Pwn2Own: $1 Million Reward for 76 Zero-Days Uncovered

SeverityHIGH

Significant risk — action recommended within 24-48 hours

TMTrend Micro Research·Reporting by Trend Micro Research
📰 2 sources·Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Updated:
🎯

Basically, researchers found serious security flaws in cars and chargers and got paid a lot for it.

Quick Summary

Researchers at Pwn2Own uncovered 76 critical vulnerabilities in connected vehicles and EV chargers. This poses significant risks to personal safety and data privacy. Manufacturers are urged to act quickly to patch these flaws and enhance security.

What Happened

In a thrilling showcase of cybersecurity prowess, the Pwn2Own competition has once again proven its worth as a platform for uncovering vulnerabilities. This year, researchers from the TrendAI Zero Day Initiative (ZDI) identified a staggering 76 zero-day vulnerabilities across various technologies, including connected vehicles and electric vehicle (EV) chargers. The total reward for these discoveries? A jaw-dropping $1 million.

The event, held annually, invites security researchers to exploit software and hardware vulnerabilities in real-time. This year’s focus on automotive systems highlights the increasing importance of securing vehicles as they become more connected and reliant on technology. With each successful exploit, researchers not only demonstrate their skills but also contribute to making these technologies safer for everyone.

Why Should You Care

You might wonder why this matters to you. Think about your daily life: many of us rely on connected cars and EV chargers. If hackers can exploit vulnerabilities in these systems, they could potentially gain control of your vehicle or compromise your charging station. This could lead to dangerous situations, not to mention the potential for data theft or privacy violations.

Imagine if someone could unlock your car or manipulate its systems from afar. It’s not just a tech issue; it’s a personal safety concern. The more we depend on technology, the more crucial it is to ensure that it is secure. This competition not only shines a light on existing vulnerabilities but also pushes manufacturers to improve their security measures.

What's Being Done

In response to these findings, manufacturers are urged to take immediate action. Here’s what you can do if you’re in the automotive or EV charging space:

  • Update your systems: Ensure that all software and firmware are up to date to protect against known vulnerabilities.
  • Implement security best practices: Regularly audit your systems and adopt robust security protocols.
  • Stay informed: Follow updates from ZDI and other security organizations to keep abreast of new vulnerabilities and patches.

Experts are closely monitoring how manufacturers respond to these vulnerabilities. The hope is that this competition will lead to stronger security measures across the board, ultimately benefiting all users of connected technology.

🔒 Pro insight: The sheer number of zero-days uncovered indicates a systemic issue in automotive cybersecurity that demands immediate attention from manufacturers.

Original article from

TMTrend Micro Research· Trend Micro Research
Read Full Article

Also covered by

ZEZero Day Initiative Blog

Pwn2Own Automotive 2026 - The Full Schedule

Read Article

Related Pings

HIGHVulnerabilities

Exploitable Vulnerabilities - 87% of Organizations at Risk

A new Datadog report reveals that 87% of organizations have exploitable vulnerabilities. This affects two-fifths of services, posing serious security risks. Companies must act quickly to address these flaws.

Infosecurity Magazine·
CRITICALVulnerabilities

Fortinet FortiClient EMS - Critical 0-Day Vulnerability Exploited

A critical zero-day vulnerability in FortiClient EMS is actively exploited. Fortinet has released emergency patches and urges immediate action from users.

Cyber Security News·
HIGHVulnerabilities

Video Conferencing Bug - CISA Orders Agencies to Patch

CISA has mandated federal agencies to patch a critical vulnerability in TrueConf software, exploited by Chinese hackers. Immediate action is essential to prevent espionage.

The Record·
HIGHVulnerabilities

Post-Deployment Vulnerability Detection - Rethinking Strategies

A new approach to vulnerability detection is needed post-deployment. Many organizations overlook risks from newly disclosed CVEs, leaving systems exposed. Rethinking strategies can enhance security.

OpenSSF Blog·
HIGHVulnerabilities

Mobile Vulnerabilities - Enterprises Struggle with Control

Mobile devices are increasingly vulnerable due to outdated software and hidden threats like Shadow AI. This puts sensitive enterprise data at risk. Organizations must act to secure their mobile environments.

SecurityWeek·
HIGHVulnerabilities

CVE-2026-33691 - OWASP CRS Whitespace Padding Bypass Alert

A new vulnerability in OWASP CRS allows attackers to upload dangerous files by exploiting whitespace in filenames. This affects many web applications, risking severe security breaches. Immediate updates are necessary to protect your systems.

Full Disclosure·