Welcome back to Pwn2Own Toronto! Yesterday, we awarded $400,000 for 26 unique 0-days. We saw the Samsung Galaxy exploited twice and two successful demonstrations in the SOHO Smashup category. Today’s event’s look to be just as exciting. We’ll be updating this blog with results throughout the day.
Results current as of 20:00. All times Eastern (GMT-5). All denominations are in USD.
SUCCESS – for the first attempt of Day 2, ANHTUD Information Security Department was able to execute exploits against 2 bugs (one being a stack-based buffler overflow) on a HP Color LaserJet Pro M479fdw in the Printer category. They earn $10K and 2 Master of Pwn points.
We are not camera shy here at Pwn2Own!
BUG COLLISION – PHPHooligans was able to execute 2 exploits against the WAN interface of the NETGEAR RAX30 AX2400 in the Router category. However, the exploits they used were previously used in the competition. They still earn $10K and 1 Master of Pwn points.
SUCCESS and BUG COLLISION – Bugscale was able to succesfully launch an attack against the Synology router and HP Printer in today’s first SOHO SMASHUP challenge using one unique bug and another previously known bug. They earn $37,500 and 7.5 Master of Pwn points.
SUCCESS – Toan Pham and Tri Dang from Qrious Secure were able to execute an attack using 2 bugs against the Sonos One Speaker in the Smart Speaker category. They earn $60K and 6 Master of Pwn points.
SUCCESS – Team Viettel was able to execute their Command Injection, Root Shell attack against the LAN interface of the TP-Link AX1800 in the Router category. They earn $5K and 1 Master of Pwn points.
Team Viettel (@rskvp93, @_q5ca, @hoangnx99 from @vcslab)
SUCCESS – Le Tran Hai Tung was able to execute an OOB Write attack against the Canon imageCLASS MF743Cdw in the Printer category. They earn $10K and 2 Master of Pwn points.
Pwned!
SUCCESS – Synacktiv was able to execute their command injection attack against the Lexmark MC3224i in the Printer category. They earn $10K and 2 Master of Pwn points.
Lexmark Pwn!
SUCCESS and BUG COLLISION – STAR Labs was able to succesfully launch an attack against the Sonos One Speaker in the Smart Speaker category using one unique bug and another previously known bug. They earn $22,500 and 4.5 Master of Pwn points.
Sonos Pwned!
BUG COLLISION – Summoning Team was able to execute their command injection attack against the LAN interface of the Synology RT6600ax in the Router category. However, the exploit they used was already used earlier in the competition. They still earn $1250 and 0.5 Master of Pwn points.
Collision! But still earns some coin!
SUCCESS and BUG COLLISION – NCC Group EDG was able to succesfully launch an attack against the WAN interface of the NETGEAR RAX30 AX2400 in the Router category using one unique bug and another N-day. They earn $7.5K and 1.5 Master of Pwn points.
SUCCESS – Team Viettel was able to execute their stack-based buffer overflow attack against the Canon imageCLASS MF743Cdw in the Printers category . They earn $10K and 2 Master of Pwn points.
New branding for the screen!
SUCCESS – NCC Group EDG was able to execute their command injectino attack against the Lexmark MC3224i in the Printer category. They earn $10K and 2 Master of Pwn points.
Lexmark printer pwned again!
FAILURE – Qrious Secure was unable to get their complete exploit of the NETGEAR router and the Western Digital NAS in the SOHO SMASHUP category working within the time allotted.
BUG COLLISION – DEVCORE was able to execute their Stack Based Buffer Overflow attack against the HP Color LaserJet Pro M479fdw in the Printer category. However, the exploit they used was already used earlier. They still earn $5K and 1 Master of Pwn points.
A touch of style but unfortunately a collision!
WITHDRAWN – Ledger Donjon unfortunately withdrew their attempt to attack the WAN interface of the TP-Link AX1800 in the Router category. This results in a -0.5 Master of Pwn point penalty.
SUCCESS – DEVCORE was able to execute their heap-based buffer overflow attack against the Canon imageCLASS MF743Cdw in the Printer category. They earn $10K and 2 Master of Pwn points.
Full win for DEVCORE!
SUCCESS – Luca MORO (@johncool__) was able to execute their Classic Buffer Overflow attack against the WD My Cloud Pro Series PR4100 in the NAS category. They earn $40K and 4 Master of Pwn points.
SUCCESS – Interrupt Labs was able to execute their improper input validation attack against the Samsung Galaxy S22 in the Mobile Phone category. They earn $25K and 5 Master of Pwn points.
Another poor Galaxy S22 pwned!
Written by admin
NEWS
-
NVIDIA BioNeMo Enables Generative AI for Drug Discovery on AWS
November 29, 2023Researchers and developers at leading pharmaceutical and techbio companies can now easily deploy NVIDIA Clara software and services for accelerated healthcare through Amazon Web Services. Announced today at AWS re:Invent, the initiative gives healthcare and life sciences developers using AWS... -
Embracing Transformation: AWS and NVIDIA Forge Ahead in Generative AI and Cloud Innovation
November 29, 2023Amazon Web Services and NVIDIA will bring the latest generative AI technologies to enterprises worldwide. Combining AI and cloud computing, NVIDIA founder and CEO Jensen Huang joined AWS CEO Adam Selipsky Tuesday on stage at AWS re:Invent 2023 at the... -
ZDI-23-1751: Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
November 28, 2023This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The...