Skip to content Skip to footer
0 items - $0.00 0

U.S. Government Disclosed 39 Zero-Day Vulnerabilities in 2023, First-Ever Report by jc_811

U.S. Government Disclosed 39 Zero-Day Vulnerabilities in 2023, First-Ever Report by jc_811

U.S. Government Disclosed 39 Zero-Day Vulnerabilities in 2023, First-Ever Report by jc_811

12 Comments

  • Post Author
    HypnoDrone
    Posted February 6, 2025 at 3:03 pm

    So there was 39 vulnerabilities that affected government systems. The rest didn't so they had no need to disclose.

  • Post Author
    afavour
    Posted February 6, 2025 at 3:06 pm

    > What changed the calculus in 2023 isn’t clear.

    Well, the calculus didn't change in 2023 if the report was only released a month or so ago. And in fact, in May 2024:

    DHS, CISA Announce Membership Changes to the Cyber Safety Review Board
    https://www.dhs.gov/archive/news/2024/05/06/dhs-cisa-announc…

    So some new people came in and decided that more public information was better.

    > On January 21, 2025, it was reported that the Trump administration fired all members of the CSRB.

    Ah, well, never mind then

  • Post Author
    nimbius
    Posted February 6, 2025 at 3:06 pm

    I hope this signals a turning point and lessons learned from the historic practice of hoarding exploits in the hopes they can be weaponized.

    when you disclose vulnerabilities and exploits, you effectively take cannons off both sides of the metaphorical battle field. it actively makes society safer.

  • Post Author
    JoshTko
    Posted February 6, 2025 at 3:07 pm

    [flagged]

  • Post Author
    staticelf
    Posted February 6, 2025 at 3:07 pm

    I think people give the US a lot of unnecessary shit. I don't think my government releases any zero days but I am sure they must have found some. Every government today probably uses zero days but it seems very few release information about them?

  • Post Author
    numbsafari
    Posted February 6, 2025 at 3:10 pm

    NOBUS is a disaster. Knowingly leaving citizens unprotected is an absolute failure of government. Having a robust policy of identifying a resolving cybersecurity faults, and holding organizations accountable for patching and remediation is necessary if we are going to survive a real cyber “war”. We are absolutely unprepared.

  • Post Author
    ipunchghosts
    Posted February 6, 2025 at 3:10 pm

    [flagged]

  • Post Author
    int_
    Posted February 6, 2025 at 3:42 pm

    [flagged]

  • Post Author
    pentel-0_5
    Posted February 6, 2025 at 3:56 pm

    These are just the disclosed ones. The weaponized ones (as mentioned) found or bought kept secret by the NSA, etc. such as from Zerodium (ex-VUPEN) and similar aren't counted obviously. ;)

  • Post Author
    ggernov
    Posted February 6, 2025 at 4:16 pm

    These are wins because if they're actually patched it takes offensive tools away from our adversaries.

  • Post Author
    davemp
    Posted February 6, 2025 at 4:29 pm

    While I don’t think we should be hoarding vulns, the idea of the government having huge budgets to find and disclose software defects is a bit strange to me. Seems like another instance of socializing bad externalities.

  • Post Author
    mattmaroon
    Posted February 6, 2025 at 5:15 pm

    "What the government didn't reveal is how many zero days it discovered in 2023 that it kept to exploit rather than disclose. Whatever that number, it likely will increase under the Trump administration, which has vowed to ramp up government hacking operations."

    This is a bit of a prisoner's dilemma. The world would be better off if everyone disclosed every such exploit for obvious reasons. But if government A discloses everything and government B reserves them to exploit later, then government B has a strong advantage over government A.

    The only responses then are war, diplomacy, or we do it too and create yet another mutually assured destruction scenario.

    War is not going to happen because the cure would be worse than the disease. The major players are all nuclear powers. Diplomacy would be ideal if there were sufficient trust and buy-in, but it seems unlikely the U.S. and Russia could get there. And with nuclear treaties there's an easy verification method since nuclear weapons are big and hard to do on the sly. It'd be hard to come up with a sufficient verification regime here.

    So we're left with mutually assured cyber destruction. I'd prefer we weren't, but I don't see the alternative.

Leave a comment

In the Shadows of Innovation”

© 2025 HackTech.info. All Rights Reserved.

Sign Up to Our Newsletter

Be the first to know the latest updates

Whoops, you're not connected to Mailchimp. You need to enter a valid Mailchimp API key.