Hackers Earn $1.3 Million at Pwn2Own Berlin 2026
Pwn2Own Berlin 2026 awards $1.3M for 47 zero-day exploits across Windows, Linux, VMware, Nvidia, and AI products.
Summary
White hat hackers earned $1,298,250 at Pwn2Own Berlin 2026 by demonstrating 47 unique vulnerabilities in Microsoft Exchange, Edge, SharePoint, VMware ESX, and AI products including LiteLLM, OpenAI Codex, and LM Studio. Top teams Devcore and StarLabs SG captured nearly $750,000, with Devcore earning $200,000 for a Microsoft Exchange remote code execution exploit and StarLabs SG winning $200,000 for VMware ESX cross-tenant code execution. Eight exploit attempts failed, and some registered white hat hackers reportedly disclosed findings directly to vendors when all event slots filled.
Full text
Pwn2Own Berlin 2026 has come to an end, and participants earned a total of nearly $1.3 millon for exploits targeting Windows, Linux, VMware, Nvidia, and AI products. According to TrendAI’s Zero Day Initiative (ZDI), white hat hackers have been awarded $1,298,250 for 47 unique vulnerabilities. Nearly $750,000 of the total amount was won by the first two teams: Devcore and StarLabs SG. The two teams also received the highest payouts for a single exploit chain. Devcore earned $200,000 for a remote code execution exploit with System privileges on Microsoft Exchange, and $175,000 for a Microsoft Edge sandbox escape. It also received $100,000 for exploiting Microsoft SharePoint. StarLabs SG won $200,000 for a VMware ESX exploit that included a cross-tenant code execution add-on. VMware was at the event and noted last week that Pwn2Own participants can earn up to $200,000 for ESX exploits. The third-place team, Out Of Bounds, earned a total of $95,750. Unsurprisingly, there were many successful attempts in the AI product category. Participants earned $40,000 rewards for hacking LiteLLM, OpenAI Codex, and LM Studio.Advertisement. Scroll to continue reading. Cursor exploits earned $15,000 and $30,000, while an Ollama exploit earned researchers $28,000 (the exploit included a known vulnerability). $20,000 bounties were received by Pwn2Own participants for OpenAI Codex, Claude Code, LM Studio, NVIDIA Megatron Bridge, and Chroma vulnerabilities. Between $2,500 and $50,000 was earned for various exploits targeting Red Hat Linux, Windows 11, NVIDIA Megatron Bridge, and NVIDIA Container Toolkit. There were eight failed attempts. They targeted Oracle Autonomous AI Database, NV Container Toolkit, OpenAI Codex, Safari, SharePoint, Red Hat Enterprise Linux for Workstations, Firefox, and VMware ESX. International Cyber Digest reported that several teams were unable to sign up for Pwn2Own because all time slots were already taken. Some white hat hackers who could not register decided to disclose their findings directly to vendors, and some have begun publicly disclosing their exploits. Related: China Revives Tianfu Cup Hacking Contest Under Increased Secrecy Related: Infotainment, EV Charger Exploits Earn Hackers $1M at Pwn2Own Automotive 2026 Related: $1M WhatsApp Hack Flops: Only Low-Risk Bugs Disclosed to Meta After Pwn2Own Withdrawal Written By Eduard Kovacs Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering. More from Eduard Kovacs New Linux Kernel Vulnerability Fragnesia Allows Root Privilege EscalationAkamai to Acquire AI and Browser Security Firm LayerX for $205 MillionG7 Countries Release AI SBOM GuidanceHigh-Severity Vulnerability Patched in VMware FusionFoxconn Confirms North American Factories Hit by CyberattackMicrosoft, Palo Alto Networks Find Many Vulnerabilities by Using AI on Their Own CodeMicrosoft Patches Critical Zero-Click Outlook Vulnerability Threatening EnterprisesHundreds of Malicious Packages Force RubyGems to Suspend Registrations Latest News PoC Code Published for Critical NGINX VulnerabilityIn Other News: Big Tech vs Canada Encryption Bill, Cisco’s Free AI Security Spec, Audi App FlawsMicrosoft Warns of Exchange Server Zero-Day Exploited in the WildAmerican Lending Center Data Breach Affects 123,000 IndividualsOpenAI Hit by TanStack Supply Chain AttackTeamPCP Ups the Game, Releases Shai-Hulud Worm’s Source CodeChrome 148 Update Patches Critical VulnerabilitiesCisco Patches Another SD-WAN Zero-Day, the Sixth Exploited in 2026 Trending Daily Briefing NewsletterSubscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: Third-Party Risk in Practice June 4, 2026 Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveTim Byrd has been appointed Chief Information Security Officer at First Citizens Bank.IRONSCALES has named Steve McKenzie as Chief Operating Officer.Silvio Pappalardo has joined AuthMind as Chief Revenue Officer.More People On The MoveExpert Insights Enhancing Data Center Security Without Sacrificing Performance For AI data centers, where the stakes are the highest and performance constraints are the tightest, security and performance are no longer a zero-sum game. (Nadir Izrael) Is the SOC Obsolete, and We Just Haven’t Admitted It Yet? Many AI-first enterprises have already embraced sovereign architectures for general AI initiatives; cybersecurity—and the SOC—should be next. (Danelle Au) The Mythos Moment: Enterprises Must Fight Agents with Agents Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor) Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George) Government Can’t Win the Cyber War Without the Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) Flipboard Reddit Whatsapp Whatsapp Email