Pwn2Own Event Reveals 73 Zero-Day Vulnerabilities and Offers $1 Million in Prizes

Published:

Discovering Vulnerabilities at Pwn2Own 2023

The recent Pwn2Own event has made headlines, with participants uncovering a staggering 73 unique zero-day vulnerabilities across diverse connected devices and technologies. This annual competition, held in Ireland, brought together some of the top ethical hackers from around the world to demonstrate their skills and shed light on the growing cyber threats that abound in our increasingly digitized lives.

A Wide Range of Affected Systems

The vulnerabilities identified during the event span a wide array of systems, including printers, network storage devices, smart home gadgets, and even flagship smartphones and wearables. The implications of these findings are significant, underscoring the urgent need for improved security measures across various platforms. Trend Micro, a key player in cybersecurity, has acknowledged the importance of this research in combating rising cyber threats, emphasizing that knowledge is power when it comes to safeguarding digital environments.

Proactive Cybersecurity

Trend Micro recognized that the discoveries made during Pwn2Own enable them to protect their customers from zero-day exploits an average of 71 days earlier than the rest of the cybersecurity industry. This proactive approach is crucial in an age where cyber risks are escalating, making security measures more vital than ever. By identifying vulnerabilities before they can be exploited by malicious actors, companies can take action and implement patches more effectively.

The Master of Pwn

A highlight of the event was the crowning of "Master of Pwn." The title was awarded to Summoning Team, who showcased their exceptional skills and strategy in uncovering vulnerabilities, leading to a substantial cash prize of USD $187,500. Along with this accolade, the event awarded a total of USD $1,024,750 to researchers who effectively demonstrated their zero-day exploits, contributing to an event with a total prize pool exceeding USD $2 million.

Notable Exploits and Winners

Several participants caught the cybersecurity community’s attention with their innovative approaches to exploitation. For instance, Ben R. and Georgi G. from Interrupt Labs successfully exploited an improper input validation flaw in the Samsung Galaxy S25, allowing them access to the device’s camera and location-tracking functionalities. Their demonstration earned them a prize of USD $50,000—a testament to their technical expertise.

In another impressive feat, Ken Gannon and 伊藤 剣 from Mobile Hacking Lab, along with Dimitrios Valsamaras of Summoning Team, exploited the same Samsung device using a combination of five distinct bugs, securing another USD $50,000 reward.

Furthermore, Bongeun Koo and Evangelos Daravigkas from Team DDOS made headlines by identifying eight vulnerabilities in both the QNAP Qhora-322 router and QNAP TS-453E NAS, nicknaming their endeavor "SOHO Smashup." This impressive collaborative victory yielded a hefty prize of USD $100,000.

Unique Findings from the Event

Other noteworthy disclosures included dmdung from STAR Labs SG Pte. Ltd, who revealed an out-of-bounds access vulnerability in the Sonos Era 300 smart speaker. This discovery also earned a USD $50,000 award. Additionally, Sina Kheirkhah and McCaulay Hudson from Summoning Team were recognized for their attack on the Synology ActiveProtect Appliance DP320 using two vulnerabilities.

Interestingly, Team Z3 opted for a discreet approach and did not publicly demonstrate a zero-click exploit for WhatsApp. Instead, they chose to share their findings confidentially with Trend Micro’s Zero Day Initiative and Meta, focusing on collaborative remediation efforts.

Looking Forward to Future Events

Looking ahead, the next Pwn2Own competition is set to focus on automotive systems, with the event slated to take place in Tokyo, Japan. This transition towards exploring vulnerabilities in automotive technology reflects the evolving landscape of cybersecurity, encapsulating the significance of connected vehicles in modern life.

Trend Micro firmly believes that the research conducted during Pwn2Own is a cornerstone of its strategy to mitigate threat risks. Their commitment to delivering advanced threat defenses reinforces the necessity of staying ahead in a world rife with cyber challenges, ensuring that protective measures are always one step ahead of potential exploitation.

Related articles

Recent articles

New Products