Playbook: Zero-Day Exploit Response
ID: PB-24
Severity: Critical | Category: Vulnerability Exploitation
MITRE ATT&CK: T1190 (Exploit Public-Facing Application), T1203 (Exploitation for Client Execution)
Trigger: Vendor advisory (0-day), TI alert, CISA KEV, Anomalous behavior without known CVE
Zero-Day Response Timeline
graph LR
Disc["🔍 0-day Discovered"] --> Assess["⚖️ Impact?"]
Assess --> Mitigate["🛡️ Virtual Patch"]
Mitigate --> Monitor["👁️ Monitor"]
Monitor --> Patch["🩹 Vendor Patch"]
Patch --> Apply["✅ Deploy"]
style Disc fill:#e74c3c,color:#fff
style Mitigate fill:#f39c12,color:#fff
style Apply fill:#27ae60,color:#fff
Vulnerability Triage
sequenceDiagram
participant TI as Threat Intel
participant SOC
participant VM as Vuln Mgmt
participant Ops
TI->>SOC: 🚨 0-day advisory
SOC->>VM: Scan for vulnerable assets
VM-->>SOC: Found 50 servers
SOC->>Ops: WAF virtual patch immediately
Ops-->>SOC: ✅ Virtual patch active
Note over SOC: ⏳ Wait for vendor patch
🚨 ZERO-DAY = No Patch Available. Immediate compensating controls and virtual patching are critical until vendor releases a fix.
Decision Flow
graph TD
Alert["🚨 Zero-Day Alert"] --> Source{"📢 Source?"}
Source -->|Vendor Advisory| Vendor["📄 Review CVE + Advisory"]
Source -->|CISA KEV| KEV["🏛️ In Active Exploitation"]
Source -->|Threat Intel / News| TI["📰 Emerging Zero-Day"]
Source -->|Internal Anomaly| Internal["🔍 Unknown Exploit Detected"]
Vendor --> Exposure["📊 Asset Inventory — Are We Affected?"]
KEV --> Exposure
TI --> Exposure
Internal --> Exposure
Exposure -->|Yes, We Run Affected Software| Affected["🔴 Assess Exploitation"]
Exposure -->|No| Safe["✅ Monitor — Not Affected"]
Affected --> IOC{"🔍 IoCs Found?"}
IOC -->|Yes — Actively Exploited| Compromised["🔴 Confirmed Compromise"]
IOC -->|No IoCs Yet| Mitigate["🟠 Apply Emergency Mitigations"]
Compromised --> FullIR["🔒 Full IR + Emergency Containment"]
Mitigate --> VPatch["🛡️ Virtual Patch + Monitor"]
1. Analysis
1.1 Zero-Day Assessment Framework
| Factor |
Assessment |
Score |
| CVSS Score |
___/10 |
|
| Attack Vector |
Network / Adjacent / Local / Physical |
|
| Complexity |
Low / High |
|
| Authentication Required |
None / Low / High |
|
| CISA KEV Listed |
Yes / No |
|
| Active Exploitation Confirmed |
Yes / No |
|
| Public PoC Available |
Yes / No |
|
| Patch Available |
Yes / No (Zero-Day = No) |
|
| Our Exposure |
Internet-facing / Internal / Not affected |
|
1.2 Investigation Checklist
| Check |
How |
Done |
| What software/version is affected? |
Advisory / CVE |
☐ |
| Inventory ALL systems running affected software |
CMDB, vulnerability scanner |
☐ |
| Are any affected systems internet-facing? |
Firewall rules, Shodan, ASM |
☐ |
| Search for advisory-provided IoCs |
EDR, SIEM, network logs |
☐ |
| Check for web shells, new files, backdoors |
EDR, file integrity monitor |
☐ |
| Check for unusual outbound connections |
Proxy / firewall / netflow |
☐ |
| Review logs for exploitation attempts |
WAF / IDS / application logs |
☐ |
| Are vendor workarounds available? |
Advisory |
☐ |
1.3 Exposure Priority Matrix
| System Type |
Internet-Facing |
Severity |
Action |
| Production, Internet-facing |
Yes |
🔴 Critical |
Immediate mitigation |
| Production, Internal |
No |
🟠 High |
Priority mitigation |
| Dev/Test, Internet-facing |
Yes |
🟠 High |
Take offline or mitigate |
| Dev/Test, Internal |
No |
🟡 Medium |
Schedule mitigation |
2. Containment
2.1 Emergency Mitigations (No Patch Available)
| # |
Action |
Done |
| 1 |
Disable vulnerable feature/service if possible |
☐ |
| 2 |
Restrict network access to affected systems (ACLs/FW rules) |
☐ |
| 3 |
Virtual patching — deploy IPS/WAF signatures for exploit attempt |
☐ |
| 4 |
Take offline internet-facing instances if business allows |
☐ |
| 5 |
Increase logging on affected systems |
☐ |
2.2 If Exploitation Confirmed
| # |
Action |
Done |
| 1 |
Isolate compromised systems from network |
☐ |
| 2 |
Snapshot/image compromised systems for forensics |
☐ |
| 3 |
Block C2 IPs/domains from advisory |
☐ |
| 4 |
Disable compromised user accounts |
☐ |
3. Eradication
| # |
Action |
Done |
| 1 |
Apply vendor patch as soon as released (emergency change) |
☐ |
| 2 |
Perform forensics — determine attack scope, lateral movement, data access |
☐ |
| 3 |
Reset credentials for accounts on compromised systems |
☐ |
| 4 |
Hunt for backdoors — web shells, implants, scheduled tasks, new users |
☐ |
| 5 |
Remove all attacker artifacts |
☐ |
| 6 |
Verify integrity — compare critical files to known-good baseline |
☐ |
4. Recovery
4.1 Patching Priority
| Priority |
System Type |
Timeline |
| P0 |
Internet-facing, exploited |
Immediately |
| P1 |
Internet-facing, not yet exploited |
Within 24 hours |
| P2 |
Internal, critical |
Within 48 hours |
| P3 |
Internal, non-critical |
Within 7 days |
4.2 Post-Patch Actions
| # |
Action |
Done |
| 1 |
Validate patch applied successfully |
☐ |
| 2 |
Verify vulnerability no longer exploitable |
☐ |
| 3 |
Check for residual compromise EVEN after patching |
☐ |
| 4 |
Update SBOM with patched versions |
☐ |
| 5 |
Monitor for re-exploitation attempts for 30 days |
☐ |
5. Communication
| Audience |
When |
What |
| CISO |
Immediately for Critical CVSS |
Exposure assessment, mitigation status |
| Executive team |
If confirmed exploitation |
Business impact, remediation timeline |
| Legal / DPO |
If data breach confirmed |
PDPA notification (72h) |
| Vendor |
If you discover a new zero-day |
Coordinated Vulnerability Disclosure (CVD) |
| ISACs / Peers |
After confirming IoCs |
TLP:AMBER or TLP:GREEN sharing |
| Regulators |
If critical infrastructure affected |
Per regulatory requirements |
6. IoC Collection
| Type |
Value |
Source |
| CVE ID |
|
Advisory |
| Affected software/version |
|
Advisory |
| Exploit payload/signature |
|
Advisory / IDS |
| C2 domains/IPs |
|
Advisory / TI |
| Web shell / backdoor hashes |
|
EDR / Forensics |
| Attacker IP |
|
WAF / IDS / Logs |
7. Escalation Criteria
| Condition |
Escalate To |
| Internet-facing system with active exploitation |
CISO + Major Incident |
| Public PoC available + we're exposed |
SOC Lead urgently |
| Data exfiltration during exploitation |
Legal + DPO (PDPA 72h) |
| Multiple systems compromised |
Major Incident team |
| Nation-state indicators |
Law enforcement + National CERT |
| You discover a new zero-day in our systems |
CISO + CVD process |
Threat Intel Coordination
sequenceDiagram
participant CERT
participant TI as Threat Intel
participant SOC
participant Ops
CERT->>TI: 🚨 Zero-day advisory
TI->>SOC: Assess impact
SOC->>Ops: Scan for vulnerable assets
Ops-->>SOC: Found 50 servers
SOC->>Ops: Deploy virtual patch
Ops-->>SOC: ✅ Patched
Compensating Controls
graph TD
ZeroDay["🔓 Zero-Day"] --> WAF["🛡️ WAF virtual patch"]
ZeroDay --> Segment["🔒 Network segmentation"]
ZeroDay --> ACL["📋 Restrict access"]
ZeroDay --> Monitor["👁️ Enhanced monitoring"]
WAF --> Wait["⏳ Wait vendor patch"]
Segment --> Wait
ACL --> Wait
Monitor --> Wait
Wait --> Apply["✅ Apply official patch"]
style ZeroDay fill:#e74c3c,color:#fff
style Apply fill:#27ae60,color:#fff
Detection Rules (Sigma)
References