Views:

ZDI-powered vulnerabilities from the TrendAI™ Zero Day Initiative (ZDI) are surfaced in Threat and Exposure Management, providing advance visibility into high-severity vulnerabilities before public disclosure.

TrendAI Vision One™ integrates intelligence from the TrendAI™ Zero Day Initiative (ZDI), the world's largest vendor-agnostic bug bounty program, to generate risk events for vulnerabilities that have not yet been publicly disclosed. When ZDI researchers discover a vulnerability, vulnerability details remain confidential while the affected vendor develops a fix. ZDI-powered vulnerabilities give you advance warning during this pre-disclosure period so you can take protective action before a public advisory or CVE is published.
The ZDI responsible disclosure process follows these stages:
  1. Security researchers submit a vulnerability to ZDI.
  2. ZDI assigns an internal pre-disclosure tracking identifier called a ZDI-CAN ID (for example, ZDI-CAN-28894) and notifies the affected vendor.
  3. The vendor typically has 120 days to develop and release a fix.
  4. At public disclosure, ZDI publishes an advisory with a ZDI ID (for example, ZDI-25-423). If the vendor acknowledges the vulnerability, a CVE ID is assigned. Some vulnerabilities may never receive a CVE ID.
TrendAI Vision One™ generates the following risk event types based on the disclosure phase of a ZDI vulnerability. Each asset receives one risk event per vulnerability. ZDI-powered vulnerabilities are linked to any associated CVE risk events and are not duplicated for the same vulnerability on the same asset.

ZDI-powered risk event types

Risk event type
Description
Disclosure phase
ZDI vulnerability alert
Generated when an asset is detected running a software version known to be affected by a pre-disclosure ZDI vulnerability. Vulnerability details are not disclosed until the vendor patch is available or the ZDI disclosure deadline passes.
Pre-disclosure (ZDI-CAN ID only)
Time-critical vulnerability alert
Generated when ZDI publicly discloses a vulnerability and an asset is detected as affected. The vulnerability may be a zero-day (no patch available) or N-day (patch available but not yet applied) vulnerability.
Post-disclosure (ZDI ID assigned)
The ZDI vulnerability profile includes a disclosure timeline showing the full lifecycle of a ZDI vulnerability, from initial discovery through vendor notification, attack prevention/detection rule availability, public disclosure, and patch release. The timeline updates as the vulnerability progresses through each phase.
ZDI-powered vulnerabilities are identified in Threat and Exposure Management with a ZDI badge. To find a specific ZDI vulnerability by identifier, search by the ZDI-CAN ID or ZDI ID. If a CVE has been assigned, the vulnerability can still be located using the ZDI identifier.
Each ZDI vulnerability profile displays the following information.

ZDI vulnerability profile details

Detail
Description
Common Vulnerability Scoring System (CVSS) score
Severity score based on the vulnerability characteristics.
Affected vendor and products
The vendor and product names associated with the vulnerability.
Vulnerable versions
Validated, confirmed vulnerable versions and possible vulnerable versions based on available information.
Disclosure timeline
A phased view of the vulnerability lifecycle showing vendor notification, attack prevention/detection rule availability, public disclosure, and patch release milestones.
Attack prevention/detection rules
Attack prevention/detection rules available for the vulnerability, applied through TrendAI Vision One™ capabilities such as Network Security or Endpoint Security.
Mitigation options
Suggested actions to reduce risk exposure on the affected asset.
References
Links to the ZDI advisory and other relevant sources.
When a ZDI-powered vulnerability is detected on an asset, you can help prevent exploitation using the following mitigation measures.

Mitigation measures for ZDI risk events

Measure
Description
Apply attack prevention/detection rules
If attack prevention/detection rules are available for the vulnerability, apply them through the suggested capability to reduce risk exposure while an official vendor patch is in development.
Isolate the affected endpoint
Isolate the affected endpoint to prevent potential threat spread, particularly if no attack prevention/detection rule is available or active exploitation is suspected.
Limit application exposure
For Windows application vulnerabilities, go to Attack Surface DiscoveryLocal apps, locate the affected application, and mark the application as Untrusted to prevent the application from running until a patch is available.
Increase monitoring
Increase monitoring on the affected asset to detect unusual activity early and identify potential exploitation attempts.
Plan ahead for patching
ZDI-powered vulnerabilities provide advance notice before a vendor patch is publicly available. Use the lead time to prepare patching workflows so affected assets can be patched promptly when a fix is released.