Vulnerabilities discovered in Tesla cars and major browsers

Vulnerabilities discovered in Tesla cars and major browsers


Trend Micro was announced the result of “Pwn2Own”, an important ethical hacking competition organized by the Zero Day Initiative (ZDI). This year’s edition was held in Vancouver and saw participants discover new weaknesses Windows, Linux, Tesla, Chrome, VMware and in widespread technology.

In the event of a threat, Trend customers can benefit from real-time protection while other companies wait for an official release from the affected vendor.

One of the biggest challenges for organizations in managing cyber risk is addressing the disparity between the amount of threats and the available security resources: in fact, security companies. program and EV manufacturers must identify and prioritize vulnerabilities to address them, resulting in a large number of known but unresolved issues.

The average time to respond to vulnerabilities and create a patch is more than 70 days, but thanks to Zdi’s work, Trend customers are protected immediately.

Below are some important points of Pwn2Own Vancouver 2024:

  • researchers discovered a 29-day vulnerability, collecting $1,132,500 worth of bounties;
  • all major web browsers are affected;
  • the electrical control unit (ECU) of the Tesla Model 3 was hacked by air suction;
  • researchers showed the first ever Docker leak (when an attacker can bypass the container and gain access to the host system).

Zdi collects the results of independent researchers regularly, in Pwn2Own or throughout the year. This activity allows developers program learn about vulnerabilities before cybercriminals exploit them. It also offers a huge advantage to companies in various industries, as vendors respond less and less immediately to the discovery of new vulnerabilities.

“Cyber ​​threats continue to grow but patches are always delayed. This exposes organizations to more cyber risks, which are beyond their control. Security vendors who can identify vulnerabilities early and secure businesses with online patches provide greater value to customers them,” he said. Frank Dickson, Vice President of the Security and Trust Group at Idc.

When a vulnerability is discovered, companies and security vendors must wait for a patch to be released. Awareness and deep understanding of threats, also thanks to Pwn2Own, allows Trend to protect its customers through virtual patches that ensure continuity of protection. On average, ZDI detects and discloses more than 1,000 vulnerabilities per year.

Detecting and mitigating real-world vulnerabilities early helps reduce cyber risk throughout your organization. Security teams, regardless of the size of their company, are increasingly overwhelmed by threats that exceed their capabilities; they are included equipment attack in the officeindustrial equipment, connected cars, electric vehicles and remote workers’ devices, such as smartphones, NAS devices, cameras, printers, routers and personal vehicles.