What is ZERODIUM?

ZERODIUM is a cybersecurity start-up company with operations in North America and EMEA, it was founded by cybersecurity veterans with unparalleled experience in advanced vulnerability research and exploitation. ZERODIUM contributors are from a global community of talented and independent security researchers working together to provide the most up-to-date source of cybersecurity research and capabilities. ZERODIUM pays the highest rewards to researchers for their zero-day discoveries as we believe that this is the only way to capture the most advanced security research from all around the globe.

What is the difference between ZERODIUM and other programs?

The majority of existing vulnerability acquisition programs focus on the quantity instead of quality hence they usually acquire any kind of vulnerabilities but pay researchers very low rewards. At ZERODIUM we pay much higher rewards as we only focus on and acquire high-risk vulnerabilities with fully functional/reliable exploits affecting modern operating systems, software, and devices.

Who can participate in the ZERODIUM program?

Researchers from most countries can participate in the ZERODIUM program, however, if you are a citizen/resident of a country listed on US/UN sanctions lists, you are ineligible to participate to the program.

How to submit my research to ZERODIUM?

All submissions to ZERODIUM must be achieved through PGP encrypted emails. Visit our submit page for more information.

Which products and/or software are eligible?

We only acquire high-end vulnerability research and exploits affecting modern operating systems, software, and devices. Please read the Program section for a list of potentially eligible products.

Which vulnerability/exploit types are eligible?

We only acquire high-risk flaws accompanied by a fully functional and reliable exploit leading to arbitrary code execution, or privilege escalation, or sandbox bypass/escape, or sensitive information disclosure. Please read the Program section for a list of eligible vulnerability types.

What about exploitation techniques or mitigation bypass?

We will be glad to discuss, evaluate, and make an offer not only for a vulnerability/exploit but also for any innovative research, exploitation technique, or mitigation bypass. Please contact us to discuss your findings.

What about vulnerabilities affecting online services/websites?

ZERODIUM does not acquire vulnerabilities or exploits affecting online services or web sites such as Facebook, Google, etc. Please report such vulnerabilities directly to the affected vendor or through one of their bug bounty programs.

Are partial exploits (e.g. browser RCE w/ sandbox bypass/escape, and vice versa) eligible?

Yes, both partial or complete exploit chains are eligible. We acquire both full chains of zero-day exploits but also N stage exploits (e.g. a browser RCE without any sandbox escape/bypass, and also a sandbox escape/bypass or a privilege escalation alone without any client-side exploit) as far as the vulnerability is exploitable and falls within our eligibility scope.

Are theoretically-exploitable memory corruptions (e.g. crash PoC only) eligible?

Not eligible. For memory corruption vulnerabilities, we only acquire vulnerabilities proven to be exploitable i.e. accompanied by a fully functional exploit working with the latest/updated version of the affected software/system/device. Feel free to contact us if you think that your vulnerability may still be eligible.

What format should my vulnerability submission be in?

Submissions can be made in any format as long as all the supplied files and/or messages are PGP encrypted. All submissions must include: a fully functional exploit with source code (if any), a technical analysis of the vulnerability including a description of the root cause of the flaw, attack vectors, exploitation technique(s), required configuration (if non-default), and any other information necessary to evaluate your submission.

How to increase the potential reward/payment for my vulnerability?

ZERODIUM will make an offer to acquire your research once your submission is fully evaluated. The offer will mostly depend on the technical quality of your submission (affected product(s), vulnerability type, criticality, attack vector, default vs non-default configuration, etc) but also the quality of your exploit (reliability, bypassed exploit-mitigations, covered versions/systems/platforms, process continuation, etc).

What is the usual amount paid by ZERODIUM for a vulnerability X or Y?

ZERODIUM cannot discuss or share any financial information regarding a potential reward/payment before evaluating an acquisition opportunity, but ZERODIUM guarantees to researchers to receive rewards higher than any other bug bounty or software vendor reward on the market including those from Google, Mozilla, Internet Bug Bounty, etc. Please read the Program section for a list of potential payouts.

Which payment methods and/or bonuses are available?

Any acquisition made by ZERODIUM will be paid in full and in one installment via a bank/wire transfer. ZERODIUM may also pay additional bonuses in one or more installments if the research meets specific lifespan requirements. If you, your bank, or your country are/is on US/UN sanctions lists, you are ineligible to participate to the program or receive payments.

How the acquired security research is distributed by ZERODIUM?

ZERODIUM extensively analyzes and documents all acquired vulnerability research and provides it, along with protective measures and security recommendations, to its clients as part of the ZERODIUM Zero-Day Research Feed.

Who are ZERODIUM's customers?

ZERODIUM customers are major corporations in defense, technology, and finance, in need of advanced zero-day protection, as well as government organizations in need of specific and tailored cybersecurity capabilities.

Is ZERODIUM hiring security researchers and/or reverse engineers?

ZERODIUM is always hiring experienced zero-day vulnerability researchers to join our internal research team. ZERODIUM offers unique opportunities to work on advanced vulnerability research projects in an environment that recognizes and rewards great talent and work.

Please check our Careers section for a list of employment opportunities.