Pwn2Own Automotive: Hackers Earn $1M+ Exposing 76 Zero-Days in Tesla and Other Vehicle Systems

Researchers Demonstrate 76 Zero-Day Exploits Against Tesla and Others at Pwn2Own Automotive 2026

HIGH
January 24, 2026
5m read
VulnerabilityCyberattackThreat Intelligence

Related Entities

Organizations

Tesla DIESECCyber Recaps

Other

Full Report

Executive Summary

The Pwn2Own Automotive 2026 competition has concluded, with security researchers earning a total of $1,047,000 for successfully exploiting 76 zero-day vulnerabilities in modern connected vehicle systems. The event underscored the significant and growing security risks within the automotive sector. A team of researchers managed to achieve a full root compromise of a Tesla infotainment system by chaining multiple flaws, a feat that earned them a substantial portion of the prize pool. Other targets, including various Electric Vehicle (EV) chargers and In-Vehicle Infotainment (IVI) systems, were also successfully hacked. The findings serve as a critical warning to the automotive industry about the need for robust, continuous security testing and hardening of the complex software supply chain that underpins modern vehicles.


Threat Overview

The Pwn2Own competition provides a controlled environment for white-hat hackers to demonstrate vulnerabilities in real-world products. The 2026 automotive event focused on two main categories: In-Vehicle Infotainment (IVI) systems and Electric Vehicle Supply Equipment (EVSE), commonly known as EV chargers. Researchers successfully demonstrated exploits against products from multiple vendors, proving that the digital attack surface of cars is both broad and vulnerable.

The most notable achievement was the complete compromise of a Tesla infotainment system. This was not a single-flaw exploit but a complex chain involving an information leak and an out-of-bounds write vulnerability. By combining these flaws, the researchers were able to escalate privileges and gain root access, giving them complete control over the IVI unit. In total, 37 unique zero-days were demonstrated against Tesla systems alone.


Technical Analysis

While the specific technical details of the 76 zero-day vulnerabilities will remain private for a 90-day period to allow vendors to develop patches, the high-level descriptions provide insight into the attack vectors.

Tesla Infotainment Hack:

  • Attack Chain: The successful exploit was a multi-stage attack, a common technique for compromising hardened targets.
    1. Information Leak: The initial vulnerability likely allowed the researchers to bypass Address Space Layout Randomization (ASLR) by leaking memory addresses.
    2. Out-of-Bounds Write: This memory corruption flaw was then used to write data outside of its intended buffer, allowing the researchers to hijack the program's control flow.
    3. Privilege Escalation: The control flow hijack was leveraged to execute arbitrary code, ultimately leading to root permissions on the device.

MITRE ATT&CK TTPs (Inferred)


Impact Assessment

A compromised IVI system can pose significant risks. While typically isolated from critical drive systems, a rooted infotainment unit could potentially be used to:

  • Access Sensitive Data: Steal personal information stored on the system, such as contacts, location history, and connected accounts.
  • Eavesdrop: Activate the in-car microphone to listen to conversations.
  • Pivot to Other Systems: In a worst-case scenario, an attacker could attempt to pivot from the IVI system to more critical Electronic Control Units (ECUs) that manage vehicle functions, although this is usually prevented by network segmentation.

Vulnerabilities in EV chargers could allow attackers to disrupt charging sessions, steal electricity, or potentially compromise the payment information of users. The successful exploits at Pwn2Own demonstrate that these are not theoretical risks but practical threats that require immediate attention from manufacturers.


Cyber Observables for Detection

Since specific IOCs are not public, detection must focus on behavioral anomalies in automotive systems.

Type Value Description Context Confidence
process_name Unusual processes running on IVI systems. A sign of compromise if unexpected binaries are executed. Endpoint monitoring on the vehicle's OS. medium
network_traffic_pattern IVI system communicating with unknown external IPs. Potential C2 traffic or data exfiltration. Vehicle telematics logs, gateway firewall logs. high
file_path Modifications to system files or binaries in the IVI filesystem. Attackers may modify files to establish persistence. File integrity monitoring (FIM) on the device. high
log_source Vehicle diagnostic logs (DTCs). Unexpected error codes or system resets could indicate instability caused by an exploit. On-Board Diagnostics (OBD-II) data analysis. low

Detection & Response

For automotive manufacturers and fleet operators:

  • Firmware Integrity: Implement secure boot and runtime integrity checks to detect any unauthorized modifications to the IVI firmware. Use D3FEND Bootloader Authentication.
  • Network Monitoring: Vehicle Security Operations Centers (VSOCs) should monitor telematics data for anomalous network connections originating from IVI systems. Any communication with non-whitelisted domains should trigger an alert.
  • Behavioral Analysis: Develop baselines for normal IVI system behavior (e.g., CPU usage, memory consumption, running processes) and alert on significant deviations, which could indicate malicious code execution.
  • Over-the-Air (OTA) Updates: Ensure a robust and secure OTA update mechanism is in place to rapidly deploy patches for discovered vulnerabilities.

Mitigation

  • Secure Coding Practices: Manufacturers must invest in secure coding training for developers and implement static (SAST) and dynamic (DAST) application security testing throughout the software development lifecycle.
  • Architectural Security (D3FEND Network Isolation): Enforce strong network segmentation between the IVI system and critical vehicle control networks (e.g., CAN bus). A firewall or gateway should strictly control and monitor all inter-network communication.
  • Attack Surface Reduction: Disable all unnecessary services, ports, and debugging features on production firmware to minimize the attack surface.
  • Bug Bounty Programs: Proactively engage with the security research community through private bug bounty programs to discover and fix vulnerabilities before they can be exploited maliciously.

Timeline of Events

1
January 23, 2026
Pwn2Own Automotive 2026 event concludes, with researchers demonstrating 76 zero-day vulnerabilities.
2
January 24, 2026
This article was published
3
April 23, 2026
Approximate 90-day deadline for vendors to patch the discovered vulnerabilities before public disclosure.

MITRE ATT&CK Mitigations

Run applications within the IVI system in sandboxed environments with minimal privileges to contain the impact of an exploit.

Mapped D3FEND Techniques:

Strictly isolate the IVI network from critical vehicle control networks (like the CAN bus) to prevent lateral movement.

Mapped D3FEND Techniques:

Implement memory safety features like ASLR and stack canaries to make exploitation more difficult.

Mapped D3FEND Techniques:

Use secure boot to ensure that only signed, trusted code is loaded during the IVI system's boot process.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

Automotive manufacturers must enforce strict network isolation between In-Vehicle Infotainment (IVI) systems and critical vehicle control networks, such as the CAN bus. This is the single most important architectural defense to prevent a compromised entertainment system from affecting physical vehicle functions. A dedicated automotive-grade firewall or gateway should be placed between the IVI domain and the vehicle control domain. This gateway must operate on a default-deny basis, only allowing explicitly whitelisted and authenticated messages to pass. For example, it might allow the IVI to receive vehicle speed data for the GPS display but block any attempt by the IVI to send commands to the braking or steering ECUs. This isolation ensures that even if a researcher achieves root on the Tesla IVI system, as seen at Pwn2Own, the scope of the compromise is contained and cannot escalate to a safety-critical incident. This is a fundamental principle of defense-in-depth for connected vehicles.

A robust and secure Over-the-Air (OTA) software update capability is essential for mitigating vulnerabilities like the 76 zero-days found at Pwn2Own. Manufacturers like Tesla must have a mechanism to rapidly deploy patches to their entire vehicle fleet without requiring a visit to a dealership. The OTA update process itself must be secured against attack, using end-to-end encryption for the update package, strong code-signing to verify its authenticity and integrity, and a secure boot process to ensure the update is applied correctly. Following the 90-day responsible disclosure period from Pwn2Own, manufacturers must be prepared to push these critical security fixes to all affected vehicles. This capability transforms vulnerability management from a reactive, recall-based model to a proactive, agile process, which is critical for the software-defined vehicle.

To defend against the types of exploits demonstrated at Pwn2Own, such as out-of-bounds writes, automotive software developers must implement comprehensive application hardening techniques. This includes compiling all code with modern memory safety features enabled, such as Address Space Layout Randomization (ASLR), Stack Canaries, and Data Execution Prevention (DEP). For the Tesla IVI system, which runs a Linux-based OS, this is standard practice but must be enforced rigorously. Furthermore, developers should use programming languages with built-in memory safety (e.g., Rust) for new components where possible. Static and dynamic code analysis tools should be integrated into the CI/CD pipeline to automatically detect potential vulnerabilities like buffer overflows before the code is ever deployed to a vehicle. This proactive hardening makes it significantly more difficult for attackers to turn a bug into a working exploit.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Pwn2OwnAutomotive SecurityCar HackingTeslaZero-DayVulnerabilityInfotainmentEV Charger

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading