CISA Known Exploited Vulnerabilities catalog
https://gateway.pipeworx.io/cisa-kev/mcpAdd this server entry to the mcpServers object in your Claude Desktop config, then restart the app.
{
"mcpServers": {
"io-github-pipeworx-io-cisa-kev": {
"url": "https://gateway.pipeworx.io/cisa-kev/mcp"
}
}
}~/Library/Application Support/Claude/claude_desktop_config.json%APPDATA%\Claude\claude_desktop_config.jsonNo remote HTTP endpoint is advertised. Use the package or stdio setup shown in Install.
Cisa Kev is an MCP server for CISA Known Exploited Vulnerabilities catalog. It supports HTTP transport.
Use the generated config in Install. It points your client at the advertised remote endpoint shown on this page.
Choose the Claude Desktop tab in Install, copy the config, and add it to Claude Desktop's MCP server settings. Endpoint: https://gateway.pipeworx.io/cisa-kev/mcp.
Choose the Claude Code tab in Install, copy the config, and add it to Claude Code's MCP server settings. Endpoint: https://gateway.pipeworx.io/cisa-kev/mcp.
Choose the Codex tab in Install, copy the config, and add it to Codex's MCP server settings. Endpoint: https://gateway.pipeworx.io/cisa-kev/mcp.
Choose the Cursor or VS Code tab in Install, copy the config, and add it to Cursor or VS Code's MCP server settings. Endpoint: https://gateway.pipeworx.io/cisa-kev/mcp.
Cisa Kev uses HTTP transport. Endpoint: https://gateway.pipeworx.io/cisa-kev/mcp.
Cisa Kev inventory is listed when the MCP endpoint exposes tools, resources, or prompts. Some servers require auth first.
Cisa Kev does not advertise a verified auth requirement. If discovery fails, it may still need provider login, an API key, a bearer token, or a session header.