Welcome to Pwn2Own Vancouver 2022! This year marks the 15th anniversary of the contest, and we plan on celebrating by putting some amazing research on display. For this year’s event, we have 17 contestants attempting to exploit 21 targets across multiple categories. As always, we began our contest with a random drawing to determine the order of attempts. If you missed it, you can watch the replay here.
The complete schedule for the contest is below (all times Pacific [GMT -7:00]).
Note: All times subject to change - You can see the results and live updates here once they become available. Entries marked with a 📷 icon will be live-streamed on YouTube, Twitch, and Twitter.
Wednesday, May 18, 2022
0930: Hector “p3rr0” Peralta targeting Microsoft Teams in the Enterprise Communications category
📷 1030: Billy Jheng Bing-Jhong (@st424204), Muhammad Alifa Ramdhan (@n0psledbyte), and Nguyễn Hoàng Thạch (@hi_im_d4rkn3ss) of STAR Labs targeting Oracle VirtualBox with a guest-to-host escape in the Virtualization category
📷 1200: Masato Kinugawa targeting Microsoft Teams in the Enterprise Communications category
📷 1300: Manfred Paul (@_manfp) targeting Mozilla Firefox (including sandbox escape) in the Web Browser category
1330: Marcin Wiązowski targeting Microsoft Windows 11 in the Local Elevation of Privilege category
1400: Team Orca of Sea Security (security.sea.com) targeting Ubuntu Desktop in the Local Elevation of Privilege category
1450: Daniel Lim Wee Soong (@daniellimws), Poh Jia Hao (@Chocologicall), Li Jiantao (@CurseRed) & Ngo Wei Lin (@Creastery) of STAR Labs targeting Microsoft Teams in the Enterprise Communications category
📷 1550: Manfred Paul (@_manfp) targeting Apple Safari in the Web Browser category
📷 1650: Keith Yeo (@kyeojy) targeting Ubuntu Desktop in the Local Elevation of Privilege category
1720: Phan Thanh Duy (@PTDuy) and Lê Hữu Quang Linh (@linhlhq) of STAR Labs targeting Microsoft Windows 11 in the Local Elevation of Privilege category
Thursday, May 19, 2022
📷 1000: David BERARD and Vincent DEHORS from @Synacktiv target the Tesla Model 3 Infotainment System (with Sandbox Escape) in the Automotive category
1100: namnp targeting Microsoft Windows 11 in the Local Elevation of Privilege category
📷 1130: Bien Pham (@bienpnn) targeting Ubuntu Desktop in the Local Elevation of Privilege category
📷 1300: @Jedar_LZ targeting the Tesla Model 3 Diagnostic Ethernet (with Root Persistence) in the Automotive category
1400: T0 targeting Microsoft Windows 11 in the Local Elevation of Privilege category
📷 1430: TUTELARY from Northwestern University targeting Ubuntu Desktop in the Local Elevation of Privilege category
Friday, May 20, 2022
📷 1000: Team DoubleDragon: Yonghwi Jin (@jinmo123) of Theori, and Yongjin Kim (@adm1nkyj1) of Enki targeting Microsoft Teams in the Enterprise Communications category
1030: nghiadt12 from Viettel Cyber Security targeting Microsoft Windows 11 in the Local Elevation of Privilege category
📷 1100: Billy Jheng Bing-Jhong (@st424204) of STAR Labs targeting Ubuntu Desktop in the Local Elevation of Privilege category
1300: vinhthp1712 targeting Microsoft Windows 11 in the Local Elevation of Privilege category
📷 1330: Bruno PUJOS (@brunopujos) from REverse Tactics targeting Microsoft Windows 11 in the Local Elevation of Privilege category
📷 1520: Award Ceremony