Hackers Exploit 18-Year-Old ‘0.0.0.0-Day’ Loophole in Major Browsers

Lilu Anderson
Photo: Finoracle.net

Hackers Exploit 18-Year-Old ‘0.0.0.0-Day’ Loophole in Major Browsers

Apple Safari, Google Chrome, and Mozilla Firefox browsers have been found vulnerable to a critical security loophole known as the ‘0.0.0.0-day’ attack. This vulnerability has been present for the past 18 years, allowing hackers to potentially breach private networks of both homes and businesses, as reported by Israeli cybersecurity startup Oligo.

What is the 0.0.0.0-Day Attack?

The loophole is linked to how browsers handle queries to a 0.0.0.0 IP address. Normally, when browsers like Chrome, Safari, and Firefox receive queries to 0.0.0.0, they redirect these to other IP addresses such as ‘localhost’, a local server used for testing code. Hackers have exploited this behavior by sending malicious requests to the 0.0.0.0 IP address, gaining access to data that should remain private. This type of attack has been termed a ‘0.0.0.0-day’ attack.

How the Attack Works

In a typical 0.0.0.0-day attack, the hacker manipulates the target into visiting a malicious website. The website appears normal but sends a harmful request to the 0.0.0.0 IP address, allowing the hacker to access sensitive information such as developer code and internal messages. Avi Lumelsky, an AI security researcher at Oligo, pointed out that this could also let attackers access the internal private network of the victim, opening up multiple attack vectors.

Vulnerability Scope

Although the attack predominantly affects those hosting web servers, it’s estimated that a significant number of systems are still vulnerable. Notably, researchers found that the issue extends beyond just localhost to any application that uses localhost and can be reached via 0.0.0.0. Affected systems can include major frameworks like Ray AI, used by companies such as Amazon and Intel.

Real-World Impact

David Adrian, a Google security developer, highlighted real-world instances of malware exploiting this vulnerability to target specific developer tools. While Windows systems are protected (Microsoft blocked 0.0.0.0 on its OS), Apple Macs and Linux machines remain at risk.

Industry Response

Apple has announced plans to block all website attempts to hit 0.0.0.0 in the beta of macOS 15 Sequoia. Google’s Chromium and Chrome security teams are also working on similar fixes. However, Mozilla faces challenges as blocking 0.0.0.0 could disrupt servers using it as a localhost substitute. Mozilla emphasized the ongoing standards discussions to understand and mitigate these compatibility risks.

Gal Elbaz, cofounder and CTO of Oligo, warned that the risk remains significant. Allowing 0.0.0.0 effectively permits access that should be blocked, leaving systems exposed.

Presentation at DEF CON

The cybersecurity community will gain further insights when the researchers present their findings at the DEF CON conference in Las Vegas this weekend.

Share This Article
Lilu Anderson is a technology writer and analyst with over 12 years of experience in the tech industry. A graduate of Stanford University with a degree in Computer Science, Lilu specializes in emerging technologies, software development, and cybersecurity. Her work has been published in renowned tech publications such as Wired, TechCrunch, and Ars Technica. Lilu’s articles are known for their detailed research, clear articulation, and insightful analysis, making them valuable to readers seeking reliable and up-to-date information on technology trends. She actively stays abreast of the latest advancements and regularly participates in industry conferences and tech meetups. With a strong reputation for expertise, authoritativeness, and trustworthiness, Lilu Anderson continues to deliver high-quality content that helps readers understand and navigate the fast-paced world of technology.