pwn2own exploits major software

As security researchers gathered at Pwn2Own Berlin 2025, multiple teams successfully demonstrated critical vulnerabilities in major operating systems and virtualization platforms, earning $260,000 in rewards on the first day alone.

The event, hosted at OffensiveCon, showcased 11 exploit attempts targeting Windows 11, Red Hat Enterprise Linux, Oracle VirtualBox, and other prominent systems.

Chen Le Qi from STAR Labs SG demonstrated a sophisticated exploit chain on Windows 11, combining use-after-free and integer overflow vulnerabilities to achieve SYSTEM-level privileges, earning $30,000 for the successful breach.

Security researcher Chen Le Qi successfully breached Windows 11 through chained vulnerabilities, demonstrating system-wide access at Pwn2Own Berlin.

The DEVCORE Research Team, led by Pumpkin, exposed a critical integer overflow vulnerability in Red Hat Linux, which resulted in local privilege escalation and a $20,000 reward.

Team Prison Break executed a particularly notable attack against Oracle VirtualBox, leveraging an integer overflow vulnerability to escape virtual machine constraints and execute code on the host operating system, securing a $40,000 prize.

Billy and Ramdhan from STAR Labs achieved the day’s highest reward of $60,000 by demonstrating a container escape in Docker Desktop through a Linux kernel flaw.

The competition revealed a concerning pattern of exploitable vulnerabilities, with integer overflow and use-after-free flaws appearing consistently across multiple platforms.

Red Hat Linux proved particularly vulnerable to chained attacks, as demonstrated by researchers Hyunwoo Kim and Wongi Lee, who encountered an N-day bug collision during their exploitation attempt.

The event marked several milestones, including the introduction of the first-ever AI category, which saw successful exploitation of the Chroma platform.

Over the first two days, participants uncovered 39 unique zero-day vulnerabilities, resulting in total awards of $695,000.

The demonstrated exploits highlighted critical security weaknesses in fundamental technology infrastructure, emphasizing the ongoing importance of vulnerability research and responsible disclosure in maintaining digital security.

Organizations can protect against similar vulnerabilities by implementing security awareness training and maintaining strong security practices to comply with industry regulations.

You May Also Like

China Exposes Foreign Cyberattacks Traced to U.S., Sweden, and India

China’s bold accusations expose devastating foreign cyberattacks that cost trillions – but the real perpetrators might surprise you.

Hacked Emails and Breached VPNs: How Russian Spies Hunt Ukraine’s Western Aid in Plain Sight

Russian hackers can see Western military aid to Ukraine in real-time. See how this sophisticated cyber espionage puts billions in support at risk.

China-Linked Spying Group APT31 Accused of Brazen Hacks on Czech Foreign Ministry

Chinese state hackers didn’t just breach networks – they spent 14 years weaponizing email inboxes to steal America’s most guarded secrets. Learn their playbook.

Why Cyber Attacks Are Costing Businesses Far More Than They Realize

Small businesses are unaware they’re 350% more likely to be attacked than large companies. Your business could be next, and the cost is devastating.