pwn2own exploits major software

As security researchers gathered at Pwn2Own Berlin 2025, multiple teams successfully demonstrated critical vulnerabilities in major operating systems and virtualization platforms, earning $260,000 in rewards on the first day alone.

The event, hosted at OffensiveCon, showcased 11 exploit attempts targeting Windows 11, Red Hat Enterprise Linux, Oracle VirtualBox, and other prominent systems.

Chen Le Qi from STAR Labs SG demonstrated a sophisticated exploit chain on Windows 11, combining use-after-free and integer overflow vulnerabilities to achieve SYSTEM-level privileges, earning $30,000 for the successful breach.

Security researcher Chen Le Qi successfully breached Windows 11 through chained vulnerabilities, demonstrating system-wide access at Pwn2Own Berlin.

The DEVCORE Research Team, led by Pumpkin, exposed a critical integer overflow vulnerability in Red Hat Linux, which resulted in local privilege escalation and a $20,000 reward.

Team Prison Break executed a particularly notable attack against Oracle VirtualBox, leveraging an integer overflow vulnerability to escape virtual machine constraints and execute code on the host operating system, securing a $40,000 prize.

Billy and Ramdhan from STAR Labs achieved the day’s highest reward of $60,000 by demonstrating a container escape in Docker Desktop through a Linux kernel flaw.

The competition revealed a concerning pattern of exploitable vulnerabilities, with integer overflow and use-after-free flaws appearing consistently across multiple platforms.

Red Hat Linux proved particularly vulnerable to chained attacks, as demonstrated by researchers Hyunwoo Kim and Wongi Lee, who encountered an N-day bug collision during their exploitation attempt.

The event marked several milestones, including the introduction of the first-ever AI category, which saw successful exploitation of the Chroma platform.

Over the first two days, participants uncovered 39 unique zero-day vulnerabilities, resulting in total awards of $695,000.

The demonstrated exploits highlighted critical security weaknesses in fundamental technology infrastructure, emphasizing the ongoing importance of vulnerability research and responsible disclosure in maintaining digital security.

Organizations can protect against similar vulnerabilities by implementing security awareness training and maintaining strong security practices to comply with industry regulations.

You May Also Like

Inside the Relentless Cyber War: FBI Battles Unstoppable Hackers in America’s Digital Crime Surge

Every 39 seconds, hackers strike American networks – causing $16 billion in damages while law enforcement races against time to stop the relentless digital assault.

China Exposes Foreign Cyberattacks Traced to U.S., Sweden, and India

China’s bold accusations expose devastating foreign cyberattacks that cost trillions – but the real perpetrators might surprise you.

Inside the Minds of Cyber Attackers: Why Nation-States and Ransom Gangs Want You

Nation-states and cybercrime gangs have mastered psychological warfare, turning your employees into their greatest weapons. Your defenses may already be compromised.

Cybersecurity Week 20: Chaos, Progress, and the Alarming Truth Behind Today’s Digital Defenses

Cyber defenses crumble worldwide as attacks surge 44% while billion-dollar criminal enterprises flourish. Your digital safety hangs in the balance.