Home/Glossary/Zero-Day Vulnerability

Zero-Day Vulnerability

A previously unknown software vulnerability that attackers exploit before the vendor has released a patch or fix.

Attack MethodsAlso called: "zero day exploit", "0-day vulnerability", "0day"

Zero-day vulnerabilities are dangerous because no patch exists when they are first exploited, leaving organizations defenseless until vendors respond.

Why "zero-day"

  • The vendor has had zero days to fix the vulnerability since it became known.
  • Often discovered by attackers or security researchers simultaneously.
  • Can remain unknown for months or years before discovery.

Zero-day lifecycle

  1. Discovery: Attacker or researcher finds the vulnerability.
  2. Exploitation: Attackers develop and deploy exploits in the wild.
  3. Detection: Security community or vendor becomes aware of attacks.
  4. Patch development: Vendor creates and tests a fix.
  5. Patch deployment: Organizations apply updates to remediate.

Why they matter

  • Bypass traditional signature-based defenses that rely on known attack patterns.
  • Often used in targeted attacks against high-value organizations.
  • Can compromise even fully-patched systems if the vulnerability is unknown.
  • Valuable on the black market, sometimes selling for millions of dollars.

Defensive strategies

  • Deploy defense-in-depth controls that do not rely solely on signatures.
  • Use behavioral analysis and anomaly detection (EDR, NGFW, SIEM).
  • Implement application allowlisting and least-privilege access controls.
  • Segment networks to limit lateral movement if exploitation occurs.
  • Maintain incident response capabilities for rapid containment.
  • Subscribe to threat intelligence feeds for early warning of emerging threats.