Project Zero Updates Its Vulnerability Disclosure Policy

Four years on, Project Zero’s policy evolves again.

Since 2021, the Google-hosted security research team has followed a model known as “90 + 30″*. Any editor to whom a vulnerability is reported has 90 days to patch it before it is made public. For those fixed within the deadline, the technical details are published only 30 days later — a window intended to cover the patch adoption time. There is a 90-day grace period, grantable if patching can be completed within 104 days.

Project Zero experiments with an early disclosure

This policy has had little effect on one aspect: the time between the publication of a fix and its diffusion in the supply chain of software. Project Zero points to its work on chipsets and their drivers as evidence: they demonstrated how this diffusion delay contributes to lengthening the lifecycle of vulnerabilities.

A new approach is therefore being tested. The 90-day window remains, but with an additional step at the start of the process. About a week after reporting a vulnerability to a vendor, Project Zero will publicly announce its existence. It will specify the supplier or the open-source project involved, the affected product, the date of the report and the expiration date of the 90-day window.

These elements are intended to address a downstream signal in the supply chain… and to stimulate better upstream communication. Project Zero acknowledges that the approach could cause headaches for vendors without downstream ecosystems, by drawing attention to vulnerabilities that only they can fix. But these vendors represent a minority of the vulnerabilities addressed. The overall benefit of the approach would therefore outweigh these drawbacks.

* This cycle does not apply to actively exploited flaws. These are made public 7 days after their disclosure (a 3-day grace period). Project Zero also waits 30 days to publish the technical details.

Sur le même thème

Voir tous les articles Cybersécurité

Faille Salesloft : des tickets de support exposés… et des […]

Par
Clément Bohic

2 min.

Le NIST normalise une cryptographie “légère” pour l’IoT

Par
La rédaction

{ Tribune Expert } – Vibe coding : bonne ou mauvaise vibe ?

Par
Martyn Ditchburn *

La faille Salesloft fait de multiples victimes dans le secteur IT

Par
Clément Bohic

Réserve cyber de l’UE : qui sont les 45 fournisseurs sélectionnés

Par
Clément Bohic

Dawn Liphardt

Dawn Liphardt

I'm Dawn Liphardt, the founder and lead writer of this publication. With a background in philosophy and a deep interest in the social impact of technology, I started this platform to explore how innovation shapes — and sometimes disrupts — the world we live in. My work focuses on critical, human-centered storytelling at the frontier of artificial intelligence and emerging tech.