Post-EoL Security Exposure
Devices past their security-support date that are named in CISA's Known Exploited Vulnerabilities catalog.
This is not a CVE search tool. Every entry below is a specific device in our catalog that (1) is past the vendor's end-of-vulnerability-security-support or last-date-of-support date and (2) runs a platform listed in CISA's Known Exploited Vulnerabilities (KEV) catalog. The vendor is not patching these devices. The vulnerabilities are being exploited in the wild.
Correlation is at the platform level (Junos OS, PAN-OS, BIG-IP, SonicOS, Firebox, etc.). A specific CVE may affect only certain OS versions; the device may or may not have received the patch before the vendor cut off support. Assume exposure unless you've confirmed otherwise.
By vendor
| Vendor | Exposed devices | Distinct CVEs | Ransomware-linked |
|---|---|---|---|
| Juniper | 705 | 7 | 0 |
| WatchGuard | 92 | 4 | 0 |
| SonicWall | 53 | 3 | 2 |
| F5 Networks | 33 | 5 | 3 |
| Sophos | 23 | 3 | 0 |
| Palo Alto | 16 | 10 | 5 |
Most recent exposures
Top 200 of 922 flagged devices, ordered by most recent KEV addition date.
Operators running any device in this list should treat it as a compensating-control scenario under NIST SA-22 and the equivalent PCI-DSS, HIPAA, and cyber-insurance guidance. See the Compliance and Insurance page for clause-level context and control options.
CISA KEV snapshot refreshed via scripts/refresh_kev.py. Source data: CISA Known Exploited Vulnerabilities catalog.