DEVCORE Crowned 'Master of Pwn' at Pwn2Own Berlin 2026; Researchers Disclose 47 Zero-Days

Pwn2Own Berlin 2026 Concludes with $1.3M Awarded for 47 Zero-Days in Enterprise Software

INFORMATIONAL
May 18, 2026
4m read
VulnerabilitySecurity Operations

Related Entities

Organizations

DEVCOREMicrosoft VMware NVIDIARed Hat STARLabs SG

Products & Tech

Microsoft Exchange Server Microsoft SharePointVMware ESXiMicrosoft EdgeWindows 11Red Hat Enterprise LinuxOpenAI Codex

Other

OpenAI

Full Report

Executive Summary

The Pwn2Own Berlin 2026 hacking competition, held from May 14-16, has concluded with a total of $1,298,250 awarded to security researchers for the successful demonstration of 47 unique zero-day vulnerabilities. The event focused on enterprise software, virtualization, and AI products, revealing significant flaws in widely deployed technologies. The Taiwanese research team DEVCORE was crowned the "Master of Pwn," earning $505,000 for their exploits. Their victories included a three-bug chain against Microsoft Exchange Server for $200,000 and a two-bug chain against Microsoft SharePoint for $100,000. All discovered vulnerabilities have been responsibly disclosed to the affected vendors, who are now working on patches.

Incident Timeline

The competition spanned three days, with numerous successful exploits demonstrated:

  • Dates: May 14 - May 16, 2026
  • Total Payout: $1,298,250
  • Total Zero-Days: 47

Response Actions

The primary response action is from the vendors whose products were successfully exploited. Through Trend Micro's Zero Day Initiative (ZDI), which runs Pwn2Own, all 47 vulnerabilities were privately disclosed to the respective vendors. These vendors now have a standard 90-day deadline to develop and release security patches before ZDI publicly discloses limited details about the flaws. This process of coordinated vulnerability disclosure is central to the event's mission.

Technical Findings

While specific technical details of the exploits remain private to give vendors time to patch, the competition revealed several high-impact attack chains:

  • DEVCORE's Exchange RCE: The highest-value exploit of the event was a three-bug chain demonstrated by DEVCORE that achieved remote code execution with SYSTEM privileges on a fully patched Microsoft Exchange Server. This is a critical finding, as Exchange remains a top target for nation-state and ransomware actors.

  • STARLabs SG's ESXi Exploit: The STARLabs SG team demonstrated a sophisticated exploit against VMware ESXi, which included a cross-tenant code execution component, earning them $200,000. This type of vulnerability is extremely dangerous in multi-tenant cloud environments.

  • Other Notable Targets: Researchers also successfully demonstrated exploits against:

    • Microsoft Windows 11
    • Microsoft Edge
    • Red Hat Enterprise Linux
    • OpenAI Codex
    • LiteLLM (AI Gateway)

The breadth of targets highlights that vulnerabilities exist across the entire technology stack, from operating systems and hypervisors to browsers and emerging AI platforms.

Lessons Learned

  1. Enterprise Software Remains Vulnerable: Despite years of security investment, core enterprise products like Exchange, SharePoint, and ESXi continue to harbor critical, chainable vulnerabilities.
  2. The Value of Offensive Security Research: Events like Pwn2Own are crucial for proactively identifying and fixing flaws before they can be exploited by malicious actors. The high payouts incentivize top-tier talent to participate in responsible disclosure.
  3. AI as a New Attack Surface: The inclusion of AI platforms as targets signifies a new and complex frontier for security research. As AI becomes more integrated into business processes, securing these models and their infrastructure is paramount.

Mitigation Recommendations

For end-users, the immediate mitigation is to prepare for a wave of critical patches from the affected vendors.

  • Patch Management: Organizations should monitor security advisories from Microsoft, VMware, Red Hat, and others over the next 90 days and be prepared to deploy the resulting patches on an expedited basis. This aligns with MITRE Mitigation M1051 - Update Software.
  • Defense-in-Depth: The success of multi-bug chains underscores the need for a defense-in-depth strategy. Even if one security layer is bypassed, others like network segmentation (M1030), strict access controls, and EDR solutions can prevent a full compromise.
  • Assume Breach Mentality: Given the continuous discovery of zero-days, organizations should operate under an 'assume breach' mentality, investing in robust detection and response capabilities to quickly identify and contain intrusions that leverage unknown vulnerabilities.

Timeline of Events

1
May 14, 2026
Pwn2Own Berlin 2026 competition begins.
2
May 16, 2026
Pwn2Own Berlin 2026 concludes, with 47 zero-days disclosed and DEVCORE announced as the winner.
3
May 18, 2026
This article was published

MITRE ATT&CK Mitigations

Monitor vendor advisories and apply security patches for the 47 disclosed vulnerabilities as they are released.

Implement network segmentation to limit the impact of a potential breach, preventing lateral movement from a compromised system.

Audit

M1047enterprise

Maintain robust logging and monitoring to detect anomalous activity that could indicate exploitation of an unknown vulnerability.

Timeline of Events

1
May 14, 2026

Pwn2Own Berlin 2026 competition begins.

2
May 16, 2026

Pwn2Own Berlin 2026 concludes, with 47 zero-days disclosed and DEVCORE announced as the winner.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Pwn2Ownzero-dayvulnerabilityhacking contestDEVCOREMicrosoft Exchange

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.