Hackers won over $700k after unleashing 19 zero-day vulnerabilities in competition

Major bag alert.

Reading time icon 2 min. read


Readers help support MSpoweruser. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help MSPoweruser sustain the editorial team Read more

Key notes

  • Pwn2Own Vancouver 2024 unveils 19 new zero-day vulnerabilities, hackers earn $700K+.
  • Notable feats include Abdul Aziz Hariri’s $50K Adobe Reader exploit and Synacktiv’s Tesla hack earning $200K+.
  • Last year’s event saw hackers bag over $1M in prizes, with 27 new vulnerabilities uncovered.
linux hack

Pwn2Own Vancouver 2024 kicked off with a bang, as hackers uncovered 19 new, zero-day vulnerabilities across different platforms. The event showcased hackers’ skills in finding weaknesses in popular systems like Windows 11, Tesla, and Ubuntu Linux, earning them hefty rewards totaling over $700K … so far.

The competition saw impressive feats (via BleepingComputer), like Abdul Aziz Hariri’s exploit on Adobe Reader, netting him $50K, and Synacktiv’s rapid Tesla ECU hack, securing them a Tesla Model 3 and $200K. 

Other highlights included successful hacks on web browsers like Apple Safari, Google Chrome, and Microsoft Edge, earning hackers substantial prizes.

“This year’s event promises to be the largest-ever Vancouver event – both in terms of entries and potential prizes. If everything hits, we will end up paying out over $1,300,000 in cash and prizes – including a Tesla Model 3,” says Zero Day Initiative, the event’s organizer.

In last year’s edition, hackers won big, earning over $1 million in prizes and even a Tesla car. They found 27 new vulnerabilities in platforms like Windows 11, Microsoft Teams, macOS, and Tesla’s Model 3.

As the competition progresses, hackers are set to earn even more prizes, including a Tesla Model 3 car. Vendors now have 90 days to fix the reported vulnerabilities before they’re publicly disclosed.

Leave a Reply

Your email address will not be published. Required fields are marked *