Security researchers demonstrated 15 unique zero-day vulnerabilities on the second day of Pwn2Own Berlin 2026, earning $385,750 and bringing the total to $908,750 for 39 vulnerabilities over two days. The vulnerabilities affected various products, including Windows 11, Microsoft Exchange, and Red Hat Enterprise Linux for Workstations. Notably, Microsoft Exchange was successfully exploited, highlighting the ongoing risks associated with the platform. With one day of the competition remaining, the total rewards are expected to increase further. The high number of zero-day vulnerabilities discovered in a short period underscores the importance of prompt patching and vulnerability assessment. As zero-day activity targeting Microsoft products continues to rise, the window for patching vulnerabilities is rapidly closing, making it essential for organizations to assess their exposure immediately1. This emphasizes the need for proactive security measures to mitigate potential threats.
Pwn2Own Berlin 2026, Day Two: $385,750 more, Microsoft Exchange falls, and the running total crosses $900K
⚠️ Critical Alert
Why This Matters
Zero-day activity targeting Microsoft means patching windows are already closing — assess your exposure immediately.
References
- SecurityAffairs. (2026, May 15). Pwn2Own Berlin 2026, Day Two: $385,750 more, Microsoft Exchange falls, and the running total crosses $900K. SecurityAffairs. https://securityaffairs.com/192209/security/pwn2own-berlin-2026-day-two-385750-more-microsoft-exchange-falls-and-the-running-total-crosses-900k.html
Original Source
SecurityAffairs
Read original →