A recent discovery by Oligo Security researchers has shed light on a critical vulnerability known as the “0.0.0.0-Day” that impacts popular browsers like Chrome, Safari, and Firefox. This vulnerability has the potential to be exploited by cyber attackers to gain unauthorized access to services on internal company networks.
The vulnerability arises from how these browsers handle network requests from external, public websites. Attackers can take advantage of this loophole to manipulate settings, access sensitive information, upload malicious files, and even execute remote code. While attacks exploiting this vulnerability have been successful on macOS and Linux systems, Windows systems remain unaffected due to the blocking of the 0.0.0.0 IPv4 address.
The 0.0.0.0-Day vulnerability allows a malicious website to send a request to the 0.0.0.0 IPv4 address and a specific port, which vulnerable browsers then forward to a service running on that port on the host’s local network. This seemingly harmless IP address can thus be leveraged by attackers to exploit local services, including those used for development, operating systems, and internal networks.
Researchers at Oligo Security conducted an investigation to identify vulnerable local applications affected by the vulnerability. They found that many local services running on a local port could be exploited through a web server with endpoints that allow for file manipulation. This discovery highlights the potential risks posed by the 0.0.0.0-Day vulnerability to various applications and services.
Efforts are underway to address this security flaw in major browsers. Browsers’ built-in CORS protections offer some defense against cross-site request forgery attacks, but limitations in response content handling still leave room for exploitation. The Private Network Access (PNA) specification, designed to prevent communication between less-secure public networks and more-secure private networks, does not effectively block requests sent to the 0.0.0.0 address due to a loophole in the existing IP segment definitions.
In response to the findings by Oligo Security, Google, Apple, and Mozilla have taken steps to mitigate the risk posed by the 0.0.0.0 vulnerability. Google plans to block access to 0.0.0.0 in future releases of Chrome, while Apple has already implemented changes in its WebKit browser engine. Mozilla is also set to introduce measures to prevent access to 0.0.0.0 in Firefox.
Developers are advised to implement additional protections for local applications to safeguard against potential attacks exploiting the 0.0.0.0-Day vulnerability. With the increasing use of 0.0.0.0 in website communications, it is crucial for website owners to be vigilant and take necessary precautions. As Oligo Security researchers have warned, the percentage of websites communicating with 0.0.0.0 is on the rise, making it essential to address this security risk promptly.

