Pwn2Own Berlin 2025: Bug Hunters Earn $435,000 on Day Two, Showcasing 20 Unique Zero-Days

Listen to this Post

Featured Image
Pwn2Own is one of the most anticipated events in the cybersecurity community, bringing together top-tier researchers and ethical hackers from around the globe. Held annually, this competition allows security experts to demonstrate their skills by discovering vulnerabilities in widely used software and systems. The event not only serves as a platform to showcase the talents of these bug hunters but also rewards them handsomely for their discoveries. The Berlin 2025 edition of Pwn2Own was no exception, with participants raking in substantial amounts by exposing zero-day flaws across numerous platforms.

On the second day of the Pwn2Own Berlin 2025 event, participants demonstrated impressive skill and expertise, uncovering 20 unique zero-day vulnerabilities across popular platforms such as Microsoft SharePoint, VMware ESXi, Oracle VirtualBox, Red Hat Enterprise Linux, and Mozilla Firefox. These discoveries contributed to a total of \$435,000 in earnings for the competitors, pushing the overall prize pool to \$695,000 after the first day’s \$260,000 in awards. The event also featured a first-ever AI category, highlighting the growing importance of artificial intelligence in the cybersecurity landscape.

the

Nguusd Hoang Thach of STARLabs SG exploited an integer overflow vulnerability in VMware ESXi, earning \$150,000 and 15 Master of Pwn points.
Dinh Ho Anh Khoa from Viettel Cyber Security found an auth bypass and insecure deserialization vulnerability in Microsoft SharePoint, securing \$100,000 and 10 Master of Pwn points.
Edouard Bochin and Tao Yan of Palo Alto Networks exploited an Out-of-Bounds Write flaw in Mozilla Firefox, earning \$50,000 and 5 Master of Pwn points.

These vulnerabilities were part of a broad spectrum of vulnerabilities discovered during the competition, underscoring the sophistication of modern-day cyber threats. The high-profile nature of these products—spanning enterprise solutions and web browsers—further highlights the critical need for continuous security testing and patching.

What Undercode Says:

The sheer magnitude of this event underlines an undeniable reality: the modern digital ecosystem is more interconnected than ever, but its security infrastructure often lags behind. Pwn2Own Berlin 2025 serves as both a celebration of cybersecurity talent and a reminder of the vulnerabilities lurking in widely used software.

VMware ESXi’s integer overflow exploit, in particular, is concerning. This is not just an enterprise server issue but a potential gateway for massive breaches if left unaddressed. The fact that Nguusd Hoang Thach was able to execute such a sophisticated attack shows how even minor coding flaws in complex systems can have massive implications for security.

The auth bypass and insecure deserialization issues found in Microsoft SharePoint by Dinh Ho Anh Khoa are especially worrisome. SharePoint is widely used by corporations worldwide, making this exploit a serious concern for many businesses relying on it for internal collaboration. It serves as a stark reminder that internal platforms, not just external-facing systems, must undergo rigorous security testing.

Similarly, Edouard Bochin and Tao Yan’s discovery in Mozilla Firefox should not be overlooked. While Firefox is primarily a consumer-facing product, it’s also a critical tool in many organizational environments. An Out-of-Bounds Write vulnerability opens the door for attackers to run arbitrary code, which could compromise sensitive data and internal systems.

Overall, this Pwn2Own session reinforces the importance of proactive security measures. While bug hunters are stepping up and bringing vulnerabilities to light, it’s clear that organizations need to invest more heavily in securing their systems against such exploits before they fall victim to the next attack.

Fact Checker Results:

\$695,000 in total rewards validates the competition’s status as a major event in the cybersecurity calendar. šŸ†
20 unique zero-day vulnerabilities demonstrate the sheer scale of flaws in widely used software. āš ļø
Pwn2Own Berlin 2025’s inclusion of an AI category signals the growing role of AI in cybersecurity, and potential future targets for exploitation. šŸ¤–

Prediction:

Looking ahead, as more companies integrate AI into their operations, AI-driven vulnerabilities will likely become a major focus in future competitions like Pwn2Own. With hackers demonstrating prowess in exploiting both traditional and cutting-edge technologies, organizations will need to bolster their defenses, not only against current flaws but also emerging AI-based threats.

References:

Reported By: securityaffairs.com
Extra Source Hub:
https://www.linkedin.com
Wikipedia
Undercode AI

Image Source:

Unsplash
Undercode AI DI v2

Join Our Cyber World:

šŸ’¬ Whatsapp | šŸ’¬ Telegram