Hackers Target VMware ESXi and Microsoft SharePoint Zero-Days at Pwn2Own Berlin 2025

Researchers at Pwn2Own Berlin 2025 earned $695,000 for exploiting zero-day flaws in VMware ESXi, Microsoft SharePoint, Firefox, and AI platforms.
Hackers Target VMware ESXi and Microsoft SharePoint Zero-Days at Pwn2Own Berlin 2025
Table of Contents
    Add a header to begin generating the table of contents

    Security researchers demonstrated 20 zero-day vulnerabilities across enterprise technologies during the first two days of Pwn2Own Berlin 2025, earning a total of $695,000 in rewards. High-profile targets included VMware ESXi, Microsoft SharePoint, Red Hat Enterprise Linux, and Mozilla Firefox.

    The event, hosted as part of the OffensiveCon conference from May 15 to 17, marks the first time Pwn2Own introduced an AI category, with over $1 million in prizes available across various enterprise-related targets.

    $435,000 Awarded on Day Two for New Zero-Day Exploits

    Day two of the contest saw $435,000 awarded for successful exploitation of zero-day flaws in major platforms. Key highlights include:

    • VMware ESXi Exploit
      Nguyen Hoang Thach of STARLabs SG earned $150,000 after exploiting an integer overflow vulnerability in VMware ESXi.
    • Microsoft SharePoint Breach
      Dinh Ho Anh Khoa from Viettel Cyber Security received $100,000 for chaining two vulnerabilities — an authentication bypass and insecure deserialization — to hack Microsoft SharePoint.
    • Mozilla Firefox Zero-Day
      Palo Alto Networks’ Edouard Bochin and Tao Yan demonstrated a successful out-of-bounds write in Mozilla Firefox.
    • Red Hat Enterprise Linux Privilege Escalation
      Gerrard Tai from STARLabs SG leveraged a use-after-free flaw to escalate privileges to root.
    • Oracle VirtualBox Guest-to-Host Escape
      Another team from Viettel Cyber Security used an out-of-bounds write to escape the guest VM environment on Oracle VirtualBox.

    AI Targets Successfully Hacked in New Category

    The new AI category also saw action:

    • Redis Exploitation
      Wiz Research exploited Redis using a use-after-free zero-day.
    • Nvidia Triton Inference Server
      Qrious Secure chained four vulnerabilities to gain control over Nvidia’s AI inference server.

    Day One Summary and Remaining Targets

    On day one, contestants earned $260,000 by hacking Windows 11, Red Hat Enterprise Linux, and Oracle VirtualBox. That brought the two-day total to $695,000 in payouts for uncovering 20 unique zero-day vulnerabilities.

    The final day will see further exploit attempts on:

    • Windows 11
    • VMware Workstation and ESXi
    • Oracle VirtualBox
    • Mozilla Firefox
    • Nvidia Triton Inference Server and Container Toolkit

    Though two Tesla targets — a 2025 Model Y and a 2024 Model 3 unit — were offered, no exploit attempts were submitted.

    Disclosure Timeline and Vendor Response

    Following the contest, vendors have 90 days to address the disclosed vulnerabilities before Trend Micro’s Zero Day Initiative publicly releases technical details.


    Related Posts