The Pwn2Own Hack Contest, held every spring at the CanSecWest Cybersecurity Conference in Vancouver, Canada, has just come to an end, and this year’s big winner sits with a team of security researchers Amat Cama and Richard Zhu. They have accumulated nine points in the two-day competition and held on to the final stake in four games.
(Pictured: Trend Micro)
The situation at this Pwn2Own event is very different due to the outbreak of the new coronavirus. Travel restrictions have been imposed around the world, resulting in a large number of security researchers unable or unwilling to enter the competition.
This year’s Pwn2Own Hack Contest has also been moved online for safety and health reasons. The players pre-empt edi-exploits to the event organizers and then run the code with all participants in the live broadcast.
Over the course of two days, six teams successfully hacked applications and operating systems such as Windows, macOS, Ubuntu, Safari, Adobe Reader, and Oracle Box Virtual.
All vulnerabilities exploited during this period are immediately reported to affiliates. In terms of vulnerability blasting, the Georgia Technology Systems Software and Security Laboratory (SSLab_Gatech) team led the score on the first day.
Team members Yong Hwi Jin (?jinmo123), Jungwon Lim (?setuid0x0_) and Insu Yun (@insu_yun_en) have largely used Safari as a springboard.
Pop-up calculator apps to macOS through a series of six vulnerabilities resulted in a macOS kernel lift attack that earned them $70,000 in bonuses and seven Pwn points.
The second was the use-after-free exploit, which led to a local claim attack on Microsoft’s Windows operating system, earning $40,000 in bonuses and four Pwn points.
The third exploit was a local lift attack on The Ubuntu desktop by Manfred Paul of the RedRocket CTF team, earning a $30,000 bonus and three Pwn points.
The fourth attack took advantage of the use-after-free vulnerability, which allowed Amat Cama and Richard Zhu of the Fluoroacetate team to secure a local lift for Windows, earning $40,000 in bonuses and four Pwn points.
The fifth vulnerability was pioneered by STAR Labs’ Phi Ph?m H?ng (@4nhdaden) the next day to break through the VirtualBox virtual machine, earning it a $40,000 bonus and four Pwn points.
The sixth exploit was achieved by Amat Cama and Richard Zhu, but this time the goal was to achieve a Windows local lift through Adobe Reader, with a $50,000 bonus and 5 Pwn points.
The seventh was the VMware Workstation virtual machine exploits of the Synacktiv team’s Corentin Bayet (@OnlyTheDuck) and Bruno Pujos (@BrunoPujos), which unfortunately failed to prove within the specified time frame.