Mobile security firm Zimperium has launched an exploit acquisition program that aims to bring undisclosed attack code for already patched vulnerabilities out in the open.
Paying for old exploits might seem like a waste of money, but there are technical and business arguments to justify such an acquisition system and they ultimately have to do with the difference between exploits and vulnerabilities.
A vulnerability is a software defect with potential security implications, while an exploit is the actual code that takes advantage of that bug to achieve a specific malicious goal, often by bypassing other security barriers along the way.
In practice, many vulnerabilities that get reported to vendors are not accompanied by working exploits. Showing that a programming error can lead to memory corruption is typically enough for the vendor to understand its potential implications -- for example, arbitrary code execution.
If the software vendor understands the bug and commits to patching it, there's usually no point in taking the time to write a full-blown exploit that also bypasses sandboxes or OS security mechanisms like SELinux, DEP and ASLR in order to prove malicious code execution.
That's not the case, though, for the so-called weaponized exploits that are being sold behind closed doors to malicious hackers or to government agencies for a lot of money. These need to be fully functional and reliable and, in most cases, target unpatched vulnerabilities that users have no defense for, which is why they're known as zero-day exploits.
But what happens when exploits lose their zero-day status because the vulnerabilities they use are discovered independently and get patched by vendors? Does that attack code become public? Not always.
There's really no way to know how many zero-day exploits have been burned by vendor fixes over the years, and have remained private to this day. Or how many exploit writers hang on to what were previously zero-day exploits in hopes that they might still have some value against older devices.
It's worth keeping in mind that not every hacker is a bug hunter and not every bug hunter is an exploit writer. These are actions that require different skill sets. There are many successful bug hunters that don't have the necessary programming skills to write full-blown exploit chains that work reliably on various OS versions.
"Security research and exploitation is in our heart and what led Zimperium to this point," Zimperium's founder and CTO Zuk Avraham said in a blog post Tuesday. "We appreciate the art of exploitation, and appreciate cool tricks in order to write an exploit development, bypass ASLR/KASLR, achieve persistency, etc. We humbly believe that we can learn from any exploit and as a result offer better security for our customers and partners."
Sign up for CIO Asia eNewsletters.