Google Project Zero to Cut Vulnerability Disclosures to 7 Days in 2025

Google's Project Zero will accelerate vulnerability disclosures starting 2025, revealing bug existence within seven days of notifying vendors to pressure faster patching and reduce exploitation risks. This shifts from the 90-day timeline, amid data showing patch delays. Reactions are mixed, with praise for transparency but concerns over potential attacker advantages.
Google Project Zero to Cut Vulnerability Disclosures to 7 Days in 2025
Written by Ryan Gibson

In a move that could reshape how software vulnerabilities are handled across the tech industry, Google has announced significant updates to its vulnerability disclosure practices through its elite hacking team, Project Zero. The changes, set to take effect in 2025, aim to accelerate the patching process by publicly revealing the existence of newly discovered bugs much sooner—within just seven days of notifying the affected vendor. This shift comes amid growing concerns over prolonged exposure windows that allow cybercriminals to exploit flaws before fixes are deployed.

Project Zero, Google’s internal group dedicated to uncovering zero-day vulnerabilities, has long adhered to a 90-day disclosure timeline, giving vendors a grace period to develop and release patches. However, under the new policy, the team will share limited details about a vulnerability’s discovery shortly after reporting it, without divulging technical specifics that could aid attackers. This “reporting transparency” initiative is designed to pressure vendors into faster action while informing users and security researchers about potential risks earlier.

Accelerating the Patch Cycle: A Response to Real-World Threats

The rationale behind this policy evolution stems from data analyzed by Project Zero, which shows that the average time from bug report to public patch availability often exceeds the 90-day window, leaving systems vulnerable. As detailed in a recent blog post on the Project Zero site, the team observed that many vendors delay fixes due to complex development cycles, resulting in what they term the “upstream patch gap.” By announcing the report date and expected disclosure deadline publicly within a week, Google hopes to foster accountability and encourage swifter remediation.

Industry experts have mixed reactions to the change. Some praise it as a bold step toward transparency, potentially reducing the window for exploitation. For instance, posts on X (formerly Twitter) from cybersecurity professionals highlight enthusiasm for shrinking patch delays, with one prominent account noting that this could “drive faster, safer updates for users.” Yet, critics worry that even limited disclosures might tip off sophisticated threat actors, enabling them to reverse-engineer issues before patches are ready.

Historical Context and Precedents in Disclosure Policies

Google’s history with disclosure policies provides crucial backdrop. Back in 2013, the company’s Online Security Blog outlined timelines for vulnerabilities under active attack, emphasizing rapid response. More recently, a 2020 update from Project Zero, as reported in their blog, adjusted deadlines to include a grace period for bugs discovered during active exploitation, reflecting lessons from real incidents like the Chrome zero-days patched in mid-2025, including CVE-2025-6554 and CVE-2025-6558, which were actively targeted.

These past adjustments underscore Google’s ongoing refinement of its approach. According to a report from CyberScoop, the latest policy specifically targets the delays in the vulnerability lifecycle by putting vendors on early notice, a strategy that aligns with broader industry calls for quicker transparency without compromising security.

Implications for Vendors and the Broader Ecosystem

For software vendors, this means adapting to heightened scrutiny. Companies like Microsoft and Apple, frequent recipients of Project Zero reports, may need to streamline their patching processes to avoid public shaming or increased user anxiety. The policy’s trial nature—set for evaluation after one year—allows Google to gather feedback, much like the ecosystem responses summarized in the 2025 Q2 Privacy Sandbox report on Google’s Privacy Sandbox site.

Security researchers outside Google are also watching closely. As one X post from a cybersecurity hub put it, this could “boost transparency between vendors and users,” potentially inspiring similar policies elsewhere. However, the change raises questions about balancing speed with safety: if vendors rush patches, could that introduce new bugs?

Potential Challenges and Future Outlook

Challenges abound, including legal and ethical considerations. Google’s own Privacy Policy emphasizes sharing information to address security issues, but premature disclosures could conflict with regulations like the EU’s GDPR, which mandates careful handling of breach notifications.

Looking ahead, this policy could set a new standard, influencing how organizations worldwide manage disclosures. As detailed in an analysis by TechRadar, Google’s move signals a proactive stance in an era of escalating cyber threats, from state-sponsored attacks to ransomware. If successful, it might not only shorten vulnerability lifecycles but also enhance collective defenses, ultimately benefiting end-users who bear the brunt of unpatched flaws.

In conversations on X, sentiment leans positive, with influencers like Heather Adkins from Google touting the goal of safer updates. Yet, as with any policy shift, its true impact will emerge through implementation, potentially redefining trust in the cybersecurity domain.

Subscribe for Updates

CISOUpdate Newsletter

The CISOUpdate Email Newsletter is a must-read for Chief Information Security Officers. Perfect for CISOs focused on risk management, data protection, and staying ahead in an evolving threat landscape.

By signing up for our newsletter you agree to receive content related to ientry.com / webpronews.com and our affiliate partners. For additional information refer to our terms of service.

Notice an error?

Help us improve our content by reporting any issues you find.

Get the WebProNews newsletter delivered to your inbox

Get the free daily newsletter read by decision makers

Subscribe
Advertise with Us

Ready to get started?

Get our media kit

Advertise with Us