Zero-Day Exploit

Zero-Day Exploit

One-liner: An exploit targeting a vulnerability that is unknown to the vendor, meaning no patch exists at the time of attack.

🎯 What Is It?

A Zero-Day Exploit leverages a security vulnerability that has not yet been discovered or patched by the software vendor. The term "zero-day" refers to the fact that developers have had zero days to fix the issue. These exploits are part of the Exploitation stage of the Cyber Kill Chain and are highly valuable in the threat landscape.

πŸ”¬ How It Works

Timeline of a Zero-Day

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚  Vulnerability      Vulnerability       Patch           Patch      β”‚
β”‚  Introduced         Discovered          Developed       Deployed   β”‚
β”‚      β”‚                  β”‚                  β”‚               β”‚       β”‚
β”‚      β–Ό                  β–Ό                  β–Ό               β–Ό       β”‚
β”œβ”€β”€β”€β”€β”€β”€β—β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β—β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β—β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β—β”€β”€β”€β”€β”€β”€β”€β”€
β”‚      β”‚                  β”‚                  β”‚               β”‚       β”‚
β”‚      │◄─── Zero-Day ───►│◄─── Patch Gap ──►│               β”‚       β”‚
β”‚      β”‚     Window       β”‚                  β”‚               β”‚       β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Terminology

Term Definition
Zero-Day Vulnerability The unknown flaw itself
Zero-Day Exploit Code that exploits the vulnerability
Zero-Day Attack Use of the exploit against real targets
N-Day Exploit Exploit for known vulnerability (patch exists)

πŸ“Š Why They Matter

Zero-Day Market

Buyer Type Price Range Motivation
Vendors (Bug Bounty) $500 - $150K Fix vulnerabilities
Governments $50K - $2.5M+ Offensive operations
Black Market $10K - $500K+ Cybercrime, APT

πŸ›‘οΈ Detection & Prevention

How to Detect

How to Prevent / Mitigate

🎀 Interview Angles

Common Questions

STAR Story

Situation: Log4Shell zero-day (CVE-2021-44228) was publicly disclosed.
Task: Protect the organization before an official patch was available.
Action: Immediately applied virtual patching via WAF rules, disabled JNDI lookups where possible, conducted asset inventory to identify vulnerable systems, and monitored for exploitation attempts.
Result: No successful exploitation occurred despite active targeting. Formal patches applied within 72 hours of release.

βœ… Best Practices

πŸ“š References