Zero-Day Vulnerability

What is it?

A zero-day vulnerability is a software security flaw that is known to the software vendor but doesn’t have a patch in place to fix the flaw and can be exploited by cybercriminals.

Why Do Vulnerabilities Pose Security Risks?

Hackers write code to target specific security weaknesses. They package the code into malware called a “zero-day exploit.” The malicious software then takes advantage of a pre-existing vulnerability to compromise, intercept or disturb the device’s regular operating functions. If the hacker is successful, this is referred to as a “zero-day attack.” Vulnerabilities could be weak passwords, unencrypted data, existing software bugs or broken algorithms.

What Makes a Vulnerability “Zero-Day?”

The term “zero-day” refers to a newly discovered software vulnerability. Because the developer has just learned of the flaw, an official patch or update to fix this issue hasn’t been released. Zero-day refers to the fact that developers have “zero-days” to fix the problem that has just been exposed – and perhaps already exploited by hackers.

How are Zero-Day Vulnerabilities Fixed?

Once the vulnerability has been identified, developers must work quickly to create a “patch” or fix for the software. Patches come in the form of software updates, so it’s important to ensure that you’re always keeping your devices up to date. While software updates can be annoying and cause delays in your busy schedule, not updating your software when updates are available leaves your device at risk. It’s your responsibility to make sure that your device is up to date and secure.

How to Protect Yourself from a Zero-Day Vulnerability:

Follow these guidelines to protect yourself and your organization from zero-day vulnerabilities:

  •   Establish safe and effective personal online security habits

  • Configure security settings for your operating system, internet browser and security software

  • Install a proactive and comprehensive security software to help block known and unknown threats

  • Keep software and security packages up to date by downloading the latest software releases and updates

Example Zero-Day Attacks

Google Chrome – has unfortunately been the target of multiple zero-day attacks in 2021 – 13 to date to be exact. Of the two most recent attacks, one, which has been tracked as CVE-2021-37975, is because of “Google’s hard-to-protect V8 JavaScript engine” while the other, CVE-2021-37976, has been described as “an information leak in core.”

Apple – In 2020, Apple provided a patch in the form of the IOS 14.4 update after it was discovered that hackers could remotely access iPhones and other Apple devices. One of the vulnerabilities was linked to web browsing while the other to elevated user privileges. Both are believed to have been exploited prior to the update being released.

What are the Repercussions When a Zero-Day Attack Occurs?

According to Norton, zero-day attacks can affect the following assets:

  • Data stolen

  • Remote control of devices

  • Other malware installed

  • Files corrupted

  • Contact list accessed

  • Spyware installed to steal sensitive information

Zero-day attacks aren’t always recognized as soon as they happen. It can take months or even years for an attack to be realized and for a patch to be issued.

Previous
Previous

5 Emotions Used in Social Engineering

Next
Next

Cyber Security and Business 2021 Survey