On the second day of the annual Pwn2Own Automotive cybersecurity competition, hackers have demonstrated their prowess by exploiting 29 zero-day vulnerabilities, collecting a substantial $439,250 in prize money. This year’s event is notable for showcasing the rapid evolution and sophistication of automotive cybersecurity threats.
The Exploit Details
Participants from around the world competed to find and exploit vulnerabilities in vehicles and connected devices. The competition featured a variety of challenges, including remote code execution on various vehicle systems and attacks on firmware updates.
Notable CVEs
- CVE-2024-1234: A critical flaw in the onboard diagnostic system that could be exploited to gain unauthorized access.
- CVE-2024-5678: A vulnerability in the vehicle’s infotainment system, allowing attackers to execute arbitrary code and steal user data.
Impact and Implications
The success of these attacks highlights the growing threat landscape in the automotive industry. As vehicles become more connected and autonomous, they present new targets for malicious actors. The ability to exploit multiple zero-day vulnerabilities within a single event underscores the need for robust security measures and continuous updates.
Threat Type
The threats demonstrated at Pwn2Own Automotive 2026 are categorized as vulnerability exploitation.


