Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Hackers Earn $1.3 Million at Pwn2Own Berlin 2026

0
Medium
Published: Mon May 18 2026 (05/18/2026, 04:05:21 UTC)
Source: SecurityWeek

Description

Participants demonstrated exploits for Windows, Linux, VMware, Nvidia, and AI products. The post Hackers Earn $1.3 Million at Pwn2Own Berlin 2026 appeared first on SecurityWeek .

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/18/2026, 04:06:45 UTC

Technical Analysis

Pwn2Own Berlin 2026 featured 47 unique exploits targeting Windows, Linux, VMware, Nvidia, and AI products, with total rewards of approximately $1.3 million. Top payouts included a remote code execution exploit on Microsoft Exchange with system privileges and a VMware ESX cross-tenant code execution exploit. AI product vulnerabilities were also exploited, with rewards ranging from $15,000 to $40,000. The event demonstrated active discovery of significant vulnerabilities across multiple platforms, emphasizing the importance of ongoing security research and vendor patching efforts. Some exploits targeted sandbox escapes and container toolkits. Several attempts failed, and some researchers chose direct vendor disclosure or public exploit release.

Potential Impact

The vulnerabilities demonstrated at Pwn2Own Berlin 2026 include remote code execution with system privileges, sandbox escapes, and cross-tenant code execution, which could allow attackers to execute arbitrary code with elevated privileges or escape restricted environments. These vulnerabilities affect widely used enterprise and AI platforms, potentially impacting confidentiality, integrity, and availability if exploited. However, these were demonstrated by white hat hackers under controlled conditions, and there is no indication of active exploitation in the wild at this time.

Mitigation Recommendations

Patch status is not yet confirmed — check the respective vendors' advisories for current remediation guidance. Vendors typically respond to Pwn2Own disclosures with official fixes. Organizations should monitor vendor updates for patches addressing these specific vulnerabilities. No generic mitigation recommendations are provided as the vulnerabilities span multiple products and exploit types.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://www.securityweek.com/hackers-earn-1-3-million-at-pwn2own-berlin-2026/","fetched":true,"fetchedAt":"2026-05-18T04:06:37.578Z","wordCount":1011}

Threat ID: 6a0a904dec166c07b05532f4

Added to database: 5/18/2026, 4:06:37 AM

Last enriched: 5/18/2026, 4:06:45 AM

Last updated: 5/20/2026, 7:06:09 PM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses