Google wants vendors to fix or offer mitigation advice for previously unknown and actively exploited software vulnerabilities within seven days of their discovery.
"After 7 days have elapsed without a patch or advisory, we will support researchers making details available so that users can take steps to protect themselves," Google security engineers Chris Evans and Drew Hintz said Wednesday in a blog post.
[ The Web browser is your portal to the world -- and the gateway for security threats. InfoWorld's expert contributors show you how to secure your Web browsers. Download the free PDF today! | Stay up to date on the latest security developments with InfoWorld's Security Central newsletter. ]
In 2010, Google researchers proposed a public disclosure deadline of 60 days for critical vulnerabilities and said that vendors should release a patch or mitigation information for them within that time frame.
"Based on our experience, however, we believe that more urgent action -- within 7 days -- is appropriate for critical vulnerabilities under active exploitation," the Google security engineers said. "The reason for this special designation is that each day an actively exploited vulnerability remains undisclosed to the public and unpatched, more computers will be compromised."
Over the years, Google security researchers have found dozens of cases where attackers were actively targeting publicly unknown, or "zero-day," vulnerabilities in software from third-party vendors, Evans and Hintz said. "We always report these cases to the affected vendor immediately, and we work closely with them to drive the issue to resolution," they said.
Many zero-day vulnerabilities are used against specific groups of individuals in targeted attacks that are often more serious than broader ones, the Google security engineers said. For example, political activists from certain parts of the world are frequently targeted and the compromise of their computers can have real implications for their personal safety, they said.
"Seven days is an aggressive timeline and may be too short for some vendors to update their products, but it should be enough time to publish advice about possible mitigations, such as temporarily disabling a service, restricting access, or contacting the vendor for more information," Evans and Hintz said.
Google expects to be held to the same standard and hopes that this new recommended time frame for zero-day vulnerability response will improve the coordination of vulnerability management and the overall state of security on the Web.
Carsten Eiram, the chief research officer at security firm Risk Based Security, agrees that making information about zero-day vulnerabilities known to users is important. "Each day an 0-day [vulnerability] is left undisclosed, systems are at a greater risk," he said Thursday via email. "Google providing other vendors with 7 days to respond by either publishing an announcement or a fix is very reasonable; they should not provide more."
Google has a fairly large security research team whose members are often credited by third-party vendors, including large ones like Adobe and Microsoft, with discovering vulnerabilities in their products.
However, while Google's new disclosure recommendation will most likely be followed by the company's own security researchers, it remains to be seen if it will also be adopted by third-party researchers or if it will influence vendors.