pwn2own exploits major software

As security researchers gathered at Pwn2Own Berlin 2025, multiple teams successfully demonstrated critical vulnerabilities in major operating systems and virtualization platforms, earning $260,000 in rewards on the first day alone.

The event, hosted at OffensiveCon, showcased 11 exploit attempts targeting Windows 11, Red Hat Enterprise Linux, Oracle VirtualBox, and other prominent systems.

Chen Le Qi from STAR Labs SG demonstrated a sophisticated exploit chain on Windows 11, combining use-after-free and integer overflow vulnerabilities to achieve SYSTEM-level privileges, earning $30,000 for the successful breach.

Security researcher Chen Le Qi successfully breached Windows 11 through chained vulnerabilities, demonstrating system-wide access at Pwn2Own Berlin.

The DEVCORE Research Team, led by Pumpkin, exposed a critical integer overflow vulnerability in Red Hat Linux, which resulted in local privilege escalation and a $20,000 reward.

Team Prison Break executed a particularly notable attack against Oracle VirtualBox, leveraging an integer overflow vulnerability to escape virtual machine constraints and execute code on the host operating system, securing a $40,000 prize.

Billy and Ramdhan from STAR Labs achieved the day’s highest reward of $60,000 by demonstrating a container escape in Docker Desktop through a Linux kernel flaw.

The competition revealed a concerning pattern of exploitable vulnerabilities, with integer overflow and use-after-free flaws appearing consistently across multiple platforms.

Red Hat Linux proved particularly vulnerable to chained attacks, as demonstrated by researchers Hyunwoo Kim and Wongi Lee, who encountered an N-day bug collision during their exploitation attempt.

The event marked several milestones, including the introduction of the first-ever AI category, which saw successful exploitation of the Chroma platform.

Over the first two days, participants uncovered 39 unique zero-day vulnerabilities, resulting in total awards of $695,000.

The demonstrated exploits highlighted critical security weaknesses in fundamental technology infrastructure, emphasizing the ongoing importance of vulnerability research and responsible disclosure in maintaining digital security.

Organizations can protect against similar vulnerabilities by implementing security awareness training and maintaining strong security practices to comply with industry regulations.

You May Also Like

Iran May Hack U.S. Businesses Next—Air Strikes Make Retaliation a Digital Time Bomb

Iranian hackers armed with advanced tools and state backing pose an imminent digital threat to U.S. businesses following recent military strikes. Will your business survive?

Inside the Relentless Cyber War: FBI Battles Unstoppable Hackers in America’s Digital Crime Surge

Every 39 seconds, hackers strike American networks – causing $16 billion in damages while law enforcement races against time to stop the relentless digital assault.

Chinese-Linked Hack Breaches Canadian Telecom Gear, Exposing Deep Vulnerabilities

Chinese hackers didn’t just breach Canadian telecom – they got away with $4.35M in damages. Salt Typhoon’s infiltration reveals a frightening new reality.

Chinese Hackers Hijack Unpatched Cisco Devices to Spy on Canadian Telecom Networks

Chinese hackers sneaked into Canada’s telecom networks through outdated Cisco devices for years, and nobody noticed. Your data might be next.