IAS Gyan

Daily News Analysis

Zero day attack

15th May, 2024 Security

Zero day attack

Disclaimer: Copyright infringement is not intended.


  • Google Chrome has been hit with another zero-day vulnerability which has set the alarm bells ringing among users and cyber experts.


  • The vulnerabilities in Google Chrome are attributed to errors in visuals and angle components leading to use-after-free errors, as well as a heap buffer overflow in WebAudio. These vulnerabilities could allow remote attackers to compromise targeted systems.
  • The security alert specifies the versions of Google Chrome that are affected by these vulnerabilities. Users of Google Chrome on Windows, macOS, and Linux systems are urged to take action if they are using versions before 124.0.6367.201/.202 for Windows and Mac, and before 124.0.6367.201 for Linux.
  • The severity of Zero-Day Issues: Zero-day vulnerabilities are particularly concerning because they are exploited by attackers before developers have had a chance to address them. This means that users may be unaware of the potential severity of these attacks until they are made public.

“Zero-Day” Definition

The term “Zero-Day” is used when security teams are unaware of their software vulnerability, and they’ve had “0” days to work on a security patch or an update to fix the issue. “Zero-Day” is commonly associated with the terms Vulnerability, Exploit, and Threat. It is important to understand the difference:

●A Zero-Day Vulnerability is an unknown security vulnerability or software flaw that a threat actor can target with malicious code.

●A Zero-Day Exploit is the technique or tactic a malicious actor uses to leverage the vulnerability to attack a system.

●A Zero-Day Attack occurs when a hacker releases malware to exploit the software vulnerability before the software developer has patched the flaw.

How do zero-day attacks work?

Way ahead

  • .Users are advised to download the latest software update for Google Chrome by accessing the browser's settings and selecting the update option.
  • To stay protected against potential security threats, users should regularly update their software, including web browsers, to the latest versions.
  • Additionally, practicing safe browsing habits, such as avoiding suspicious websites and links, can help mitigate the risk of falling victim to cyber-attacks.




Consider the following statements about a zero-day attack:

1) Zero-day attacks exploit software vulnerabilities that have been known and patched by developers for at least 24 hours.

2) Zero-day attacks occur when cybercriminals exploit unknown vulnerabilities in software or hardware before developers can provide a fix or patch.

3) Zero-day attacks target systems that have been offline for an extended period, making them vulnerable to exploitation.

4) Zero-day attacks involve the simultaneous targeting of multiple organizations by cyber threat actors on the same day.

How many of the above statements is/are correct?

A.Only one

B.Only two

C.Only three

D. All four

Answer: A)