When the doors opened on the first day of Pwn2Own Berlin 2025, few could have predicted just how quickly and decisively some of the world’s most widely used enterprise operating systems would fall to the creative might of leading security researchers. Within hours, Windows 11 and Red Hat Enterprise Linux had each been breached with zero-day exploits—demonstrating, yet again, that even today’s most advanced, security-hardened platforms can still harbor undetected vulnerabilities. As the dust settled, participants had already walked away with $260,000 in rewards, and the information security landscape was left with critical lessons and urgent challenges.
Organized by the Zero Day Initiative (ZDI) and hosted at OffensiveCon in Berlin, this year’s Pwn2Own competition focused squarely on enterprise technologies. Running from May 15–17, the event drew seasoned exploitation teams, independent researchers, and vendor representatives. New for 2025 was the introduction of an Artificial Intelligence category, reflecting the growing corporate uptake of AI-powered tooling—and its associated attack surface.
Over three days, participants would target a robust suite of enterprise infrastructures, including fully patched instances of Windows 11, Red Hat Enterprise Linux for Workstations, Microsoft SharePoint, VMware ESXi, Oracle VirtualBox, Docker Desktop, web browsers like Mozilla Firefox and Chrome, and even bench-top units of the latest Tesla vehicles.
A key hallmark of the event: Pwn2Own’s “full patch” requirement. Researchers must demonstrate working exploits on products that have been updated to the latest available security fixes. This ensures that the vulnerabilities revealed are previously undisclosed, also known as “zero-days”, and are likely present on systems in active use around the globe.
Not long after, researchers Hyunwoo Kim and Wongi Lee showcased a different approach to subverting Red Hat Linux, this time by chaining a use-after-free bug with an information leak. As the duo chained these low-level flaws together, they too secured root privileges, though their payout was affected by what the community calls a "bug collision." One of the bugs exploited was not entirely novel—a so-called “N-day” vulnerability—dropping the uniqueness (and thus the bounty) of their overall demonstration.
But Windows 11 was not breached just once. Marcin Wiązowski later exploited an out-of-bounds write vulnerability—a type of bug where the attacker writes data outside the allocated memory boundary, potentially altering program execution or seizing control of the underlying system. Hyeonjin Choi followed suit, demonstrating a type confusion zero-day, a complex category of memory safety errors arising when a program mistakenly interprets data as the wrong type—often with catastrophic consequences.
Each of these attacks, demonstrated in front of both judges and vendor representatives, underscores a persistent weakness in even the latest iterations of Windows’ security architecture: the enduring prevalence of memory safety issues.
Team Prison Break earned $40,000 by using an integer overflow vulnerability to break out of Oracle VirtualBox, the widely used open-source virtualization platform. Successful “VM escapes” are serious; they allow code running inside a supposed “contained” environment to execute commands against the host operating system, drastically expanding the scope and impact of a compromise.
In an equally notable win, STARLabs SG's Billy and Ramdhan were awarded $60,000 for exploiting Docker Desktop, the go-to containerization solution for developers and enterprises. By chaining a fresh use-after-free zero-day, they managed to break beyond Docker’s container boundaries, executing code directly on the underlying host OS. This feat is a sobering reminder to DevOps and IT administrators: segmentation and virtualization technologies are not foolproof, and maintaining strong defense-in-depth strategies is still essential.
With the AI category now a fixture at Pwn2Own, similar high-stakes exploits are anticipated, aimed both at underlying machine learning infrastructure and the applications built atop it.
Enterprises and administrators should heed the lessons from this competition: the threat landscape is dynamic, not static. Being fully patched—while mandatory—is not an ironclad shield; unknown vulnerabilities persist and can be harnessed by both well-intentioned researchers and malicious attackers.
Organizations should:
Yet, these same demonstrations also drive progress: vendors rush patches to market, mitigations are enhanced, and architectural investments (such as hardware-backed isolation and memory-safe programming languages) are prioritized. The $1 million+ prize pool serves as both carrot and stick—rewarding disclosure, deterring malicious abuse.
As the event heads into its final day, with researchers poised to tackle everything from web browsers and cloud-native platforms to AI engines and automotive stacks, the eyes of the industry are firmly fixed on every exploit chain that lands. For every system breached in Berlin, millions of endpoints worldwide could soon see strengthened lines of digital defense—if, and only if, enterprises and individuals respond swiftly and decisively.
By shining a light into the darkest corners of enterprise infrastructure, Pwn2Own propels the entire ecosystem forward. But the arms race between exploit and patch continues—just as fierce, just as critical, as ever.
Source: BleepingComputer Windows 11 and Red Hat Linux hacked on first day of Pwn2Own
The Scene: Pwn2Own Berlin 2025
Organized by the Zero Day Initiative (ZDI) and hosted at OffensiveCon in Berlin, this year’s Pwn2Own competition focused squarely on enterprise technologies. Running from May 15–17, the event drew seasoned exploitation teams, independent researchers, and vendor representatives. New for 2025 was the introduction of an Artificial Intelligence category, reflecting the growing corporate uptake of AI-powered tooling—and its associated attack surface.Over three days, participants would target a robust suite of enterprise infrastructures, including fully patched instances of Windows 11, Red Hat Enterprise Linux for Workstations, Microsoft SharePoint, VMware ESXi, Oracle VirtualBox, Docker Desktop, web browsers like Mozilla Firefox and Chrome, and even bench-top units of the latest Tesla vehicles.
A key hallmark of the event: Pwn2Own’s “full patch” requirement. Researchers must demonstrate working exploits on products that have been updated to the latest available security fixes. This ensures that the vulnerabilities revealed are previously undisclosed, also known as “zero-days”, and are likely present on systems in active use around the globe.
Major Victims: Windows 11 and Red Hat Linux Compromised
Red Hat Enterprise Linux for Workstations
The very first demonstration of the competition saw the DEVCORE Research Team—specifically, "Pumpkin"—break local privilege escalation protections on Red Hat Enterprise Linux by successfully exploiting an integer overflow vulnerability. The exploit, which enabled the researchers to elevate privileges from a standard user to root access (the highest level of control on Linux systems), earned the team $20,000. This attack typifies a class of flaws where arithmetic errors during software operations crash through security boundaries, particularly sinister because they can lurk beneath complex system layers for years before discovery.Not long after, researchers Hyunwoo Kim and Wongi Lee showcased a different approach to subverting Red Hat Linux, this time by chaining a use-after-free bug with an information leak. As the duo chained these low-level flaws together, they too secured root privileges, though their payout was affected by what the community calls a "bug collision." One of the bugs exploited was not entirely novel—a so-called “N-day” vulnerability—dropping the uniqueness (and thus the bounty) of their overall demonstration.
Windows 11: A Trio of Prizes
Microsoft’s flagship desktop OS, Windows 11, did not fare much better. Chen Le Qi from Singapore-based STARLabs SG was awarded $30,000 for an exploit chain that combined a use-after-free bug with an integer overflow, ultimately escalating privileges to SYSTEM, which is functionally equivalent to root in the Windows world. SYSTEM-level privileges are the most coveted by attackers, permitting blanket access to files, security settings, and sensitive secrets.But Windows 11 was not breached just once. Marcin Wiązowski later exploited an out-of-bounds write vulnerability—a type of bug where the attacker writes data outside the allocated memory boundary, potentially altering program execution or seizing control of the underlying system. Hyeonjin Choi followed suit, demonstrating a type confusion zero-day, a complex category of memory safety errors arising when a program mistakenly interprets data as the wrong type—often with catastrophic consequences.
Each of these attacks, demonstrated in front of both judges and vendor representatives, underscores a persistent weakness in even the latest iterations of Windows’ security architecture: the enduring prevalence of memory safety issues.
Virtualization, Containers, and Cloud-Native Risks
Escaping the Sandbox: Oracle VirtualBox and Docker Desktop
Outside of traditional operating system targets, virtualization and containerization products came under direct fire—categories of technology often assumed to be inherently more secure due to their isolation mechanisms.Team Prison Break earned $40,000 by using an integer overflow vulnerability to break out of Oracle VirtualBox, the widely used open-source virtualization platform. Successful “VM escapes” are serious; they allow code running inside a supposed “contained” environment to execute commands against the host operating system, drastically expanding the scope and impact of a compromise.
In an equally notable win, STARLabs SG's Billy and Ramdhan were awarded $60,000 for exploiting Docker Desktop, the go-to containerization solution for developers and enterprises. By chaining a fresh use-after-free zero-day, they managed to break beyond Docker’s container boundaries, executing code directly on the underlying host OS. This feat is a sobering reminder to DevOps and IT administrators: segmentation and virtualization technologies are not foolproof, and maintaining strong defense-in-depth strategies is still essential.
AI and Enterprise Application Security: Emerging Frontiers
Summoning Team’s Sina Kheirkhah captured further attention—and $35,000—by demonstrating a zero-day named “Chroma” in conjunction with an already known security gap in Nvidia’s Triton Inference Server. As enterprises increasingly rely on GPU-accelerated deep learning inference platforms for AI workloads, vulnerabilities in such infrastructure could provide powerful entry points for attackers — especially when it comes to manipulating or extracting sensitive AI models and data.With the AI category now a fixture at Pwn2Own, similar high-stakes exploits are anticipated, aimed both at underlying machine learning infrastructure and the applications built atop it.
Prize Money, Leaderboards, and the Path to Patching
On just the first day, the leaderboard reflected accumulated awards of $260,000—proof not only of the event’s prestige but also of the collective focus and expertise of the world’s top vulnerability researchers. The full award pool for this year’s Berlin event stretched beyond $1 million in cash and prizes, including opportunities to target high-profile categories such as:- Web browsers (Mozilla Firefox, Chrome)
- Virtualization platforms (VMware ESXi, Oracle VirtualBox)
- Cloud-native and containerization products (Docker, Kubernetes)
- Server and enterprise applications (Microsoft SharePoint)
- AI platforms
- Automotive targets (2024–2025 Tesla Model 3/Y bench-top units)
Zero-Day Disclosure and Patch Timelines
A defining feature of Pwn2Own is its responsible disclosure principle. All demonstrated exploits are immediately disclosed to the affected vendors—Microsoft, Red Hat, Oracle, Nvidia, and others—who then have 90 days to develop and release appropriate security fixes before the vulnerability details are made public. This 90-day “patch window” is now an accepted industry standard, balancing the need for rapid hardening of widely used software without exposing end users to immediate risk.Enterprises and administrators should heed the lessons from this competition: the threat landscape is dynamic, not static. Being fully patched—while mandatory—is not an ironclad shield; unknown vulnerabilities persist and can be harnessed by both well-intentioned researchers and malicious attackers.
Critical Analysis: Strengths and Risks
Notable Strengths
- Ongoing Security Investment by Vendors: The presence of vendor representatives at Pwn2Own, quick acknowledgment of disclosed bugs, and commitment to rapid patch turnaround are all evidence of the maturity of today’s security response processes.
- Researcher Creativity and Collaboration: Many of the successful exploits involved multi-stage chains, demonstrating a profound understanding of complex systems and a willingness to build upon, and share, technical knowledge.
- Robustness in Public Disclosure: The competition format ensures that newly discovered vulnerabilities rapidly find their way to the vendors best placed to fix them—rather than languishing in underground marketplaces or being exploited in the wild.
Significant Risks
- Persistence of Memory Safety Bugs: The repeated exploitation of use-after-free, type confusion, integer overflow, and out-of-bounds write vulnerabilities—across both Windows and Linux—highlights enduring systemic weaknesses. Despite decades of investment in compiler hardening, sandboxing, and runtime checks, memory safety remains the software industry’s Achilles' heel.
- Attack Surface Expansion: As enterprises and vendors expand their reliance on complex supply chains (containers, virtualization, AI-powered decision engines), the attack surface grows—sometimes exponentially. Attacks that cross security boundaries, such as VM or container escapes, demonstrate how a single lapse can cascade into much broader compromise.
- Potential for Bug Collisions and N-Day Vulnerabilities: The “bug collision” affecting Hyunwoo Kim and Wongi Lee’s Red Hat exploit reveals a messy reality: not every “new” vulnerability is truly novel, and coordination between bug bounty programs and vendor advisories remains imperfect. N-day exploits still represent real threats, especially if patches are not universally and swiftly deployed.
- Unverifiable Claims and Opacity: While Pwn2Own prizes responsible disclosure and public accountability, not every exploit demonstrated can be independently verified until vendors release advisories or proof-of-concept code becomes available. For time-sensitive or high-risk bugs, the window between demo and patch can be a period of heightened risk—particularly for highly motivated attackers.
Lessons for Enterprises and Users
For defenders, the message is clear: patching must be relentless, but so too must be efforts to deploy mitigation layers, intrusion detection, and ongoing monitoring of all endpoints and cloud environments. No single product is immune, no matter how recent its last security update. Privilege escalation, sandbox escapes, and memory corruption bugs remain among the most lucrative and dangerous classes of vulnerabilities, as proven yet again at Pwn2Own Berlin.Organizations should:
- Implement a robust vulnerability management and patching process, prioritizing critical infrastructure.
- Invest in modern endpoint protection and detection tools capable of identifying post-exploitation activity.
- Stay informed of new security advisories—especially within the “patch window” following major competitions.
- Consider additional safeguards such as sandboxing, application whitelisting, least-privilege configurations, and regular security training for administrators and developers alike.
The Road Ahead: Will Security Win the Arms Race?
Each year, Pwn2Own acts as both a wake-up call and a barometer for the state of software and platform security. The fact that the best-defended enterprise operating systems and virtualization stacks can be breached in minutes—with live demos in front of a panel of judges and peers—demonstrates the relentless ingenuity of the security research community.Yet, these same demonstrations also drive progress: vendors rush patches to market, mitigations are enhanced, and architectural investments (such as hardware-backed isolation and memory-safe programming languages) are prioritized. The $1 million+ prize pool serves as both carrot and stick—rewarding disclosure, deterring malicious abuse.
As the event heads into its final day, with researchers poised to tackle everything from web browsers and cloud-native platforms to AI engines and automotive stacks, the eyes of the industry are firmly fixed on every exploit chain that lands. For every system breached in Berlin, millions of endpoints worldwide could soon see strengthened lines of digital defense—if, and only if, enterprises and individuals respond swiftly and decisively.
Final Thoughts
Pwn2Own Berlin 2025’s first-day results confirmed an unsettling truth: even flagship software from industry titans like Microsoft and Red Hat remains vulnerable to determined, well-equipped attackers. The ongoing escalation in both complexity and stakes—across desktops, clouds, AI, and even cars—demands that vendors, enterprises, and end users alike take security more seriously than ever before.By shining a light into the darkest corners of enterprise infrastructure, Pwn2Own propels the entire ecosystem forward. But the arms race between exploit and patch continues—just as fierce, just as critical, as ever.
Source: BleepingComputer Windows 11 and Red Hat Linux hacked on first day of Pwn2Own