TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

U.S. Government Disclosed 39 Zero-Day Vulnerabilities in 2023, First-Ever Report

221 点作者 jc_8113 个月前

16 条评论

nimbius3 个月前
I hope this signals a turning point and lessons learned from the historic practice of hoarding exploits in the hopes they can be weaponized.<p>when you disclose vulnerabilities and exploits, you effectively take cannons off both sides of the metaphorical battle field. it actively makes society safer.
评论 #42963151 未加载
评论 #42963403 未加载
评论 #42965852 未加载
评论 #42964682 未加载
评论 #42963325 未加载
评论 #42963162 未加载
评论 #42963616 未加载
评论 #42965414 未加载
评论 #42963448 未加载
评论 #42963853 未加载
评论 #42963776 未加载
skirge3 个月前
Burning 0-days makes your enemies spend more time on finding new ones - costs rise so they will go bankrupt. Cold war 2.0. It&#x27;s not enough to just run grep &#x2F; memcpy finder on software like 20-15 years ago.
ikmckenz3 个月前
There is no such thing as a &quot;Nobody But Us&quot; vulnerability. Leaving holes in systems and praying enemies won&#x27;t discover them, with the hope of attacking them ourselves is extremely foolish.
评论 #42965309 未加载
评论 #42967951 未加载
joshfraser3 个月前
I&#x27;ve seen the invite-only marketplaces where these exploits are sold. You can buy an exploit to compromise any piece of software or hardware that you can imagine. Many of them go for millions of dollars.<p>There are known exploits to get root access to every phone or laptop in the world. But researchers won&#x27;t disclose these to the manufacturers when they can make millions of dollars selling them to governments. Governments won&#x27;t disclose them because they want to use them to spy on their citizens and foreign adversaries.<p>The manufacturers prefer to fix these bugs, but aren&#x27;t usually willing to pay as much as the nation states that are bidding. All they do is drive up the price. Worse, intelligence agencies like the NSA often pressure or incentivize major tech companies to keep zero-days unpatched for exploitation.<p>It&#x27;s a really hard problem. There are a bunch of perverse incentives that are putting us all at risk.
评论 #42965683 未加载
评论 #42965675 未加载
评论 #42966147 未加载
评论 #42965395 未加载
评论 #42965515 未加载
评论 #42965786 未加载
评论 #42965822 未加载
pentel-0_53 个月前
These are just the <i>disclosed</i> ones. The <i>weaponized</i> ones (as mentioned) found or bought kept secret by the NSA, etc. such as from Zerodium (ex-VUPEN) and similar aren&#x27;t counted obviously. ;)
评论 #42965312 未加载
HypnoDrone3 个月前
So there was 39 vulnerabilities that affected government systems. The rest didn&#x27;t so they had no need to disclose.
评论 #42963147 未加载
评论 #42964898 未加载
mattmaroon3 个月前
&quot;What the government didn&#x27;t reveal is how many zero days it discovered in 2023 that it kept to exploit rather than disclose. Whatever that number, it likely will increase under the Trump administration, which has vowed to ramp up government hacking operations.&quot;<p>This is a bit of a prisoner&#x27;s dilemma. The world would be better off if everyone disclosed every such exploit for obvious reasons. But if government A discloses everything and government B reserves them to exploit later, then government B has a strong advantage over government A.<p>The only responses then are war, diplomacy, or we do it too and create yet another mutually assured destruction scenario.<p>War is not going to happen because the cure would be worse than the disease. The major players are all nuclear powers. Diplomacy would be ideal if there were sufficient trust and buy-in, but it seems unlikely the U.S. and Russia could get there. And with nuclear treaties there&#x27;s an easy verification method since nuclear weapons are big and hard to do on the sly. It&#x27;d be hard to come up with a sufficient verification regime here.<p>So we&#x27;re left with mutually assured cyber destruction. I&#x27;d prefer we weren&#x27;t, but I don&#x27;t see the alternative.
评论 #42966163 未加载
Veserv3 个月前
Disclosing zero-days so the vendor can patch them and declare &quot;mission accomplished&quot; is such a waste.<p>&quot;Penetrate and Patch&quot; is about as effective for software security as it is for bulletproof vests. If you randomly select 10 bulletproof vests for testing, shoot each 10 times and get 10 holes each, you do not patch those holes and call it good. What you learned from your verification process is that the process that lead to that bulletproof vest is incapable of consistently delivering products that meet the requirements. Only development process changes that result in passing new verification tests give any confidence of adequacy.<p>Absent actively, or likely actively, exploited vulnerabilitys, the government should organize vulnerabilitys by &quot;difficulty&quot; and announce the presence of, but not disclose the precise nature of, vulnerabilitys and demand process improvement until vulnerabilitys of that &quot;difficulty&quot; are not longer present as indicated by fixing all &quot;known, but undiclosed&quot; vulnerabilitys of that &quot;difficulty&quot;. Only that provides initial supporting evidence that the process has improved enough to categorically prevent vulnerabilitys of that &quot;difficulty&quot;. Anything less is just papering over defective products on the government&#x27;s dime.
评论 #42965787 未加载
评论 #42965745 未加载
staticelf3 个月前
I think people give the US a lot of unnecessary shit. I don&#x27;t think my government releases any zero days but I am sure they must have found some. Every government today probably uses zero days but it seems very few release information about them?
评论 #42963321 未加载
评论 #42964182 未加载
egberts13 个月前
Simply because not enough anti-malware vendors are willing to let US government know that one of their favorite hoard of malware has lost &quot;its edge&quot;.<p>So, either they form a department of viability or they lose it all.
davemp3 个月前
While I don’t think we should be hoarding vulns, the idea of the government having huge budgets to find and disclose software defects is a bit strange to me. Seems like another instance of socializing bad externalities.
ggernov3 个月前
These are wins because if they&#x27;re actually patched it takes offensive tools away from our adversaries.
maerF0x03 个月前
the US often gets negative takes for doing what many other nations are also doing.<p>For example in 2018 Tencent (basically, China) withdrew from hacking competitions like pwn2own taking along with them the disclosures that proceeded.
评论 #42965697 未加载
评论 #42965930 未加载
josefritzishere3 个月前
I guess there wont be one in 2024
numbsafari3 个月前
NOBUS is a disaster. Knowingly leaving citizens unprotected is an absolute failure of government. Having a robust policy of identifying a resolving cybersecurity faults, and holding organizations accountable for patching and remediation is necessary if we are going to survive a real cyber “war”. We are absolutely unprepared.
评论 #42964455 未加载
评论 #42965331 未加载
评论 #42963695 未加载
评论 #42963182 未加载
afavour3 个月前
&gt; What changed the calculus in 2023 isn’t clear.<p>Well, the calculus didn&#x27;t change in 2023 if the report was only released a month or so ago. And in fact, in May 2024:<p>DHS, CISA Announce Membership Changes to the Cyber Safety Review Board <a href="https:&#x2F;&#x2F;www.dhs.gov&#x2F;archive&#x2F;news&#x2F;2024&#x2F;05&#x2F;06&#x2F;dhs-cisa-announce-membership-changes-cyber-safety-review-board" rel="nofollow">https:&#x2F;&#x2F;www.dhs.gov&#x2F;archive&#x2F;news&#x2F;2024&#x2F;05&#x2F;06&#x2F;dhs-cisa-announc...</a><p>So some new people came in and decided that more public information was better.<p>&gt; On January 21, 2025, it was reported that the Trump administration fired all members of the CSRB.<p>Ah, well, never mind then
评论 #42963945 未加载
评论 #42964196 未加载
评论 #42963433 未加载