Eli5: How are Zero-click exploits even possible?

588 views

Like if nobody “asks” a piece of software to execute how does it get downloaded to my phone or PC and then execute it self ? I can understand attacks e.g where you download a jpeg and then click to open it and the jpeg had some extra malicious code in it etc, but without anybody “authorizing” anything how does the kernel allow the code to be run by the cpu etc ?

**EDIT** I am talking about forced entry zero click software like the one pegasus created for iphones

In: 190

20 Answers

Anonymous 0 Comments

To add another example – your computer may be open to communicate with other computers on the network, for example for sharing files and printers. Normally this will only do what it is supposed to do – share files you chose to those who know the username & password, but if there is a bug (and there were many bugs in this component in Windows), it can be tricked into doing something completely different, including executing arbitrary code. No input from the user is necessary at all.

Normally your computer is not directly accessible from the internet, so this danger would come only from other computers on the same network. But in certain configurations it could come from the internet too.

You are viewing 1 out of 20 answers, click here to view all answers.