Back to Feed
Zero-dayMay 19, 2026

Pwn2Own Berlin 2026 Closes With $1.3 Million in Zero-Day Payouts

Pwn2Own Berlin 2026 concludes with 47 zero-day exploits demonstrated and $1.3M in payouts.

Summary

The Pwn2Own Berlin 2026 hacking competition concluded on May 16, 2026, with researchers demonstrating 47 unique zero-day vulnerabilities across enterprise software and AI platforms, earning $1.298M in total payouts. DEVCORE from Taiwan won the Master of Pwn title with $505K, with major exploits targeting Microsoft Exchange, VMware ESXi, SharePoint, Windows 11, and AI assistants like OpenAI Codex and Anthropic Claude. Vendors have 90 days to patch before ZDI publicly discloses technical details.

Full text

SecurityPwn2Own Berlin 2026 Closes With $1.3 Million in Zero-Day Payouts Cybersecurity researchers successfully demonstrated 47 unique zero-day exploits at Pwn2Own Berlin 2026, targeting major enterprise software and AI platforms. byDeeba AhmedMay 19, 20262 minute read The highly anticipated Pwn2Own Berlin 2026 hacking competition concluded on 16 May 2026, following three days of intense activity at the OffensiveCon conference, and we have all the results. The event saw massive financial payouts, with researchers receiving around $1,298,250 in total for live demos of 47 unique zero-day vulnerabilities. The Top Three Teams A Taiwanese research group, DEVCORE, was awarded the Master of Pwn title, receiving 50.5 points and $505,000 in cash rewards, while STARLabs SG secured second place with 25 points ($242,500), followed by Out Of Bounds in third with 12.75 points ($95,750). The competition’s largest payout went to the DEVCORE Research Team’s Cheng-Da Tsai, aka Orange Tsai, who received $200,000 for chaining three different vulnerabilities to achieve remote code execution (RCE) with SYSTEM privileges on Microsoft Exchange. On the event’s opening day, Tsai had earned $175,000 for a Microsoft Edge sandbox escape that chained four logic bugs. Key Exploits At Pwn2Own Berlin, researchers targeted fully patched products from diverse categories, including local privilege escalation (LPE), virtualization, and Large Language Model (LLM) coding assistants. On the final day, Nguyen Hoang Thach of STARLabs SG successfully used a memory corruption vulnerability to exploit VMware ESXi with the Cross-tenant Code Execution add-on, earning $200,000. Also, splitline from DEVCORE chained two bugs to compromise Microsoft SharePoint, netting $100,000. Operating systems were repeatedly targeted throughout the event. Le Tran Hai Tung, dungnm, and hieuvd of Viettel Cyber Security used an integer overflow to achieve local privilege escalation (LCE) on Windows 11. Another repeatedly breached platform was Red Hat Enterprise Linux for Workstations. Reportedly, researcher Hyunwoo Kim chained a use-after-free bug and an uninitialized memory vulnerability to gain privilege escalation. Valentina Palmiotti of IBM X-Force Offensive Research achieved root access on the platform and also exposed a 0-day in the NVIDIA Container Toolkit. AI-based Exploits The newly introduced artificial intelligence categories also faced successful exploitation. Satoki Tsuji of Ikotas Labs, Inc., abused an external control vulnerability within OpenAI Codex to execute arbitrary code on the host system. Anthropic Claude Code AI assistant was also targeted multiple times. Researchers from Compass Security and Byung Young Yi of Out of Bounds successfully demonstrated exploits against it, but both attempts resulted in bug collisions because the underlying vulnerabilities had already been previously disclosed to the ZDI vendor database. This year, the event faced a controversy over an unlikely logistical challenge, as for the first time in its 19-year history, the contest ran out of slots. As reported by Hackread.com earlier this month, the Zero Day Initiative (ZDI), the Trend Micro organisation that operates the event, had to close registrations on 7 May due to the registration logjam, which led to revenge disclosures from the rejected candidates. Nevertheless, the event was successful. Now, as per the standard disclosure guidelines, vendors have a 90-day window to develop/distribute security patches, after which ZDI will release the technical specifics of the identified zero-days. Deeba Ahmed Deeba is a veteran cybersecurity reporter at Hackread.com with over a decade of experience covering cybercrime, vulnerabilities, and security events. Her expertise and in-depth analysis make her a key contributor to the platform’s trusted coverage. View Posts 0dayAIBug BountyhackingPwn2OwnVulnerabilityZDI Leave a Reply Cancel reply View Comments (0) Related Posts Read More Security Malware Hackers Exploit Cloud Misconfigurations to Spread Malware Veriti Research reveals 40% of networks allow ‘any/any’ cloud access, exposing critical vulnerabilities. Learn how malware like XWorm… byDeeba Ahmed Read More Security Malware Russian APT28 Deploys “NotDoor” Backdoor Through Microsoft Outlook APT28 hackers deploy NotDoor backdoor via Microsoft Outlook macros, using OneDrive sideloading to steal data and evade detection. byWaqas Technology Security The Best Alternatives Operating Systems For most people, the only operating systems they know of are Windows, macOS, Android, and iOS. They have thus… byAli Raza Read More News Cyber Attacks Cyber Events Security Apria Healthcare Discloses Major Data Breach Impacting 1.8M Users The breach spanned two periods: from 5th April to 7th May 2019, and from 27th August to 10th October 2021. byHabiba Rashid

Indicators of Compromise

  • malware — OpenAI Codex RCE

Entities

Pwn2Own Berlin 2026 (campaign)Microsoft (vendor)VMware (vendor)Red Hat (vendor)OpenAI (vendor)Anthropic (vendor)