Redazione RHC : 16 July 2025 11:05
Zero-day vulnerabilities are one of the greatest cybersecurity risks for organizations. These are unknown and unpatched vulnerabilities that attackers exploit to penetrate computer systems and compromise data security.
In this article, we’ll explore zero-day vulnerabilities, how they’re discovered, how hackers use them, their market, and what the best practices are to prevent and mitigate these attacks.
A zero-day vulnerability is a computer security vulnerability in software, an operating system, or an application that is unknown to the software manufacturer, users, and security experts. This means that developers have not yet had time to identify and fix the vulnerability, and therefore there is no patch or security update available to protect a software or hardware system.
Attackers can exploit a zero-day vulnerability to gain unauthorized access to a system, execute malicious code, install malware, steal information, or compromise data security. Because the vulnerability is unknown to the software vendor, attackers can use exploits undetected and without the software or operating system being able to defend itself.
Zero-day vulnerabilities can be discovered by security researchers, ethical hackers, or cybercriminals, and can be used to carry out highly targeted attacks against specific organizations or a broad audience of users. Since there is no solution available to immediately fix the zero-day vulnerability, organizations face a potentially critical security threat.
Zero-day vulnerabilities can be discovered In several ways. In some cases, they are discovered accidentally or by chance by security experts or end users. However, most zero-day vulnerabilities are discovered through research techniques conducted by computer security experts and independent researchers.
These experts use a combination of automated and manual techniques to analyze software and operating system code, trying to identify security vulnerabilities. Security researchers can also use fuzzing techniques, which consist of generating random inputs for software and then analyzing their behavior to identify any errors or anomalous behavior.
Additionally, security researchers can use bug bounty programs, where software developers pay security experts to identify and report vulnerabilities in their products. Bug bounty programs can incentivize security experts to invest time and resources in finding zero-day vulnerabilities.
It’s important to note that cybercriminals can also use the same research techniques to identify zero-day vulnerabilities and exploit them for malicious purposes. Therefore, computer security experts and independent researchers are required to respect the principles of professional ethics and follow responsible disclosure procedures to ensure that discovered vulnerabilities are reported to software vendors and fixed before they are exploited by attackers.
Zero-day vulnerabilities can be disclosed to the community in several ways, each with its own advantages and disadvantages. Here are the main types of zero-day vulnerability disclosure:
In summary, zero-day vulnerabilities can be disclosed in several ways. Responsible disclosure is generally considered the best option, as it allows the software vendor to patch the vulnerability before it can be exploited by attackers and allows the computing community to update systems before they are exploited.
However, there are cases where public or third-party disclosure may be justified, such as when the software vendor fails to act promptly to patch the vulnerability, perhaps after months and months of reminders to fix the previously reported security bug.
The reselling of zero-day vulnerabilities to zero-day brokers is a phenomenon that has developed in recent years and has raised several cybersecurity concerns. A zero-day broker is an intermediary who purchases zero-day vulnerabilities from security researchers (bug hunters) or other vendors and resells them to clients, such as governments, intelligence services, and cybersecurity firms.
Buying and selling zero-day vulnerabilities has become a highly lucrative market, as these vulnerabilities can be used to attack computer systems and compromise data security.
One of the most notorious cases of zero-day vulnerability use is the Pegasus surveillance software, developed by the Israeli company NSO Group. Pegasus has been used by several governments to spy on journalists, activists, and other sensitive targets. The software uses a combination of social engineering techniques and zero-day vulnerabilities to gain access to users’ devices and collect sensitive information. The vulnerabilities used by Pegasus were purchased from zero-day brokers and were not disclosed to the public or to software vendors.
The use of zero-day vulnerabilities in intelligence systems like Pegasus has raised several concerns about cybersecurity and user privacy. Zero-day vulnerabilities can be used to attack devices without users’ knowledge and without software vendors being able to patch the vulnerability. This means that users can be spied on or their sensitive information can be stolen without the users having any possibility of defense.
Over the years, there have been several high-profile attacks that have exploited zero-day vulnerabilities to compromise the cybersecurity of organizations and individuals. Here are some examples of well-known zero-day attacks:
There have been several high-profile attacks that have exploited zero-day vulnerabilities to compromise cybersecurity, but preventing and mitigating zero-day attacks is very difficult and requires a combination of technical security solutions and good corporate security practices.
Preventing zero-day attacks requires a combination of technical security solutions and good business practices. Here are some best practices for preventing and mitigating zero-day attacks: