Home > Cybersecurity glossary > 0-day ๐Ÿ”ด Vulnerability

0-day ๐Ÿ”ด Vulnerability

A 0-day (also written zero-day) is a vulnerability from computer security critical in software, an operating system or hardware, unknown of the developer and for which no patch yet available.

Its name comes from "day zero": the time elapsed between its discovery and the first available patch is zero.

Illustration of a 0-day fault with a fortified castle and a hidden entrance in the wall

A 0-day vulnerability is like leaving a door open in the wall without any guards to watch over it.
Alexandre SALQUE

 

 

 


๐Ÿ“Œ Characteristics of a 0-day vulnerability

 

  1. Not detected it is not yet known to the public or to the software vendor, nor is it listed in vulnerability databases (such as CVE)
  2. No patch available : since the developer is not aware of this, no patch to correct it.
  3. Exploited by attackers Hackers can use it to infiltrate systems, steal data or install malicious software.

 


๐Ÿ”ฅ What is a 0-day exploit?

 

A operation 0-day is a malicious program or code designed to take advantage of the flaw before a patch is released.

Example The feat EternalBlue (NSA, 2017), based on an unpatched Windows vulnerability, was used to propagate the ransomware WannaCry.


๐Ÿดโ€โ˜ ๏ธ Who uses 0-days?

 

  • Cybercriminals for targeted attacks, cybercrime and ransomware, data theft... Ex: the group FIN7 using 0-days to target points of sale (POS).
  • Governments and intelligence agencies for espionage, sabotage or cyber attacks. Ex : Stuxnet (2010), targeting Iranian centrifuges.
  • Cybersecurity researchers to report vulnerabilities to companies (bug bounty, responsible disclosure). Ex: discovery of the flaw Log4Shell (2021) by a researcher.

 


๐Ÿ›ก๏ธ How can you protect yourself against 0-days?

  • Regularly update software and systems.
  • Use advanced security solutions (EDR, IDS, firewall...).
  • Practice Zero Trust (not trusting software and users by default).
  • Monitor threats and apply patches as soon as they become available.

Attacks 0-day are among the most dangerous because they target unknown vulnerabilities that are difficult to prevent!


๐Ÿ“Š Figures for France and worldwide

 

๐ŸŒ World

  • Number of 0-days detected :
    • 2023 : 97 0-day vulnerabilities exploited (Google Project Zero report).
    • Increase of 50 % since 2020, linked to cyberwar (Ukraine, tensions between China and the United States).
  • Cost of a 0-day exploit :
    • On the dark web : 100 000 aห‹5millions depending on the target (iOS, Windows, etc.).
    • Example: iOS 0-days sell for up to 2 million $ (sources Zerodium).

๐Ÿ‡ซ๐Ÿ‡ท France

  • Attacks recorded :
    • In 2022, 12 % of cyber attacks in France involved 0-days (report ANSSI)
    • Target sectors: Health, energy, defence.
  • Emblematic case :
    • Software piracy Chรจque Emploi Service Universel (CESU) in 2021 via an undisclosed 0-day vulnerability

 


๐Ÿ’ฅ Recent examples of 0-day attacks

 

  1. Log4Shell (2021) :
    • Vulnerability in the Java library Log4jwhich is used to take control of servers.
    • Impact: 40 % of global businesses affected (source Check Point)
  2. Zoom (2020) :
    • A 0-day flaw allowed attackers to take control of PCs via the application
  3. Pegasus (NSO Group) :
    • Spyware using iOS/Android 0-days to monitor journalists and opponents

 


๐Ÿšจ Why are 0-days so dangerous?

 

  • Patch latency on average, 54 days are required to correct a vulnerability (source: Ponemon Institute)
  • System complexity modern software (e.g. cloud, IoT) increases the number of attack surfaces
  • Profitability a single 0-day can infect millions of machines (e.g. Conti ransomware)

 


๐Ÿ”ฎ The future of 0-days

 

  • Generative AI Generative AI could automate the discovery of vulnerabilities.
  • Cyber warfare 0-days become geopolitical weapons (e.g. Russia-Ukraine conflict).
  • Controls The EU is working on legislation to regulate the sale of exploits (eg: NIS 2).

 

Towards the ORSYS Cyber Academy: a free space dedicated to cybersecurity