The Pwn2Own Berlin 2026 hacking competition, held from May 14-16, has concluded with a total of $1,298,250 awarded to security researchers for the successful demonstration of 47 unique zero-day vulnerabilities. The event focused on enterprise software, virtualization, and AI products, revealing significant flaws in widely deployed technologies. The Taiwanese research team DEVCORE was crowned the "Master of Pwn," earning $505,000 for their exploits. Their victories included a three-bug chain against Microsoft Exchange Server for $200,000 and a two-bug chain against Microsoft SharePoint for $100,000. All discovered vulnerabilities have been responsibly disclosed to the affected vendors, who are now working on patches.
The competition spanned three days, with numerous successful exploits demonstrated:
The primary response action is from the vendors whose products were successfully exploited. Through Trend Micro's Zero Day Initiative (ZDI), which runs Pwn2Own, all 47 vulnerabilities were privately disclosed to the respective vendors. These vendors now have a standard 90-day deadline to develop and release security patches before ZDI publicly discloses limited details about the flaws. This process of coordinated vulnerability disclosure is central to the event's mission.
While specific technical details of the exploits remain private to give vendors time to patch, the competition revealed several high-impact attack chains:
DEVCORE's Exchange RCE: The highest-value exploit of the event was a three-bug chain demonstrated by DEVCORE that achieved remote code execution with SYSTEM privileges on a fully patched Microsoft Exchange Server. This is a critical finding, as Exchange remains a top target for nation-state and ransomware actors.
STARLabs SG's ESXi Exploit: The STARLabs SG team demonstrated a sophisticated exploit against VMware ESXi, which included a cross-tenant code execution component, earning them $200,000. This type of vulnerability is extremely dangerous in multi-tenant cloud environments.
Other Notable Targets: Researchers also successfully demonstrated exploits against:
The breadth of targets highlights that vulnerabilities exist across the entire technology stack, from operating systems and hypervisors to browsers and emerging AI platforms.
For end-users, the immediate mitigation is to prepare for a wave of critical patches from the affected vendors.
M1030), strict access controls, and EDR solutions can prevent a full compromise.Monitor vendor advisories and apply security patches for the 47 disclosed vulnerabilities as they are released.
Implement network segmentation to limit the impact of a potential breach, preventing lateral movement from a compromised system.
Pwn2Own Berlin 2026 competition begins.
Pwn2Own Berlin 2026 concludes, with 47 zero-days disclosed and DEVCORE announced as the winner.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.