Welcome to Pwn2Own Vancouver 2022! This year marks the 15th anniversary of the contest, and we plan on celebrating by putting some amazing research on display. For this year’s event, we have ## contestants attempting to exploit ## targets across multiple categories. As always, we began our contest with a random drawing to determine the order of attempts. If you missed it, you can watch the replay here.
The complete schedule for the contest is below (all times Pacific [GMT -7:00]).
Note: All times subject to change - You can see the results and live updates here once they become available. Entries marked with a icon will be live-streamed on YouTube, Twitch, and Twitter.
Wednesday, May 18, 2022
0930: Hector “p3rr0” Peralta targeting Microsoft Teams in the Enterprise Communications category
1030: Billy Jheng Bing-Jhong (@st424204), Muhammad Alifa Ramdhan (@n0psledbyte), and Nguyễn Hoàng Thạch (@hi_im_d4rkn3ss) of STAR Labs of STAR Labs targeting Oracle VirtualBox with a guest-to-host escape in the Virtualization category
1200: Masato Kinugawa targeting Microsoft Teams in the Enterprise Communications category
1300: Manfred Paul (@_manfp) targeting Mozilla Firefox (including sandbox escape) in the Web Browser category
1330: Marcin Wiązowski targeting Microsoft Windows 11 in the Local Elevation of Privilege category
1400: Team Orca of Sea Security (security.sea.com) targeting Ubuntu Desktop in the Local Elevation of Privilege category
1450: Daniel Lim Wee Soong (@daniellimws), Poh Jia Hao (@Chocologicall), Li Jiantao (@CurseRed) & Ngo Wei Lin (@Creastery) of STAR Labs targeting Microsoft Teams in the Enterprise Communications category
1550: Manfred Paul (@_manfp) targeting Apple Safari in the Web Browser category
1650: Keith Yeo (@kyeojy) targeting Ubuntu Desktop in the Local Elevation of Privilege category
1720: Phan Thanh Duy (@PTDuy) and Lê Hữu Quang Linh (@linhlhq) of STAR Labs targeting Microsoft Windows 11 in the Local Elevation of Privilege category
Thursday, May 19, 2022
1000: David BERARD and Vincent DEHORS from @Synacktiv target the Tesla Model 3 Infotainment System (with Sandbox Escape) in the Automotive category
1100: namnp targeting Microsoft Windows 11 in the Local Elevation of Privilege category
1130: Bien Pham (@bienpnn) targeting Ubuntu Desktop in the Local Elevation of Privilege category
1300: @Jedar_LZ targeting the Tesla Model 3 Diagnostic Ethernet (with Root Persistence) in the Automotive category
1400: T0 targeting Microsoft Windows 11 in the Local Elevation of Privilege category
1430: TUTELARY from Northwestern University targeting Ubuntu Desktop in the Local Elevation of Privilege category
Friday, May 20, 2022
1000: Team DoubleDragon: Yonghwi Jin (@jinmo123) of Theori, and Yongjin Kim (@adm1nkyj1) of Enki targeting Microsoft Teams in the Enterprise Communications category
1030: nghiadt12 from Viettel Cyber Security targeting Microsoft Windows 11 in the Local Elevation of Privilege category
1100: Billy Jheng Bing-Jhong (@st424204) of STAR Labs targeting Ubuntu Desktop in the Local Elevation of Privilege category
1300: vinhthp1712 targeting Microsoft Windows 11 in the Local Elevation of Privilege category
1330: Bruno PUJOS (@brunopujos) from REverse Tactics targeting Microsoft Windows 11 in the Local Elevation of Privilege category
1520: Award Ceremony
Article Link: Zero Day Initiative — Pwn2Own Vancouver 2022 - The Schedule