zero-day vulnerability
What is a zero-day vulnerability?
A zero-day vulnerability is a security flaw in software or hardware that the developer doesn't know about yet. Because no fix exists at the time it’s discovered, attackers can exploit it before anyone has a chance to patch it. It’s called “zero day” because defenders have zero days to prepare or respond before the flaw is used in an attack.
Zero-day attacks are dangerous because they often target systems that appear secure. Since there’s no warning or fix available, even up-to-date systems can be at risk. Once a zero-day vulnerability becomes public or is used in the wild, developers race to create a patch - and users must act fast to deploy it.
How are zero-day vulnerabilities discovered?
Zero-day vulnerabilities can be found by:
- Security researchers, who study systems for flaws.
- Bug bounty hunters, who report issues to companies in exchange for rewards.
- Worst case, cyber criminals, who may exploit them in attacks.
How can organizations protect themselves from zero-day vulnerabilities?
An exposure management solution like Intruder produces custom-built vulnerability checks as soon as new zero-day vulnerabilities are disclosed to help organizations stay ahead.
If you’re looking for peace of mind from zero-day vulnerabilities, learn more about Rapid Response and our Enterprise plan.