Glossary Zero-Day Vulnerability

What Is a Zero-Day Vulnerability?

A zero-day vulnerability is a software security flaw that the vendor or developer has just discovered, so they have not had any time to create or release a patch. Since there is no fix yet, cybercriminals can take advantage of these flaws to launch attacks that are hard to spot and stop.

For example, the WannaCry ransomware attack in May 2017 showed how damaging zero-day vulnerabilities can be. This worldwide attack hit more than 200,000 computers in 150 countries by using a Windows flaw before many organizations could update their systems.

Key Characteristics of a Zero Day

  • Unknown to Vendor: The software creator is unaware that the flaw exists until an attack occurs or it is disclosed by researchers.
  • No Patch Available: There is no official security update or “fix” at the time of discovery.
  • High Risk: Regular antivirus tools that use known threat signatures often miss zero-day exploits because these threats are new and unknown.
  • Immediate Threat: Attackers have a clear advantage until a patch is released and applied.

How a Zero-Day Attack Works

A zero-day threat usually follows a timeline called the ‘Window of Vulnerability.’

  1. Vulnerability Introduced: A developer unintentionally writes code containing a security flaw (e.g., a buffer overflow or SQL injection gap).
  2. Exploit Created: An attacker finds the flaw before the vendor or security researchers notice it. They then create a ‘Zero Day Exploit,’ which is code made to use this weakness.
  3. Attack Launched: The attacker uses a ‘Zero Day Attack’ on certain targets or even across the internet. At this point, standard security scans often cannot see the attack.
  4. Discovery & Disclosure: The vendor eventually learns of the flaw, either through a bounty program, a security researcher, or by detecting an active attack.
  5. Patch Released: The vendor develops and distributes a security update. Once the patch is available, the flaw is no longer a “zero day” but becomes a “known vulnerability” (often assigned a CVE number).

Why Zero-Day Vulnerabilities Matter in Cybersecurity

Zero-day vulnerabilities are among the most serious risks for organizations because they get past the main defense, which is patch management.

  • Bypassing Defenses: Because legacy security tools rely on known threat databases, zero-day attacks can slip through firewalls and endpoint protection unnoticed.
  • High Value: These exploits are very valuable on the dark web. Nation-state hackers and advanced persistent threat (APT) groups often keep them to use against important targets like critical infrastructure or government networks.
  • Operational Impact: Fixing a zero-day often means emergency downtime, using manual workarounds, or even taking systems offline until a patch is ready.

Zero Day vs. Known Vulnerabilities

FeatureZero Day VulnerabilityKnown Vulnerability (N-Day)
StatusUnknown to vendor/publicPublicly disclosed
Patch AvailabilityNonePatch exists (but may not be applied)
DetectionDifficult (requires behavioral analysis)Easy (signature-based detection)
Risk LevelCritical / SevereVariable (depends on patch status)

FAQ: Zero-Day Vulnerability

Q: What is the difference between a zero-day vulnerability and a zero-day exploit?

The vulnerability is a flaw in the software code itself. The exploit is the actual code or technique that attackers use to exploit a flaw and breach a system.

Q: How can I protect against zero-day attacks if there is no patch?

Because you cannot patch what you do not know about, protection depends on using multiple layers of defense:

  • Use Web Application Firewalls (WAF) to block suspicious traffic patterns.
  • Implement Runtime Application Self-Protection (RASP).
  • Employ behavioral analysis rather than just signature-based detection.
  • Maintain a strict incident response plan to react quickly once a zero-day is disclosed.

Q: Can antivirus software detect zero-day attacks?

Traditional antivirus software that only uses ‘signatures’ (which are like fingerprints of known malware) cannot find zero-day threats. However, modern Endpoint Detection and Response (EDR) tools that use AI and watch for unusual behavior can often spot zero-day attacks, such as unexpected file encryption or unauthorized data transfers.

Next Steps

Ready to secure your applications? Choose your path forward.

Join 500+ companies already securing their applications with Plexicus

SOC 2 Compliant
ISO 27001 Certified
Enterprise Ready