26 Unique 0-Day Bug Exploited In Pwn2Own Hacking Contest – Day 2

by Esmeralda McKenzie
26 Unique 0-Day Bug Exploited In Pwn2Own Hacking Contest – Day 2

26 Unique 0-Day Bug Exploited In Pwn2Own Hacking Contest – Day 2

Pwn2Own Day 2

Researchers have got $400,000 for 26 determined 0-day flaws in the Toronto Pwn2Own hacking competition.

Followed by Day 1 of the match, Samsung Galaxy used to be efficiently broken-down in two SOHO Smashup demonstrations and used to be exploited twice.

Pwn2Own Day 2

In the NAS class, Luca MORO used to be winning in the notify of their Traditional Buffer Overflow assault towards the WD My Cloud Professional Series PR4100. $40K and 4 Grasp of Pwn factors are theirs to set.

Printer Category

On essentially the main are attempting of Day 2, ANHTUD Data Security Division used to be winning in operating exploits towards 2 flaws, with out a doubt one of which used to be a stack-based completely buffer overflow, on an HP Coloration LaserJet Professional M479fdw in the Printer class. $10K and a pair of Grasp of Pwn factors are theirs to set.

Aleksei Stafeev efficiently launched an assault on the Lexmark MC3224i in the Printer class for his closing are attempting of the night time the notify of a novel expose injection and one other flaw realized earlier in the competition. 7.5K greenbacks and 1.5 Grasp of Pwn factors are awarded.

SOHO Smashup Category

In essentially the main SOHO SMASHUP roar, Bugscale efficiently launched an assault the notify of one unique bug and one other identified bug towards the Synology router and HP printer. They receive 7.5 Grasp of Pwn factors as correctly as $37,500.

Clear Speaker Category

The Sonos One Speaker in the Clear Speaker class used to be the goal of an assault utilized by Toan Pham and Tri Dang from Qrious Stable exploiting 2 flaws. 60K and 6 Grasp of Pwn factors are theirs.

With the abet of one unique flaw and one other previously known bug, STAR Labs used to be winning in launching an assault towards the Sonos One Speaker in the Clear Speaker class. They receive 4.5 Grasp of Pwn factors and $22,500.

Router Category

The NETGEAR RAX30 AX2400 used to be at risk of 2 attacks that PHPHooligans had been ready to dart towards the WAN interface. The tricks they employed, in the period in-between, had already been broken-down in the competition. Serene, they receive $10,000 and one Grasp of Pwn level.

The notify of one particular defect and one other N-day, NCC Group EDG used to be ready to efficiently open an assault towards the WAN interface of the NETGEAR RAX30 AX2400 in the router class. 7.5K greenbacks and 1.5 Grasp of Pwn factors are awarded.

Cell Cell phone Category

Interrupt Labs used to be winning in the notify of its defective enter validation assault towards the Samsung Galaxy S22. They receive 5 Grasp of Pwn factors and $25K.

“This match goes to be our largest ever, with 26 groups trying 66 exploits towards various targets,” Dustin Childs, head of threat awareness at Pattern Micro’s Zero Day Initiative, acknowledged in an interview.

Critically, participants on the Miami match in April got US$400,000 for efficiently exhibiting 26 exploits and bug collisions. Members in Vancouver got US$1.15 million in Could maybe for demonstrating 25 fashioned zero-day exploits.

Penetration Checking out As a Provider – Download Red Team & Blue Team Workspace

Source credit : cybersecuritynews.com

Related Posts