Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Zero-day vulnerability

From Wikipedia, the free encyclopedia
(Redirected fromZero-day (computing))
Unfixed software vulnerability
"Zero day attack" redirects here. For the Taiwanese television program, seeZero Day Attack.

Azero-day (also known as a0-day) is avulnerability or security hole in acomputer system unknown to its developers or anyone capable ofmitigating it.[1] Until the vulnerability is remedied,threat actors canexploit it in azero-day exploit, orzero-day attack.[2][3]

The term "zero-day" originally referred to the number of days since a new piece ofsoftware was released to the public, so "zero-day software" was obtained by hacking into a developer's computer before release. Eventually the term was applied to the vulnerabilities that allowed this hacking, and to the number of days that the vendor has had to fix them.[4][5][6] Vendors who discover the vulnerability may createpatches or adviseworkarounds to mitigate it, though users need to deploy that mitigation to eliminate the vulnerability in their systems. Zero-day attacks are severethreats.[7]

Definition

[edit]

Despite developers' goal of delivering a product that works entirely as intended, virtually all products containsoftware andhardware bugs.[8] If a bug creates a security risk, it is called avulnerability. Vulnerabilities vary in their ability to beexploited by malicious actors. Some are not usable at all, while others can be used to disrupt the device with adenial of service attack. The most valuable allow the attacker toinject and run their own code, without the user being aware of it.[9] Although the term "zero-day" initially referred to the time since the vendor had become aware of the vulnerability, zero-day vulnerabilities can also be defined as the subset of vulnerabilities for which nopatch or other fix is available.[10][11][12] A zero-day exploit is any exploit that takes advantage of such a vulnerability.[9]

Exploits

[edit]

Anexploit is the delivery mechanism that takes advantage of the vulnerability to penetrate the target's systems, for such purposes as disrupting operations, installingmalware, orexfiltrating data.[13] Researchers Lillian Ablon and Andy Bogart write that "little is known about the true extent, use, benefit, and harm of zero-day exploits".[14] Exploits based on zero-day vulnerabilities are considered more dangerous than those that take advantage of a known vulnerability.[15][16] However, it is likely that most cyberattacks use known vulnerabilities, not zero-days.[14]

Governments of states are the primary users of zero-day exploits, not only because of the high cost of finding or buying vulnerabilities, but also the significant cost of writing the attack software. Nevertheless, anyone can use a vulnerability,[11] and according to research by theRAND Corporation, "any serious attacker can always get an affordable zero-day for almost any target".[17] Many targeted attacks[18] and mostadvanced persistent threats rely on zero-day vulnerabilities.[19]

In 2017, the average time to develop an exploit from a zero-day vulnerability was estimated at 22 days.[20] The difficulty of developing exploits has been increasing over time due to increased anti-exploitation features in popular software.[21]

Window of vulnerability

[edit]
Vulnerability timeline

Zero-day vulnerabilities are often classified as alive—meaning that there is no public knowledge of the vulnerability—and dead—the vulnerability has been disclosed, but not patched. If the software's maintainers are actively searching for vulnerabilities, it is a living vulnerability; such vulnerabilities in unmaintained software are called immortal. Zombie vulnerabilities can be exploited in older versions of the software but have been patched in newer versions.[22]

Even publicly known and zombie vulnerabilities are often exploitable for an extended period.[23][24] Security patches can take months to develop,[25] or may never be developed.[24] A patch can have negative effects on the functionality of software[24] and users may need totest the patch to confirm functionality and compatibility.[26] Larger organizations may fail to identify and patch all dependencies, while smaller enterprises and personal users may not install patches.[24]

Research suggests that risk of cyberattack increases if the vulnerability is made publicly known or a patch is released.[27] Cybercriminals canreverse engineer the patch to find the underlying vulnerability and develop exploits,[28] often faster than users install the patch.[27]

According to research byRAND Corporation published in 2017, zero-day exploits remain usable for 6.9 years on average,[29] although those purchased from a third party only remain usable for 1.4 years on average.[20] The researchers were unable to determine if any particular platform or software (such asopen-source software) had any relationship to the life expectancy of a zero-day vulnerability.[30] Although the RAND researchers found that 5.7 percent of a stockpile of secret zero-day vulnerabilities will have been discovered by someone else within a year,[31] another study found a higher overlap rate, as high as 10.8 percent to 21.9 percent per year.[32]

Countermeasures

[edit]

Because, by definition, there is no patch that can block a zero-day exploit, all systems employing the software or hardware with the vulnerability are at risk. This includes secure systems such as banks and governments that have all patches up to date.[33] Security systems are designed around known vulnerabilities, and repeated exploitations of a zero-day exploit could continue undetected for an extended period of time.[24] Although there have been many proposals for a system that is effective at detecting zero-day exploits, this remains an active area of research in 2023.[34]

Many organizations have adopteddefense-in-depth tactics so that attacks are likely to require breaching multiple levels of security, which makes it more difficult to achieve.[35] Conventional cybersecurity measures such as training andaccess control such asmulti-factor authentication,least-privilege access, andair-gapping makes it harder to compromise systems with a zero-day exploit.[36] Since writing perfectly secure software is impossible, some researchers argue that driving up the cost of exploits is a good strategy to reduce the burden of cyberattacks.[37]

Market

[edit]
Main article:Market for zero-day exploits

Zero-day exploits can fetch millions of dollars.[11] There are three main types of buyers:[38]

  • White: the vendor, or to third parties such as theZero Day Initiative that disclose to the vendor. Often such disclosure is in exchange for abug bounty.[39][40][41] Not all companies respond positively to disclosures, as they can cause legal liability and operational overhead. It is not uncommon to receivecease-and-desist letters from software vendors after disclosing a vulnerability for free.[42]
  • Gray: the largest[11] and most lucrative. Government or intelligence agencies buy zero-days and may use it in an attack, stockpile the vulnerability, or notify the vendor.[38] The United States federal government is one of the largest buyers.[11] As of 2013, theFive Eyes (United States, United Kingdom, Canada, Australia, and New Zealand) captured the plurality of the market and other significant purchasers included Russia, India, Brazil, Malaysia, Singapore, North Korea, and Iran. Middle Eastern countries were poised to become the biggest spenders.[43]
  • Black: organized crime, which typically prefers exploit software rather than just knowledge of a vulnerability.[44] These users are more likely to employ "half-days" where a patch is already available.[45]

In 2015, the markets for government and crime were estimated at least ten times larger than the white market.[38] Sellers are often hacker groups that seek out vulnerabilities in widely used software for financial reward.[46] Some will only sell to certain buyers, while others will sell to anyone.[45] White market sellers are more likely to be motivated by non pecuniary rewards such as recognition and intellectual challenge.[47] Selling zero-day exploits is legal.[41][48] Despite calls for more regulation, law professor Mailyn Fidler says there is little chance of an international agreement because key players such as Russia and Israel are not interested.[48]

The sellers and buyers that trade in zero-days tend to be secretive, relying onnon-disclosure agreements andclassified information laws to keep the exploits secret. If the vulnerability becomes known, it can be patched and its value consequently crashes.[49] Because the market lacks transparency, it can be hard for parties to find a fair price. Sellers might not be paid if the vulnerability was disclosed before it was verified, or if the buyer declined to purchase it but used it anyway. With the proliferation of middlemen, sellers could never know to what use the exploits could be put.[50] Buyers could not guarantee that the exploit was not sold to another party.[51] Both buyers and sellers advertise on thedark web.[52]

Comparing the average prices of different kinds of exploits, 2015–2022

Research published in 2022 based on maximum prices paid as quoted by a single exploit broker found a 44 percent annualizedinflation rate in exploit pricing. Remotezero-click exploits could fetch the highest price, while those that require local access to the device are much cheaper.[53] Vulnerabilities in widely used software are also more expensive.[54] They estimated that around 400 to 1,500 people sold exploits to that broker and they made around $5,500 to $20,800 annually.[55]

Disclosure and stockpiling

[edit]

As of 2017[update], there is an ongoing debate as to whether the United States should disclose the vulnerabilities it is aware of, so that they can be patched, or keep them secret for its own use.[56] Reasons that states keep a vulnerability secret include wanting to use it offensively, or defensively inpenetration testing.[17] Disclosing the vulnerability reduces the risk that consumers and all users of the software will be victimized bymalware ordata breaches.[8]

The phases of zero-day vulnerability disclosure, along with a typical timeline, are as follows:

  1. Discovery: A researcher identifies the vulnerability, marking "Day 0".
  2. Reporting: The researcher notifies the vendor or a third party, starting remediation efforts.
  3. Patch development: The vendor develops a fix, which can take weeks to months depending on the complexity.
  4. Public disclosure: Once a patch is released, details are shared publicly. If no patch is issued within an agreed period (commonly 90 days), some researchers disclose it to push for action.

History

[edit]
Further information:List of cyberattacks and2010s global surveillance disclosures

Zero-day exploits increased in significance after services such as Apple, Google,Facebook, and Microsoft encrypted servers and messages, meaning that the most feasible way to access a user's data was to intercept it at the source before it was encrypted.[33] One of the best-known use of zero-day exploits was theStuxnet worm, which used four zero-day vulnerabilities to damageIran's nuclear program in 2010.[14] The worm showed what could be achieved by zero-day exploits, unleashing an expansion in the market.[43]

The United StatesNational Security Agency (NSA) increased its search for zero-day vulnerabilities after large tech companies refused to installbackdoors into the software, tasking theTailored Access Operations (TAO) with discovering and purchasing zero-day exploits.[57] In 2007, former NSA employeeCharlie Miller publicly revealed for the first time that theUnited States government was buying zero-day exploits.[58] Some information about the NSA involvement with zero-days was revealed in the documents leaked by NSA contractorEdward Snowden in 2013, but details were lacking.[57] ReporterNicole Perlroth concluded that "either Snowden’s access as a contractor didn’t take him far enough into the government’s systems for the intel required, or some of the government’s sources and methods for acquiring zero-days were so confidential, or controversial, that the agency never dared put them in writing".[59]

One of the most infamous vulnerabilities discovered after 2013,Heartbleed (CVE-2014-0160), was not a zero-day when publicly disclosed but underscored the critical impact thatsoftware bugs can have on global cybersecurity. This flaw in theOpenSSLcryptographic library could have been exploited as a zero-day prior to its discovery, allowing attackers to steal sensitive information such as private keys and passwords.[60]

In 2016 thehacking group known asThe Shadow Brokers released a trove of sophisticated zero-day exploits reportedly stolen from the NSA. These included tools such asEternalBlue, which leveraged a vulnerability inMicrosoft Windows'Server Message Block (SMB) protocol. EternalBlue was later weaponized in high-profile attacks likeWannaCry andNotPetya, causing widespread global damage and highlighting the risks of stockpiling vulnerabilities.[61]

The year 2020 saw one of the most sophisticatedcyber espionage campaigns to date, in which attackers exploited multiple vulnerabilities, including zero-day vulnerabilities, to compromiseSolarWinds' Orion software. This allowed access to numerous government and corporate networks.[62]

In 2021 Chinese state-sponsored group,Hafnium, exploited zero-day vulnerabilities inMicrosoft Exchange Server to conduct cyber espionage. Known asProxyLogon, these flaws allowed attackers to bypass authentication and execute arbitrary code, compromising thousands of systems globally.[63]

In 2022 the spywarePegasus, developed byIsrael'sNSO Group, was found to exploit zero-click vulnerabilities in messaging services likeiMessage andWhatsApp. These exploits allowed attackers to access targets' devices without requiring user interaction, heightening concerns over surveillance and privacy.[64]

References

[edit]
  1. ^Guo, Mingyu; Wang, Guanhua; Hata, Hideaki; Babar, Muhammad Ali (2021-07-01)."Revenue maximizing markets for zero-day exploits".Autonomous Agents and Multi-Agent Systems.35 (2): 36.arXiv:2006.14184.doi:10.1007/s10458-021-09522-w.ISSN 1387-2532.S2CID 254225904.
  2. ^Compare:"What is a Zero-Day Vulnerability?".pctools.Symantec. Archived fromthe original on 2017-07-04. Retrieved2016-01-20.A zero day vulnerability refers to an exploitable bug in software that is unknown to the vendor. This security hole may be exploited by crackers before the vendor becomes aware and hurries to fix it—this exploit is called a zero day attack.
  3. ^Khandelwal, Abhi; Mahato, Dharmendra Prasad (2024). "Zero-Day Exploits Framework of Supply Chain Networks".Advanced Network Technologies and Intelligent Computing. Vol. 2090. Cham: Springer Nature Switzerland. p. 319–335.doi:10.1007/978-3-031-64076-6_21.ISBN 978-3-031-64075-9. Retrieved2025-06-17.Zero-Day Exploits: It is difficult to detect and mitigate zero-day vulnerabilities that are unknown to suppliers. Attackers can exploit these vulnerabilities before security fixes are released.
  4. ^Zetter, Kim (Nov 11, 2014)."Hacker Lexicon: What Is a Zero Day?".Wired.
  5. ^"Where the term "Zero Day" comes from - mmmm". 2018-01-31. Archived fromthe original on 2018-01-31. Retrieved2021-09-05.
  6. ^"Flash Vulnerabilities Causing Problems".ESET. Archived fromthe original on March 4, 2016. RetrievedMar 4, 2016.
  7. ^The Man Who Found Stuxnet – Sergey Ulasen in the Spotlight published on November 2, 2011
  8. ^abAblon & Bogart 2017, p. 1.
  9. ^abAblon & Bogart 2017, p. 2.
  10. ^Ablon & Bogart 2017, pp. iii, 2.
  11. ^abcdeSood & Enbody 2014, p. 1.
  12. ^Perlroth 2021, p. 7.
  13. ^Strout 2023, p. 23.
  14. ^abcAblon & Bogart 2017, p. 3.
  15. ^Sood & Enbody 2014, p. 24.
  16. ^Bravo & Kitchen 2022, p. 11.
  17. ^abAblon & Bogart 2017, p. xiv.
  18. ^Sood & Enbody 2014, pp. 2–3, 24.
  19. ^Sood & Enbody 2014, p. 4.
  20. ^abAblon & Bogart 2017, p. xiii.
  21. ^Perlroth 2021, p. 142.
  22. ^Ablon & Bogart 2017, p. xi.
  23. ^Ablon & Bogart 2017, p. 8.
  24. ^abcdeSood & Enbody 2014, p. 42.
  25. ^Strout 2023, p. 26.
  26. ^Libicki, Ablon & Webb 2015, p. 50.
  27. ^abLibicki, Ablon & Webb 2015, pp. 49–50.
  28. ^Strout 2023, p. 28.
  29. ^Ablon & Bogart 2017, p. x.
  30. ^Ablon & Bogart 2017, pp. xi–xii.
  31. ^Ablon & Bogart 2017, p. x: "For a given stockpile of zero-day vulnerabilities, after a year, approximately 5.7 percent have been discovered by an outside entity."
  32. ^Leal, Marcelo M.; Musgrave, Paul (2023). "Backwards from zero: How the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity".Contemporary Security Policy.44 (3):437–461.doi:10.1080/13523260.2023.2216112.ISSN 1352-3260.
  33. ^abPerlroth 2021, p. 8.
  34. ^Ahmadet al. 2023, p. 10733.
  35. ^Strout 2023, p. 24.
  36. ^Libicki, Ablon & Webb 2015, p. 104.
  37. ^Dellago, Simpson & Woods 2022, p. 41.
  38. ^abcLibicki, Ablon & Webb 2015, p. 44.
  39. ^Dellago, Simpson & Woods 2022, p. 33.
  40. ^O'Harrow 2013, p. 18.
  41. ^abLibicki, Ablon & Webb 2015, p. 45.
  42. ^Strout 2023, p. 36.
  43. ^abPerlroth 2021, p. 145.
  44. ^Libicki, Ablon & Webb 2015, pp. 44, 46.
  45. ^abLibicki, Ablon & Webb 2015, p. 46.
  46. ^Sood & Enbody 2014, p. 116.
  47. ^Libicki, Ablon & Webb 2015, pp. 46–47.
  48. ^abGooding, Matthew (19 July 2022)."Zero day vulnerability trade is lucrative but risky".Tech Monitor. Retrieved4 April 2024.
  49. ^Perlroth 2021, p. 42.
  50. ^Perlroth 2021, p. 57.
  51. ^Perlroth 2021, p. 58.
  52. ^Sood & Enbody 2014, p. 117.
  53. ^Dellago, Simpson & Woods 2022, pp. 31, 41.
  54. ^Libicki, Ablon & Webb 2015, p. 48.
  55. ^Dellago, Simpson & Woods 2022, p. 42: "The number of independent active sellers (between 400[31] and 1500[35] individuals) ... 2015,[35] suggests an annual pay of $5.5k - 20.8k per researcher."
  56. ^Ablon & Bogart 2017, p. iii.
  57. ^abPerlroth 2021, p. 9.
  58. ^Perlroth 2021, pp. 60, 62.
  59. ^Perlroth 2021, p. 10.
  60. ^"Heartbleed: Serious OpenSSL zero day vulnerability revealed".ZDNet.Archived from the original on 2024-10-04. Retrieved2024-11-29.
  61. ^"The Shadow Brokers publishing the NSA vulnerabilities".Cyberlaw. 4 June 2021.Archived from the original on 2024-02-27. Retrieved2024-11-29.
  62. ^"SolarWinds hack explained: Everything you need to know".TechTarget.Archived from the original on 2024-10-05. Retrieved2024-11-29.
  63. ^"Businesses urged to act fast against ProxyLogon attack on Microsoft Exchange Server".S-RM.Archived from the original on 2024-11-29. Retrieved2024-11-29.
  64. ^Marczak, Bill; Scott-Railton, John; Razzak, Bahr Abdul; Deibert, Ron (18 April 2023)."NSO Group's Pegasus Spyware Returns in 2022 with a Trio of iOS 15 and iOS 16 Zero-Click Exploit Chains".Citizenlab.Archived from the original on 2024-09-27. Retrieved2024-11-29.

Sources

[edit]
Retrieved from "https://en.wikipedia.org/w/index.php?title=Zero-day_vulnerability&oldid=1324074157"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp