Hackers at Pwn2Own earn $400K for zero-day ICS exploits

by | Apr 1, 2022 | News


Premium Content

 

Patreon

Subscribe to Patreon to watch this episode.


 

Reading Time: 2 Minutes

 

Pwn2Own Miami 2022 has ended with competitors earning $400,000 for 26 zero-day exploits (and several bug collisions) targeting ICS and SCADA products demoed during the contest between April 19 and April 21.

 

 

Security researchers targeted multiple production categories: Control Server, OPC Unified Architecture (OPC UA) Server, Data Gateway, and Human Machine Interface (HMI).

“Thanks again to all of the competitors who participated. We couldn’t have a contest without them,” Trend Micro’s Zero Day Initiative (ZDI) said today.

“Thanks also to the participating vendors for their cooperation and for providing fixes for the bugs disclosed throughout the contest.”

After the security vulnerabilities exploited during Pwn2Own are reported, vendors are given 120 days to release patches until ZDI publicly discloses them.

 

 

 

See Also: Complete Offensive Security and Ethical Hacking Course

 

 

 

Solutions

 

Winners awarded $90,000

 

The winners of the Pwn2Own Miami 2022 event are Daan Keuper (@daankeuper) and Thijs Alkemade (@xnyhps) from Computest Sector 7 (@sector7_nl).

During day one, they earned $20,000 after executing code on the Inductive Automation Ignition SCADA control server solution using a missing authentication weakness.

The same day they used an uncontrolled search path vulnerability to gain remote code execution (RCE) in AVEVA Edge HMI/SCADA software and were awarded $20,000 for their efforts.

On the second day, Computest Sector 7 exploited an infinite loop condition to trigger a DoS state against the Unified Automation C++ Demo Server and earned $5,000.

Last but not least, on day two of Pwn2Own Miami 2022, the team bypassed the trusted application check on the OPC Foundation OPC UA .NET Standard and added $40,000 to their awards stash.

They won the Master of Pwn title after earning a total of $90,000 during the three days of the contest and getting the first spot on the leaderboard with a total of 90 points.

 

Master of Pwn Leaderboard
Pwn2Own Miami 2022 results (ZDI)

 

This year’s Pwn2Own Miami took place at the S4 conference in Miami South Beach in person and also allowed remote participation.

 

 

 
 
 

 

 

During the first edition of the ICS-themed Pwn2Own Miami, held back in January 2020, ZDI awarded $280,000 for 24 unique zero-day vulnerabilities in ICS and SCADA products.

You can watch a recording of the Computest Sector 7 (@sector7_nl) team targeting the OPC Foundation OPC UA .NET Standard below.

ZDI described their attempt as exploiting “one of the more interesting bugs we’ve ever seen at a Pwn2Own.”

 

 

 

See Also: Recon Tool: Smap

 

 

 

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: [email protected]

 

 

 

See Also: Write up: Hacking is an art, and so is subdomain enumeration.

 

Source: bleepingcomputer.com

Source Link

 

 

 


 

 

Merch

Share This