Researchers Awarded Over $1 Million in Pwn2Own Hacking Competition

by Esmeralda McKenzie
Researchers Awarded Over $1 Million in Pwn2Own Hacking Competition

Researchers Awarded Over $1 Million in Pwn2Own Hacking Competition

Researchers Awarded Over  Million in Pwn2Own Hacking Competition

At Pwn2Own Automobile 2024 Day 2, researchers were rewarded over $1 million for exploiting Tesla infotainment systems, Sony, Alphine players, Autel charging systems, and a ways more.

On the principle day, a prize of $722,500 was as soon as given to researchers for 24 obvious 0 days. The Synacktiv Crew completed their 3 zero-day vulnerabilities on the Tesla Modem and got $100,000.

EHA

Doc

Bustle Free ThreatScan on Your Mailbox

AI-Powered Security for Enterprise Email Security

Trustifi’s Evolved threat safety prevents the widest spectrum of sophisticated assaults sooner than they reach a particular person’s mailbox. Are attempting Trustifi Free Threat Scan with Refined AI-Powered Email Security .

The summary for Day 2 of Pwn2Own Automobile 2024 is geared up below.

Pwn2Own Day 2

The usage of a 3-worm chain, the PHP Hooligans and Center of the evening Blue team exploited the Phoenix Contact CHARX SEC-3100. They procure six Master of Pwn Capabilities and $30,000.

The Tesla Infotainment Machine was as soon as attacked by the Synacktiv team utilizing a 2-worm chain. They procure ten Master of Pwn Capabilities to boot to to $100,000.

The usage of a 2-worm chain, NCC Crew EDG was as soon as ready to defeat the Alpine Halo9 iLX-F509. They receive 4 Master of Pwn Capabilities and $20,000.

Synacktiv exploited Automobile Grade Linux by utilizing a 3-worm chain. They procure 5 Master of Pwn Capabilities and $35,000.

Le Tran Hai Tung attacked the Alpine Halo9 iLX-F509 with a 2-worm chain. He positive factors four Master of Pwn Capabilities and $20,000.

fuzzware.io exploited the ChargePoint Home Flex with a two-worm chain. They procure six Master of Pwn Capabilities and $30,000.

The Center of the evening Blue / PHP Hooligans team exploited the Autel MaxiCharger AC Wallbox Business utilizing a stack-essentially based fully buffer overflow. They procure six Master of Pwn Capabilities and $30,000.

With a stack-essentially based fully buffer overflow, RET2 Systems exploited the JuiceBox 40 Orderly EV Charging Web page online. They procure six Master of Pwn Capabilities and $30,000.

To this point this week, researchers were granted over $1,000,000 in prizes (¥150 million!).

You might per chance perhaps review the detailed itinerary of the extremely competitive contest by following this link. Moreover, for your reference, a comprehensive rundown of the Pwn2Own Automobile 2024 Day 2 outcomes can also moreover be found here. In the event you are trying to search out records on a particular day, it’s good to per chance per chance well with out problems entry it utilizing this link.

Source credit : cybersecuritynews.com

Related Posts