Hubbry Logo
Pwn2OwnPwn2OwnMain
Open search
Pwn2Own
Community hub
Pwn2Own
logo
7 pages, 0 posts
0 subscribers
Be the first to start a discussion here.
Be the first to start a discussion here.
Pwn2Own
Pwn2Own
from Wikipedia
Pwn2Own
DateApril 18–20, 2007 (2007-04-18 – 2007-04-20)
TimeTwice yearly
Duration2 to 4 days
VenueCanSecWest security conference
LocationVarious
TypeHacking contest
PatronZero Day Initiative
Organized byCanSecWest Applied Security Conference
AwardsCash prizes
WebsiteCanSecWest Applied Security Conference

Pwn2Own is a computer hacking contest held annually at the CanSecWest security conference.[1] First held in April 2007 in Vancouver,[2] the contest is now held twice a year,[3] most recently in March 2024.[4] Contestants are challenged to exploit widely used software[5] and mobile devices with previously unknown vulnerabilities.[6] Winners of the contest receive the device that they exploited and a cash prize.[7] The Pwn2Own contest serves to demonstrate the vulnerability of devices and software in widespread use while also providing a checkpoint on the progress made in security since the previous year.

History

[edit]

Origins

[edit]

The first contest in 2007[1] was conceived and developed by Dragos Ruiu in response to his frustration with Apple Inc.'s lack of response[8] to the Month of Apple Bugs and the Month of Kernel Bugs,[9] as well as Apple's television commercials that trivialized the security built into the competing Windows operating system.[10] At the time, there was a widespread belief that, despite these public displays of vulnerabilities in Apple products, OS X was significantly more secure than any other competitors.[8] On March 20, roughly three weeks before CanSecWest that year, Ruiu announced the Pwn2Own contest to security researchers on the DailyDave mailing list.[1] The contest was to include two MacBook Pros that he would leave on the conference floor hooked up to their own wireless access point. Any conference attendee that could connect to this wireless access point and exploit one of the devices would be able to leave the conference with that laptop. There was no monetary reward.[8] The name "Pwn2Own" was derived from the fact that contestants must "pwn" or hack the device in order to "own" or win it.

On the first day of the conference in Vancouver, British Columbia, Ruiu asked Terri Forslof of the Zero Day Initiative (ZDI) to participate in the contest.[5] ZDI has a program which purchases zero-day attacks, reports them to the affected vendor and turns them into signatures for their own network intrusion detection system, increasing its effectiveness. The vulnerabilities sold to ZDI are made public only after the affected vendor has issued a patch for it.[11] Forslof agreed to have ZDI offer to purchase any vulnerabilities used in the contest for a flat price of $10,000.[5] The first contest subsequently exposed a high-profile QuickTime flaw, which was disclosed to Apple on April 23 and patched in early May.[5]

In 2008 the scope of the Pwn2Own contest was expanded.[12] Targets included three laptops running the default installation of Windows Vista, OS X, or Ubuntu Linux.[13] Mobile devices were added in 2009.[6]

For 2012 the rules were changed to a capture-the-flag-style competition with a point system.[14] At and Chrome was successfully exploited for the first time, by regular competitor VUPEN.[15] After withdrawing from the contest that year due to new disclosure rules,[16] in 2013 Google returned as a sponsor and the rules were changed to require full disclosure of exploits and techniques used.[17] In that year (2013) a single researcher was able to hack Chrome, Firefox and Internet Explorer, a trifecta hack.[18] Google ceased to be a sponsor of Pwn2Own in 2015.[19]

Recent years

[edit]

In 2015, every web browser tested was successfully hacked and every prize won, totaling $557,500. Other prizes such as laptops were also given to winning researchers.[20] In 2018, the conference was much smaller and sponsored primarily by Microsoft, after China banned its security researchers from participating in the contest.[21]

Pwn2Own continues to be sponsored by Trend Micro's Zero Day Initiative, with ZDI reporting vulnerabilities to vendors before going public with the hacks.[3] "One of the largest hacking contests in the world" according to TechCrunch,[22] as of 2019 the contest continues to be held several times a year.[7] Pwn2Own Tokyo was held November 6 to November 7 in Tokyo, Japan, and was expected to hand out $750,000 in cash and prizes.[22] Hacks focus on browsers, virtual machines, computers, and phones.[3] In 2019, the contest added cars for the first time, with $900,000 offered for hacks exploiting Tesla software.[3] In 2019, the contest added industrial control systems.[23] The 2025, Pwn2Own event will be hosted at OffensiveCon.[24]

Award system

[edit]

Winners of the contest receive the device that they exploited and a cash prize.[7] Winners also receive a "Masters" jacket celebrating the year of their win.

List of successful exploits

[edit]

The following list of notable hacks is incomplete.

Hacker(s) Affiliation Year Exploit Target Version / OS Source
Dino Dai Zovi Independent 2007 QuickTime (Safari) Mac OS X [25][26]
Shane Macauley Independent 2007 QuickTime (Safari) Mac OS X [26][25]
Charlie Miller ISE 2008 Safari (PCRE) Mac OS X 10.5.2 [27][28]
Jake Honoroff ISE 2008 Safari (PCRE) Mac OS X 10.5.2 [27]
Mark Daniel ISE 2008 Safari (PCRE) Mac OS X 10.5.2 [27]
Shane Macauley Independent 2008 Adobe Flash (Internet Explorer) Windows Vista Service Pack 1 [29]
Alexander Sotirov Independent 2008 Adobe Flash (Internet Explorer) Windows Vista Service Pack 1 [29]
Derek Callaway Independent 2008 Adobe Flash (Internet Explorer) Windows Vista Service Pack 1 [29]
Charlie Miller ISE 2009 Safari Mac OS X [30][28]
Nils Independent 2009 Internet Explorer 8 Windows 7 Beta [31]
Nils Independent 2009 Safari Mac OS X [32]
Nils Independent 2009 Mozilla Firefox [33]
Charlie Miller ISE 2010 Safari Mac OS X [34]
Peter Vreugdenhil Independent 2010 Internet Explorer 8 Windows 7 [34]
Nils Independent 2010 Mozilla Firefox 3.6 Windows 7 (64-bit) [34]
Ralf-Philipp Weinmann Independent 2010 iPhone 3GS iOS [34]
Vincenzo Iozzo Independent 2010 iPhone 3GS iOS [34]
VUPEN VUPEN 2011 Safari 5.0.3 Mac OS X 10.6.6 [35]
Stephen Fewer Harmony Security 2011 Internet Explorer 8 (32-bit) Windows 7 Service Pack 1 (64-bit) [35]
Charlie Miller ISE 2011 iPhone 4 iOS 4.2.1 [36]
Dion Blazakis ISE 2011 iPhone 4 iOS 4.2.1 [36]
Willem Pinckaers Independent 2011 BlackBerry Torch 9800 BlackBerry OS 6.0.0.246 [36]
Vincenzo Iozzo Independent 2011 Blackberry Torch 9800 BlackBerry OS 6.0.0.246 [36]
Ralf-Philipp Weinmann Independent 2011 Blackberry Torch 9800 BlackBerry OS 6.0.0.246 [36]
VUPEN VUPEN 2012 Chrome Windows 7 Service Pack 1 (64-bit) [15]
VUPEN VUPEN 2012 Internet Explorer 9 Windows 7 [37]
Willem Pinckaers Independent 2012 Mozilla Firefox [38]
Vincenzo Iozzo Independent 2012 Mozilla Firefox [38]
Nils, Jon, Tyrone Erasmus, Jacques Louw MWR Labs 2012 Samsung Galaxy S3 Android [39][40]
VUPEN VUPEN 2013 Internet Explorer 10 Windows 8 [41]
VUPEN VUPEN 2013 Adobe Flash Windows 8 [42]
VUPEN VUPEN 2013 Oracle Java Windows 8 [42]
Nils MWR Labs 2013 Chrome Windows 8
Jon MWR Labs 2013 Chrome Windows 8
George Hotz Independent 2013 Adobe Reader Windows 8
Joshua Drake Independent 2013 Oracle Java Windows 8
James Forshaw Independent 2013 Oracle Java Windows 8
Ben Murphy Independent 2013 Oracle Java Windows 8
Pinkie Pie Independent 2013 (Mobile) Chrome Android [43]
Nico Joly VUPEN 2014 (mobile) Windows Phone (Internet Explorer 11) Windows 8.1
VUPEN VUPEN 2014 Internet Explorer 11 Windows 8.1
VUPEN VUPEN 2014 Adobe Reader XI Windows 8.1
VUPEN VUPEN 2014 Chrome Windows 8.1
VUPEN VUPEN 2014 Adobe Flash Windows 8.1
VUPEN VUPEN 2014 Mozilla Firefox Windows 8.1
Liang Chen, Zeguang Zhao Keen team, team509 2014 Adobe Flash Windows 8.1
Sebastian Apelt, Andreas Schmidt Independent 2014 Internet Explorer 11 Windows 8.1
Jüri Aedla Independent 2014 Mozilla Firefox Windows 8.1
Mariusz Młyński Independent 2014 Mozilla Firefox Windows 8.1
George Hotz Independent 2014 Mozilla Firefox Windows 8.1
Liang Chen, Zeguang Zhao Keen team, team509 2014 OS X Mavericks, and Safari
Bernard Wagner, Kyle Riley MWR Labs 2014 Amazon Fire Phone Fire OS [44]
Jung Hoon Lee, aka lokihardt Independent 2015 Internet Explorer 11, Google Chrome, and Safari [20]
Nico Golde, Daniel Komaromy Independent 2015 (Mobile) Samsung Galaxy S6 Baseband Android
Guang Gong Qihoo 360 2015 (Mobile) Nexus 6 Chrome Android
JungHoon Lee Independent 2016 Microsoft Edge Windows 10
Liang Chen, Qidan He, Marco Grassi, Yubin Fu Tencent Security Team Sniper 2016 Safari Mac OS X [45][46][47]
360Vulcan Qihoo 360 2016 Adobe Flash Player, Chrome Windows 10 [46][47]
Liang Chen, Wayne Liang, Marco Grassi, Yubin Fu Tencent Keen Security Lab 2016

(Mobile)

Safari iOS 10 [48][49]
Qidan He, Gengming Liu, Zhen Feng Tencent Keen Security Lab 2016

(Mobile)

Nexus 6P Chrome Android [49]
2017 iPhone 7, others iOS 11.1
2018
Fluoroacetate Independent 2019 (Mobile) Amazon Echo Show 5 [50]
Pedro Ribeiro, Radek Domanski Flashback 2019 (Mobile) NETGEAR Nighthawk Smart WiFi Router (LAN and WAN) v3 (hardware) [51]
Pedro Ribeiro, Radek Domanski Flashback 2019 (Mobile) TP-Link AC1750 Smart WiFi Router (LAN and WAN) v5 (hardware) [52]
Mark Barnes, Toby Drew, Max Van Amerongen, and James Loureiro F-Secure Labs 2019 (Mobile) Xiaomi Mi9 (Web Browser and NFC) Android [51]
Mark Barnes, Toby Drew, Max Van Amerongen, and James Loureiro F-Secure Labs 2019 (Mobile) TP-Link AC1750 Smart WiFi Router (LAN and WAN) v5 (hardware) [52]
Yong Hwi Jin, Jungwon Lim, and Insu Yun Georgia Tech Systems Software & Security Lab 2020 (Desktop) Apple Safari, with privilege escalation macOS [53][54]
Richard Zhu Fluorescence 2020 (Desktop) Microsoft Windows Windows [53][54]
Manfred Paul RedRocket 2020 (Desktop) Ubuntu Desktop Ubuntu [53][54]
Amat Cama, Richard Zhu Fluoroacetate 2020 (Desktop) Microsoft Windows Windows [53][54]
Phi Phạm Hồng STAR Labs 2020 (Desktop) Oracle VirtualBox Windows [53][55]
Amat Cama, Richard Zhu Fluoroacetate 2020 (Desktop) Adobe Reader, with privilege escalation Windows [53][55]
Lucas Leong Zero Day Initiative 2020 (Desktop) Oracle VirtualBox Windows [53][55]
STAR Labs 2020 (Tokyo) NETGEAR Nighthawk R7800 (LAN) [56]
Trapa Security 2020 (Tokyo) Western Digital My Cloud Pro Series PR4100 [56]
Pedro Ribeiro, Radek Domanski Flashback 2020 (Tokyo) NETGEAR Nighthawk R7800 (WAN) [56]
84c0 2020 (Tokyo) Western Digital My Cloud Pro Series PR4100 [56]
Viettel Cyber Security 2020 (Tokyo) Samsung Q60T [56]
Trapa Security 2020 (Tokyo) NETGEAR Nighthawk R7800 (LAN) [56]
Pedro Ribeiro, Radek Domanski Flashback 2020 (Tokyo) TP-Link AC1750 Smart WiFi [56]
Bugscale 2020 (Tokyo) Western Digital My Cloud Pro Series PR4100 [56]
84c0 2020 (Tokyo) NETGEAR Nighthawk R7800 (LAN) [56]
F-Secure Labs 2020 (Tokyo) Samsung Q60T [56]
Sam Thomas Pentest Ltd 2020 (Tokyo) Western Digital My Cloud Pro Series PR4100 [56]
Synacktiv 2020 (Tokyo) TP-Link AC1750 Smart WiFi (LAN) [56]
DEVCORE 2020 (Tokyo) Synology DiskStation DS418Play NAS [56]
DEVCORE 2020 (Tokyo) Western Digital My Cloud Pro Series PR4100 [56]
Gaurav Baruah 2020 (Tokyo) Western Digital My Cloud Pro Series PR4100 [56]
Viettel Cyber Security 2020 (Tokyo) Sony X800 [56]
STAR Labs 2020 (Tokyo) Synology DiskStation DS418Play NAS [56]
Jack Dates RET2 Systems 2021 (Vancouver) Apple Safari, with privilege escalation [57]
DEVCORE 2021 (Vancouver) Microsoft Exchange [57]
OV 2021 (Vancouver) Microsoft Teams [57]
Viettel Cyber Security 2021 (Vancouver) Microsoft Windows Windows 10 [57]
Ryota Shiga Flatt Security Inc 2021 (Vancouver) Ubuntu Desktop Ubuntu [57]
Jack Dates RET2 Systems 2021 (Vancouver) Parallels Desktop [57]
Bruno Keith, Niklas Baumstark Dataflow Security 2021 (Vancouver) Google Chrome, Microsoft Edge [57]
Viettel Cyber Security 2021 (Vancouver) Microsoft Exchange [57]
Daan Keuper, Thijs Alkemade Computest 2021 (Vancouver) Zoom Messenger Windows [57]
Tao Yan Palo Alto Networks 2021 (Vancouver) Microsoft Windows Windows 10 [57]
Sunjoo Park 2021 (Vancouver) Parallels Desktop [57]
Manfred Paul 2021 (Vancouver) Ubuntu Desktop Ubuntu [57]
z3r09 2021 (Vancouver) Microsoft Windows Windows 10 [57]
Benjamin McBride L3Harris Trenchant 2021 (Vancouver) Parallels Desktop [57]
Steven Seeley Source Incite 2021 (Vancouver) Microsoft Exchange [57]
Billy STAR Labs 2021 (Vancouver) Ubuntu Desktop Ubuntu [57]
Fabien Perigaud Synacktiv 2021 (Vancouver) Microsoft Windows Windows 10 [57]
Alisa Esage 2021 (Vancouver) Parallels Desktop [57]
Vincent Dehors Synacktiv 2021 (Vancouver) Ubuntu Desktop Ubuntu [57]
Da Lao 2021 (Vancouver) Parallels Desktop [57]
Marcin Wiazowski 2021 (Vancouver) Microsoft Windows Windows 10 [57]
Orange Tsai DEVCORE Research Team 2021 Microsoft Exchange Server Windows [58]
Anonymous researcher 2021 Microsoft Sharepoint Server Windows [58]
Abdelhamid Naceri (halov) 2021 Lock screen bypass Windows [58]
Manfred Paul April 2021 eBPF Privilege Escalation Linux Kernel [58]
Jack Dates RET2 Systems, Inc. 2021 Safari RCE / WebKit / WebAssembly Mac OS [58]

Yearly contests

[edit]

2007

[edit]

The contest took place from Thursday, April 18 to Saturday, April 20, 2007, in Vancouver.[2] The first contest was intended to highlight the insecurity of Apple's Mac OS X operating system since, at the time, there was a widespread belief that OS X was far more secure than its competitors.[8] Concerning rules, only two MacBook Pro laptops, one 13" and one 15", were left on the conference floor at CanSecWest and joined to a separate wireless network. Only certain attacks were allowed and these restrictions were progressively loosened over the three days of the conference.[8] Day 1 allowed remote attacks only, day 2 had browser attacks included, while day 3 allowed local attacks, where contestants could connect with a USB stick or Bluetooth. In order to win the 15" MacBook Pro, contestants would be required to further escalate their privileges to root after gaining access with their initial exploit.

The laptops were not hacked on the first day. After the $10,000 prize was announced by ZDI, Shane Macaulay called up former co-worker Dino Dai Zovi in New York and urged him to compete in the second day.[2] In one night, Dai Zovi found and exploited a previously unknown vulnerability in a QuickTime library loaded by Safari.[25] The following morning, Dai Zovi sent his exploit code to Macaulay,[59] who placed it on a website and e-mailed the contest organizers a link to it. When clicked, the link gave Macauley control of the laptop, winning the contest by proxy for Dai Zovi, who gave Macaulay the 15" MacBook Pro.[60] Dai Zovi separately sold the vulnerability to ZDI for the $10,000 prize.[26]

2008

[edit]

Pwn2Own 2008 took place from Thursday, March 26 to Saturday, March 28, 2008.[13] After the successful 2007 contest, the scope of the contest expanded to include a wider array of operating systems and browsers. The contest would demonstrate the widespread insecurity of all software in widespread use by consumers.[12] Dragos refined the contest with the help of a wide panel of industry experts and the contest was administered by ZDI, who would again offer to purchase the vulnerabilities after their demonstration.[13] As with all the vulnerabilities that ZDI purchases, the details of the vulnerabilities used in Pwn2Own would be provided to the affected vendors and public details would be withheld until a patch was made available.[11] All contestants who successfully demonstrated exploits at the contest could sell their vulnerabilities to ZDI for prizes of $20,000 on the first day, $10,000 on the second day, and $5,000 on the third day.[12] As in the previous year's contest, only certain attacks were allowed on each day. Targets included three laptops running the default installation of Windows Vista Ultimate SP1, Mac OS X 10.5.2, or Ubuntu Linux 7.10.[13] Day 1 saw remote attacks only; contestants had to join the same network as the target laptop and perform their attack without user interaction and without authentication. Day 2 had browser and Instant messaging attacks included, as well as malicious website attacks with links sent to organizers to be clicked.[12] Day 3 had third-party client applications included. Contestants could target popular third-party software[12] such as browsers, Adobe Flash, Java, Apple Mail, iChat, Skype, AOL, and Microsoft Silverlight.[13]

The laptop running OS X was exploited on the second day of the contest with an exploit for the Safari browser co-written by Charlie Miller,[28] Jake Honoroff and Mark Daniel of Independent Security Evaluators. Their exploit targeted an open-source subcomponent of the Safari browser.[27][61] The laptop running Windows Vista SP1 was exploited on the third day of the contest with an exploit for Adobe Flash co-written by Shane Macaulay, Alexander Sotirov, and Derek Callaway.[29][62] After the contest, Adobe disclosed that they had co-discovered the same vulnerability internally and had been working on a patch at the time of Pwn2Own.[63] The laptop running Ubuntu was not exploited.

2009

[edit]

Pwn2Own 2009 took place over the three days of CanSecWest from Thursday, March 18 to Saturday, March 20, 2009. After having considerably more success targeting web browsers than any other category of software in 2007, the third Pwn2Own focused on popular browsers used on consumer desktop operating systems. It added another category of mobile devices which contestants were challenged to hack via many remote attack vectors including email, SMS messages, and website browsing.[6][64] All contestants who demonstrated successful exploits at the contest were offered rewards for the underlying vulnerabilities by ZDI, $5,000 for browser exploits and $10,000 for mobile exploits.[65]

Web browser targets were Internet Explorer 8, Firefox, and Chrome installed on a Sony Vaio running Windows 7 Beta and Safari and Firefox installed on a MacBook running Mac OS X. All browsers were fully patched and in default configurations on the first day of the contest. As in previous years, the attack surface contest expanded over the three days.[65] On day 1, contestants had to target functionality in the default browser without access to any plugins. On day 2, Adobe Flash, Java, Microsoft .NET Framework, and QuickTime were included. On day 3, other popular third-party plugins were included like Adobe Reader. Multiple winners per target were allowed, but only the first contestant to exploit each laptop would get it. Mobile device targets included BlackBerry, Android, Apple iPhone 2.0 (T-Mobile G1), Symbian (Nokia N95) and Windows Mobile (HTC Touch) phones in their default configurations.

As with the browser contest, the attack surface available to contestants expanded over three days. In order to prove that they were able to successfully compromise the device, contestants had to demonstrate they could collect sensitive data from the mobile device or incur some type of financial loss from the mobile device owner.[65] On day 1, the device could receive SMS, MMS, and e-mail but messages could not be read. Wifi (if on by default), Bluetooth (if on by default), and radio stack were also in-scope. On day 2, SMS, MMS, and e-mail could be opened and read. Wifi was turned on and Bluetooth could be turned on and paired with a nearby headset (additional pairing disallowed). Day 3 allowed one level of user interaction with the default applications. Multiple winners per device were allowed, but only the first contestant to exploit each mobile device would get it (along with a one-year phone contract).

Based on the increased interest in competing in 2009, ZDI arranged a random selection to determine which team went first against each target.[65] The first contestant to be selected was Charlie Miller. He exploited Safari on OS X without the aid of any browser plugins.[30][28] In interviews after winning the contest, Miller stressed that while it only took him minutes to run his exploit against Safari it took him many days to research and develop the exploit he used.[66] A researcher identified only as Nils was selected to go after Miller. Nils successfully ran an exploit against Internet Explorer 8 on Windows 7 Beta. In writing this exploit, Nils had to bypass anti-exploitation mitigations that Microsoft had implemented in Internet Explorer 8 and Windows 7, including Data Execution Protection (DEP) and Address Space Layout Randomization (ASLR).[31][67] Nils continued trying the other browsers. Although Miller had already exploited Safari on OS X, Nils exploited this platform again,[32] then moved on to exploit Firefox successfully.[33] Near the end of the first day, Julien Tinnes and Sami Koivu (remote) successfully exploited Firefox and Safari on OS X with a vulnerability in Java. At the time, OS X had Java enabled by default, which allowed for reliable exploitation against that platform. However, due to having reported the vulnerabilities to the vendor already, Tinnes' participation fell outside the rules of the contest and was unable to be rewarded.[68] The next days of the contest did not attract any additional contestants. Chrome, as well as all of the mobile devices, went unexploited in Pwn2Own 2009.[69]

2010

[edit]

The competition started on March 24, 2010 and had a total cash prize pool of US$100,000.[70] Nine days before the contest was to begin, Apple released sixteen patches for WebKit and Safari.[71] Concerning software to exploit, $40,000 of the $100,000 was reserved for web browsers, where each target is worth $10,000.[70] Day 1 included Microsoft Internet Explorer 8 on Windows 7, Mozilla Firefox 3.6 on Windows 7, Google Chrome 4 on Windows 7, and Apple Safari 4 on Mac OS X Snow Leopard. Day 2 included Microsoft Internet Explorer 8 on Windows Vista, Mozilla Firefox 3 on Windows Vista, Google Chrome 4 on Windows Vista, and Apple Safari 4 on Mac OS X Snow Leopard. Day 3 included Microsoft Internet Explorer 8 on Windows XP, Mozilla Firefox 3 on Windows XP, Google Chrome 4 on Windows XP, and Apple Safari 4 on Mac OS X Snow Leopard. $60,000 of the total $100,000 cash prize pool was allotted to the mobile phone portion of the contest, each target was worth $15,000.[70] These included Apple iPhone 3GS, RIM BlackBerry Bold 9700, Nokia E72 device running Symbian, and HTC Nexus One running Android.

The Opera web browser was left out of the contests as a target: The ZDI team argued that Opera had a low market share and that Chrome and Safari are only included "due to their default presence on various mobile platforms". However, Opera's rendering engine, Presto, is present on millions of mobile platforms.[72][73][74][75]

Among successful exploits were when Charlie Miller hacked Safari 4 on Mac OS X.[34] Nils hacked Firefox 3.6 on Windows 7 64-bit[34] by using a memory corruption vulnerability and bypassing ASLR and DEP, after which Mozilla patched the security flaw in Firefox 3.6.3.[76] Ralf-Philipp Weinmann and Vincenzo Iozzo hacked the iPhone 3GS by bypassing the digital code signatures used on the iPhone to verify that the code in memory is from Apple.[34] Peter Vreugdenhil exploited Internet Explorer 8 on Windows 7 by using two vulnerabilities that involved bypassing ASLR and evading DEP.[34]

2011

[edit]

The 2011 contest took place March 9 to 11 during the CanSecWest conference in Vancouver.[77] The web browser targets for the 2011 contest included Microsoft Internet Explorer, Apple Safari, Mozilla Firefox, and Google Chrome. New to the Pwn2Own contest was the fact that a new attack surface was allowed for penetrating mobile phones, specifically over cellphone basebands. The mobile phone targets were Dell Venue Pro running Windows Phone 7, iPhone 4 running iOS, BlackBerry Torch 9800 running BlackBerry OS 6.0, and Nexus S running Android 2.3. Several teams registered for the desktop browser contest. For Apple Safari, registered competitors included VUPEN, Anon_07, Team Anon, Charlie Miller. Mozilla Firefox included Sam Thomas and Anonymous_1. Microsoft Internet Explorer teams included Stephen Fewer, VUPEN, Sam Thomas, and Ahmed M Sleet. Google Chrome teams included Moatz Khader, Team Anon, and Ahmed M Sleet. For the mobile browser category, the following teams registered. For the Apple iPhone hack attempt, teams included Anon_07, Dion Blazakis and Charlie Miller, Team Anon, Anonymous_1, and Ahmed M Sleet. To hack the RIM Blackberry the teams were Anonymous_1, Team Anon, and Ahmed M Sleet. To hack the Samsung Nexus S, teams included Jon Oberheide, Anonymous_1, Anon_07, and Team Anonymous. To hack the Dell Venue Pro, teams included George Hotz, Team Anonymous, Anonymous_1, and Ahmed M Sleet.

During the first day of the competition, Safari and Internet Explorer were defeated by researchers. Safari was version 5.0.3 installed on a fully patched Mac OS X 10.6.6. French security firm VUPEN was the first to attack the browser. Internet Explorer was a 32-bit version 8 installed on 64-bit Windows 7 Service Pack 1. Security researcher Stephen Fewer of Harmony Security was successful in exploiting IE. This was demonstrated just as with Safari.[35] In day 2 the iPhone 4 and Blackberry Torch 9800 were both exploited. The iPhone was running iOS 4.2.1; however, the flaw exists in version 4.3 of the iOS.[36] Security researchers Charlie Miller and Dion Blazakis were able to gain access to the iPhone's address book through a vulnerability in Mobile Safari by visiting their exploit-ridden webpage.[36] The Blackberry Torch 9800 phone was running BlackBerry OS 6.0.0.246. The team of Vincenzo Iozzo, Willem Pinckaers, and Ralf Philipp Weinmann took advantage of a vulnerability in the Blackberry's WebKit-based web browser by visiting their previously prepared webpage.[36] Firefox, Android, and Windows Phone 7 were scheduled to be tested during day 2, but the security researchers that had been chosen for these platforms did not attempt any exploits. Sam Thomas had been selected to test Firefox, but he withdrew stating that his exploit was not stable. The researchers that had been chosen to test Android and Windows Phone 7 did not show up.[36] No teams showed up for day three. Chrome and Firefox were not hacked.

2012

[edit]

For 2012 the rules were changed to a capture-the-flag-style competition with a point system.[14] The new format caused Charlie Miller, successful at the event in past years, to decide not to attend, as it required "on-the-spot" writing of exploits that Miller argued favored larger teams.[16] Hackers went against the four major browsers.[16]

At Pwn2Own 2012, Chrome was successfully exploited for the first time. VUPEN declined to reveal how they escaped the sandbox, saying they would sell the information.[15] Internet Explorer 9 on Windows 7 was successfully exploited next.[37] Firefox was the third browser to be hacked using a zero day exploit.[38]

Safari on Mac OS X Lion was the only browser left standing at the conclusion of the zero-day portion of Pwn2Own. Versions of Safari that were not fully patched and running on Mac OS X Snow Leopard were compromised during the CVE portion of Pwn2Own. Significant improvements in the security mitigations within Mac OS X were introduced in Lion.[78][79][citation needed]

Controversy with Google

[edit]

Google withdrew from sponsorship of the event because the 2012 rules did not require full disclosure of exploits from winners, specifically exploits to break out of a sandboxed environment and demonstrated exploits that did not "win".[16] Pwn2Own defended the decision, saying that it believed that no hackers would attempt to exploit Chrome if their methods had to be disclosed.[16] Google offered a separate "Pwnium" contest that offered up to $60,000 for Chrome-specific exploits. Non-Chrome vulnerabilities used were guaranteed to be immediately reported to the appropriate vendor.[16] Sergey Glazunov and a teenager identified as "PinkiePie" each earned $60,000 for exploits that bypassed the security sandbox.[80][81] Google issued a fix to Chrome users in less than 24 hours after the Pwnium exploits were demonstrated.[82]

2013

[edit]

In 2013, Google returned as a sponsor and the rules were changed to require full disclosure of exploits and techniques used.[17] The Mobile Pwn2Own 2013 contest was held November 13–14, 2013, during the PacSec 2013 Conference in Tokyo.[83] Web browsers Google Chrome, Internet Explorer and Firefox, along with Windows 8 and Java, were exploited.[84] Adobe also joined the contest, adding Reader and Flash.[41] Apple Safari on Mountain Lion was not targeted as no teams showed up.

French security firm VUPEN has successfully exploited a fully updated Internet Explorer 10 on Microsoft Surface Pro running a 64-bit version of Windows 8 and fully bypassed Protected Mode sandbox without crashing or freezing the browser.[41] The VUPEN team then exploited Mozilla Firefox, Adobe Flash, and Oracle Java.[42] Pinkie Pie won $50,000, and Google released Chrome updates on November 14 to address the vulnerabilities exploited.[43] Nils and Jon from MWRLabs were successful at exploiting Google Chrome using WebKit and Windows kernel flaws to bypass Chrome sandbox and won $100,000. George Hotz exploited Adobe Acrobat Reader and escaped the sandbox to win $70,000. James Forshaw, Joshua Drake, and Ben Murphy independently exploited Oracle Java to win $20,000 each.

The mobile contest saw contestants winning $117,500 out of a prize pool of $300,000.[83]

2014

[edit]

At Pwn2Own 2014 in March[85][86] was held in Vancouver at the CanSecWest Conference and sponsored by Hewlett-Packard.[87] All four targeted browsers fell to researchers,[88] and contestants overall won $850,000 of an available pool of $1,085,000.[89] VUPEN successfully exploited fully updated Internet Explorer 11, Adobe Reader XI, Google Chrome, Adobe Flash, and Mozilla Firefox on a 64-bit version of Windows 8.1, to win a total of $400,000—the highest payout to a single competitor to date. The company used a total of 11 distinct zero-day vulnerabilities.[90]

Among other successful exploits in 2014, Internet Explorer 11 was exploited by Sebastian Apelt and Andreas Schmidt for a prize of $100,000.[87] Apple Safari on Mac OS X Mavericks and Adobe Flash on Windows 8.1 were successfully exploited by Liang Chen of Keen Team and Zeguang Zhao of team509.[91] Mozilla Firefox was exploited three times on the first day, and once more on the second day, with HP awarding researchers $50,000 for each disclosed Firefox flaw that year.[92] Both Vupen and an anonymous participant exploited Google Chrome. Vupen earned $100,000 for the crack, while the anonymous entrant had their prize of $60,000 reduced, as their attack relied on a vulnerability revealed the day before at Google's Pwnium contest.[88] Also, Nico Joly of the VUPEN team took on the Windows Phone (the Lumia 1520), but was unable to gain full control of the system.[93] In 2014, Keen Lab hacked Windows 8.1 Adobe Flash in 16 seconds, as well as the OSX Mavericks Safari system in 20 seconds.[94]

2015–2017

[edit]

Every single prize available was claimed in 2015 in March in Vancouver, and all browsers were hacked for a total in $557,500 and other prizes. The top hacker proved to be Jung Hoon Lee, who took out "IE 11, both the stable and beta versions of Google Chrome, and Apple Safari" and earned $225,000 in prize money. Other hacks included Team509 and KeenTeem breaking into Adobe Flash, and other breaks in Adobe Reader. Overall, there were 5 bugs in the Windows operating system, 4 in Internet Explorer 11, 3 in Firefox, Adobe Reader, and Adobe Flash, 2 in Safari, and 1 in Chrome.[95] Google ceased to be a sponsor of Pwn2Own in 2015.[19]

At the contest in March 2016, "each of the winning entries was able to avoid the sandboxing mitigations by leveraging vulnerabilities in the underlying OSs."[96] In 2016, Chrome, Microsoft Edge and Safari were all hacked.[97] According to Brian Gorenc, manager of Vulnerability Research at HPE, they had chosen not to include Firefox that year as they had "wanted to focus on the browsers that [had] made serious security improvements in the last year".[98] After two days of competition, Tencent Security Team Sniper edged out JungHoon Lee with 13 more Pwn points and earning them the top Master of Pwn for Pwn2Own 2016 title.[47] In Mobile Pwn2Own 2016, which was held in tandem with the PacSecWest security conference in Tokyo, Tencent Team Keen won $215k at Mobile Pwn2Own 2016, by attacking Nexus6P and two exploits for the iPhone iOS 10.1, and was named Master of Pwn, a title ZDI gives to the contestant that accumulates the most points throughout the contest.[49]

In March 2017 in Vancouver, for the first time hackers broke into VMWare's virtual machine sandbox.[99] In 2017, Chrome did not have any successful hacks (although only one team attempted to target Chrome); the subsequent browsers that best fared were, in order, Firefox, Safari and Edge.[100] Mobile Pwn2Own was held on November 1 and 2 in 2017.[101] Representatives from Apple, Google and Huawei were at the contest.[102] Various smartphones, including ones using Apple's iOS 11.1 software, were also successfully hacked. The "11 successful attacks" were against the iPhone 7, the Huawei Mate 9 Pro and the Samsung Galaxy S8. Google Pixel was not hacked.[101] Overall, ZDI that year awarded $833,000 to uncover 51 zero-day bugs.[103] The team Qihoo 360 won the top prize in 2017.[104]

2018

[edit]

In 2018, the conference was much smaller and sponsored primarily by Microsoft. China had banned its security researchers from participating in the contest, despite Chinese nationals winning in the past, and banned divulging security vulnerabilities to foreigners.[21] In particular, Tencent's Keen Labs and Qihoo 360's 360Vulcan teem did not enter, nor any other Chinese nationals.[103] A Tianfu Cup was subsequently designed to be a "Chinese version of Pwn2Own", also taking place twice a year.[105] Also, shortly before the 2018 conference, Microsoft had patched several vulnerabilities in Edge, causing many teams to withdraw. Nevertheless, certain openings were found in Edge, Safari, Firefox and more.[106] No hack attempts were made against Chrome,[21][107] although the reward offered was the same as for Edge.[108] Hackers were ultimately awarded $267,000.[106] While many Microsoft products had large rewards available to anyone who was able to gain access through them, only Edge was successfully exploited, and also Safari and Firefox.[21]

2019

[edit]

A March 2019 contest took place in Vancouver at the CanSecWest conference, with categories including VMware ESXi, VMware Workstation, Oracle VirtualBox, Chrome, Microsoft Edge, and Firefox, as well as Tesla.[3] Tesla entered its new Model 3 sedan, with a pair of researchers earning $375,000 and the car they hacked after finding a severe memory randomization bug in the car's infotainment system.[22] It was also the first year that hacking of devices in the home automation category was allowed.[50]

In October 2019, Politico reported that the next edition of Pwn2Own had added industrial control systems.[23] Pwn2Own Tokyo was held November 6 to November 7, and was expected to hand out $750,000 in cash and prizes. Facebook Portal was entered, as was the Amazon Echo Show 5, a Google Nest Hub Max, an Amazon Cloud Cam and a Nest Cam IQ Indoor. Also entered was the Oculus Quest virtual reality kit.[22] In 2019, a team won $60,000 hacking into an Amazon Echo Show 5. They did so by hacking into the "patch gap" that meshed older software patched onto other platforms, as the smart screen used an old version of Chromium.[109][7] The team shared the findings with Amazon,[50] which said it was investigating the hack and would take "appropriate steps."[109]

2020

[edit]

A new edition of the Pwn2Own contest took place on January 21–23, 2020, in Miami at the S4 conference, with industrial control system and SCADA targets only.[110] Contestants were awarded more than $250,000 over the three-day event[111] as hackers demonstrated a multiple exploits in many leading ICS platforms. Steven Seeley and Chris Anastasio, a hacker duo calling themselves Team Incite, were awarded the title of Master of Pwn[112] with winnings of $80,000 and 92.5 Master of Pwn points. Overall, the contest had 14 winning demonstrations, nine partial wins due to bug collisions, and two failed entries.[113]

The spring edition of Pwn2Own 2020 occurred on March 18–19, 2020. Tesla again returned as a sponsor and had a Model 3 as an available target.[114] Due to COVID-19, the conference moved to a virtual event. The Zero Day Initiative decided to allow remote participation. This allowed researchers to send their exploits to the program prior to the event. ZDI researchers then ran the exploits from their homes and recorded the screen as well as the Zoom call with the contestant. The contest saw six successful demonstrations and awarded $270,000 over the two-day event while purchasing 13 unique bugs in Adobe Reader, Apple Safari and macOS, Microsoft Windows, and Oracle VirtualBox.[115] The duo of Amat Cama and Richard Zhu (Team Fluoroacetate) was crowned Master of Pwn with earnings of $90,000.[116]

The fall edition on Pwn2Own, normally referred to as Pwn2Own Tokyo, was held on November 5–7, 2020. With the lockdown from COVID-19 continuing, the contest was again held virtually and titled Pwn2Own Tokyo (Live From Toronto). ZDI researchers in Toronto ran the event, with others connecting from home.[117] The event had eight winning entries, nine partial wins due to bug collisions, and two failed attempts.[118] Prizes totalling $136,500 were awarded for 23 unique bugs. The Flashback Team (Pedro Ribeiro and Radek Domanski) earned the Master of Pwn title for their Wide Area Network (WAN) router exploits.[119]

2021

[edit]

On April 6–8, 2021, the Pwn2Own contest took place in Austin and virtually. This year's event expanded by adding the Enterprise Communications category, which includes Microsoft Teams and Zoom Messenger.[120] The first day of the contest saw Apple Safari,[121] Microsoft Exchange, Microsoft Teams, Windows 10,[122] and Ubuntu all compromised. Zoom Messenger was compromised on the second day of the contest with a zero-click exploit.[123] Parallels Desktop, Google Chrome, and Microsoft Edge were also successfully exploited during the contest. Over US$1,200,000 was awarded for 23 unique 0-days. Master of Pwn was a three-way tie between Team DEVCORE, OV, and the team of Daan Keuper and Thijs Alkemade.[124]

2022

[edit]

Miami (April 19–21)

[edit]

The second edition of Pwn2Own Miami occurred April 19–21, 2022, at the Filmore in South Beach Miami. $400,000 in prize money was awarded.[125] The team of Daan Keuper and Thijs Alkemade from Computest Sector 7 were awarded Master of Pwn with earnings of $90,000.[126]

Vancouver (May 18–20)

[edit]

Pwn2Own returned to Vancouver on May 18–20, 2022, to celebrate the 15th anniversary[127] of the contest. Over the three-day event, the ZDI awarded US$1,155,000 for 25 unique 0-day vulnerabilities. Day One of the contest set a single-day contest record of US$800,000 awarded for various exploits, including three separate Microsoft Teams demonstrations.[128] One of these exploits required no user interaction and could be used to compromise an entire organization. Also demonstrated were successful demonstrations against the Mozilla Firefox and Apple Safari web browsers.[129] Day Two of the contest was highlighted by a remote exploit of the Tesla Infotainment system. Researchers from the Synacktiv Team were able to remotely start the windshield wipers, open the trunk, and flash the headlights of the vehicle.[130] The event's final day saw three of the six Windows 11 privilege escalations successfully demonstrated. All six of these exploits used unique bugs. Samsung's flagship phone, the Galaxy S22, running the latest Android 13, was hacked in less than a minute. Once all the points were totaled, the STAR Labs team was awarded the title of Master of Pwn with $270,000 and 27 points.[131][132]

Toronto (December 6–9)

[edit]
Day 1 attempts[133]
Team Category Target Results References
Nettitude Printer Canon imageCLASS MF743Cdw Success
$20K and 2 Master of Pwn
Qrious Secure Router (WAN) TP-Link AX1800 Success
$20K and 2 Master of Pwn
[134]
Horizon3 AI Printer Lexmark MC3224i Success
$20K and 2 Master of Pwn
Gaurav Baruah Router (WAN) Synology RT6600ax Success
$20K and 2 Master of Pwn
Interrupt Labs Printer HP Color LaserJet Pro M479fdw Success
$20K and 2 Master of Pwn
STAR Labs Mobile Phone Samsung Galaxy S22 Success
$50K and 5 Master of Pwn
Quarkslab Router (LAN) NETGEAR RAX30 AX2400 Withdrawn
-0.5 Master of Pwn
Computest Router (LAN) Synology RT6600ax Success
$5K and 1 Master of Pwn
PHPHooligans Small Office / Home Office (SOHO) Smash-up NETGEAR RAX30 AX2400 Failure
Lexmark MC3224i
Chim Mobile Phone Samsung Galaxy S22 Success
$25K and 5 Master of Pwn
Interrupt Labs Router (LAN) NETGEAR RAX30 AX2400 Success
$5K and 1 Master of Pwn
Tenable Router (LAN) TP-Link AX1800 Failure
DEVCORE Small Office / Home Office (SOHO) Smash-up Mikrotik RouterBoard RB2011UiAS-IN Success
$100K and 10 Master of Pwn
Canon imageCLASS MF743Cdw
Claroty Research Network Attached Storage (NAS) Synology DiskStation DS920+ Success
$40K and 4 Master of Pwn
NCC Group EDG Router (LAN) TP-Link AX1800 Withdrawn
-0.5 Master of Pwn
[135]
Team Viettel Printer HP Color LaserJet Pro M479fdw Success
$10K and 2 Master of Pwn
ASU SEFCOM Network Attached Storage (NAS) Synology DiskStation DS920+ Collision
$10K and 2 Master of Pwn
Claroty Research Router (LAN) NETGEAR RAX30 AX2400 Success
$2.5K and 1 Master of Pwn
[136]
NCC Group EDG Router (LAN) Synology RT6600ax Collision
$1250 and 0.5 Master of Pwn
[135]
Neodyme Small Office / Home Office (SOHO) Smash-up NETGEAR RAX30 AX2400 Success
$50K and 10 Master of Pwn
HP Color LaserJet Pro M479fdw
Qrious Secure Router (LAN) NETGEAR RAX30 AX2400 Collision
$1250 and 0.5 Master of Pwn
Day 2 attempts[137]
Team Category Target Results References
ANHTUD Information Security Department Printer HP Color LaserJet Pro M479fdw Success
$10K and 2 Master of Pwn
PHPHooligans Router (WAN) NETGEAR RAX30 AX2400 Collision
$10K and 1 Master of Pwn
Bugscale Small Office / Home Office (SOHO) Smash-up Synology RT6600ax Success and Collision
$37.5K and 7.5 Master of Pwn
HP Color LaserJet Pro M479fdw
Qrious Secure Smart Speaker Sonos One Speaker Success
$60K and 6 Master of Pwn
[138]
Team Viettel Router (LAN) TP-Link AX1800 Success
$5K and 1 Master of Pwn
[134]
Le Tran Hai Tung Printer Canon imageCLASS MF743Cdw Success
$10K and 2 Master of Pwn
Synacktiv Printer Lexmark MC3224i Success
$10K and 2 Master of Pwn
STAR Labs Smart Speaker Sonos One Speaker Success and Collision
$22.5K and 4.5 Master of Pwn
[138]
Summoning Team Router (LAN) Synology RT6600ax Collision
$1250 and 0.5 Master of Pwn points
NCC Group EDG Router (LAN) NETGEAR RAX30 AX2400 Success and Collision
$7.5K and 1.5 Master of Pwn
[135]
Team Viettel Printer Canon imageCLASS MF743Cdw Success
$10K and 2 Master of Pwn
NCC Group EDG Printer Lexmark MC3224i Success
$10K and 2 Master of Pwn
Qrious Secure Small Office / Home Office (SOHO) Smash-up NETGEAR RAX30 AX2400 Failure
WD My Cloud Pro Series PR4100
DEVCORE Printer HP Color LaserJet Pro M479fdw Collision
$5K and 1 Master of Pwn
Ledger Donjon Router (WAN) TP-Link AX1800 Withdrawn
-1 Master of Pwn
[139]
DEVCORE Printer Canon imageCLASS MF743Cdw Success
$10K and 2 Master of Pwn
Luca MORO Network Attached Storage (NAS) WD My Cloud Pro Series PR4100 Success
$40K and 4 Master of Pwn
[140]
Interrupt Labs Mobile Phone Samsung Galaxy S22 Success
$25K and 5 Master of Pwn
Bugscale Router (WAN) NETGEAR RAX30 AX2400 Failure
Aleksei Stafeev Printer Lexmark MC3224i Success and Collision
$7.5K and 1.5 Master of Pwn
Day 3 attempts[141]
Team Category Target Results References
Team Viettel Network Attached Storage (NAS) WD My Cloud Pro Series PR4100 Success
$20K and 4 Master of Pwn
STAR Labs Small Office / Home Office (SOHO) Smash-up Synology RT6600ax Collision
$25K and 5 Master of Pwn
Canon imageCLASS MF743Cdw
Bun Bo Ong Chi Printer Canon imageCLASS MF743Cdw Success
$10K and 2 Master of Pwn
DEVCORE Smart Speaker Sonos One Speaker Success and Collision
$22.5K and 4.5 Master of Pwn
[138]
Qrious Secure Mobile Phone Samsung Galaxy S22 Failure
Team Viettel Small Office / Home Office (SOHO) Smash-up Cisco Integrated Service Router C921-4P Success and Collision
$37.5K and 7.5 Master of Pwn
Canon imageCLASS MF743Cdw
Pentest Limited Network Attached Storage (NAS) WD My Cloud Pro Series PR4100 Success
$20K and 4 Master of Pwn
Peter Geissler Printer Canon imageCLASS MF743Cdw Collision
$5K and 1 Master of Pwn
Qrious Secure Router (WAN) NETGEAR RAX30 AX2400 Success and Collision
$8.5K and 1.75 Master of Pwn
Neodyme Router (WAN) NETGEAR RAX30 AX2400 Failure
Pentest Limited Mobile Phone Samsung Galaxy S22 Success
$25K and 5 Master of Pwn
R-SEC Printer Canon imageCLASS MF743Cdw Success
$10K and 2 Master of Pwn
NCC Group EDG Small Office / Home Office (SOHO) Smash-up Ubiquiti Networks EdgeRouter X SFP Success
$50K and 10 Master of Pwn
[135]
Lexmark MC3224i
Claroty Research Network Attached Storage (NAS) WD My Cloud Pro Series PR4100 Success
$20K and 4 Master of Pwn
Day 4 attempts[142]
Team Category Target Results References
Quarkslab Router (WAN) NETGEAR RAX30 AX2400 Failure [143]
Peter Geissler Printer Lexmark MC3224i Failure [144]
NCC Group EDG Printer Canon imageCLASS MF743Cdw Collision
$5K and 1 Master of Pwn
Nettitude Router (WAN) NETGEAR RAX30 AX2400 Failure
Synacktiv Printer Canon imageCLASS MF743Cdw Collision
$5K and 1 Master of Pwn
[145]
Chris Anastasio Printer Lexmark MC3224i Success
$10K and 1 Master of Pwn
NCC Group EDG Router (WAN) Synology RT6600ax Collision
$5K and 1 Master of Pwn
[135]
ANHTUD Information Security Department Printer Canon imageCLASS MF743Cdw Success
$10K and 1 Master of Pwn
DEVCORE Printer Lexmark MC3224i Collision
$5K and 1 Master of Pwn
Sonar Router (WAN) Synology RT6600ax Collision
$5K and 1 Master of Pwn
[146]
namnp Printer Canon imageCLASS MF743Cdw Success
$10K and 1 Master of Pwn

See also

[edit]

References

[edit]
[edit]
Revisions and contributorsEdit on WikipediaRead on Wikipedia
from Grokipedia
Pwn2Own is a series of ethical hacking competitions organized by Trend Micro's Zero Day Initiative (ZDI), where participants demonstrate zero-day exploits against targeted commercial software, hardware, and systems to claim cash prizes and ownership of the compromised devices. Launched in April 2007 at the CanSecWest conference in , , the event originated as a demonstration of browser and operating system vulnerabilities but has evolved into multiple annual editions across global locations, including specialized contests for automotive, industrial control systems, and infrastructure. The competitions emphasize real-world exploit chains, requiring contestants to achieve remote code execution or under constrained conditions, with successful demonstrations leading to responsible disclosure of vulnerabilities to affected vendors for remediation. Over nearly two decades, Pwn2Own has facilitated the identification of hundreds of zero-day bugs, awarding tens of millions in total prizes—such as $792,750 across 56 exploits in a single 2025 event—and driving patches that mitigate risks in widely deployed technologies like web browsers, mobile platforms, and connected vehicles. Landmark achievements include inaugural hacks of enterprise targets in , the introduction of an AI hacking category in 2025, and escalating prize pools that reflect the rising value of undisclosed flaws in complex ecosystems. By incentivizing elite researchers through high-stakes challenges, Pwn2Own serves as a benchmark for cybersecurity resilience, exposing gaps in secure development practices while enabling vendors to prioritize fixes before public exploitation occurs. The format's focus on verifiable, high-impact exploits has influenced industry standards, though it consistently reveals vulnerabilities in even hardened systems, underscoring the ongoing between defenders and potential adversaries.

Origins and Early Development

Inception and Founding Principles

Pwn2Own originated in April 2007 as an annual computer hacking contest held during the CanSecWest security conference in , . It was initiated by Dragos Ruiu, the founder and organizer of CanSecWest, to empirically test claims of software invulnerability through live demonstrations of zero-day exploits. At the time, Apple's marketing campaigns, including the "I'm a Mac" advertisements, emphasized the superior security of Mac OS X over other operating systems, prompting Ruiu to create a structured competition that would incentivize researchers to uncover and demonstrate undisclosed vulnerabilities in real-world targets. The founding principles centered on fostering rigorous, incentive-driven security research by awarding cash prizes to the first successful exploiters of specified targets, such as web browsers and operating systems, while ensuring responsible disclosure of findings to vendors. This approach prioritized causal demonstration of flaws over theoretical discussion, aiming to highlight systemic insecurities in commercial products and compel manufacturers to address them promptly. Unlike informal hacking challenges, Pwn2Own enforced strict rules requiring remote, zero-interaction exploits to simulate realistic attack vectors, thereby providing verifiable evidence of potential real-world risks without relying on unproven assertions. From its inception, the contest emphasized empirical validation over vendor self-assessments, with prizes funded initially by sponsors and later coordinated through partnerships that supported . This model sought to bridge the gap between researchers and industry, promoting transparency in while avoiding immediate public exploitation that could enable widespread abuse. By , operational management shifted to the Zero Day Initiative (ZDI), a program under , which formalized prize structures and disclosure processes to sustain the event's growth without altering its core focus on high-stakes, proof-of-concept hacking.

Initial Events and Growth (2007–2010)

The inaugural Pwn2Own contest took place in April 2007 at the CanSecWest security conference in , , organized by vulnerability researcher Dragos Ruiu as a demonstration of real-world exploit capabilities against fully patched systems. Participants targeted web browsers on provided laptops, with the primary focus on Apple's running on a ; the first successful exploit, chaining multiple zero-day vulnerabilities, was achieved in approximately five hours, earning the winner the device itself plus a cash prize of around $10,000. No exploits succeeded against other browsers like or during the event, underscoring early disparities in browser security postures at the time. The 2008 edition, held March 27–28 in , marked the second annual event and expanded targets to include additional operating systems and applications such as mail clients. demonstrated the first hack by exploiting a MacBook Air via a QuickTime vulnerability in under two minutes after initial rules were adjusted to allow physical access for preparation, securing a $20,000 prize and the device. Subsequent days featured browser challenges, with successes against but failures for others, reflecting growing researcher interest and the contest's role in highlighting persistent zero-day risks in consumer software. Total prizes remained modest, averaging $10,000–$20,000 per category, but the event drew more international participants, establishing Pwn2Own as a benchmark for exploit development. In 2009, conducted again at CanSecWest in , the contest intensified focus on major browsers including , , and , with prizes set at $15,000 per successful demonstration on fully patched systems. German researcher Juenemann achieved a rare triple crown by hacking all three browsers in sequence using undisclosed zero-days, collecting $45,000 total and retaining the exploited devices; his exploits involved remote code execution without user interaction, exposing weaknesses in rendering engines and . Apple systems fell rapidly again, reinforcing patterns of vulnerability in , while the event's structure—requiring pre-registration of exploit intent—began formalizing through coordination with the Zero Day Initiative (ZDI), which facilitated responsible disclosure to vendors post-contest. Participation grew, with heightened media coverage signaling Pwn2Own's emergence as a key arena for validating security claims by vendors. By 2010, the contest evolved further at CanSecWest, incorporating mobile devices for the first time alongside browsers and operating systems, with exploits marking a milestone in targeting emerging platforms. Ralf-Philipp Weinmann successfully hacked an via a remote SMS-based vulnerability, earning the device and cash prize, while browser hacks continued against , , and , demonstrating that no major platform remained uncompromised under contest conditions. Prizes scaled slightly upward, maintaining $15,000–$20,000 per category, but total payouts increased due to more successful entries, reflecting broader researcher engagement and ZDI's growing role in acquiring and coordinating zero-day disclosures for patching. The event's expansion highlighted accelerating growth in exploit sophistication and the contest's value in driving vendor incentives for defense, though it also revealed systemic challenges in pre-release vulnerability detection across ecosystems.

Evolution and Modern Format

Expansion to Multiple Categories and Locations

Initially focused on web browsers and operating systems at its Vancouver inception, Pwn2Own broadened its scope to encompass mobile devices starting with the first dedicated Mobile Pwn2Own event held in Tokyo, Japan, in November 2013, targeting platforms like and Android. This addition reflected growing concerns over smartphone vulnerabilities, with contestants demonstrating remote code execution exploits on devices such as the and Apple . Subsequent years saw further category diversification, including the introduction of an (IoT) segment in 2018 at Pwn2Own , where participants targeted connected devices beyond traditional computing endpoints to highlight risks in smart home and networked gadgets. In 2019, the automotive category debuted at the event, challenging hackers to compromise vehicle systems like Tesla's infotainment interfaces, marking an entry into physical infrastructure security. By 2020, a specialized Industrial Control Systems (ICS) variant emerged, focusing on operational technology in sectors like energy and manufacturing, with dedicated events to address supervisory control and data acquisition () weaknesses. Geographic expansion paralleled these thematic growths, shifting from annual exclusivity to international venues beginning with for mobile-focused contests in 2013 and continuing with PacSec-hosted events there through the . The 2021 , edition incorporated hybrid in-person and virtual formats amid pandemic constraints, introducing categories like printers and (NAS) devices. hosted consumer-oriented iterations from 2022 onward, featuring small office/home office (SOHO) routers and systems. Recent developments include enterprise events in , , in May 2025 with a pioneering AI infrastructure category targeting models and frameworks, and Cork, , in October 2025 emphasizing messaging apps like alongside traditional targets. Automotive editions remain anchored in , expanding in 2025 to include electric vehicle chargers from vendors like Tesla and Alpitronic. These multi-location formats, now numbering several annually across continents, enable broader researcher participation and vendor-specific challenges while maintaining the core zero-day disclosure model.

Rule Changes and Scaling (2011–2022)

In 2012, Pwn2Own transitioned from sequential individual attempts to a capture-the-flag format incorporating a point system, enabling teams to accumulate points based on the complexity and success of exploits against targets such as , , , and Chrome, with prizes tiered at $60,000 for first place, $30,000 for second, and $15,000 for third. This shift facilitated broader participation and competition dynamics, departing from prior single-exploit focus. Concurrently, a mobile-only variant launched in emphasized smartphone hacking under specialized rules, awarding $60,000 in prizes. Subsequent refinements elevated exploit rigor; in 2015, Windows targets mandated circumvention of Enhanced Mitigation Experience Toolkit (EMET) and Endpoint Protection Manager (EPM) defenses to claim awards. By 2016, organizers introduced the "Master of Pwn" title for the highest-scoring team, alongside $460,000 in total awards for 21 zero-day demonstrations. In 2017, rules added penalties via negative points for withdrawn attempts, aiming to discourage speculative entries, while the 10th anniversary event distributed $833,000 across 51 zero-days. Event scaling accelerated through category diversification and geographic expansion. Plug-in vulnerabilities joined core browser targets in 2013, with prize pools reaching $560,000 and $320,000 awarded; the Tokyo mobile edition that year incorporated Bluetooth, Wi-Fi, and USB attack vectors, yielding $117,500. Prizes escalated, nearing $1 million by 2014, when all seven targeted mobile devices in fell to exploits. Internet of Things (IoT) categories debuted in 2018, followed by automotive targets like the in 2019 ($545,000 awarded in ), industrial control systems (ICS) in Miami 2020 ($280,000), and enterprise communications in 2021 ($1.2 million in ). By 2022, multiple annual events became standard, including ($1.155 million awarded), ($400,000 for ICS), and Toronto—the largest to date with 66 entries from 36 teams across 13 categories, disbursing $989,750. Overall prize scales grew from $60,000 total in to multimillion-dollar aggregates, reflecting heightened vendor sponsorships and vulnerability disclosures, while international venues like sustained specialized mobile and automotive focus.

Recent Events and Innovations (2023–2025)

In 2023, Pwn2Own , held in March, saw participants demonstrate 27 unique zero-day vulnerabilities across categories including browsers, operating systems, and hypervisors, earning $1,035,000 in prizes along with a vehicle for a successful automotive exploit. Later that year, Pwn2Own in October resulted in 58 zero-days targeting devices such as smartphones, cameras, and printers, with total awards exceeding $1 million USD. These events highlighted growing emphasis on (IoT) and mobile targets, with multiple successful hacks on devices reported. The 2024 schedule expanded geographically and thematically, beginning with Pwn2Own Automotive in January, which focused exclusively on connected vehicle vulnerabilities, awarding prizes for exploits against chargers and systems. Pwn2Own followed in March, distributing $1.1 million for demonstrations including Tesla vehicle hacks, operating system compromises, and software exploits. Pwn2Own Ireland in October marked the debut of a European flagship event outside traditional venues, yielding over $1 million in bounties for 38 successful attacks on cameras, printers, (NAS) devices, smart speakers, and smartphones, uncovering more than 70 zero-days. This iteration introduced refined rules for remote code execution in enterprise environments, enhancing focus on real-world attack vectors. By 2025, innovations included the introduction of an (AI) hacking category at Pwn2Own in May, an enterprise-oriented event targeting web browsers, operating systems, and AI models, where participants earned over $1 million for exploits, with STAR Labs SG claiming Master of Pwn honors. Pwn2Own Automotive returned in January with expanded targets like EV chargers under the (OCPP), resulting in 49 zero-days and a new Master of Pwn, Sina Kheirkhah. Pwn2Own in concluded the primary annual cycle, awarding $1,024,750 for 73 zero-days across similar categories, demonstrating sustained scaling in prize pools and vulnerability disclosures amid increasing participation from international teams. These developments reflect Zero Day Initiative's strategy to broaden scope into emerging technologies like AI and automotive ecosystems, prioritizing verifiable zero-day discoveries for vendor patching.

Contest Mechanics

Structure and Competition Rules

Pwn2Own operates as a live, invite-only hacking competition organized by Trend Micro's Zero Day Initiative (ZDI), typically spanning three to four days at security conferences or dedicated venues. Contestants register in advance via email to [email protected], requiring a ZDI researcher account, completion of a , and submission of case entry forms for each targeted product. Events feature predefined categories such as web browsers, mobile devices, automotive systems, and emerging areas like AI models, with specific targets (e.g., latest versions of Chrome, , or Tesla vehicles) announced prior to the contest. The format employs a capture-the-flag style since 2012, where participants compete sequentially to exploit vulnerabilities, earning points for successes rather than solely racing to be first. Eligibility restricts participation to individuals or teams of legal adult age, excluding employees of , event sponsors, or targeted vendors, as well as residents of U.S.-embargoed countries or those on denied persons lists. Public sector employees must confirm compliance with ethics rules. Each contestant or team registers once, with one entry per target but multiple possible across categories. Attempts proceed in a randomized order determined by draw at the event's start, ensuring fairness; contestants may only target each product once across the contest. Successful exploits must leverage previously unknown, undisclosed vulnerabilities, with no reuse of flaws in subsequent attempts or categories. During attempts, participants have up to 30 minutes total, including three 10-minute slots, to demonstrate a full exploit chain under strict conditions: no user interaction beyond initial application launch, fully automated execution, and targets configured in default, fully patched states. Success requires achieving , , or sensitive while bypassing mitigations like (ASLR), data execution prevention (DEP), and sandboxing where applicable. Judges verify novelty and reliability on-site, disqualifying exploits reliant on known issues or non-remote vectors unless specified (e.g., zero-click for certain mobile categories). Post-success, contestants submit a whitepaper and proof-of-concept to ZDI, which purchases the vulnerabilities and coordinates responsible disclosure to vendors, typically granting 90 days for patching before public release. Prizes combine cash awards per target—ranging from $20,000 to $500,000 based on complexity—and a points system for overall ranking, with the highest scorer crowned "Master of Pwn" and awarded 65,000 ZDI reward points (valued at approximately $25,000). Points vary by category difficulty (e.g., 10–50 per exploit), accumulated across days, and may include bonuses for add-on challenges like defeating additional security layers. Unclaimed prizes in a category can roll over or redistribute, incentivizing broader participation. ZDI retains rights to demonstrated exploits, ensuring ethical handling, while contestants waive claims to devices "pwned" during the event.

Target Categories and Devices

Pwn2Own contests designate target categories comprising specific commercial devices, software applications, and systems, chosen for their market significance and potential . Successful attempts generally require demonstrating , , or while bypassing protections like (ASLR), data execution prevention (DEP), and sandboxing, often via remote network vectors without user interaction beyond device setup. Categories adapt to technological shifts, incorporating traditional endpoints alongside specialized domains such as industrial controls and infrastructure. Web browsers represent a foundational category, targeting rendering engines, sandbox escapes, and kernel escalations in products like , , , and Mozilla Firefox, with additional premiums for escapes in virtualized environments. Mobile platforms focus on flagship smartphones, including the Samsung Galaxy S25, Google Pixel 9 series, and Apple iPhone 16, where exploits must achieve system-level access remotely via browser, radio, or messaging without biometric manipulation. Operating systems such as , Apple macOS, and are tested for local privilege escalations exploiting kernel vulnerabilities. Enterprise and server categories emphasize virtualization hypervisors like VMware ESXi, Hyper-V, and Oracle VirtualBox; container runtimes including Docker and gRPC frameworks; and applications such as Exchange, (RDP), Reader, and Office 365 suites (Word, Excel, PowerPoint). (NAS) devices, including Synology DiskStation DS925+, BeeStation Plus, ActiveProtect DP320, and QNAP TS-453E, are targeted for remote code execution over network or radio interfaces using default configurations. Printers like HP DeskJet 2855e, CX532adwe, Canon imageCLASS MF654Cdw, and Brother MFC-J1010DW face network-based attacks on exposed services. Surveillance and smart home systems include cameras such as CC400W, AI Pro, and Wyze Cam Pan v3; hubs like Bridge and Green; and speakers including Era 300 and 15, with exploits pivoting via small office/home office (SOHO) routers like QNAP Qhora-322. Messaging applications, notably on Android, , and Meta Quest VR headsets, demand zero-click or one-click remote compromises. Wearables target devices like Ray-Ban Meta Smart Glasses and /3S for proximity or local escalations. Automotive categories feature in-vehicle infotainment (IVI) units such as Sony XAV-AX8500, Alpine iLX-507, Pioneer DMH-WT7600NEX, and Kenwood DMX958XR; (EV) chargers including ChargePoint Home Flex, Phoenix Contact CHARX SEC-3150, and Tesla Wall Connector; and vehicle-specific components like /Y tuners, modems, gateways, ECUs, and systems via or Ethernet. Operating systems in this domain include Automotive Grade Linux, BlackBerry QNX, and Android Automotive OS. Emerging AI categories introduce six frameworks, such as vector databases, model serving toolkits, and Container Toolkit, requiring host-level code execution from constrained environments like crafted container images.

Award System and Incentives

The Pwn2Own competitions award cash prizes to participants who successfully demonstrate novel zero-day exploits against specified targets, with amounts determined by the category, exploit complexity, and impact level. Prizes typically range from $20,000 to $200,000 per successful first-round hack, escalating to $1 million for high-stakes challenges such as zero-click remote code execution in applications like . In addition to monetary rewards, winners receive the exploited device itself, valued at approximately $500, and all demonstrated vulnerabilities are responsibly disclosed through the Zero Day Initiative (ZDI) for coordinated patching by vendors. A points-based incentivizes breadth and , assigning values to exploits based on factors like chains and sandbox escapes; the contestant accumulating the most points earns the "Master of Pwn" title and 65,000 ZDI reward points, redeemable at an estimated $25,000 value within ZDI's acquisition program. Partial successes, such as incomplete chains or second-round attempts, may yield reduced prizes starting at $5,000, while failed demonstrations receive no award to maintain focus on verifiable, high-impact results. Event prize pools have grown substantially, reaching over $1 million in recent iterations like Pwn2Own 2025, where $1,024,750 was disbursed for 73 unique zero-days across three days. These incentives promote ethical research by offering competitive payouts that rival underground markets, channeling discoveries into coordinated disclosure rather than exploitation-for-hire. ZDI's involvement ensures researchers forgo immediate public release or sale to adversaries in exchange for bounties and priority patching, fostering long-term cybersecurity improvements through vendor notifications and empirical validation of defenses. This structure has scaled with event expansion, as seen in specialized contests like Pwn2Own Automotive 2026, which offers over $3 million in prizes to target vehicle systems, underscoring the program's role in prioritizing causal impact over speculative threats.

Notable Exploits and Milestones

High-Profile Browser and OS Hacks

At the 2015 Pwn2Own event in Vancouver, all four major web browsers—Microsoft Internet Explorer 11, Google Chrome (stable and beta versions), Mozilla Firefox, and Apple Safari—were compromised within the first two days, marking one of the most comprehensive demonstrations of browser vulnerabilities to date. South Korean security researcher Jung Hoon Lee single-handedly exploited Internet Explorer 11, both Chrome variants, and Safari, chaining zero-day flaws to achieve remote code execution and system compromise, which netted him $225,000 in prizes. Firefox fell to a separate team using three zero-days for a sandbox escape and privilege escalation. These hacks exposed weaknesses in browser rendering engines, sandboxing, and underlying OS interactions, prompting rapid patches from vendors including Microsoft, Google, Mozilla, and Apple. Earlier browser exploits set precedents for such feats; for instance, at the 2009 Pwn2Own, German researcher Nils hacked , , and using undisclosed zero-days, winning $15,000 and underscoring browsers' susceptibility to targeted attacks even on fully patched systems. has historically been a frequent early target, with compromising a running in under two minutes at the 2008 event via a browser-based exploit chain leading to kernel access. Operating system hacks have escalated in complexity and stakes, often involving kernel-level privileges. At Pwn2Own Berlin 2025, was exploited three times on the first day alone: once for initial system access, and twice more for SYSTEM-level elevation using an out-of-bounds write vulnerability by researcher Marcin Wiązowski and a separate chain by Hyeonjin Yoon. , prized for its enterprise hardening, was also breached via zero-days targeting its kernel and virtualization components. macOS faced similar scrutiny, with a 2023 Pwn2Own Vancouver exploit using a time-of-check-to-time-of-use (TOCTOU) zero-day for , earning $40,000 and highlighting persistent gaps in Apple's security model despite mitigations like . Windows kernel exploits stand out for their technical demands, frequently chaining user-mode to ring-0 elevation while evading defenses like Kernel Patch Protection. Demonstrations at events like Pwn2Own Vancouver 2023 and 2024 involved streaming service proxies and eBPF verifier bypasses, revealing how attackers proxy user inputs to kernel objects for arbitrary code execution. These OS-level achievements, often undisclosed until coordinated disclosure via the Zero Day Initiative, have driven mitigations such as enhanced address space layout randomization and control flow integrity in subsequent updates.

Records in Specialized Categories

In the automotive category, introduced prominently with the first dedicated Pwn2Own Automotive event in 2023 offering over $1 million in prizes across targets like Tesla systems, , EV chargers, and operating systems, participants have set benchmarks for zero-day discoveries. The 2024 and 2025 events each yielded 49 unique zero-days, marking the highest number reported in this category to date, with total awards reaching $1,323,750 in 2024 and $886,250 in 2025 for exploits including Tesla and charger systems. Earlier milestones include the 2019 event's focus on , where 19 zero-days were demonstrated for $545,000 in prizes. For industrial control systems (ICS) and operational technology (OT), Pwn2Own events since 2020 have highlighted vulnerabilities in critical infrastructure software. The 2022 Miami contest awarded $400,000 for 26 zero-days across ICS platforms, including a notable exploit by Dutch researchers Daan Keuper and Thijs Alkemade of Computest, who bypassed trusted-application checks in the OPC UA protocol—used in power grids and pipelines—for $40,000 plus the Master of Pwn title, completing the hack in days rather than weeks as in prior challenges. The 2023 Miami event followed with 27 zero-days for $153,500, while the 2020 iteration exceeded $280,000 in prizes for over 24 zero-days, underscoring persistent gaps in ICS security despite vendor patches. Mobile categories, expanded since 2017 with targets like Samsung Galaxy and iOS devices, have produced high-volume zero-day chains, often simpler than desktop equivalents per participant analyses. The 2023 Toronto mobile event awarded $1,038,500 for 58 zero-days, with Team Viettel claiming Master of Pwn for $180,000; similarly, 2017 Tokyo saw 32 zero-days for $515,000, led by Tencent Keen Security Lab. In IoT-focused subcategories, such as 2019 Tokyo's smart devices (speakers, TVs, routers) yielding 18 zero-days for $315,000 and 2024 Ireland's AI-enabled NAS/cameras contributing to over 70 zero-days across $1 million+ prizes, exploits have emphasized network and firmware weaknesses. These records reflect scaling complexity and prize incentives, driving disclosures in embedded systems beyond traditional computing.

Key Vulnerabilities and Their Resolutions

In Pwn2Own competitions, demonstrated zero-day vulnerabilities are responsibly disclosed by the Zero Day Initiative (ZDI) to affected vendors, who typically issue patches within 90 days before public details are released. This process has led to numerous security updates across browsers, operating systems, and virtualization software, enhancing defenses against remote code execution (RCE), sandbox escapes, and privilege escalations. For instance, at Pwn2Own Vancouver 2024, researchers exploited CVE-2024-2887 in Google Chrome's V8 JavaScript engine, enabling type confusion and arbitrary read/write primitives for full compromise; Google patched it in Chrome version 124.0.6367.91 on May 2, 2024, with Microsoft following suit for Edge. VMware products have also seen key resolutions post-Pwn2Own. During Pwn2Own Berlin 2025, four critical vulnerabilities in Workstation and Fusion—collectively earning hackers $340,000—were demonstrated, involving flaws like use-after-free errors leading to code execution; VMware addressed them in security advisory VMSA-2025-0013, released shortly after the event on May 20, 2025, urging users to apply updates to mitigate guest-to-host escape risks. Apple exploits have historically prompted rapid fixes, as seen after Pwn2Own 2014 where multiple zero-days enabled RCE chains; Apple patched 27 vulnerabilities in 7.1 on October 22, 2014, including rendering flaws, to prevent drive-by attacks. Similarly, in Pwn2Own 2024 events, Chrome zero-days exposed at CanSecWest were fixed in a March 27, 2024, update (version 123.0.6312.106), covering seven flaws such as out-of-bounds access for sandbox bypass. These resolutions underscore how Pwn2Own drives vendor accountability, though patch efficacy depends on timely user deployment.

Controversies and Challenges

Vendor Resistance and Disclosure Disputes

Vendors participating in or targeted by Pwn2Own events have demonstrated resistance through proactive hardening measures, such as last-minute patches to specific vulnerabilities ahead of competition attempts, which can invalidate exploits and heighten pressure on researchers. For example, during preparations for Pwn2Own 2021 Austin, teams encountered vendor-induced changes that altered expected attack paths, underscoring how product evolution and pre-event updates serve as defensive strategies against public demonstrations of flaws. Similarly, over multi-year targeting of the same products, vendors iteratively strengthen defenses in response to prior Pwn2Own successes, as detailed in a three-year research effort on a consumer device where repeated attempts revealed escalating mitigations. Disclosure disputes frequently emerge post-event when vendors contest the severity or exploitability of vulnerabilities reported via the Zero Day Initiative (ZDI), which coordinates patches within a 90-day window before public release. ZDI has highlighted recurring issues in (CVD), including vendors downgrading impacts—classifying remote code execution as mere spoofing—despite empirical evidence from Pwn2Own demonstrations, potentially delaying effective fixes and complicating risk assessment for users. An uptick in failed patches has been observed, where initial vendor responses inadequately resolve the root issue, requiring ZDI's intervention to enforce comprehensive remediation based on verified exploit chains. High-profile cases illustrate these tensions. In 2010, withdrew sponsorship from Pwn2Own citing fundamental disagreements with organizers over optimal methods for maximizing vulnerability fixes, reflecting broader vendor concerns about the contest's disclosure model favoring demonstration over immediate patching. More recently, at Pwn2Own Ireland 2025, a researcher withdrew a promised $1 million zero-click exploit after partial demonstration, leading to only two low-risk bugs being formally disclosed to Meta; the incident sparked debate over the exploit's claimed capabilities versus verifiable impact, with the researcher asserting private notification to Meta amid questions on technical substance. Such episodes underscore how Pwn2Own's high-stakes format can amplify scrutiny on disclosure fidelity, though ZDI maintains that its brokered process prioritizes vendor collaboration to mitigate real-world risks.

Government Interventions and Participant Restrictions

In 2018, the Chinese government enacted regulations effectively barring its cybersecurity researchers from participating in overseas hacking contests, including Pwn2Own, to safeguard and retain control over zero-day vulnerabilities. These rules required prior approval for international events and mandated that any discovered exploits be reported to state authorities rather than disclosed to foreign vendors. Prior to the restrictions, Chinese teams had achieved significant success at Pwn2Own, capturing 79% of prizes by 2017 through high-value browser and system hacks. The policy led to the notable absence of Chinese participants at the 2018 Pwn2Own event, resulting in reduced competition scale and fewer high-stakes demonstrations compared to prior years dominated by teams from firms like and Alibaba. In response, established domestic equivalents such as the Tianfu Cup, launched in 2018, where winners must disclose vulnerabilities to the government before any patching by vendors, channeling research toward state priorities. Beyond participant nationalities, international export controls have indirectly restricted Pwn2Own events. In September 2015, organizers canceled Pwn2Own Mobile in , citing Japan's implementation of the , a that classifies certain hacking tools as dual-use technologies requiring licenses for demonstration or transfer. This marked an early instance of such regulations disrupting contest logistics, though subsequent events adapted by emphasizing responsible disclosure protocols compliant with varying national laws. No similar broad bans from other governments, such as the or European nations, have been documented for their own researchers in Pwn2Own.

Ethical Debates in Vulnerability Research

Vulnerability research, as exemplified by competitions like , operates within frameworks emphasizing responsible disclosure, where researchers report flaws to vendors or coordinators like the Zero Day Initiative (ZDI) before public release, allowing time for patches. This approach, formalized in the 2000s through standards such as 's guidelines and later ISO 29147, prioritizes minimizing harm by preventing immediate exploitation while ensuring vendors address issues. Pwn2Own mandates such coordination, with ZDI handling notifications and embargoing details until remediation, contrasting with earlier adversarial models. Debates persist between responsible and full disclosure, the latter involving immediate public publication of vulnerabilities and proofs-of-concept to compel rapid vendor action. Proponents of full disclosure, rooted in practices via mailing lists like Bugtraq, argue it accelerates patching through market pressure and community scrutiny, as delayed disclosure risks vendor inaction or stockpiling for offensive use. Critics counter that it enables script kiddies and cybercriminals to weaponize flaws faster than patches deploy, as seen in early 2000s worm outbreaks following public releases. In Pwn2Own's context, responsible disclosure mitigates these risks but has drawn criticism for granting vendors excessive control over timelines, potentially delaying broader awareness. Competitions like Pwn2Own highlight ethical tensions around state involvement, particularly with participants from nations where research feeds offensive capabilities. Chinese teams dominated Pwn2Own from 2014 to 2017, securing up to 80% of prizes, before a government ban on international participation shifted focus to domestic events like the Tianfu Cup. Regulations requiring zero-day reports to state agencies within 48 hours create dual-use dilemmas, as skills honed in ethical contests pipeline talent to state-sponsored , undermining global trust in shared research. This raises questions about the morality of open competitions, where ostensibly defensive demonstrations may indirectly bolster adversarial arsenals without researcher consent. Researchers face personal ethical challenges, including conflicts between financial incentives and public welfare, as high-stakes prizes commodify vulnerabilities into a prone to burnout and selective targeting. Pwn2Own rules prohibit prior exploit sales and require participants to verify compliance with codes, yet cases of private pre-disclosure, such as a WhatsApp exploit reported to Meta before competition, illustrate tensions between maximizing rewards and prior obligations. Ultimately, these debates underscore research's dual nature: advancing secure development while risking proliferation, with Pwn2Own's model favoring coordinated over unfettered transparency.

Impact on Cybersecurity

Contributions to Secure Development Practices

Pwn2Own, organized by the Zero Day Initiative (ZDI), contributes to secure development by facilitating responsible disclosure of zero-day vulnerabilities demonstrated during contests, providing vendors with detailed exploit information to enable targeted patches. Following successful hacks, ZDI grants vendors a 90-day window to develop and release fixes before public advisory publication, which has resulted in numerous security updates for products like browsers and operating systems. This process has directly influenced patching timelines, as seen in cases such as Mozilla's rapid response to two zero-days exploited at Pwn2Own 2025, leading to immediate security advisories and updates addressing content-process code execution risks. Similarly, patched four vulnerabilities disclosed at the same event within weeks, mitigating potential remote code execution in its products. Over multiple events, Pwn2Own has driven the disclosure of over 70 zero-days in a single contest like 2024, with all findings channeled to affected parties for remediation, thereby reducing exposure for millions of users. By publicly demonstrating high-impact exploits, the competition raises awareness of persistent flaws in common vulnerability categories, such as memory corruption and injection issues, compelling developers to prioritize exploitability in their secure coding workflows. This exposure has normalized proactive bug hunting and incentivized vendors to integrate practices like , static analysis, and memory-safe languages to minimize easily exploitable weaknesses, as evidenced by recurring event outcomes highlighting deficiencies in the software development lifecycle. ZDI's model, operational for 20 years as of 2025, underscores financial incentives for researchers to report flaws responsibly rather than sell to black markets, fostering a collaborative that enhances overall product hardening.

Influence on Private Vulnerability Markets

Pwn2Own has established a structured, transparent alternative to clandestine zero-day markets by awarding substantial cash prizes for demonstrated exploits, with total payouts exceeding $1 million in events such as the 2025 competition, where $1,155,000 was distributed for 25 . Organized by the Zero Day Initiative (ZDI), the contest acquires these and coordinates responsible disclosure to vendors, prioritizing patching over prolonged secrecy, which contrasts with private brokers like that purchase exploits for non-disclosure to maintain their offensive utility. This model incentivizes researchers to pursue ethical avenues, potentially diverting talent from opaque trading where exploits fetch higher prices—up to millions for high-impact —but risk enabling unchecked weaponization. The contest's public demonstration and subsequent vendor notifications accelerate patching cycles, diminishing the exclusivity and resale value of similar undisclosed vulnerabilities markets, as evidenced by rapid exploit campaigns targeting Pwn2Own-disclosed flaws before full . By showcasing exploit feasibility under timed conditions, Pwn2Own raises awareness of pricing dynamics, influencing bug bounty programs to offer competitive rewards; for instance, it has paved the way for platforms like , where payouts for critical flaws now often reach tens of thousands, mirroring the contest's emphasis on high-stakes, verifiable hacks. However, top-tier researchers may still favor private brokers for premium targets, as Pwn2Own's disclosure requirement limits applicability to exploits intended for secrecy-driven sales. Overall, Pwn2Own exerts downward pressure on private market premiums by legitimizing high-reward disclosure, fostering a shift toward defensive use of zero-days while highlighting the trade-offs between immediate payouts and long-term cybersecurity gains. This has prompted some governments to restrict participation, as seen in China's ban on international contests to retain domestic control over researcher outputs, underscoring the contest's role in reshaping global .

Criticisms of Effectiveness and Rapid Reuse Risks

Critics contend that Pwn2Own's vulnerability disclosure process, while accelerating patches for demonstrated flaws, fails to prevent rapid weaponization by adversaries, as evidenced by exploits transitioning from contest stages to widespread attacks within months. The ToolShell exploit chain, demonstrated at Pwn2Own in May 2025 by researcher Dinh Ho Anh Khoa for a $100,000 prize, targeted servers via unauthenticated deserialization (CVE-2025-53770) and other flaws. By July 7, 2025, it was exploited in the wild, compromising over 400 networks including U.S. government agencies, with attackers deploying variants like 4L4MD4R and ; 's initial patch on July 8 proved insufficient against ongoing campaigns by groups such as Linen Typhoon. This case illustrates reuse risks, where coordinated disclosure through the Zero Day Initiative delays public details but does not deter monitoring by state actors or criminals who reverse-engineer or leak techniques post-event. The RondoDox botnet further exemplifies these limitations, emerging in June 2025 and exploiting over 50 vulnerabilities across 30 vendors, including Pwn2Own-identified issues like CVE-2023-1389 in routers—patched in 2023 but reused via persistent n-day attacks. Employing an "exploit shotgun" tactic bundling Mirai and Morte , the campaign targeted unpatched routers, DVRs, and NVRs for rapid expansion, aided by AI-driven scanning. Such rapid repurposing narrows the gap between disclosure and mass exploitation, particularly when patch adoption lags, questioning Pwn2Own's net contribution to amid slow vendor mitigation. Broader critiques highlight Pwn2Own's inability to enforce systemic improvements, as repeated discoveries of similar flaw types—such as buffer overflows and authentication bypasses—signal ongoing deficiencies in secure development practices among vendors. Despite annual events unearthing dozens of zero-days, the persistence of exploitable chains in products like and routers suggests that incentives for short-term fixes do not translate to robust, proactive defenses, potentially fueling an where adversaries adapt faster than ecosystems harden. This dynamic underscores risks from public demonstrations, where techniques may inform attacker playbooks even under embargo, eroding the competition's preventive efficacy without complementary mandates for accelerated patching and deployment.

References

Add your contribution
Related Hubs
User Avatar
No comments yet.