pwn2own exploits major software

As security researchers gathered at Pwn2Own Berlin 2025, multiple teams successfully demonstrated critical vulnerabilities in major operating systems and virtualization platforms, earning $260,000 in rewards on the first day alone.

The event, hosted at OffensiveCon, showcased 11 exploit attempts targeting Windows 11, Red Hat Enterprise Linux, Oracle VirtualBox, and other prominent systems.

Chen Le Qi from STAR Labs SG demonstrated a sophisticated exploit chain on Windows 11, combining use-after-free and integer overflow vulnerabilities to achieve SYSTEM-level privileges, earning $30,000 for the successful breach.

Security researcher Chen Le Qi successfully breached Windows 11 through chained vulnerabilities, demonstrating system-wide access at Pwn2Own Berlin.

The DEVCORE Research Team, led by Pumpkin, exposed a critical integer overflow vulnerability in Red Hat Linux, which resulted in local privilege escalation and a $20,000 reward.

Team Prison Break executed a particularly notable attack against Oracle VirtualBox, leveraging an integer overflow vulnerability to escape virtual machine constraints and execute code on the host operating system, securing a $40,000 prize.

Billy and Ramdhan from STAR Labs achieved the day’s highest reward of $60,000 by demonstrating a container escape in Docker Desktop through a Linux kernel flaw.

The competition revealed a concerning pattern of exploitable vulnerabilities, with integer overflow and use-after-free flaws appearing consistently across multiple platforms.

Red Hat Linux proved particularly vulnerable to chained attacks, as demonstrated by researchers Hyunwoo Kim and Wongi Lee, who encountered an N-day bug collision during their exploitation attempt.

The event marked several milestones, including the introduction of the first-ever AI category, which saw successful exploitation of the Chroma platform.

Over the first two days, participants uncovered 39 unique zero-day vulnerabilities, resulting in total awards of $695,000.

The demonstrated exploits highlighted critical security weaknesses in fundamental technology infrastructure, emphasizing the ongoing importance of vulnerability research and responsible disclosure in maintaining digital security.

Organizations can protect against similar vulnerabilities by implementing security awareness training and maintaining strong security practices to comply with industry regulations.

You May Also Like

Unstoppable? 7.3 Tbps DDOS Barrage Crushes Hosting Provider With 37.4tb in 45 Seconds

Can your network survive what crushed a major host? A devastating 7.3 Tbps DDoS attack proves that no one is truly safe anymore.

Chinese Spy Hack Went Undetected in US National Guard for 9 Months—Here’s What They Got

Chinese hackers breached U.S. National Guard systems for 9 months, stealing critical military data while America’s defenses stood blind. Who else is watching?

Why Cyber Attacks Are Costing Businesses Far More Than They Realize

Small businesses are unaware they’re 350% more likely to be attacked than large companies. Your business could be next, and the cost is devastating.

From Satellites to Smartphones: How Cyberwarfare Is Breaching Every Digital Barrier

From AI-powered phishing to trillion-dollar losses, modern cyberwarfare has evolved beyond imagination. Your smartphone might be the next battlefield.