Home/Blog/What is a 0-day vulnerability and how do CVE IDs work for them?
Cybersecurity

What is a 0-day vulnerability and how do CVE IDs work for them?

Understand zero-day vulnerabilities, their characteristics, and how they fit into the CVE identification and disclosure system.

By Inventive HQ Team
What is a 0-day vulnerability and how do CVE IDs work for them?

Understanding Zero-Day Vulnerabilities

A zero-day vulnerability is a previously unknown security flaw in software or hardware that vendors and the security community are unaware of. The name "zero-day" refers to the fact that developers have had zero days to work on a patch—the vulnerability hasn't been publicly disclosed, and no fix is available.

Zero-day vulnerabilities are particularly dangerous because:

  • No patches exist to address them
  • Antivirus and intrusion detection systems don't have signatures to identify exploitation attempts
  • Organizations cannot protect themselves through standard vulnerability management practices
  • Attackers have exclusive knowledge of the vulnerability and can exploit it with impunity

The ideal scenario from an attacker's perspective is discovering a zero-day before anyone else, remaining undetected, and exploiting it for months or years before disclosure forces vendors to fix it.

How Vulnerabilities Become Zero-Days

Zero-day vulnerabilities originate in several ways:

Independent discovery: Attackers or security researchers independently discover vulnerabilities in code before anyone else has identified them. A complex piece of software contains numerous potential vulnerabilities; attackers may find ones that vendors haven't identified.

Targeted research: Attackers or well-funded research teams deliberately search for vulnerabilities in widely used software, especially targeting specific products valuable to them (banking systems, government infrastructure, etc.).

Supply chain and exotic attacks: Some zero-days are discovered through novel attack vectors or interaction between multiple components that create unforeseen vulnerabilities.

Purchased from vulnerability brokers: Security researchers or companies discover vulnerabilities and sell them to other researchers, governments, or defensive security companies without public disclosure. These remain zero-days as long as they're kept secret.

The Life Cycle of a Zero-Day

Phase 1: Hidden existence (Days 0 to unknown) The vulnerability exists in deployed software, but only attackers know about it. They exploit it stealthily, typically targeting specific organizations or industries. The organization being attacked might not realize their systems are compromised.

Phase 2: Discovery and responsible disclosure attempt (Day X to X+90) A security researcher discovers the zero-day and responsibly discloses it to the vendor privately. The vendor then works on developing a patch. This is technically no longer a pure zero-day once researchers know about it, but it's not publicly known.

Phase 3: Public disclosure and patch release (Day X+90 or less) The vulnerability is publicly disclosed, and vendors release patches. It becomes a named CVE. The zero-day window closes, and vulnerability management processes take over.

Phase 4: Active exploitation window (Days after disclosure) Even after patches are available, many systems remain unpatched. Attackers often accelerate exploitation attempts during this window when the vulnerability is known but many systems remain vulnerable.

CVE Assignment for Zero-Days

Zero-days receive CVE identifiers only after they're disclosed (either discovered and responsibly reported, or exploited in the wild and discovered by security researchers). This creates an interesting situation:

Before disclosure: A vulnerability being secretly exploited has no CVE identifier. It might not even be a CVE candidate because no one knows about it.

At disclosure: As soon as the vulnerability is publicly disclosed, it's assigned a CVE identifier (like CVE-2025-12345). This happens simultaneously with patch release (in coordinated disclosure) or sometimes after patch development begins (if discovered in the wild and reported).

Retroactive CVE assignment: For zero-days exploited in the wild before responsible disclosure, the CVE is often assigned very quickly after discovery. Security researchers and vendors understand that rapid CVE assignment helps other organizations assess their risk.

Famous Zero-Day Examples

Stuxnet (2009-2010): Not a specific CVE but used multiple zero-day vulnerabilities to target Iranian nuclear facilities. Included Windows kernel vulnerabilities and remote code execution flaws. Remained highly secret for months before being discovered.

Citrix ShareFile vulnerability (CVE-2021-22941): Zero-day in Citrix ShareFile that was actively exploited before disclosure. After discovery, vendors released patches and the CVE was assigned immediately.

SolarWinds Supply Chain Attack (2020): Used multiple vulnerabilities, some of which were zero-days at the time of exploitation. The attack went undetected for months.

ProxyLogon (CVE-2021-27065 and related): Microsoft Exchange zero-day vulnerabilities discovered during active exploitation in early 2021. Microsoft released patches within weeks of discovery.

Kaseya VSA vulnerability (CVE-2021-30116): Zero-day in Kaseya VSA remote management software exploited by REvil ransomware gang. Active exploitation was discovered before patches existed.

Detection of Zero-Day Exploitation

Since zero-days have no patches or signatures, detection is challenging but possible:

Behavioral analysis: Monitoring for unusual system behavior (unexpected network connections, privilege escalation, file modifications) can detect exploitation even if the underlying vulnerability is unknown.

Threat intelligence: Security researchers and incident response teams analyze attacks and reverse-engineer exploits to identify zero-day usage patterns.

Honeypots and trap systems: Organizations maintain systems that appear valuable but are isolated and monitored. Attack attempts against honeypots indicate zero-day discovery.

Anomaly detection: Machine learning-based systems identify behavior patterns that deviate from normal system operation, sometimes catching zero-day exploitation.

Incident response: When organizations suffer breaches, forensic analysis can reveal whether zero-days were used.

Protection Against Zero-Days

Since zero-days can't be patched, organizations must implement other defensive measures:

Compensating controls:

  • Network segmentation to limit lateral movement
  • Application whitelisting to prevent unauthorized code execution
  • Memory protection (DEP, ASLR) to make exploitation harder
  • Least privilege access to minimize damage if compromise occurs

Threat intelligence and threat hunting: Actively search for indicators of compromise from known zero-day exploitation campaigns.

Assumption of breach: Design systems assuming they might be compromised, with detection and containment strategies.

Rapid incident response: If zero-day exploitation is discovered, implement rapid containment and eradication.

Vulnerability reduction: Minimize attack surface by:

  • Disabling unnecessary services
  • Keeping fewer systems connected to networks
  • Using up-to-date software even if zero-days exist
  • Running modern operating systems with built-in protections

The Zero-Day Black Market

Unfortunately, zero-day vulnerabilities are valuable commodities:

Government acquisition: Governments purchase zero-days for surveillance and cyber warfare purposes. These might remain secret indefinitely.

Criminal underground: Cybercriminals purchase zero-days for financial crimes (theft, fraud, ransomware).

Defensive security companies: Some legitimate security companies purchase zero-days to improve their detection capabilities.

Bug bounty alternatives: Researchers who discover zero-days might sell them to specialized brokers (Zerodium, etc.) rather than disclosing them responsibly.

This black market creates tension: vendors want zero-days disclosed responsibly so they can patch, while researchers might be financially incentivized to sell them secretly.

N-Day Vulnerabilities

After a CVE is assigned, zero-days become "N-day" vulnerabilities (where N is the number of days since disclosure). N-day exploitation continues as long as organizations remain unpatched.

A vulnerability might be:

  • 1-day: Exploited the day after patch release (before many organizations can deploy)
  • 30-day: Exploited 30 days after patch release (still many unpatched systems)
  • 100-day: Exploited months after patch release (still significant unpatched population)
  • 1000-day: Exploited years later (especially in legacy systems, never patched)

Zero-Days in Specific Contexts

Web browsers: Zero-day browser vulnerabilities are particularly valuable because browsers are nearly universal and often process untrusted content. Browser vendors have rapid patch processes and provide automatic updates to mitigate zero-day windows.

Operating systems: OS zero-days affect all systems running that OS, making them extremely valuable to attackers. Major OS vendors (Microsoft, Apple) have sophisticated security teams and rapid patch processes.

Firmware: Firmware zero-days (in routers, switches, etc.) are particularly persistent because firmware updates are often difficult and many systems never receive updates.

Embedded systems and IoT: IoT devices and industrial systems often never receive security patches, making any vulnerability in these devices permanently exploitable.

The Economics of Zero-Days

The value of a zero-day depends on:

  • Affected systems: Browser zero-days affecting billions of systems are more valuable than zero-days in obscure software
  • Exploitability: Easy-to-exploit remote code execution is more valuable than complex vulnerabilities
  • Attack vector: Network-based vulnerabilities are more valuable than requiring physical access
  • Patch timeline: Zero-days in heavily patched software (browsers, OS) lose value quickly; zero-days in rarely-patched software remain valuable longer

Zero-day prices vary:

  • Simple vulnerabilities: $10,000-$100,000
  • Complex remote code execution: $100,000-$1,000,000+
  • Zero-days in popular, heavily-used software: Up to several million

This creates perverse incentives for researchers to keep vulnerabilities secret rather than disclosing responsibly.

Future of Zero-Days

As software becomes more complex and connected, zero-days will likely remain a persistent problem:

  • Improved security engineering: Secure coding practices, formal verification, and security-first architecture reduce vulnerabilities
  • Responsible disclosure expansion: Growing norms around responsible disclosure incentivize notification over exploitation
  • Bug bounties: Companies offering substantial rewards encourage disclosure rather than sales to black market
  • AI-assisted discovery: Automated tools might discover vulnerabilities faster, but attackers use the same tools
  • Regulation: Government regulations might require vulnerability disclosure or impose liability for security failures

Conclusion

Zero-day vulnerabilities are previously unknown security flaws that attackers exploit before vendors can patch them. They're named for the zero days developers have to create fixes. Once discovered, zero-days are assigned CVE identifiers and become labeled vulnerabilities. The window of vulnerability is longest for zero-days because no patches exist—organizations must rely on compensating controls, threat intelligence, and incident response to protect against them. As software becomes more complex and interconnected, zero-day vulnerabilities will remain a persistent security challenge requiring layered defenses and rapid incident response capabilities.

Need Expert Cybersecurity Guidance?

Our team of security experts is ready to help protect your business from evolving threats.