VulnerabilitiesHIGH

Pwn2Own Automotive 2026: Day Two Sees Major Exploits

ZDZero Day Initiative BlogJan 22, 2026
Pwn2Ownautomotive security0-day vulnerabilitiescommand injectionMaster of Pwn
🎯

Basically, hackers competed to find weaknesses in car systems for cash prizes.

Quick Summary

Day Two of Pwn2Own Automotive 2026 revealed new exploits and vulnerabilities. Competitors earned over $439,000 by exposing weaknesses in automotive systems. This matters because it helps improve vehicle safety and security for everyone. Stay tuned for the final day results!

What Happened

The excitement at Pwn2Own Automotive 2026 reached new heights on Day Two as security researchers showcased their skills. A staggering total of $439,250 was awarded for 29 unique 0-day vulnerabilities?, bringing the event's total to nearly $1 million. This competition is not just about bragging rights; it’s a race to uncover critical flaws in automotive systems that could impact millions of drivers.

As teams took the stage, they faced off against various automotive technologies, pushing the limits of what’s possible in cybersecurity. Some competitors succeeded spectacularly, while others fell short, unable to demonstrate their exploits within the time constraints. The stakes are high, with the title of Master of Pwn on the line and only one day left to compete.

Among the standout performances, Team MAMMOTH successfully exploited a command injection? vulnerability in the Alpine iLX-F511, earning $10,000 and two Master of Pwn points. Meanwhile, FuzzingLabs chained two vulnerabilities to exploit the Phoenix Contact CHARX SEC-3150, netting $20,000 and four points. As the competition heats up, all eyes are on Fuzzware.io, currently leading the pack.

Why Should You Care

You might wonder why this matters to you. Think of it like this: every time you get into a car, you trust that it’s safe. Exploits discovered in this competition could lead to vulnerabilities in vehicles you or your loved ones drive. If hackers can find ways to manipulate car systems, it could pose serious safety risks.

Imagine if someone could unlock your car remotely or disable its brakes. This is what these researchers are trying to prevent. By exposing these vulnerabilities, they help manufacturers patch them before they can be exploited by malicious actors. The work done here could directly impact the safety and security of your daily commute.

What's Being Done

The competition has drawn attention from automotive manufacturers and cybersecurity experts alike. Here’s what’s happening:

  • Monitoring for new vulnerabilities: Companies are closely watching the exploits demonstrated to understand potential risks.
  • Patching systems: Manufacturers will likely prioritize fixing the vulnerabilities discovered during the competition.
  • Encouraging responsible disclosure: This event highlights the importance of reporting vulnerabilities rather than exploiting them maliciously.

As the final day approaches, experts are eager to see what new vulnerabilities will be uncovered and how manufacturers will respond. The race for Master of Pwn continues, but the real winners are the drivers who will benefit from enhanced vehicle security.

💡 Tap dotted terms for explanations

🔒 Pro insight: The rapid discovery of 0-days at Pwn2Own highlights the urgent need for automotive cybersecurity measures to keep pace with evolving threats.

Original article from

Zero Day Initiative Blog · Dustin Childs

Read Full Article

Related Pings

HIGHVulnerabilities

Authentication Bypass Flaw Exposes pac4j-jwt Users

A critical vulnerability in the pac4j-jwt library allows attackers to impersonate users. Developers using this library must update immediately to prevent unauthorized access. Ignoring this could lead to severe security breaches.

Arctic Wolf Blog·Yesterday, 8:34 PM
CRITICALVulnerabilities

Critical Authentication Bypass in pac4j-jwt Library Exposed!

A severe flaw in the pac4j-jwt library allows hackers to bypass authentication. This affects applications relying on the library, risking user data and security. Immediate updates are essential to protect against exploitation.

Arctic Wolf Blog·Yesterday, 7:55 PM
HIGHVulnerabilities

Firefox Faces 22 Vulnerabilities Discovered by Anthropic

Anthropic discovered 22 vulnerabilities in Firefox, with 14 marked high-severity. This puts users at risk of data breaches and unauthorized access. Mozilla is working on patches to fix these issues.

TechCrunch Security·Yesterday, 7:00 PM
CRITICALVulnerabilities

Cisco FMC Faces Maximum-Severity Vulnerabilities: Act Now!

Cisco has identified two critical vulnerabilities in its Secure Firewall Management Center software. Organizations using this software are at risk of unauthorized access and control. Immediate patching is essential to protect sensitive data and maintain security.

Arctic Wolf Blog·Yesterday, 5:58 PM
HIGHVulnerabilities

Firefox Vulnerabilities Exposed by AI in Just Two Weeks

AI has uncovered 22 vulnerabilities in Firefox in just two weeks. This affects anyone using the browser, putting personal data at risk. Mozilla is working on patches to fix these issues, so stay updated!

Cyber Security News·Yesterday, 5:38 PM
HIGHVulnerabilities

Linux Rootkits Evolve with eBPF and io_uring Threats

Linux rootkits are evolving into a serious threat, targeting cloud and IoT systems. This shift puts many users at risk of data breaches and disruptions. Experts are working on detection methods and patches to combat these threats.

Cyber Security News·Yesterday, 5:33 PM