Pwn2Own Automotive 2026 - Day Three Results and the Master of Pwn
好的,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头,直接写描述即可。首先,我需要仔细阅读并理解文章内容。 文章主要讲的是Pwn2Own Automotive 2026比赛的第三天,也就是最后一天的情况。已经进行了两天,总共颁发了955,750美元奖金,发现了66个独特的零日漏洞。Fuzzware.io团队成功攻击了Alpine汽车,并获得了奖金和积分。Qrious Secure团队虽然遇到了碰撞问题,但也获得了奖励。比赛接近尾声,气氛紧张。 接下来,我需要将这些信息浓缩到100字以内。要确保涵盖主要事件:比赛进入最后阶段、已颁发的奖金和漏洞数量、两个团队的成功案例以及比赛的紧张氛围。 可能的结构是:比赛进入第三天,已颁发奖金和漏洞数量,团队成功攻击案例,以及比赛的激烈程度。 最后,检查字数是否在限制内,并确保语言简洁明了。 </think> Pwn2Own Automotive 2026进入决赛阶段,全球顶尖安全研究人员对最新汽车目标发起最后冲击。前两日已颁发955,750美元奖金,发现66个独特零日漏洞。Fuzzware.io团队成功攻击Alpine iLX-F511并获得奖励。Qrious Secure团队虽遇碰撞问题仍获奖励。 2026-1-23 02:0:37 Author: www.thezdi.com(查看原文) 阅读量:0 收藏

Day 3 of Pwn2Own Automotive 2026 is here - the final push. The world’s top security researchers return for their last shots at the latest automotive targets. After two days, $955,750 awarded for 66 unique 0-day vulnerabilities, and the Master of Pwn leaderboard has a clear frontrunner as the competition heads into its final stretch.

Bold attempts, decisive moments, and a dramatic finish lie ahead. Follow the final updates on Twitter, Mastodon, LinkedIn, and Bluesky, and join the conversation using #Pwn2OwnAutomotive and #P2OAuto.

SUCCESS / COLLISON - Tobias Scharnowski (@ScepticCtf), Felix Buchmann (@diff_fusion), and Kristian Covic (@SeTcbPrivilege) of Fuzzware.io targeted the Alpine iLX-F511, demonstrating one vulnerability previously used by another contestant, earning $2,500 USD and 1 Master of Pwn point. #Pwn2Own #P2OAuto

SUCCESS / COLLISON - Slow Horses of Qrious Secure (@qriousec) targeted the Grizzl-E Smart 40A but encountered two bug collisions, still earning $5,000 USD and 2 Master of Pwn points.


文章来源: https://www.thezdi.com/blog/2026/1/23/pwn2own-automotive-2026-day-three-results-and-the-master-of-pwn
如有侵权请联系:admin#unsafe.sh