What is a Zero-Day Exploit?

Vishnu Shivalal P
2 min readOct 15, 2022

A zero-day exploit is a software/hardware vulnerability exploited by cybercriminals before the developer of the vulnerable software discovers and publicly releases a fix. Zero-day exploits are especially harmful because they target zero-day vulnerabilities for which no patch exists, leaving your systems completely exposed at discovery.

In other words, a Zero-day exploit attack happens before the patch is made available to fix that particular vulnerability, and victims of an insight zero-day attack are left with no remedy.

Zero-day exploits are used mainly cybercriminals and advanced persistent threat (APT) actors to target victims and spread malware infection on a massive scale. Since zero-day exploits are used in the wild before the developers of vulnerable software are aware of them. They are potent tools attributed to cybercrime or nation-state attack campaigns.

Properties of a Zero-Day Exploit

  • A flaw - A bug in computer system.
  • Unknown vulnerability - Previously unknown to software vendors.
  • No instant fix - There is no immediate fix available.
  • Can be exploited - It is open to be attacked by hackers.

Difference between Zero-day vulnerability, Exploit and Attack

Zero-day Vulnerability

A flaw discovered before software vendor knows about it.

Exploit

The method to exploit zero-day has been discovered. No damage caused yet.

Attack

Damaged caused for example, data stolen, systems brought down etc.

Recently discovered Zero-day Exploits

  1. Microsoft Exchange servers hacked to deploy LockBit ransomware. Link.
  2. Zero-day in WPGateway Wordpress plugin. Link.
  3. Jenkins discloses dozens of zero-day bugs in multiple plugins. Link.

--

--

Vishnu Shivalal P
Vishnu Shivalal P

Written by Vishnu Shivalal P

Cyber Security Engineer | Bug Hunter | Security Researcher | CTF Player | PenTester | Security Enthusiast | TryHackMe Top 1% www.linkedin.com/in/vishnushivalalp

No responses yet