Pwn2Own Berlin 2026 is proving to be one of the most intense offensive security contests in recent memory. Day Two alone delivered 15 new zero‑day exploits, adding $385,750 in rewards and pushing the running total to nearly $908,750 across 39 unique vulnerabilities. The event highlights how quickly attackers can chain flaws into devastating real‑world compromises.

Microsoft Exchange RCE Steals the Spotlight
The headline exploit came from Orange Tsai of DEVCORE, who chained three vulnerabilities to achieve remote code execution (RCE) with SYSTEM privileges on Microsoft Exchange.
- Reward: $200,000 and 20 Master of Pwn points — the single highest‑value exploit so far.
- Risk: Exchange servers sit at the heart of enterprise communication. A successful RCE means attackers can fully control email infrastructure, enabling espionage, lateral movement, and executive impersonation in phishing campaigns.
This exploit underscores why email remains one of the most sensitive and high‑value attack surfaces in modern enterprises.
Windows 11 and Linux Privilege Escalations
Operating systems were also prime targets:
- Windows 11: Researcher Siyeon Wi exploited an integer overflow to gain elevated privileges. While the payout was smaller ($7,500), privilege escalation bugs are critical because they can turn limited access into full system compromise.
- Red Hat Enterprise Linux: Ben Koo of Team DDOS leveraged a use‑after‑free flaw to escalate privileges, reinforcing that memory safety issues remain a persistent challenge in core OS components.
AI & Developer Tools in the Crosshairs
Day Two also confirmed a new frontier: AI‑powered development environments.
- Cursor IDE: Exploited twice by different teams, confirming multiple vulnerabilities.
- OpenAI Codex: Compromised via a novel exploit chain.
- LM Studio: Targeted with a code‑injection attack by OtterSec.
These findings highlight that AI‑assisted coding platforms are now high‑value targets, given their privileged access to source code and developer workflows.
Other Notes
- Failed attempts: Apple Safari, Microsoft SharePoint, Mozilla Firefox.
- “Collision” outcomes: Valid exploits using already‑discovered bugs, showing overlapping research efforts.
- Leaderboard: DEVCORE leads with 40.5 points and $405,000, but the race for Master of Pwn remains open.
Final Thought
Day Two reinforced two critical lessons for defenders:
- Enterprise software remains a prime target. Exchange and Windows exploits show attackers still prioritize core infrastructure.
- AI developer tools are the new battleground. Their privileged access makes them attractive for adversaries seeking entry into the software supply chain.
For security teams, the takeaway is clear: patching and monitoring must extend beyond traditional enterprise systems to include AI‑driven developer environments.
Leave a Reply