Hackers get $1,047,000 for 76 zero-days at Pwn2Own Automotive 2026
Recorded: Jan. 23, 2026, 5 p.m.
| Original | Summarized |
Hackers get $1,047,000 for 76 zero-days at Pwn2Own Automotive 2026 News Featured Curl ending bug bounty program after flood of AI slop reports INC ransomware opsec fail allowed data recovery for 12 US orgs Cisco fixes Unified Communications RCE zero day exploited in attacks Hackers exploit 29 zero-days on second day of Pwn2Own Automotive US to deport Venezuelans who emptied bank ATMs using malware Hackers exploit critical telnetd auth bypass flaw to get root What an AI-Written Honeypot Taught Us About Trusting Machines Microsoft: Outlook for iOS crashes, freezes due to coding error Tutorials Latest How to access the Dark Web using the Tor Browser How to enable Kernel-mode Hardware-enforced Stack Protection in Windows 11 How to use the Windows Registry Editor How to backup and restore the Windows Registry How to start Windows in Safe Mode How to remove a Trojan, Virus, Worm, or other Malware How to show hidden files in Windows 7 How to see hidden files in Windows Webinars Latest Qualys BrowserCheck STOPDecrypter AuroraDecrypter FilesLockerDecrypter AdwCleaner ComboFix RKill Junkware Removal Tool Deals Categories eLearning IT Certification Courses Gear + Gadgets Security VPNs Popular Best VPNs How to change IP address Access the dark web safely Best VPN for YouTube Forums Virus Removal Guides HomeNewsSecurityHackers get $1,047,000 for 76 zero-days at Pwn2Own Automotive 2026 Hackers get $1,047,000 for 76 zero-days at Pwn2Own Automotive 2026 By Sergiu Gatlan January 23, 2026 Pwn2Own Automotive 2026 has ended with security researchers earning $1,047,000 after exploiting 76 zero-day vulnerabilities between January 21 and January 23. Before TrendMicro's Zero Day Initiative publicly discloses them, vendors have 90 days to develop and release security fixes for zero-days that were exploited and reported during the Pwn2Own contest. Pwn2Own Automotive 2026 leaderboard (ZDI) 7 Security Best Practices for MCP Related Articles: Automotive Sergiu Gatlan Previous Article Post a Comment Community Rules You need to login in order to post a comment You may also like: Popular Stories Fortinet admins report patched FortiGate firewalls getting hacked Hackers breach Fortinet FortiGate devices, steal firewall configs Zendesk ticket systems hijacked in massive global spam wave Sponsor Posts Exposure Management Index: Insights From 3,000+ Teams. Get The Report. Discover how phishing kits are sold and deployed. Download the full research report. Overdue a password health-check? Audit your Active Directory for free Identity Governance & Threat Detection in one: Get a guided tour of our platform Upcoming Webinar Follow us: Main Sections News Community Forums Useful Resources Welcome Guide Company About BleepingComputer Terms of Use - Privacy Policy - Ethics Statement - Affiliate Disclosure Copyright @ 2003 - 2026 Bleeping Computer® LLC - All Rights Reserved Login Username Password Remember Me Sign in anonymously Sign in with Twitter Not a member yet? Register Now Help us understand the problem. What is going on with this comment? Spam Abusive or Harmful Inappropriate content Strong language Other Read our posting guidelinese to learn what content is prohibited. Submitting... |
The Pwn2Own Automotive 2026 competition, held in Tokyo, Japan, concluded with a significant haul of $1,047,000 awarded to security researchers who successfully exploited 76 zero-day vulnerabilities within automotive technologies. The event, organized by Trend Micro’s Zero Day Initiative (ZDI), focused on securing in-vehicle infotainment (IVI) systems, electric vehicle (EV) chargers, and car operating systems, such as Automotive Grade Linux. Team Fuzzware.io emerged as the top winner, securing $215,000 after demonstrating vulnerabilities in an Alpitronic HYC50 Charging Station, an Autel charger, and a Kenwood DNR1007XR navigation receiver. The team subsequently earned an additional $95,000 for exploiting multiple zero-days in the Phoenix Contact CHARX SEC-3150 charging controller, the ChargePoint Home Flex EV charger, and the Grizzl-E Smart 40A EV charging station. Synactiv Team received $35,000 after chaining an out-of-bounds write flaw and an information leak to compromise a Tesla Infotainment System via a USB-based attack. The competition highlighted the ongoing need for robust cybersecurity measures within the rapidly evolving automotive sector. Previous editions of Pwn2Own Automotive, including the 2024 and 2025 events, generated substantial payouts – $1,323,750 and $886,250 respectively – showcasing the prevalence and criticality of zero-day vulnerabilities in automotive systems. The event’s goal is to incentivize security researchers to identify and report vulnerabilities directly to vendors, enabling timely patching and minimizing potential risks. The substantial monetary rewards underscore the economic value of vulnerability discovery and the importance of proactive security measures within the automotive industry. |