TrendAI™ Zero Day Initiative Leads Industry Remediation at Pwn2Own Berlin
Ethical hackers earn over
NVIDIA joined the event as a first-time sponsor of Pwn2Own, bringing its own category of products for researchers to target for vulnerability disclosures.
The disclosures made through the ZDI at Pwn2Own and year-round allow vendors to quickly understand and fix vulnerabilities before cybercriminals exploit them, ultimately benefiting organizations and end users of the impacted software or hardware. ZDI research has shown that vendors are increasingly neglecting to patch software vulnerabilities that are disclosed to them. Through ZDI's coordinated disclosure process, TrendAI Vision One™ customers receive are protected an average of three months ahead of the rest of the industry.
Highlights from the event included:
- Orange Tsai (@orange_8361) of DEVCORE Research Team chained 3 bugs to achieve Remote Code Execution as SYSTEM on Microsoft Exchange, earning
$200,000 . They also chained 4 logic bugs to achieve a sandbox escape on Microsoft Edge, earning$175,000 . - Splitline (@splitline) of DEVCORE Research Team chained 2 bugs to exploit Microsoft SharePoint, earning
$100,000 . -
Nguyen Hoang Thach (@hi_im_d4rkn3ss) of STARLabs SG (@starlabs_sg) used a Memory Corruption bug to exploit VMware ESXi with the Cross-tenant Code Execution add-on, earning$200,000 and 20 Master of Pwn points. - Chompie of
IBM X-Force Offensive Research (XOR) used a single bug to exploit NV Container Toolkit, earning$50,000 .
A total of
About TrendAI™
TrendAI™, the global AI security leader and enterprise business unit of
View original content to download multimedia:https://www.prnewswire.com/news-releases/trendai-zero-day-initiative-leads-industry-remediation-at-pwn2own-berlin-302775266.html
SOURCE TrendAI