Thursday, December 7, 2023

Pwn2Own 2019 – Tesla Car Internet Browser Hacked – Hackers Won the Car & $545,000 in Total – Day 3

First and the second-day contest ended up with a various successful attempt to exploit the different bugs in multiple software vendors including, Microsoft, VMware, Oracle and Apple.

In Pwn2Own 2019 final day, Zero Day Initiative introduced the Tesla car in automotive category and the Fluoroacetate team made an attempt to exploit the Tesla Model 3 internet browser.

Tesla offers the prizes range from $35,000 to $300,000 depending on a variety of factors including the exploit used.

Finally, Fluoroacetate team used a JIT bug and exploit the browser let displays their message remotely from their system.

In this case, Successfully demonstration reward $35,000, Of course, they also get the car which they exploited.

Fluoroacetate team of Richard Zhu and Amat Cama earned them $375,000, laptops and a car over the contest and resulted in 36 Master of Pwn points.

Another team Team KunnaPwn who have registered in the automotive category withdrew their entry, Although they didn’t demonstrate any of their research at this contest.

According to ZDI, “Overall, the three days of Pwn2Own Vancouver 2019 have been a great success. We have awarded a total of $545,000 for 19 unique bugs in Apple Safari, Microsoft Edge and Windows, VMware Workstation, Mozilla Firefox, and – in its inaugural year – the Tesla infotainment system. “

In this case, all the exploited zero-day report will be notified to respective vendors and now have 90 days to produce security patches to address the issues we reported. ZDI said.

Also, you can take this online Course Bundle to learnMastery Web Hacking & Bug Bounty

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Website

Latest articles

Bluetooth keystroke-injection Flaw: A Threat to Apple, Linux & Android Devices

An unauthenticated Bluetooth keystroke-injection vulnerability that affects Android, macOS, and iOS devices has been...

Atlassian Patches RCE Flaw that Affected Multiple Products

Atlassian has been discovered with four new vulnerabilities associated with Remote Code Execution in...

Reflectiz Introduces AI-powered Insights on Top of Its Smart Alerting System

Reflectiz, a cybersecurity company specializing in continuous web threat management, proudly introduces a new...

SLAM Attack Gets Root Password Hash in 30 Seconds

Spectre is a class of speculative execution vulnerabilities in microprocessors that can allow threat...

Akira Ransomware Exploiting Zero-day Flaws For Organization Network Access

The Akira ransomware group, which first appeared in March 2023, has been identified as...

Hackers Deliver AsyncRAT Through Weaponized WSF Script Files

The AsyncRAT malware, which was previously distributed through files with the .chm extension, is now being...

BlueNoroff: New Malware Attacking MacOS Users

Researchers have uncovered a new Trojan-attacking macOS user that is associated with the BlueNoroff APT...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles