hrbrmstr/kev-mcp-http
`HTTP Request Logging
When using the HTTP transport, the server provides comprehensive structured logging for monitoring, debugging, and security auditing.
$3
All logs are output as structured JSON to stderr with the following format:
`json
{
"level": "info",
"component": "http-transport",
"timestamp": "2024-01-15T10:30:45.123Z",
"method": "POST",
"path": "/mcp",
"userAgent": "Mozilla/5.0...",
"contentType": "application/json",
"contentLength": 256,
"remoteAddr": "192.168.1.100",
"requestId": "abc123def456",
"duration": 125,
"status": 200,
"responseSize": 512,
"mcpMethod": "tools/call",
"mcpId": 1,
"mcpParams": ["query", "limit"]
}
`$3
-
http-transport: HTTP server and request handling
- stdio-transport: STDIO transport (when used)
- server: General server lifecycle events$3
The logging middleware extracts MCP-specific information:
-
mcpMethod: The MCP method being called
- mcpId: Request ID from the MCP protocol
- mcpParams: Array of parameter names (not values for security)
- mcpError: Structured error information when requests fail$3
#### Environment Variables
-
LOG_HEALTH_CHECKS=true: Enable logging of successful health check requests (default: only errors are logged)
- PORT: Set the HTTP server port (default: 9191)$3
`bash
Start server and pipe logs through jq for formatting
npx @hrbrmstr/kev-mcp-http 2>&1 | jq '.'Filter error logs only
npx @hrbrmstr/kev-mcp-http 2>&1 | jq 'select(.level == "error")'Monitor request performance
npx @hrbrmstr/kev-mcp-http 2>&1 | jq 'select(.duration > 1000)'Track specific MCP methods
npx @hrbrmstr/kev-mcp-http 2>&1 | jq 'select(.mcpMethod == "tools/call")'Correlate logs by request ID
npx @hrbrmstr/kev-mcp-http 2>&1 | jq 'select(.requestId == "abc123def456")'
`$3
Each HTTP request receives a unique
requestId that appears in all related log entries, making it easy to trace the complete lifecycle of a request from start to finish.$3
- IP addresses are captured for security monitoring
- User-Agent strings are logged for client identification
- Authentication headers are redacted (shown as
[REDACTED])
- Request bodies are not logged to prevent sensitive data exposure
- Only parameter names (not values) are logged for MCP requests$3
If you've cloned and built the project locally:
`bash
npm install
npm run buildRun locally built version
node build/kev-mcp-bundle.cjs
node build/kev-mcp-bundle.cjs --transport http
`$3
#### For STDIO Transport (Most Common)
`json
{
"mcpServers": {
"cisa-kev": {
"command": "npx",
"args": ["@hrbrmstr/kev-mcp"]
}
}
}
`#### For HTTP Transport
`json
{
"mcpServers": {
"cisa-kev-http": {
"command": "npx",
"args": ["@hrbrmstr/kev-mcp-http"]
}
}
}
`#### Local Build Configuration
`json
{
"mcpServers": {
"cisa-kev": {
"command": "node",
"args": ["/path/to/kev-mcp/build/kev-mcp-bundle.cjs"]
}
}
}
`$3
The published package includes bundled executables (~1.2MB each) that contain all dependencies:
-
kev-mcp-bundle.cjs - Main CLI supporting both transports
- kev-mcp-http-bundle.cjs - HTTP-only version
- index-bundle.js - Library for programmatic useThese bundles work without
node_modules and are perfect for distribution via npx.Tools Reference
The server provides the following tools for interacting with the KEV catalog:
$3
####
get_kev_count
Returns the total number of vulnerabilities in the KEV catalog.Parameters: None
Example Response:
`json
"1366"
`####
get_kev_release_date
Returns the release date of the current KEV catalog.Parameters: None
Example Response:
`json
"2023-11-15"
`####
get_vulnerability_details
Retrieves detailed information about a specific vulnerability by CVE ID.Parameters:
-
cveId (string): The CVE ID to lookup (e.g., "CVE-2021-34527")Example Response:
`json
{
"cveID": "CVE-2021-34527",
"vendorProject": "Microsoft",
"product": "Windows Print Spooler",
"vulnerabilityName": "Microsoft Windows Print Spooler Remote Code Execution Vulnerability",
"dateAdded": "2021-07-02",
"shortDescription": "Microsoft Windows Print Spooler contains a remote code execution vulnerability...",
"requiredAction": "Apply updates per vendor instructions.",
"dueDate": "2021-07-16",
"knownRansomwareCampaignUse": "Known",
"notes": "This vulnerability has been exploited in the wild as part of ransomware attacks.",
"cwes": ["CWE-269"]
}
`$3
####
get_kev_vendors
Returns a list of all unique vendors in the KEV catalog.Parameters: None
Example Response:
`json
["Adobe", "Apache", "Apple", "Atlassian", ...]
`####
get_kev_products
Returns a list of all unique products in the KEV catalog.Parameters: None
Example Response:
`json
["Access", "Acrobat Reader", "ActiveMQ", "Adaptive Security Appliance", ...]
`####
get_kev_cves
Returns a list of all CVE IDs in the KEV catalog.Parameters: None
Example Response:
`json
["CVE-2017-11882", "CVE-2018-13379", "CVE-2018-7600", ...]
`####
get_recent_vulnerabilities
Returns vulnerabilities added to the KEV catalog within a specified time period.Parameters:
-
days (number, optional): Number of days to look back (default: 30)Example Response:
`json
{
"count": 15,
"vulnerabilities": [
{
"cveID": "CVE-2023-12345",
"vendorProject": "Example Vendor",
...
},
...
]
}
`####
get_upcoming_due_dates
Identifies vulnerabilities with upcoming remediation due dates.Parameters:
-
days (number, optional): Number of days to look ahead (default: 30)Example Response:
`json
{
"count": 8,
"vulnerabilities": [
{
"cveID": "CVE-2023-67890",
"vendorProject": "Example Vendor",
"dueDate": "2023-12-15",
...
},
...
]
}
`$3
####
search_kev
Comprehensive search tool with multiple filtering options.Parameters:
-
searchText (string, optional): Text to search in vulnerability names, descriptions, and notes
- ransomwareUse (array of strings, optional): Filter by ransomware usage ("Known" or "Unknown")
- cwes (array of strings, optional): Filter by CWE identifiers
- vendors (array of strings, optional): Filter by vendor/project names
- products (array of strings, optional): Filter by product names
- dateAddedStart (string, optional): Start date for dateAdded range (YYYY-MM-DD)
- dateAddedEnd (string, optional): End date for dateAdded range (YYYY-MM-DD)
- dateAdded (array of strings, optional): Specific dateAdded values to match
- dueDateStart (string, optional): Start date for dueDate range (YYYY-MM-DD)
- dueDateEnd (string, optional): End date for dueDate range (YYYY-MM-DD)
- dueDate (array of strings, optional): Specific dueDate values to matchExample Response:
`json
{
"count": 5,
"vulnerabilities": [
...
]
}
`####
get_related_cves
Finds vulnerabilities related to a specific vendor or product.Parameters:
-
vendor (string, optional): Vendor name to find related CVEs
- product (string, optional): Product name to find related CVEs
- limit (number, optional): Maximum number of results to return (default: 20)Note: At least one of
vendor or product must be provided.Example Response:
`json
{
"count": 12,
"totalMatches": 24,
"vulnerabilities": [
...
]
}
`####
search_by_cwe
Locates vulnerabilities associated with a specific Common Weakness Enumeration (CWE).Parameters:
-
cwe (string): CWE identifier to search for (e.g., "CWE-79" or "79")Example Response:
`json
{
"count": 17,
"cwe": "CWE-79",
"vulnerabilities": [
...
]
}
`$3
####
get_kev_statistics
Provides statistical analysis of the KEV catalog.Parameters: None
Example Response:
`json
{
"totalVulnerabilities": 436,
"topVendors": [
{"vendor": "Microsoft", "count": 89},
{"vendor": "Adobe", "count": 45},
...
],
"ransomwareUsage": {
"Known": 128,
"Unknown": 308
},
"countByYear": {
"2021": 168,
"2022": 175,
"2023": 93
}
}
`####
get_cwe_statistics
Provides statistical analysis of CWEs in the KEV catalog.Parameters: None
Example Response:
`json
{
"uniqueCweCount": 42,
"topCwes": [
{"cwe": "CWE-79", "count": 48},
{"cwe": "CWE-787", "count": 37},
...
]
}
`$3
####
force_refresh_kev_data
Forces a refresh of the KEV data cache to ensure the latest information is available.Parameters: None
Example Response:
`
KEV data successfully refreshed. Current catalog version: 2023.11.15, with 436 vulnerabilities.
`Project Structure
`
├── src/
│ ├── index.ts # Main server entry point
│ ├── types.ts # TypeScript interfaces
│ ├── utils.ts # Utility functions and constants
│ └── tools/ # Individual tools implementation
│ ├── index.ts # Tool registration
│ ├── getKevCount.ts # Count tool
│ ├── ...
├── build/ # Compiled JavaScript files
├── package.json
└── README.md
``MIT