A View of Upcoming Threat Coverage from Pwn2Own 2018

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Wed, 14 Mar 2018 21:18:38 +0000

This blog will be updated throughout the competition so keep tracking for the latest updates on upcoming threat coverage!

St. Patrick’s Day is coming up later this week, but the contestants at Pwn2Own 2018 will need more than luck on their side. They will need to dive into their expert hacking skills in the hopes of winning cash and prizes. We are in Vancouver for the Pwn2Own competition and excited to welcome Microsoft as a partner and VMware as a sponsor. This year, we have seven entries from five contestants targeting products across two of the categories. There were additional entries, but they were forced to withdraw from the competition for a number of reasons.

We have team members from Trend Micro Research (which includes the Zero Day Initiative team) onsite as usual, meeting with each of the contestants and dissecting the code and exploits in order to provide zero-day protection for Trend Micro customers. We never know what will happen when we arrive at the contest. Whether or not Pwn2Own falls near or right after a Microsoft Patch Tuesday, many vendors will make it a point to issue patches ahead of the contest. So, for example, if a contestant happens to be working on a Microsoft vulnerability, their entry could be thwarted by Microsoft’s updates. A couple of the entries that were withdrawn this year fell “victim” to vendors issuing patches. For those contestants who remain in the contest, they have three attempts within their allotted 30-minute timeslot to demonstrate their exploit.

At the end of it all, Pwn2Own helps us make the cyber world safer by working with any affected vendors to make sure they have the vulnerability and exploit information they need to issue a patch. In turn, we will provide protection for our customers until the affected vendors can build and release a patch, and maintenance windows can be scheduled for impacted systems to be remedied.

Keep following this post for updates on our upcoming Digital Vaccine coverage for the vulnerabilities discovered during Pwn2Own 2018! You can also get up to the minute coverage of the Pwn2Own contest by following the Zero Day Initiative on Twitter at @thezdi.

Upcoming coverage for the vulnerabilities discovered at Pwn2Own is listed below. Any items listed in the Upcoming Digital Vaccine Coverage column with an asterisk (*) are vulnerabilities that can only be exploited at a local level.

Day 1: March 14, 2018

 

Time (PDT)TeamTargetSuccessful?Upcoming Digital Vaccine Coverage?
10:00amRichard Zhu (fluorescence)Apple Safari with a sandbox escapeNoYes

ZDI-CAN-5812

ZDI-CAN-5813*

12:00pmRichard Zhu (fluorescence)Microsoft Edge with a Windows kernel Escalation of PrivilegeYesYes

ZDI-CAN-5814

ZDI-CAN-5815

ZDI-CAN-5816*

2:00pmNiklas Baumstark (_niklasb)Oracle VirtualBox Partial Win ZDI-CAN-5817*
ZDI-CAN-5818*
4:00pmSamuel Groß (saelo)Apple Safari with a macOS kernel Escalation of Privilege

The post A View of Upcoming Threat Coverage from Pwn2Own 2018 appeared first on .

http://feeds.trendmicro.com/TrendMicroSimplySecurity