Pwn2Own Vancouver

Pwn2Own Vancouver 2024 has ended with security researchers collecting $1,132,500 after demoing 29 zero-days (and some bug collisions).
Throughout the event, they targeted software and products in the web browser, cloud-native/container, virtualization, enterprise applications, server, local escalation of privilege (EoP), enterprise communications, and automotive categories, all up-to-date and in their default configuration.
The total prize pool was over $1,300,000 in cash prizes and a Tesla Model 3, which Team Synacktiv won on the first day.
Competitors successfully gained code execution and escalated privileges on fully patched systems after hacking Windows 11, Ubuntu Desktop, VMware Workstation, Oracle VirtualBox, three web browsers (Apple Safari, Google Chrome, and Microsoft Edge), and the Tesla Model 3.

Vendors have 90 days to release security fixes for zero-day vulnerabilities reported during Pwn2Own contests before TrendMicro's Zero Day Initiative discloses them publicly.
Pwn2Own Vancouver 2024 leaderboard
Pwn2Own Vancouver 2024 leaderboard (ZDI)
Manfred Paul won this year's edition of Pwn2Own Vancouver with 25 Master of Pwn points and $202,500 earned throughout the two-day competition after hacking the Apple Safari, Google Chrome, and Microsoft Edge web browsers.
  • On the first day of Pwn2Own, he gained remote code execution (RCE) in Safari via an integer underflow bug and a PAC bypass zero-day combo. 
  • He then used a double-tap RCE exploit targeting an Improper Validation of Specified Quantity in Input weakness to take down Chrome and Edge.
Synacktiv also made Pwn2Own Vancouver 2024's Day 1 highlight reel after winning a Tesla Model 3 car and $200,000 after hacking the Tesla ECU with Vehicle (VEH) CAN BUS Control in under 30 seconds using an integer overflow exploit.

  • On the second day, Manfred Paul also exploited an out-of-bounds (OOB) write zero-day vulnerability to gain RCE and escaped Mozilla Firefox's sandbox using an exposed dangerous function weakness.

Other successful attempts (and bug collisions) on the last day include:

  • Windows 11 privilege escalation exploits from HackInside, IBM X-Force's Valentina Palmiotti, Marcin Wiązowski, and Gabriel Kirkpatrick,
  • STAR Labs SG's VMware Workstation RCE and Ubuntu Linux privilege escalation exploits and a Docker escape,
  • Palo Alto's team hacking Chrome and Edge after defeating V8 hardening,
  • ColdEye's Oracle VirtualBox guest-to-host escape exploit,
  • KAIST Hacking Lab's Seunghyun Lee double-tap Chrome and Edge RCE exploit,
  • Theori with a privilege escalation on Ubuntu Linux.

Pwn2Own Vancouver browser zero-days

ZDI has awarded $3,494,750 during the last three Pwn2Ownco hacking contests (TorontoTokyo Automotive, and Vancouver).

Also, at Pwn2Own Vancouver 2023, hackers collected another $1,035,000 in awards and a Tesla car (won by Synaktiv) for 27 zero-days in Windows 11, Microsoft Teams, Microsoft SharePoint, macOS, Ubuntu Desktop, VMware Workstation, Oracle VirtualBox, and Tesla's Model 3. 

Related Articles:

Windows 11, Tesla, and Ubuntu Linux hacked at Pwn2Own Vancouver

Tesla hacked again, 24 more zero-days exploited at Pwn2Own Tokyo

Tesla hacked, 24 zero-days demoed at Pwn2Own Automotive 2024

Pwn2Own Automotive: $1.3M for 49 zero-days, Tesla hacked twice

Mozilla fixes two Firefox zero-day bugs exploited at Pwn2Own

Zero Day Initiative — Pwn2Own Vancouver 2024: Bringing  Cloud-Native/Container Security to Pwn2Own : r/Trendmicro
Pwn2Own Vancouver 2024 Hands Out More Than $1 Million in Prizes for  Wide-Ranging Vulnerabilities - Hackster.io
29 0-days Uncovered : Hackers Earned $1,132,500 Pwn2Own 2024