<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Zero-Day Vulnerabilities &#8211; Tech AI Connect</title>
	<atom:link href="https://techaiconnect.com/tag/zero-day-vulnerabilities/feed/" rel="self" type="application/rss+xml" />
	<link>https://techaiconnect.com</link>
	<description>All Tek Information for You</description>
	<lastBuildDate>Thu, 24 Oct 2024 23:59:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>
	<item>
		<title>Hacking Heroes at Pwn2Own Ireland: Samsung Galaxy and Sonos Era Vulnerabilities Exposed</title>
		<link>https://techaiconnect.com/hacking-heroes-at-pwn2own-ireland-samsung-galaxy-and-sonos-era-vulnerabilities-exposed/</link>
					<comments>https://techaiconnect.com/hacking-heroes-at-pwn2own-ireland-samsung-galaxy-and-sonos-era-vulnerabilities-exposed/#respond</comments>
		
		<dc:creator><![CDATA[techai]]></dc:creator>
		<pubDate>Thu, 24 Oct 2024 23:59:10 +0000</pubDate>
				<category><![CDATA[Cybersecurity Competition]]></category>
		<category><![CDATA[Pwn2Own 2024]]></category>
		<category><![CDATA[Samsung Galaxy S24]]></category>
		<category><![CDATA[Sonos Era 300]]></category>
		<category><![CDATA[Zero-Day Vulnerabilities]]></category>
		<guid isPermaLink="false">https://techaiconnect.com/hacking-heroes-at-pwn2own-ireland-samsung-galaxy-and-sonos-era-vulnerabilities-exposed/</guid>

					<description><![CDATA[The second day of Pwn2Own Ireland 2024 proved to be a riveting showcase of cybersecurity talent, where white hat hackers unearthed a staggering 51 zer]]></description>
										<content:encoded><![CDATA[<p>The second day of Pwn2Own Ireland 2024 proved to be a riveting showcase of cybersecurity talent, where white hat hackers unearthed a staggering 51 zero-day vulnerabilities, collectively earning $358,625 in cash rewards. Pwn2Own is a prestigious annual hacking contest that challenges security researchers to exploit software and hardware vulnerabilities, vying for the title of &#8220;Master of Pwn&#8221; alongside a bounty of one million dollars in total prizes.  </p>
<p>During this intense day of competition, the Viettel Cyber Security team emerged as a notable frontrunner in the pursuit of the coveted title, delivering remarkable performances across multiple categories. Leading the charge was Pham Tuan Son, alongside ExLuck from ANHTUD, who commenced the day with a successful exploit of a Canon imageCLASS MF656Cdw printer utilizing a stack-based buffer overflow. Their efforts secured a handsome reward of $10,000 and two Master of Pwn points.  </p>
<p>However, the spotlight quickly shifted to some of the day&#8217;s more spectacular exploits. Ken Gannon from the NCC Group executed a complex chain of five vulnerabilities, which included a path traversal, against the latest Samsung Galaxy S24 smartphone. This attack not only earned him $50,000 but also netted five points towards the Master of Pwn title. Gannon&#8217;s successful exploit enabled him to install an unauthorized application on the device and gain shell access, highlighting significant security weaknesses in a device favored by millions.  </p>
<p>In another standout performance, Dungdm from Viettel Cyber Security managed to seize control of the Sonos Era 300 smart speaker through a Use-After-Free (UAF) vulnerability. His successful manipulation of the device resulted in a windfall of $30,000 and six Master of Pwn points, accentuating the risks associated with smart home technology.  </p>
<p>The breadth of vulnerabilities exploited during the event was impressive. Team Cluck&#8217;s duo, Chris Anastasio and Fabius Watson, chained together two vulnerabilities—including a critical CRLF injection—to compromise the QNAP TS-464 NAS, earning $20,000 and four points. Additionally, Corentin BAYET of Reverse Tactics secured $41,750 and 8.5 points targeting the QNAP QHora-322 router, despite one of his identified bugs being a repeat from earlier rounds.  </p>
<p>Day 2 of Pwn2Own also witnessed several incidents of collision where multiple researchers attempted to exploit similar vulnerabilities on the same device. As a result, both Tenable and Synactiv encountered reduced payouts and points while attempting to hack the Lorex 2K and Synology BeeStation devices, respectively. Furthermore, competing teams such as DEVCORE, Rapid7, and Neodyme faced challenges executing their exploits within the strict timeframes, resulting in setbacks on devices like the Sonos Era 300 and Lexmark CX331adwe printer.  </p>
<p>Despite these hurdles, the competition remains fierce as participants strive to ascend the rankings. With two full days still left in the event, researchers have already showcased a remarkable total of 103 zero-day vulnerabilities, comprising 52 vulnerabilities detected on the opening day. So far, the cumulative earnings for the participating teams have reached an impressive $847,875, setting the stage for an electrifying continuation of the competition.  </p>
<p>As the cyber challenge unfolds, the stakes continue to rise for both participants and the brands behind the technology under scrutiny. The findings not only highlight significant flaws in some of the most widely used devices but also underscore the critical importance of continual vigilance in cybersecurity practices to protect against evolving threats in the digital landscape.  </p>
<p>As the event progresses, experts and enthusiasts alike will be following closely to see which teams ultimately prevail in their quest for dominance in the cybersecurity arena. </p>
]]></content:encoded>
					
					<wfw:commentRss>https://techaiconnect.com/hacking-heroes-at-pwn2own-ireland-samsung-galaxy-and-sonos-era-vulnerabilities-exposed/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hackers Reveal 52 Zero-Day Vulnerabilities at Pwn2Own Ireland 2024</title>
		<link>https://techaiconnect.com/hackers-reveal-52-zero-day-vulnerabilities-at-pwn2own-ireland-2024/</link>
					<comments>https://techaiconnect.com/hackers-reveal-52-zero-day-vulnerabilities-at-pwn2own-ireland-2024/#respond</comments>
		
		<dc:creator><![CDATA[techai]]></dc:creator>
		<pubDate>Wed, 23 Oct 2024 23:54:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Pwn2Own]]></category>
		<category><![CDATA[Tech Events]]></category>
		<category><![CDATA[Zero-Day Vulnerabilities]]></category>
		<guid isPermaLink="false">https://techaiconnect.com/hackers-reveal-52-zero-day-vulnerabilities-at-pwn2own-ireland-2024/</guid>

					<description><![CDATA[In a striking display of skill and innovation, hackers at the inaugural day of Pwn2Own Ireland 2024 uncovered an impressive total of 52 zero-day vulne]]></description>
										<content:encoded><![CDATA[<p>In a striking display of skill and innovation, hackers at the inaugural day of Pwn2Own Ireland 2024 uncovered an impressive total of 52 zero-day vulnerabilities across various devices, raking in an astounding $486,250 in cash prizes. This event, known for its high-stakes hacking challenges, kicked off with fierce competition among cybersecurity professionals eager to earn the coveted title of &#8216;Master of Pwn.&#8217; </p>
<p>Leading the charge was Viettel Cyber Security, who quickly established dominance in the competition by accumulating 13 points. The team, comprising skilled participants known by their handles phudq and namnp, executed a successful exploit against a Lorex 2K WiFi camera utilizing a stack-based buffer overflow vulnerability. Their efforts were not only rewarded with 3 points but also a generous payout of $30,000. </p>
<p>Sina Kheirkhah from Summoning Team emerged as a standout performer during this intense hacking event. Kheirkhah orchestrated a remarkable chain of nine vulnerabilities that began with a QNAP QHora-322 router and concluded with a successful compromise of the TrueNAS Mini X device. This impressive feat netted the team a whopping $100,000 and a total of 10 points towards the Master of Pwn title. </p>
<p>Following Kheirkhah&#8217;s triumph, Jack Dates from RET2 Systems showcased his prowess with a successful out-of-bounds (OOB) write exploit on the Sonos Era 300 smart speaker. This exploit allowed him comprehensive control over the device, landing him $60,000 and 6 points. The action didn’t stop there, as Viettel Cyber Security returned to the fray with a second successful exploit, cleverly combining four new bugs to transition from the QNAP QHora-322 router to the TrueNAS Mini X, resulting in an additional $50,000 reward and another 10 points. </p>
<p>Despite the excitement, day one was not without its challenges. The Summoning Team faced difficulties executing their exploits on the QNAP TS-464 and Synology BeeStation BST150-4T, ultimately running out of time. Similarly, Synacktiv encountered a bug collision during their attempt to exploit the Lorex 2K camera, which unfortunately resulted in a reduced payout of $11,250.  </p>
<p>As the first day of Pwn2Own Ireland 2024 drew to a close, participants demonstrated their tactical skills and resilience, proving that the road to success in hacking is fraught with both triumphs and setbacks. With three more days of the competition remaining, participants are poised to continue their quest for exploiting security vulnerabilities in fully patched SOHO devices. These range from printers and NAS systems to WiFi cameras, routers, smart speakers, and even mobile phones, including the latest Samsung Galaxy S24, with a substantial portion of the $1 million prize pool at stake. </p>
<p>The event also highlights the pressing nature of cybersecurity threats, as evidenced by several recent zero-day vulnerabilities being exploited actively. For instance, reports have emerged regarding Lazarus hackers employing fake DeFi games to exploit a Google Chrome zero-day, and Fortinet warning of a new critical flaw in FortiManager being used for zero-day attacks. Furthermore, Google disclosed that 70% of the vulnerabilities exploited in 2023 were zero-days. This underlines the importance of ongoing vigilance and innovation in cyber defense practices. </p>
<p>The initial day of competitive hacking concluded with shouts of congratulations for the participants from industry peers. Acknowledgment was also given to the businesses and organizers supporting this event aimed at fostering safe discovery and rewarding bug bounties. As the competition progresses, the hope remains that all involved will walk away having gained invaluable experience and insights from this unique event.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techaiconnect.com/hackers-reveal-52-zero-day-vulnerabilities-at-pwn2own-ireland-2024/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
