Article Details
Scrape Timestamp (UTC): 2024-03-21 07:11:24.101
Original Article Text
Click to Toggle View
Windows 11, Tesla, and Ubuntu Linux hacked at Pwn2Own Vancouver. On the first day of Pwn2Own Vancouver 2024, contestants demoed Windows 11, Tesla, and Ubuntu Linux zero-day vulnerabilities and exploit chains to win $732,500 and a Tesla Model 3 car. The competition started with Haboob SA's Abdul Aziz Hariri using an Adobe Reader exploit that combined an API restriction bypass and a command injection bug to gain code execution on macOS to earn $50,000. Synacktiv won the Tesla Model 3 and $200,000 after hacking the Tesla ECU with Vehicle (VEH) CAN BUS Control in under 30 seconds using an integer overflow. Theori security researchers Gwangun Jung and Junoh Lee earned $130,000 after escaping a VMware Workstation VM to gain code execution as SYSTEM on the host Windows OS using a chain targeting an uninitialized variable bug, a UAF weakness, and a heap-based buffer overflow. Reverse Tactics' Bruno PUJOS and Corentin BAYET collected $90,000 by exploiting two Oracle VirtualBox bugs and a Windows UAF to escape the VM and elevate privileges to SYSTEM. The first day of the contest ended with Manfred Paul hacking the Apple Safari, Google Chrome, and Microsoft Edge web browsers, exploiting three zero-day vulnerabilities and winning $102,500. Other attempts from the first day of Pwn2Own include: After the zero-day exploits are demoed at Pwn2Own, vendors have 90 days to create and release security patches for all reported flaws before Trend Micro's Zero Day Initiative discloses them publicly. Throughout Pwn2Own Vancouver 2024, security researchers will target fully patched products in the web browser, cloud-native/container, virtualization, enterprise applications, server, local escalation of privilege (EoP), enterprise communications, and automotive categories. On the second day, Pwn2Own competitors will attempt to exploit zero-day bugs in Windows 11, VMware Workstation, Oracle VirtualBox, Mozilla Firefox, Ubuntu Desktop, Google Chrome, Docker Desktop, and Microsoft Edge. After the two days of the hacking competition, the hackers can earn over $1,300,000, including a Tesla Model 3 car. The top award for hacking a Tesla is now $150,000, and the car itself. Competitors can win a maximum award of $500,000 and a Tesla Model 3 car for an exploit that gives complete remote control with unconfined root when targeting the Tesla Autopilot. Using a Windows kernel vulnerability, they can also get a $300,000 award for a successful Hyper-V Client guest-to-host escape and a privilege escalation on the host OS. During last year's Vancouver Pwn2Own, won by Team Synacktiv, hackers earned $1,035,000 and a Tesla car for 27 zero-days (and several bug collisions) in Windows 11, Microsoft Teams, Microsoft SharePoint, macOS, Ubuntu Desktop, VMware Workstation, Oracle VirtualBox, and Tesla's Model 3. Synacktiv also hacked the Tesla Modem and Infotainment System during the first edition of Pwn2Own Automotive in January, getting root permissions on a Tesla Modem by chaining three zero-days and demoing an Infotainment System sandbox escape via a two zero-day exploit chain.
Daily Brief Summary
Pwn2Own Vancouver 2024 Day 1 ended with contestants demonstrating zero-day vulnerabilities in Windows 11, Tesla cars, and Ubuntu Linux, winning $732,500 and a Tesla Model 3.
Notable achievements included Synacktiv hacking Tesla's ECU in under 30 seconds, winning the car and $200,000, and Theori researchers escaping a VMware Workstation VM, earning $130,000.
Abdul Aziz Hariri of Haboob SA exploited an Adobe Reader vulnerability on macOS for a $50,000 prize.
Reverse Tactics team members Bruno PUJOS and Corentin BAYET used two Oracle VirtualBox bugs and a Windows UAF to achieve SYSTEM privileges, winning $90,000.
Manfred Paul successfully hacked the Apple Safari, Google Chrome, and Microsoft Edge web browsers, exploiting three zero-day vulnerabilities and securing $102,500.
Vendors have a 90-day window to patch reported flaws before the Trend Micro's Zero Day Initiative publicly discloses them.
Pwn2Own targets a broad range of categories including web browsers, cloud-native technologies, virtualization, and automotive systems, with a total prize pool of over $1,300,000.
The top award includes $500,000 and a Tesla Model 3, with significant awards for exploiting a Windows kernel vulnerability and achieving a Hyper-V Client guest-to-host escape.