Knowledge Base Technology · · 9 min read

What Is a Zero-Day Exploit and Why Does It Matter?

Unpatched security flaws unknown to vendors are the highest-value weapons in cyber operations—and AI is changing how fast they're discovered and deployed.

A zero-day exploit is a cyberattack targeting a software vulnerability that the vendor doesn’t know exists, meaning there are zero days of advance warning to deploy a fix.

These flaws represent the most dangerous class of security vulnerabilities because no patch exists at the time of exploitation. Attackers can penetrate systems silently, often maintaining access for weeks or months before detection. The term originates from software piracy culture in the 1990s, where ‘zero-day’ referred to pirated software released on the same day as—or before—the official version. In security contexts, it describes the window between vulnerability discovery by an attacker and vendor awareness.

Recent AI-assisted vulnerability research is compressing discovery timelines and forcing a fundamental rethink of Enterprise Security strategy. The traditional 30-90 day patch cycle that underpins current defense frameworks is breaking down as adversaries weaponise flaws faster than organisations can respond.

The Vulnerability Lifecycle

A zero-day’s lifespan follows a predictable pattern, though timelines vary dramatically. The vulnerability exists silently in production code—often for years—until someone discovers it. That discoverer faces a choice: disclose responsibly to the vendor, sell on the grey market, weaponise immediately, or hoard for future use.

Day 0
Vulnerability Discovery
Attacker or researcher identifies exploitable flaw in production software.
Day 1-30
Silent Exploitation
Attacker develops working exploit and begins reconnaissance or data extraction.
Day 30-90
Vendor Notification
Vulnerability disclosed through responsible disclosure program or detected by vendor threat intelligence.
Day 90-120
Patch Development
Vendor engineers fix, tests patch across supported versions and platforms.
Day 120+
Deployment Window
Enterprises test and deploy patch; attackers race to exploit unpatched systems.

According to data from Mandiant, the median time between vulnerability exploitation and patch deployment in 2024 was 63 days for critical flaws. During that window, attackers have free rein. The problem is that AI-powered fuzzing and automated exploit generation are collapsing discovery timelines from months to days, while patch cycles remain unchanged.

Once a vendor issues a patch, the zero-day becomes a ‘one-day’ vulnerability—known but not universally fixed. Attackers reverse-engineer patches within hours to target organisations slow to update. According to CISA, 85% of exploited vulnerabilities in 2025 had patches available for more than 30 days before attacks occurred.

How Zero-Days Are Discovered and Traded

Vulnerability discovery happens through three primary channels: security research, government intelligence operations, and criminal discovery. Legitimate researchers typically follow coordinated disclosure protocols, giving vendors 90 days to patch before publishing details. Intelligence agencies stockpile zero-days for offensive cyber operations. Criminal groups and state-sponsored actors discover flaws through automated fuzzing, reverse engineering of patches, and supply chain analysis.

Zero-Day Market Valuations (2025)
iOS Remote Jailbreak$2-3M
Android Remote Code Execution$1.5-2.5M
Windows Privilege Escalation$500K-800K
Chrome Remote Code Execution$400K-600K

A grey market exists where exploit brokers like Zerodium and Crowdfense purchase zero-days from researchers and resell to government clients. Prices reflect the target’s ubiquity, exploit reliability, and difficulty of discovery. According to Zerodium, iOS remote jailbreaks command $2-3 million, while Windows privilege escalation exploits sell for $500,000-800,000. These figures represent the commercial end of the market; black market prices for the same capabilities are typically lower but carry legal risk.

The discovery landscape is shifting. Machine learning models trained on historical vulnerability patterns can identify potential flaws in codebases without human intuition. Google’s Project Zero reported in early 2026 that AI-assisted fuzzing increased their vulnerability discovery rate by 340% compared to traditional methods. This acceleration is asymmetric—attackers benefit as much as defenders, but attackers only need to find one exploitable flaw while defenders must find and patch all of them.

Why the Current Framework Is Breaking Down

The NIST Cybersecurity Framework assumes a structured vulnerability lifecycle with predictable timelines: discovery, disclosure, patch development, testing, and deployment. This model worked when vulnerabilities were discovered manually and exploit development required significant expertise. AI is invalidating both assumptions.

Context

The NIST framework was last updated in 2024 to address ransomware and supply chain risks, but predates widespread AI-assisted vulnerability discovery. Its disclosure window assumes human-paced research and exploit development—a timeline that no longer matches operational reality.

The problem has three dimensions. First, AI reduces the time from flaw discovery to working exploit from weeks to hours. Security firm Trail of Bits demonstrated in March 2026 that a large language model fine-tuned on exploit code could generate working proof-of-concept exploits for 60% of CVE-listed vulnerabilities without human intervention. Second, automated scanning allows attackers to identify and exploit vulnerable systems at internet scale within hours of patch release. Third, the vendor patch cycle hasn’t accelerated to match—development, testing, and deployment still require weeks.

This creates a widening gap between attacker capability and defender response time. When a critical zero-day surfaces, organisations face an impossible choice: deploy an untested patch immediately and risk operational disruption, or wait for proper testing while remaining vulnerable. Data from Ponemon Institute shows that 68% of enterprises require 7-14 days minimum to test and deploy critical patches across production environments. For distributed systems with complex dependencies, that figure rises to 30+ days.

Implications for Enterprise Security

The accelerated threat environment forces a shift from patch-centric to assume-breach security models. Organisations can no longer rely on staying current with patches as a primary defense, because the window between exploit availability and patch deployment is collapsing faster than procurement and deployment cycles can adapt.

Key Takeaways
  • Zero-day vulnerabilities now represent baseline risk, not edge cases—AI enables discovery at scale previously impossible.
  • Traditional disclosure windows are obsolete when exploit weaponisation happens in hours.
  • Effective defense requires layered controls that assume perimeter breach: network segmentation, privileged access management, and continuous monitoring.
  • Supply chain risk now extends to the patch supply chain itself—incomplete or delayed patches create extended vulnerability windows.

Practical implications centre on detection and containment rather than prevention. Endpoint detection and response (EDR) systems must flag anomalous behaviour even when signatures don’t exist. Network segmentation limits lateral movement after initial compromise. Privileged access management ensures stolen credentials can’t access critical systems. These controls don’t prevent zero-day exploitation but reduce attacker dwell time and limit blast radius.

For critical infrastructure operators, the calculus is different. A three-day patch mandate—currently under consideration by US officials—would require pre-testing patches in isolated environments and maintaining rapid deployment pipelines. This demands significant capital investment in redundant systems and automation, which smaller operators may struggle to afford. The alternative is accepting that critical systems will be penetrated and designing around that assumption through air-gapping, manual intervention requirements, and defense in depth.

The Supply Chain Dimension

Software supply chains introduce a second-order zero-day risk. When a vulnerability exists in a widely-used library or component, every downstream application inherits that flaw. The 2024 Log4Shell incident demonstrated this dynamic: a zero-day in a logging library affected hundreds of millions of systems across thousands of organisations. Detection required inventorying every dependency in every application—a task most enterprises discovered they couldn’t perform accurately.

Modern software development relies on vast dependency trees. A typical web application might include 500+ third-party libraries, each with their own dependencies. A zero-day in any component in that tree creates exposure, but visibility into nested dependencies is poor. Software composition analysis (SCA) tools help map dependencies, but they can’t detect zero-days until after disclosure. The time between exploit and vendor awareness remains a blind spot.

Vulnerability Response Timeline Comparison
Stage Pre-AI Era (2020) AI-Assisted Era (2026)
Discovery to Working Exploit 14-30 days 2-6 hours
Vendor Notification to Patch 60-90 days 45-60 days
Patch to Mass Exploitation 30+ days 6-12 hours
Total Window of Exposure 104-150 days 45-60 days

This compression of exploitation timelines while patch cycles remain static creates the urgency behind proposed regulatory changes. A three-day mandate would force vendors to maintain continuously-deployable security updates, potentially requiring architectural changes to enable safe rapid patching. The cost burden falls disproportionately on smaller vendors and open-source maintainers, who lack the infrastructure to achieve this velocity.