HomeRisk ManagementsSecurity Researchers Discover 47 Zero-Days at Pwn2Own Berlin

Security Researchers Discover 47 Zero-Days at Pwn2Own Berlin

Published on

spot_img

Pwn2Own Berlin 2023: A Revolutionary Focus on AI Security

In a notable display of cybersecurity prowess, security researchers were rewarded nearly $1.3 million for uncovering 47 zero-day vulnerabilities at the Pwn2Own Berlin event. This prestigious competition took place over three days, from May 14 to May 16, and was sponsored by TrendAI’s Zero Day Initiative (ZDI).

The standout team of this year’s event, Devcore, made a remarkable impact by claiming a substantial prize of $505,000. This latest iteration of Pwn2Own continued its tradition of highlighting innovative security research while shifting the focus towards enterprise-level technologies, particularly emphasizing artificial intelligence and its associated tools.

A Rising Focus on Artificial Intelligence

The 2023 Pwn2Own event featured a strong emphasis on the use of artificial intelligence, showcasing various aspects of AI technology. Competing researchers set their sights on attacking AI databases such as Chroma, Postgres pgvector, and Oracle’s Autonomous AI Database. Additionally, for the first time, coding agents such as Cursor, Claude Code, and OpenAI Codex became targets, reflecting the growing concern surrounding the security of AI-assisted coding tools.

Dustin Childs, the head of threat awareness at ZDI, noted that the rise of “vibe coding” has made it crucial to evaluate the security measures integrated within these tools. “At some point or another, we’ve probably all vibe coded something," Childs stated. "There’s no shame in that, but how secure are the tools we use for vibe coding?" The challenge for competitors was to create an entry that interacted with a contestant-controlled resource—be it a web page, repository, or media file—exploiting a vulnerability within a coding agent in a common use-case scenario.

Landmark Wins and Notable Exploits

This year’s event saw impressive performances from various researchers, further showcasing the depth of talent in the cybersecurity domain. Among the event’s highlights was Nguyen Hoang Thach from STARLabs SG, who ingeniously used a memory corruption bug to exploit VMware ESXi with cross-tenant code execution capabilities, earning himself $200,000.

Additionally, the Devcore Research Team showcased its expertise by chaining vulnerabilities in several influential platforms. One notable entry was by an anonymous participant known as "splitline," who skillfully combined two bugs to exploit Microsoft SharePoint, earning a $100,000 reward. Orange Tsai of the same team distinguished himself further by combining three vulnerabilities to achieve remote code execution on Microsoft Exchange, which also netted him $200,000. Tsai’s prowess continued to shine as he chained four logic bugs to accomplish a sandbox escape on Microsoft Edge, earning an impressive $175,000.

Development of Ethics in Vulnerability Disclosure

True to the ethos of responsible vulnerability disclosure, newly discovered exploits will be communicated to the respective vendors to facilitate the development of security updates. After a period of 90 days, if the vendors do not release relevant security patches, ZDI retains the right to publicly disclose the vulnerabilities. This protocol ensures that consumers and enterprises remain informed and protected against potential cyber threats in an increasingly digital world.

Looking Ahead: Pwn2Berlin 2026

The future of Pwn2Own appears to be bright, especially with the upcoming Pwn2Berlin 2026 edition projected to maintain its focus on artificial intelligence and emerging technologies. As advancements in AI continue to reshape not just the coding landscape but also various aspects of cybersecurity, it will be crucial for institutions and developers to remain vigilant. The competition will likely emphasize educational efforts as well, helping to build a safer digital ecosystem for all users.

As we move further into the era of sophisticated AI technologies and coding practices, events like Pwn2Own play an essential role in encouraging rigorous scrutiny and development of security measures, paving the way for safer digital interactions. The focus on vulnerabilities associated with coding agents and AI databases is not just a trend; it underscores a critical need for bolstered security as the landscape continues to evolve dramatically.

With innovation often rushing ahead of regulation and security, these events are indispensable for the continual advancement of cybersecurity protocols, helping participants and the broader community remain adaptive and informed in the face of ever-evolving threats.

Source link

Latest articles

SEPPmail Gateway Vulnerabilities Put Organizations at Risk of RCE and Email Traffic Interception

Critical Vulnerabilities in SEPPmail Secure E-Mail Gateway Expose Organizations to Risks A series of vulnerabilities...

Why the Best Security Investment for a Board in 2026 Isn’t Another Tool

The urge to invest in additional security tools is a common response among organizations...

Mythos-Style AI Tools Elevating Cybersecurity Challenges in Healthcare

Déjà Vu: Is Mythos in Hands of Bad Actors Akin to Cobalt Strike, Brute...

More like this

SEPPmail Gateway Vulnerabilities Put Organizations at Risk of RCE and Email Traffic Interception

Critical Vulnerabilities in SEPPmail Secure E-Mail Gateway Expose Organizations to Risks A series of vulnerabilities...

Why the Best Security Investment for a Board in 2026 Isn’t Another Tool

The urge to invest in additional security tools is a common response among organizations...