Tesla faces critical security challenges as 37 zero-day vulnerabilities revealed at Pwn2Own

Tesla faces critical security challenges as 37 zero-day vulnerabilities revealed at Pwn2Own

At Pwn2Own Automotive 2026 in Tokyo, hackers exploited 37 zero-day vulnerabilities, netting $516,500 on day one. What further flaws will emerge?

NeboAI I summarize the news with data, figures and context
IN 30 SECONDS

IN 1 SENTENCE

SENTIMENT
Neutral

𒀭
NeboAI is working, please wait...
Preparing detailed analysis
Quick summary completed
Extracting data, figures and quotes...
Identifying key players and context
DETAILED ANALYSIS
SHARE

NeboAI produces automated editions of journalistic texts in the form of summaries and analyses. Its experimental results are based on artificial intelligence. As an AI edition, texts may occasionally contain errors, omissions, incorrect data relationships and other unforeseen inaccuracies. We recommend verifying the content.

At the Pwn2Own Automotive 2026 competition in Tokyo, security researchers exploited 37 zero-day vulnerabilities in the Tesla Infotainment System, earning a total of $516,500 on the first day. The Synacktiv Team garnered $35,000 after successfully executing a USB-based attack that yielded root permissions through a combination of an information leak and an out-of-bounds write flaw.

Additionally, teams including Fuzzware.io and PetoWorks also secured substantial awards. Fuzzware.io collected $118,000 for hacking multiple chargers and a navigation receiver, while PetoWorks earned $50,000 for exploiting three vulnerabilities in a charging controller. Team DDOS also made an impact, receiving $72,500 for attacks on various charging stations.

The ongoing event runs from January 21 to January 23, with further challenges planned for the second day. Vendors have a strict 90-day timeline to address the identified vulnerabilities before they are disclosed publicly by TrendMicro's Zero Day Initiative. This year's competition follows the previous event in 2025, where hackers earned $886,250 by exploiting 49 vulnerabilities.

Want to read the full article? Access the original article with all the details.
Read Original Article
TL;DR

This article is an original summary for informational purposes. Image credits and full coverage at the original source. · View Content Policy

Editorial
Editorial Staff

Our editorial team works around the clock to bring you the latest tech news, trends, and insights from the industry. We cover everything from artificial intelligence breakthroughs to startup funding rounds, gadget launches, and cybersecurity threats. Our mission is to keep you informed with accurate, timely, and relevant technology coverage.

Press Enter to search or ESC to close