Hacker News: Hackers exploit 16 zero-days on first day of Pwn2Own Automotive 2025

Source URL: https://www.bleepingcomputer.com/news/security/hackers-exploit-16-zero-days-on-first-day-of-pwn2own-automotive-2025/
Source: Hacker News
Title: Hackers exploit 16 zero-days on first day of Pwn2Own Automotive 2025

Feedly Summary: Comments

AI Summary and Description: Yes

Summary: The text provides a detailed report on the outcomes of the Pwn2Own Automotive 2025 hacking competition, highlighting the successful exploitation of zero-day vulnerabilities relating to electric vehicle chargers and infotainment systems. This information is crucial for security professionals in understanding emerging threats and vulnerabilities in automotive technology.

Detailed Description:

The Pwn2Own Automotive 2025 competition showcased the evolving landscape of cybersecurity threats in the automotive industry. The event emphasizes critical vulnerabilities in electric vehicle (EV) infrastructure and systems, which security professionals must actively monitor and address. Here are the major points from the event:

– **16 Unique Zero-Day Exploits:** Researchers successfully exploited 16 distinct zero-days, demonstrating the prevalence and severity of vulnerabilities within automotive technology.
– **Total Awards:** The total cash awarded to participants reached $382,750, reflecting the competitive landscape of cybersecurity challenges.
– **Leading Competitors:**
– **Fuzzware.io**: Achieved the highest score by exploiting chargers and earned $50,000 alongside 10 Master of Pwn points.
– **Summoning Team**: Secured $91,750 and 9.25 points by hacking Ubiquiti and other chargers using a hard-coded cryptographic key and various zero-day vulnerabilities.
– **Synacktiv Team**: Earned $57,500 for exploiting a bug in the OCPP protocol.
– Notably, other teams like PHP Hooligans and Viettel Cyber Security also demonstrated successful exploits, contributing to the overall security landscape within automotive technologies.

– **Vendor Response Time:** After vulnerabilities are reported, vendors are granted a 90-day period to develop security patches before they are publicly disclosed, highlighting the urgency for manufacturers to react swiftly to emerging threats.

– **Focus on Various Automotive Technologies:** The competition targeted a wide array of technologies, including EV chargers and in-vehicle infotainment systems, reflecting the need for comprehensive security measures across different automotive components.

– **Historical Context:** The article contrasts the current competition with past events, such as Pwn2Own 2024, where significant financial rewards and numerous exploits were reported, indicating a trend toward increasingly sophisticated hacking techniques.

This information serves as a critical resource for professionals in security and compliance, specifically within the automotive sector, as it underscores the need for robust security protocols and timely updates in response to vulnerabilities found during such competitions.