During the second day of the Pwn2Own Vancouver 2022 hacking competition, white hat hackers demonstrated a working exploit against Microsoft Windows 11 OS. The T0 group demonstrated an exploit for an improper access control flaw leading to the elevation of privilege on Microsoft Windows 11. The exploit was awarded $40,000 and 4 Master of Pwn points.
The security duo David BERARD and Vincent DEHORS from @Synacktiv exploited 2 flaws (Double-Free & OOBW) with a collision on a known sandbox escape on a Telsa Model 3 Infotainment System. The experts earned $75,000 and 7.5 Master of Pwn points.
Another success was an exploit for use after free issue leading to elevation of privilege on Unbuntu Desktop demonstrated by Bien Pham (@bienpnn) who earned $40,000 and 4 Master of Pwn points.
Zhenpeng Lin (@Markak_), Yueqi Chen (@Lewis_Chen_), and Xinyu Xing (@xingxinyu) of Team TUTELARY from Northwestern University successfully demonstrated a Use After Free issue leading to elevation of privilege on Ubuntu Desktop. The team earned $40,000 and 4 Master of Pwn points.
During the first day of the event, white hat hackers earned a total of $800,000, a record for the first day of this contest, including $450,000 for successful exploits targeting Microsoft Teams.
Are you interested in the exploits that will be demonstrated on Day 3?
Stay tuned …
Please vote for Security Affairs as the best European Cybersecurity Blogger Awards 2022 – VOTE FOR YOUR WINNERS
Vote for me in the sections “The Underdogs – Best Personal (non-commercial) Security Blog” and “The Tech Whizz – Best Technical Blog” and others of your choice.
To nominate, please visit: https://docs.google.com/forms/d/e/1FAIpQLSfxxrxICiMZ9QM9iiPuMQIC-IoM-NpQMOsFZnJXrBQRYJGCOw/viewform
(SecurityAffairs – hacking, Pwn2Own Vancouver 2022)