1080*80 ad

Pwn2Own Day 2: $792K Awarded for 56 Zero-Day Exploits

Cybersecurity Contest Reveals Critical Zero-Day Flaws in Top Phones, Printers, and Smart Home Devices

Leading cybersecurity researchers have successfully demonstrated dozens of previously unknown vulnerabilities in a wide range of popular consumer and business technology, from flagship smartphones to common office printers and smart speakers. The second day of a major ethical hacking competition saw experts expose a staggering 56 unique zero-day vulnerabilities, earning them over $792,000 in a single day for their discoveries.

This event underscores a critical reality: even the most trusted devices from major manufacturers can contain undiscovered security flaws. Over the course of two days, a total of 73 unique zero-days have been responsibly disclosed, with total payouts to researchers exceeding $1 million. These findings provide invaluable insights into the current security landscape and highlight the importance of proactive defense.

High-Profile Devices Successfully Hacked

The competition placed some of the world’s most popular gadgets in the crosshairs of elite security teams, with many failing to withstand the attacks.

  • Flagship Mobile Phones Breached: Researchers successfully demonstrated exploits against the Samsung Galaxy S23 and the Xiaomi 13 Pro. The attack on the Samsung device, for instance, exploited an improper input validation weakness. This allowed the attackers to execute code on the device with elevated privileges, showcasing how a seemingly minor flaw can lead to a significant compromise.

  • Printers and Network Attached Storage (NAS) Exploited: Office and home network equipment proved to be a popular and fruitful target. Multiple teams demonstrated successful hacks against printers from Canon, HP, and Lexmark. In one notable case, an exploit chain involving three separate bugs was used to gain complete control over a Canon printer. Similarly, NAS devices from Synology and QNAP, which are often used to store sensitive personal or business data, were also compromised through complex exploits.

  • Smart Home and Router Vulnerabilities: The interconnected devices in our homes were not spared. The Sonos Era 100 smart speaker was hacked multiple times, with one team combining two vulnerabilities to achieve root access on the device. Routers from well-known brands like TP-Link and Wyze were also successfully targeted, emphasizing how the central hub of a home network can be a primary point of failure.

The Importance of Coordinated Disclosure

While the discovery of so many vulnerabilities may seem alarming, this competition serves a crucial purpose in strengthening global cybersecurity. Instead of these flaws being sold on the dark web or used by malicious actors, they are disclosed directly and privately to the vendors.

This process, known as responsible disclosure, gives manufacturers a detailed breakdown of the vulnerabilities found in their products. They are then able to develop and release security patches to protect their users before the flaws become widely known. This collaborative effort between researchers and manufacturers is essential for making the entire technology ecosystem safer for everyone.

What This Means for You: Actionable Security Tips

The results of this event are a powerful reminder that no device is impenetrable. As a user, you can take several concrete steps to protect yourself from potential threats.

  1. Prioritize Software Updates: This is the single most important action you can take. The manufacturers of these hacked devices are now working on patches. Enable automatic updates on your phone, router, computer, and smart devices. When you see a notification for a security update, install it immediately.

  2. Secure Your Network Hub: Change the default administrator password on your router and NAS devices. Use a long, complex, and unique password. This prevents attackers from easily accessing the control panel of your entire network.

  3. Isolate IoT Devices: For enhanced security, consider creating a separate guest Wi-Fi network for your smart home devices (like speakers, cameras, and smart plugs). This practice, known as network segmentation, can prevent a compromised smart device from being used to attack more sensitive devices like your computer or phone.

  4. Be Wary of Public Wi-Fi: Avoid accessing sensitive accounts or performing critical tasks when connected to unsecured public Wi-Fi networks, as these can be prime targets for attackers looking to exploit device vulnerabilities.

Ultimately, staying informed and proactive is your best defense. The work of these ethical hackers makes our digital lives safer, but it’s up to each of us to apply the security patches and best practices that keep our data and devices secure.

Source: https://securityaffairs.com/183792/hacking/pwn2own-day-2-organizers-paid-792k-for-56-0-days.html

900*80 ad

      1080*80 ad