ACROS Security, a Slovenia-based company that specializes in cybersecurity research, penetration testing and code review, on Tuesday announced the launch of a paid version of its 0patch service.
0patch provides users small patches, or micropatches, for vulnerabilities affecting open and closed source software. Applying the micropatches created by 0patch developers is easy and users don’t need to reboot the system for the fixes to take effect.
Through the 0patch FREE service, users have been provided patches for many high-risk vulnerabilities, including issues affecting Windows, WinRAR, OpenOffice, Microsoft’s JET Database, and Adobe Reader. Some of the flaws covered by 0patch have been exploited in malicious attacks.
The 0patch FREE service continues to be available for personal use and educational institutions, but ACROS Security has now also launched a PRO version that is specifically designed for enterprises and individuals who want to use it for work-related purposes.
0patch PRO provides both the patches offered in the FREE version and additional fixes that are only available to PRO users, along with dedicated email-based technical support.
PRO patches cover end-of-life products and enterprise software (e.g. Windows Server). Patches for zero-day vulnerabilities will be provided to both FREE and PRO users, but once an official fix is made available by the vendor they will only be offered to PRO users.
0patch PRO is priced at $25.95 plus tax per agent per year, but a free trial and a volume discount can also be requested. An individual license must be acquired for every machine, either physical or virtual, that uses 0patch.
ACROS Security is also working on an ENTERPRISE version of 0patch, which will include central and group management capabilities and will allow organizations to use on-premises servers.
Related: Unofficial Patches Released for Three Unfixed Windows Flaws
Related: Third-Party Patch Released for Windows Zero-Day
Related: Third-Party Patch Available for Microsoft JET Database Zero-Day
Related: Temporary Fix Available for Windows GDI Vulnerability

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- OpenSSL 1.1.1 Nears End of Life: Security Updates Only Until September 2023
- Google Links More iOS, Android Zero-Day Exploits to Spyware Vendors
- ChatGPT Data Breach Confirmed as Security Firm Warns of Vulnerable Component Exploitation
- Thousands Access Fake DDoS-for-Hire Websites Set Up by UK Police
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
Latest News
- Musk, Scientists Call for Halt to AI Race Sparked by ChatGPT
- Malware Hunters Spot Supply Chain Attack Hitting 3CX Desktop App
- LeapXpert Banks $22M Funding to Secure Corporate Messaging With Consumer Apps
- Blockchain Security Firm True I/O Raises $9 Million
- Spera Banks $10 Million to Tackle Identity and Access Sprawl
- OpenAI Patches Account Takeover Vulnerabilities in ChatGPT
- OpenSSL 1.1.1 Nears End of Life: Security Updates Only Until September 2023
- New Wi-Fi Attack Allows Traffic Interception, Security Bypass
