{"id":50,"date":"2025-09-23T21:01:30","date_gmt":"2025-09-23T21:01:30","guid":{"rendered":"https:\/\/edk-tech.net\/?post_type=glossary&amp;p=50"},"modified":"2025-09-23T21:01:30","modified_gmt":"2025-09-23T21:01:30","slug":"zero-day-vulnerability","status":"publish","type":"glossary","link":"https:\/\/edk-tech.net\/?glossary=zero-day-vulnerability","title":{"rendered":"Zero-day vulnerability"},"content":{"rendered":"\n<p>A <a href=\"https:\/\/edk-tech.net\/?glossary=zero-day-vulnerability\"\r\n                    class=\"yaw-glossary yaw-glossary-alt-link\"\r\n                    title=\"Zero-day vulnerability\"\r\n                    data-bs-toggle=\"popover\"\r\n                    data-bs-html=\"true\"\r\n                    data-bs-trigger=\"hover focus\"\r\n                    data-bs-content=\"&lt;p&gt;A zero-day (also known as a 0-day) is a cybersecurity vulnerability in a computer system that is unknown to its developers, cybersecurity specialists, or anti-malware companies. Until the vulnerability is remedied, threat actors can exploit it in a zero-day exploit,&hellip;&lt;\/p&gt;\n\">zero-day<\/a> (also known as a <a href=\"https:\/\/edk-tech.net\/?glossary=zero-day-vulnerability\"\r\n                    class=\"yaw-glossary yaw-glossary-alt-link\"\r\n                    title=\"Zero-day vulnerability\"\r\n                    data-bs-toggle=\"popover\"\r\n                    data-bs-html=\"true\"\r\n                    data-bs-trigger=\"hover focus\"\r\n                    data-bs-content=\"&lt;p&gt;A zero-day (also known as a 0-day) is a cybersecurity vulnerability in a computer system that is unknown to its developers, cybersecurity specialists, or anti-malware companies. Until the vulnerability is remedied, threat actors can exploit it in a zero-day exploit,&hellip;&lt;\/p&gt;\n\">0-day<\/a>) is a cybersecurity <a href=\"https:\/\/edk-tech.net\/?glossary=vulnerability\"\r\n                    class=\"yaw-glossary yaw-glossary-main-link\"\r\n                    title=\"vulnerability\"\r\n                    data-bs-toggle=\"popover\"\r\n                    data-bs-html=\"true\"\r\n                    data-bs-trigger=\"hover focus\"\r\n                    data-bs-content=\"&lt;p&gt;A weakness in a component of software that can be exploited by an attacker. New code might be installed on a network device (a router, for example), and this code could cause a vulnerability. For example, the code could introduce&hellip;&lt;\/p&gt;\n\">vulnerability<\/a> in a computer system that is unknown to its developers, cybersecurity specialists, or anti-malware companies. Until the vulnerability is remedied, threat actors can exploit it in a <a href=\"https:\/\/edk-tech.net\/?glossary=zero-day-vulnerability\"\r\n                    class=\"yaw-glossary yaw-glossary-alt-link\"\r\n                    title=\"Zero-day vulnerability\"\r\n                    data-bs-toggle=\"popover\"\r\n                    data-bs-html=\"true\"\r\n                    data-bs-trigger=\"hover focus\"\r\n                    data-bs-content=\"&lt;p&gt;A zero-day (also known as a 0-day) is a cybersecurity vulnerability in a computer system that is unknown to its developers, cybersecurity specialists, or anti-malware companies. Until the vulnerability is remedied, threat actors can exploit it in a zero-day exploit,&hellip;&lt;\/p&gt;\n\">zero-day exploit<\/a>, or <a href=\"https:\/\/edk-tech.net\/?glossary=zero-day-vulnerability\"\r\n                    class=\"yaw-glossary yaw-glossary-alt-link\"\r\n                    title=\"Zero-day vulnerability\"\r\n                    data-bs-toggle=\"popover\"\r\n                    data-bs-html=\"true\"\r\n                    data-bs-trigger=\"hover focus\"\r\n                    data-bs-content=\"&lt;p&gt;A zero-day (also known as a 0-day) is a cybersecurity vulnerability in a computer system that is unknown to its developers, cybersecurity specialists, or anti-malware companies. Until the vulnerability is remedied, threat actors can exploit it in a zero-day exploit,&hellip;&lt;\/p&gt;\n\">zero-day attack<\/a>.<\/p>\n\n\n\n<p>Vendors who discover the vulnerability may create patches or advise workarounds to mitigate it \u2014 though users need to deploy that mitigation to eliminate the vulnerability in their systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A zero-day (also known as a 0-day) is a cybersecurity vulnerability in a computer system that is unknown to its developers, cybersecurity specialists, or anti-malware companies. Until the vulnerability is remedied, threat actors can exploit it in a zero-day exploit, or zero-day attack. Vendors who discover the vulnerability may create patches or advise workarounds to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"template":"","format":"standard","class_list":["post-50","glossary","type-glossary","status-publish","format-standard"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/edk-tech.net\/index.php?rest_route=\/wp\/v2\/glossary\/50","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/edk-tech.net\/index.php?rest_route=\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/edk-tech.net\/index.php?rest_route=\/wp\/v2\/types\/glossary"}],"author":[{"embeddable":true,"href":"https:\/\/edk-tech.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"version-history":[{"count":0,"href":"https:\/\/edk-tech.net\/index.php?rest_route=\/wp\/v2\/glossary\/50\/revisions"}],"wp:attachment":[{"href":"https:\/\/edk-tech.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=50"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}