What is Zero-Day Vulnerability? Definition & Explanation

A zero-day (or 0-day) vulnerability is a software flaw that is unknown to the vendor and has no patch available — giving defenders "zero days" to prepare before exploitation. Zero-day exploits are among the most valuable assets in the offensive security ecosystem, with prices reaching $2.5M+ for full mobile chains.

In-Depth Explanation

The zero-day economy includes nation-state intelligence agencies (NSA, GCHQ, Mossad, MSS), specialized exploit brokers (Zerodium publishes a public price list — up to $2.5M for an Android zero-click chain, $2M for an iOS chain), spyware vendors (NSO Group's Pegasus, Intellexa's Predator, Candiru, Hacking Team's successors), criminal markets (less reliable but active), and bug-bounty programs (Apple Security Bounty up to $1M, Google's vulnerability rewards $250K+ for top tiers). Notable recent zero-day attacks include Log4Shell (CVE-2021-44228, a logging library bug exploited globally within hours), MOVEit Transfer (CVE-2023-34362, exploited by Cl0p ransomware against 2,500+ organizations), the Ivanti Connect Secure zero-days (CVE-2023-46805 + CVE-2024-21887 in early 2024 used for mass ransomware), and the XZ Utils backdoor (CVE-2024-3094, caught by Microsoft engineer Andres Freund hours before mainstream Linux deployment). Defenses against unknown zero-days rely on defense-in-depth: EDR/XDR behavioral detection, microsegmentation to limit blast radius, exploit mitigations (DEP, ASLR, CFG, CET, MTE), virtual patching at WAF/IPS edge, and assumed-breach incident response posture.

Why It Matters for Security

Zero-day exploitation is the most dangerous threat because patching is impossible by definition — defenders must rely on detection and containment rather than prevention. The increase in mass-exploitation events from disclosed zero-days (Log4Shell, MOVEit, Ivanti, ConnectWise ScreenConnect) shows that even short windows between disclosure and patching are weaponized at scale. Cyber-insurance underwriters and CISA increasingly require formal zero-day response playbooks.

Related Tools

Frequently Asked Questions

What does Zero-Day Vulnerability mean in cybersecurity?

A zero-day vulnerability in cybersecurity is a software flaw that is unknown to the vendor and has no patch available — giving defenders "zero days" to prepare before exploitation. Zero-day exploits are among the most valuable assets in the offensive ecosystem, with prices reaching $2.5M+ for full mobile chains.

Why is Zero-Day Vulnerability important?

Zero-days matter because patching is impossible by definition — defenders must rely on detection and containment. Recent events (Log4Shell, MOVEit, Ivanti, XZ backdoor) show how short the window between disclosure and mass exploitation has become, making EDR, segmentation, and rehearsed response essential.

← Back to the full Cybersecurity Glossary