Monday, April 28, 2025
HomeHacksUbuntu Desktop & Windows 11 Hacked - Pwn2Own Day 3

Ubuntu Desktop & Windows 11 Hacked – Pwn2Own Day 3

Published on

SIEM as a Service

Follow Us on Google News

After the first and second day, on day 3 , Three more zero-day exploits were successfully used by security researchers to hack the Windows 11 OS of Microsoft on the third and last day of the 2022 Pwn2Own Vancouver hacking contest.

Team DoubleDragon’s first attempt of the day to exploit Microsoft Teams failed because they were unable to demonstrate their exploit within the time allowed by Microsoft.

Although all is not lost, because ZDI was able to incorporate Team Double Dragon’s research into standard procedures.

- Advertisement - Google News

The other contestants had successfully taken down Windows 11 for three times and Ubuntu Desktop for one time as well, earning them $160,000.

It was shown successfully that nghiadt12 from Viettel Cyber Security was able to exploit an integer overflow vulnerability in Windows 11 in order to gain elevated privileges.

In turn, they received a reward of $40,000 along with 4 Master of Pwn points as a reward for their execution.

On Ubuntu Desktop, a Use-After-Free exploit was successfully demonstrated by the STAR Labs’ Billy Jheng Bing-Jhong (@st424204). His mastery of Pwn capabilities earned him another $40,000 along with four more Master points.

Through an improperly implemented access control mechanism on Microsoft Windows 11, vinhthp1712 has achieved Elevation of Privilege. It has been confirmed that vinhthp1712 has been awarded $40,000 and 4 Master of Pwn points.

Bruno PUJOS from REverse Tactics has achieved Elevation of Privilege by utilizing the Use-After-Free exploit on Microsoft Windows 11 during the final attempt of the competition.

While it is also worth mentioning that this earned him $40,000 in addition to 4 Master of Pwn points.

In conclusion, the regularly scheduled programming event, Pwn2Own has concluded with this final session.

The total number of attempts this year was 21 from 17 different contestants with Trend Micro and ZDI awarding $1,155,000 to the winner.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Cybersecurity Firm CEO Arrested for Planting Malware in Hospital Systems

Jeffrey Bowie, the CEO of a local cybersecurity firm, has been arrested for allegedly...

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Gain Legends International Suffers Security Breach – Customers Data Stolen

Gain Legends International, a prominent name in sports, entertainment, and venue management, has confirmed...

Over 17,000 Fortinet Devices Hacked Using Symbolic Link Exploit

A major cyberattack has compromised more than 17,000 Fortinet devices globally, exploiting a sophisticated...

Hacktivist Group Becomes More Sophisticated, Targets Critical Infrastructure to Deploy Ransomware

A recent report by Cyble has shed light on the evolving tactics of hacktivist...