Pwn2Own Berlin 2026 breaks record and shows that even patching software can be hacked

Published 3 min de lectura 23 reading

The Pwn2Own Berlin 2026 competition closed with a clear reminder for security officials: even fully-patched products can be violated by shackles of crashes and sophisticated techniques. In three days of competition held within the conference OffensiveCon, researchers obtained rewards for a total of $1,298,250 after explosion 47 zero-day vulnerabilities which affected from browsers and operating systems to container environments, virtualization and IA agents.

The event was not just an award show: it showed operational and technical trends that each organization should incorporate into its risk assessment. The operators were looking for bug chains to get remote run or privilege lifting on products such as Microsoft Exchange, Microsoft Edge, Windows 11, Red Hat Enterprise Linux for Workstations and VMware ESXi, and also targeted container toolkits and local inference agents for IA. The DEVCORE team took most of the loot and the Master of Pwn distinction after risking critical failures in Exchange and Edge, including an attack that was worth it. $200,000 by CERs with SYSTEM privileges.

Pwn2Own Berlin 2026 breaks record and shows that even patching software can be hacked
Image generated with IA.

That these attacks on patched software are demonstrated underlines two realities: on the one hand, attackers (or researchers) combine vectors that individually seem benign; on the other, modern environments - containers, virtual machines and local IA agents - add new and often unmature attack surfaces in terms of mitigation. The organizers of the competition, and the Zero Day Initiative (ZDI), implement an outreach policy that gives suppliers 90 days to correct before publishing details, which generates a responsibility and planning window for administrators and manufacturers ( ZDI summary).

What does this mean for those who manage infrastructure? First, prioritize external exposure: services with public or administrative interface - mail, browsers used by staff with high privileges, hypervisors and container management panels - should receive immediate attention in the parking and hardening cycles. Secondly, it must be accepted that the patches will sometimes reach within the 90-day window; therefore, compensatory controls should be applied: network segmentation, fallback policies for critical services, WAF / IPS rules and restrictions on access to management.

It is also essential to modernise detection and response: have EDR and telemetry to detect the exploitation of memory failures or side movements, practice hunt-and-detect exercises with commitment indicators and simulate attack chains in controlled environments. In the case of infrastructure implementing IA models and local agents, it is recommended to audit data flows, limit privileges of the inference process and isolate model containers to reduce impact if a vulnerability in the inference chain is exploited.

Pwn2Own Berlin 2026 breaks record and shows that even patching software can be hacked
Image generated with IA.

For product and incident response equipment, Pwn2Own is also a reminder of the effectiveness of the programme of interaction between the research community and the manufacturers: well-designed rewards encourage responsible disclosure and allow to remedy failures before they are public. Organizations should closely monitor ZDI notices and vendor bulletins, and use coordination channels to receive temporary mitigation and controlled concept testing.

Finally, from a governance and risk perspective, it is time to rethink the testing strategy: traditional automated tests are useful but not sufficient against multi-surface chains. Validating detection controls, cloud configuration shielding, and software operating responses requires exercises that combine manual penalizing techniques and continuous validation of controls; resources such as pentesting validation guides can help close that gap.

In short, Pwn2Own Berlin 2026 again made it clear that modern security requires a combination of point patches, compensatory controls, advanced telemetry and coordination with the vulnerability community. Monitoring the official disclosures and adjusting the defensive position accordingly is, today more than ever, an operational priority to reduce the operating window and impact on the organization.

Coverage

Related

More news on the same subject.