Breaking News

Come Visit Geometric Future at Computex 2025 for Exciting New Cases and PC Accessories Gaming Beyond Limits, AI Beyond Imagination ASRock at Computex 2025 Acer releases many new products ahead of Computex 2025 DeepCool Unveils New Product Lineup at COMPUTEX 2025 KIOXIA Leads with Its Industry-Defining Breakthroughs and Technologies at COMPUTEX 2025

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Pwn2Own Tokyo 2019 Concludes With Six Successful Hacking Attempts, $315,000 Awarded

Pwn2Own Tokyo 2019 Concludes With Six Successful Hacking Attempts, $315,000 Awarded

Enterprise & IT Nov 7,2019 0

The second and final day of Pwn2Own Tokyo 2019 is part of the history and offered six successful attempts against five targets across various categories.

In the morning, Team Fluoroacetate (Amat Cama and Richard Zhu) withdrew their entry targeting the baseband component of the Oppo F11 Pro handset. Instead, they moved straight to the Samsung Galaxy S10 in the same category. Their rogue base station used a stack overflow to push their file onto the target handset. The successful demonstration earned them $50,000 and 5 Master of Pwn points. This is the third year in a row the Samsung handset has been compromised via baseband.

Richard and Amat turned their attention to the LAN interface of the NETGEAR Nighthawk Smart WiFi Router (R6700). They were able to successfully demonstrate their research, however, the auth bypass they used had also been a part of a previous contestant’s entry. That makes this attempt only a partial win.

Next up, Pedro Ribeiro and Radek Domanski of Team Flashback continued their run on wireless routers by targeting the WAN port of the TP-Link AC1750 Smart WiFi router. The exploit used a stack overflow combined with a logic bug to gain code execution on the device. This earned them $20,000 and one more point towards Master of Pwn. They wrap up their first Pwn2Own with a total of $50,000 for four successful demonstrations.

The team from F-Secure Labs, Mark Barnes, Toby Drew, Max Van Amerongen, and James Loureiro, began their second day of the competition by also targeting the WAN interface of the TP-Link AC1750 Smart WiFi router. They combined a command injection bug along with some insecure defaults to gain code execution on the device. The successful demonstration earned them $20,000 and one Master of Pwn point.

In their final entry for the contest, the F-Secure Labs team targeted the Xiaomi Mi9 handset via the NFC component. In order to exfiltrate a photo from the phone, they tapped it to their specially crafted NFC tag. That triggered a cross-site scripted (XSS) bug in the NFC component and sent a picture to a different phone they controlled. The effort earned them $30,000 and 3 Master of Pwn points. That brings their contest total to $70,000 and puts them in second place in the Master of Pwn with six total points.

The final entry of the contest put the Fluoroacetate duo targeting the web browser of the Samsung Galaxy S10. They employed an integer overflow along with a UAF for the sandbox escape to exfiltrate a picture off the phone. While their demonstration was successful, it turns out part of their bug chain had been used by a previous contestant. Still, it was great to see the contest come to a close without any failed attempts.

That brings our contest to a close, and with $195,000 and 18.5 points, the Fluoroacetate duo of Richard Zhu and Amat Cama retain their title of Master of Pwn – their third in a row.

Overall, the Zero Day Initiative awarded more than $315,000 USD total over the two-day contest while purchasing 18 different bugs in the various products. Onsite vendors have received the details of these bugs and now have 90 days to produce security patches to address the bugs.

Tags: Pwn2OwnHacking
Previous Post
T-Mobile Announces Three New Plans As 5G Network Launches on December 6
Next Post
ADATA Launches the IM2P33E8 PCIe Gen3x4 M.2 2280 SSD

Related Posts

  • MSI has been hacked, be warned about where you download files

  • Hackers gain access to PS5 Debug Menu and show decrypted PS5 firmware files

  • HP Threat Research Shows Attackers Exploiting Zero‐Day Vulnerability Before Enterprises Can Patch

  • EA Gets hacked - 780GB of data and sourcecode stolen

  • European Supercomputers Researching Covid-19 Report Hacking Attacks

  • Microsoft Offers You $100,000 If You Can Hack the Linux-based Azure Sphere

  • Zoom Users' Data have Been on Sale on Dark Web: report

  • Indonesia's Tokopedia Inverstigates Alleged Data Leak of 91 Million Users

Latest News

Come Visit Geometric Future at Computex 2025 for Exciting New Cases and PC Accessories
Enterprise & IT

Come Visit Geometric Future at Computex 2025 for Exciting New Cases and PC Accessories

Gaming Beyond Limits, AI Beyond Imagination ASRock at Computex 2025
Enterprise & IT

Gaming Beyond Limits, AI Beyond Imagination ASRock at Computex 2025

Acer releases many new products ahead of Computex 2025
Enterprise & IT

Acer releases many new products ahead of Computex 2025

DeepCool Unveils New Product Lineup at COMPUTEX 2025
Cooling Systems

DeepCool Unveils New Product Lineup at COMPUTEX 2025

KIOXIA Leads with Its Industry-Defining Breakthroughs and Technologies at COMPUTEX 2025
Enterprise & IT

KIOXIA Leads with Its Industry-Defining Breakthroughs and Technologies at COMPUTEX 2025

Popular Reviews

be quiet! Light Loop 360mm

be quiet! Light Loop 360mm

be quiet! Dark Rock 5

be quiet! Dark Rock 5

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

G.skill Trident Z5 Neo RGB DDR5-6000 64GB CL30

G.skill Trident Z5 Neo RGB DDR5-6000 64GB CL30

Arctic Liquid Freezer III 420 - 360

Arctic Liquid Freezer III 420 - 360

Crucial Pro OC 32GB DDR5-6000 CL36 White

Crucial Pro OC 32GB DDR5-6000 CL36 White

Crucial T705 2TB NVME White

Crucial T705 2TB NVME White

be quiet! Light Base 600 LX

be quiet! Light Base 600 LX

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed