The conclusion of Pwn2Own Berlin 2025 marked another watershed moment for the global infosec community, with security practitioners shattering benchmarks in both technical sophistication and the scale of disclosed vulnerabilities. As the doors closed on this year’s event, what resonated beyond the cumulative $1,078,750 awarded—over a million dollars in three days—was the acumen and creativity of the world’s top security researchers. In their hands, mainstream platforms like Windows 11, VMware ESXi, and Mozilla Firefox became the stage for a parade of zero-day exploits, each one a testament to both the ever-expanding attack surface in a hyperconnected world and the vital role that responsible disclosure plays in safeguarding users and enterprises alike.
The Anatomy of Day Three: Cracking Windows, VMware, and Firefox
Day three of Pwn2Own Berlin stood out not just for the value of the prizes, but for the critical severity and breadth of the vulnerabilities uncovered. Key incidents drew the attention of both technical audiences and industry stakeholders, especially as more sophisticated exploitation methodologies were brought to the fore.
Breaking Firefox: The Renderer-Only Integer Overflow
Returning champion Manfred Paul showcased why the browser remains a prime target for offensive security research. His exploit, leveraging an integer overflow in Mozilla Firefox’s rendering engine, netted him $50,000 and five coveted Master of Pwn points. This renderer-only attack illustrates a recurring challenge for browser vendors: the complexity of modern rendering pipelines creates myriad opportunities for subtle arithmetic flaws—often invisible in normal operation but widely exploitable in adversarial hands.
While details of the vulnerability remain responsibly embargoed for vendor remediation, independent analysis confirms that integer overflows of this type can, in worst-case scenarios, allow for arbitrary code execution across process boundaries. Such exploits often bypass or partially undermine modern browser sandboxes, raising concerns for millions of users who rely on Firefox for daily web activity. Previous incidents of integer overflows in browsers, including the widely remembered CVE-2020-16009 and similar bugs in Electron-based apps, underscore the need for ongoing vigilance in memory safety mechanisms.
Windows 11: Race Conditions and Privilege Escalation
Windows 11 faced two successful privilege escalation demonstrations. The first, by DEVCORE Research Team, capitalized on previously reported weaknesses; though some overlap existed with known Microsoft bugs, the demonstration reinforced the notion that privilege escalation remains a lucrative attack vector, especially as organizations adopt newer Windows builds.
Notably, researcher Miloš Ivanović unveiled a race condition exploit, using subtle timing flaws in the OS to obtain SYSTEM-level access. Such race conditions—where the outcome of a security check can be subverted by outpacing it with a malicious process—are notoriously difficult to test at scale, and even harder to patch comprehensively. This exploit alone yielded Ivanović a prize of $15,000 and served as a stark reminder that many ‘old-school’ classes of vulnerabilities still lurk within contemporary system architectures.
Extensive technical documentation published after the event illustrates the challenge Windows faces: closing the window on race conditions often requires not just patching individual bugs, but also rethinking concurrency control and privilege boundaries throughout the codebase.
VMware’s Virtualization Stack Under Siege
Virtualization platforms underpin much of the modern cloud and enterprise ecosystem, but they are not immune to memory safety woes. At Berlin, Corentin BAYET from Reverse_Tactics exploited VMware ESXi with a combination of an integer overflow and a previously disclosed uninitialized variable bug. With $112,500 awarded—despite a partial collision with pre-known issues—the exploit’s impact is twofold: it demonstrates not only the relevance of fuzzing and classical memory analysis against hypervisors but also the significance of rigorously closing all avenues related to each vulnerability class.
In a parallel effort, Thomas Bouzerar and Etienne Helluy-Lafont from Synacktiv targeted VMware Workstation through a heap-based buffer overflow. Their combined efforts earned $80,000 and a further eight Master of Pwn points, again confirming that the attack surface of desktop virtualization is far from exhausted.
VMware, for its part, has historically been proactive in its response to such findings, rapidly pushing patches on critical flaws unearthed in the wild. But as security researchers continue to dismantle long-held assumptions about virtual machine isolation, the pressure mounts for even tighter architectural controls and more granular sandboxing within these platforms.
The Master of Pwn: STAR Labs SG’s Triumph
Among all competitors, STAR Labs SG captured headlines as the overall victor, accumulating 35 Master of Pwn points and $320,000 in rewards across categories. Their approach set a new bar for integrated exploit chains, with team members Dung and Nguyen executing one of the event’s standout attacks: a virtual machine escape leveraging both a time-of-check-to-time-of-use (TOCTOU) race condition and improper array index validation to escalate privileges on Windows.
The careful choreography of this attack chain—melding flaws in VM isolation and OS-level privilege controls—demonstrates the caliber of technical dexterity on display at Pwn2Own. Particularly, TOCTOU vulnerabilities pose unique challenges due to their reliance on attacker-controlled timing, making them difficult to detect through conventional fuzzing and static analysis. According to the event report, this exploit alone netted STAR Labs SG $70,000 and nine additional points, securing their dominance for the year.
Still, the unpredictability of live demonstrations persisted: STAR Labs SG fell short attempting to exploit the NVIDIA Triton Inference server, underscoring the stiff contest between software defenders and offensive researchers—even at the highest echelons of expertise.
Record Prizes and Expanding Horizons
Pwn2Own Berlin 2025’s record payout—over $1,078,750 in three days, with $383,750 distributed on the final day—signals more than just the generosity of sponsors. It reflects a sea change in the perceived value of vulnerability research, particularly as zero-days affecting critical cloud infrastructure and consumer-facing applications are transacted in protected, responsible environments.
A closer look at the competition breakdown reveals several noteworthy trends:
- 28 unique zero-days were disclosed and purchased, with some bugs overlapping with pre-known vendor issues.
- Seven zero-days came from the burgeoning AI category, signifying that artificial intelligence models and backends are increasingly attractive—and vulnerable—targets as they are more widely adopted.
- Research focus remains sharply split between traditional OS and hypervisor targets and newer domains like containers and AI inference tooling.
These numbers track with broader industry observations that the economics of exploit development have matured. As the cost of offense rises alongside the sophistication of defense, bug bounties and competitive events like Pwn2Own act as ‘safety valves,’ channeling researchers’ discoveries toward coordinated disclosure, rather than clandestine underground markets.
Responsible Disclosure and the Vendor Response
One of the hallmarks of Pwn2Own’s enduring legacy is its insistence on responsible disclosure, which enables vendors to address critical vulnerabilities before they become tools for malicious actors. This year, vendors including Microsoft, VMware, and Mozilla dispatched incident response and engineering teams to Berlin, ensuring that newly demonstrated exploits could be analyzed and addressed with minimal delay.
Early post-event statements from vendors have underscored their ongoing commitment to rapid patching and transparency. While not all patches exhibit the same turnaround pace, major vendors have begun rolling out advisories and hotfixes addressing the vulnerabilities disclosed at Pwn2Own, echoing the broader shift toward more agile and open incident response processes.
Microsoft, for example, maintains a ‘release cadence’ framework for out-of-band patches, automatically elevating the priority of vulnerabilities demonstrated at events like Pwn2Own. Similarly, VMware’s Product Security Engineering team frequently collaborates directly with research teams to test and deploy critical mitigations, a practice credited with preventing several high-profile post-Pwn2Own exploitation attempts in previous years.
The Strategic Value (and Risks) of Public Exploit Competitions
The record-breaking bounty pool and the sheer breadth of high-profile targets have reignited discussion over the strategic value and potential pitfalls of public hackathons like Pwn2Own.
Notable Strengths
- Accelerated Disclosure: By rewarding researchers for live demonstrations, Pwn2Own incentivizes the responsible, cooperative flow of vulnerability intelligence back to the software vendors most able to effect positive change.
- Security Ecosystem Benefits: Each disclosed exploit improves the defensive posture not only of the direct vendor but also of downstream users and integrators who might be affected by the same class of flaws.
- Innovation Catalyst: The open, competitive format spurs creative new approaches to offensive security, ferreting out edge-case bugs that regular testing routines might overlook.
Potential Risks
Yet the spectacle of highly compensated zero-days and the potential for overlap with existing vulnerabilities raise certain concerns:
- Exploit Commoditization: As the financial rewards grow, some critics argue that expert hackers might gravitate toward repeat exploit classes or ‘safely’ demonstrable chains, possibly diverting talent from more innovative or long-term research endeavors.
- Patch Window Exposure: Despite rapid vendor response, the public demonstration of powerful exploits can generate a ‘race condition’ of its own, as adversaries try to reverse engineer fixes and weaponize similar vulnerabilities before organizations have time to apply patches.
- AI and Cloud Attack Surface: The increasing presence of AI and virtualization targets signals that as new paradigms take root, they may lack decades of defensive scrutiny that traditional OSes enjoyed—potentially leading to cycles of high-value zero-days as new categories mature.
It’s worth adding that, while OffensiveCon’s stewardship of Pwn2Own continues to prioritize strong ethical and procedural safeguards, the infosec community watches closely to ensure that post-disclosure remediation truly keeps pace with the evolving threat profile.
Trends to Watch: AI Security and Complexity Creep
One notable trend this year was the inclusion of seven unique zero-days targeting AI-related infrastructure. As organizations adopt large language models and AI inference servers in production environments, these platforms are rapidly developing the sort of complex, interconnected codebases that have historically given rise to exploitable logic and memory bugs. The failed exploit attempt against NVIDIA’s Triton Inference server—while unsuccessful—highlights both the difficult defensive challenges inherent in rapidly evolving AI stacks and the growing determination of top-tier experts to stress-test them.
This evolution signals a broader shift: as IT infrastructure blurs boundaries between public cloud, local workloads, and edge AI, the complexity of defense will only grow. Pwn2Own Berlin 2025’s headlines may read as a celebration of technical feats, but in another sense, they offer an early warning: tomorrow’s most valuable zero-days may lurk not only in the core operating system or browser, but in the orchestration and inference layers that increasingly tie our digital lives together.
Practical Impact: Pwn2Own’s Expanding Influence
Perhaps the greatest success of Pwn2Own’s current format is how it operationalizes cutting-edge security research for real-world impact. Vendors, policymakers, and CISOs alike monitor the event as a bellwether for both known and nascent threat vectors. More than ever, the multi-disciplinary nature of competitor teams—blending web, OS, virtualization, and AI expertise—mirrors the wider security challenges faced across sectors.
The Berlin event’s practical consequences are already unfolding, as organizations evaluate risk exposure to the newly disclosed bugs and update patch management schedules in anticipation of vendor advisories. Just as importantly, the visibility and recognition accorded to research teams at Pwn2Own inspire the next generation of security professionals, reinforcing the value proposition of ‘hacking for good’ in an often-opaque industry.
What’s Next for Pwn2Own and the Broader Security Landscape?
As the dust settles on Berlin’s record-setting event, several questions frame the horizon for both researchers and defenders:
- How quickly and comprehensively will vendors address the vulnerabilities exposed?
- Will the newfound attention on AI inference and cloud-native stacks lead to much-needed investments in memory-safe languages, formal verification, or next-generation sandboxing?
- Can security event organizers maintain the delicate balance between publicity and responsible stewardship as the stakes—and prize pools—continue to increase?
One outcome is certain: the 2025 edition of Pwn2Own leaves little doubt that elite research, responsibly channeled, is among the world’s most valuable digital safety nets. With ever-growing attack surfaces and the relentless pace of software evolution, coordinated offensive security—celebrated and incentivized in public competitions—remains essential for preempting catastrophic cyber events.
For Windows enthusiasts, IT administrators, and enterprise defenders alike, the stories out of Berlin offer both a powerful reminder of today’s risks and a hopeful vision of a community where ingenuity, collaboration, and transparency remain the ultimate tools in the fight to secure tomorrow’s digital frontier.
Source: GBHackers News
Pwn2Own Day 3: Zero-Day Exploits Hit Windows 11, VMware ESXi, and Firefox