# Zero-Day Exploit **MITRE ATTACK layer:** Execution / Privilege Escalation A zero-day exploit is a cyberattack targeting a software vulnerability unknown to vendors or the public, leaving developers with no time to create a fix before attackers strike unsuspecting systems. ## How is Zero-Day Exploit abused Attackers weaponize undisclosed software flaws by crafting specialized exploit code that triggers unauthorized actions like arbitrary code execution or privilege escalation on unpatched systems before security teams can respond. ## Why Zero-Day Exploit matters Zero-day exploits let threat actors breach systems invisibly, bypassing existing defenses to execute malicious code, steal data, establish persistent access, or compromise high-value targets without triggering security alerts. ## Real-world example ### Google Chrome Zero day attack In 2025, attackers actively exploited multiple zero-day flaws in Google Chrome's V8 engine, including CVE-2025-2783, to bypass browser protections and install backdoors on user devices before patches could be deployed. [Source](https://fbisupport.com/recent-examples-zero-day-exploits-observed-2025/?) ## Related topics ### Advanced Persistent Threat **MITRE ATTACK layer:** Execution / Privilege Escalation [Read more](https://www.manageengine.com/products/desktop-central/attack-glossary/advanced-persistent-threat.html) ### Meltdown and Spectre Attack **MITRE ATTACK layer:** Execution / Privilege Escalation [Read more](https://www.manageengine.com/products/desktop-central/attack-glossary/meltdown-and-spectre-attack.html) ### Supply Chain Attack **MITRE ATTACK layer:** Execution / Privilege Escalation [Read more](https://www.manageengine.com/products/desktop-central/attack-glossary/supply-chain-attack.html) ## Additional Resources ### Achieve 442% ROI and reduce patching time by 95% — Forrester TEI Report See how organizations gained 442% ROI and major efficiency improvements with Endpoint Central. [Read more](https://www.manageengine.com/products/desktop-central/forrester-total-economic-impact-uems.html?utm_source=ec-attackglossary) ### Experience enterprise-grade protection proven in real-world tests — AV-Comparatives Report Discover how Endpoint Central’s antivirus earned recognition through rigorous, real-world security validation in just eight months. [Read more](https://www.manageengine.com/products/desktop-central/malware-protection-av-comparatives-dec2025.html?utm_source=ec-attack_glossary) ### Simplify endpoint security and build cyber resilience — Endpoint Security For Dummies Get a clear, practical guide to understanding threats and strengthening your organization’s security. [Read more](https://www.manageengine.com/products/desktop-central/endpoint-security-for-dummies.html?utm_source=ec_attack-glossary)