Microsoft Exchange server, Teams, Zoom, Chrome pwned at Pwn2Own

Microsoft Exchange server, Teams, Zoom, Chrome pwned at Pwn2Own

Here’s what happened on the first two days of the Pwn2Own event.

What is Pwn2Own


Pwn2Own is a bi-yearly computer hacking competition held by Trend Micro’s Zero Day Initiative (ZDI) to inform tech firms about exploits and vulnerabilities in their products before threat actors can find them. It is held at the CanSecWest security conference.


The contest started in April 2007 in Vancouver. White hat hackers from around the world can participate to discover unknown vulnerabilities in widely used mobile devices and software. Winners receive a cash reward, known as bounty.


The latest edition of Pwn2Own is currently underway, and the cash pool is way higher than the previous year, with $1.5 million to be given away.


Here are all the details of what happened on the first two days Pwn2Own 2021.


First Day of Pwn2Own


On the first day, participants earned over half a million dollars, and five out of seven attempts were declared successful. Here are all the winners:


Team Devcore received $200,000 for successfully controlling a Microsoft Exchange server by binding authentication bypass and local privilege escalation vulnerabilities.


A researcher using the alias OV also received $200,000 for detecting MS Teams code execution exploit.

RET2 Systems’ Jack Dates earned $100,000 for identifying a kernel-level code execution exploit in the Safari web browser, leveraging an integer overflow and an out-of-bounds write bug.


Team Viettel was awarded $40,000 for reporting a
Support the originator by clicking the read the rest link below.