Glossary Term

Zero-Day

A vulnerability that is unknown to the vendor and has no official patch yet.

1 min read

Share this definition

Post it to your feed or send it to teammates.

What it is

A zero-day vulnerability is a software flaw that is exploited before the responsible vendor becomes aware or has had “zero days” to release a fix. Attackers discover these weaknesses through targeted research, fuzzing, vulnerability purchases, or insider knowledge. Because no patch exists, zero-days give adversaries a significant advantage: they can compromise systems even if organizations follow best-practice patching and configuration. Zero-days often surface in browsers, email clients, VPN appliances, or widely deployed libraries where exploit chains can reach millions of devices. Once disclosed, vendors race to develop and distribute patches while security teams deploy compensating controls like configuration changes, network segmentation, or intrusion detection signatures. Markets exist where nation-states and criminal brokers buy and sell zero-day exploits, reflecting their strategic value.

Why it matters

Zero-day exploitation enables stealthy intrusions that bypass traditional defenses, leading to espionage, ransomware, or supply chain compromise. Organizations must assume that sophisticated attackers can access zero-day capabilities, making layered defense essential.

How to reduce risk

  • Implement defense-in-depth controls such as application allowlisting, behavioral detection, and strict privilege separation.
  • Monitor threat intelligence and vendor advisories to deploy temporary mitigations when zero-days are announced.
  • Maintain rapid emergency patch processes and test backups to support swift recovery once fixes are available.
  • Reduce attack surface by disabling unnecessary features and promptly decommissioning unsupported systems.