Welcome to Pwn2Own 2017 the tenth anniversary of the competition and our largest Pwn2Own ever.This is also our largest contest ever with over $1,000,000 USD up for the taking and continuing what we started last year, we’ll crown a “Master of Pwn” as the overall winner on Day Three.
As we do every year, the competition order was decided by random drawing in the contest room on the first day of the competition. This year’s event features 11 teams of contestants targeting products across four categories 30 different attempts in total. Each contestant haves three attempts within their allotted timeslot to demonstrate the exploit.
The full schedule for Day One is below (all times PDT). We will update this schedule with results as they become available.
Day One March 15, 201710:00am 360 Security ( @mj011sec ) targeting Adobe Reader
11:30am Samuel Gro ( @5aelo ) and Niklas Baumstark ( _niklasb ) targeting Apple Safari with an escalation to root on macOS
1:00pm Tencent Security Ether Team targeting Microsoft Edge
2:00pm Chaitin Security Research Lab ( @ChaitinTech ) targeting Ubuntu Desktop
3:30pm Tencent Security Ether Team targeting Microsoft windows
5:00pm Ralf-Philipp Weinmann targeting Microsoft Edge with a SYSTEM-level escalation
6:00pm Tencent Security Team Sniper (Keen Lab and PC Mgr) targeting Google Chrome with a SYSTEM-level escalation
7:30pm Tencent Security Team Sniper (Keen Lab and PC Mgr) targeting Adobe Reader
8:30pm Chaitin Security Research Lab ( @ChaitinTech ) targeting Apple Safari with an escalation to root on macOS
10:00pm Richard Zhu (fluorescence) targeting Apple Safari with an escalation to root on macOS
Due to the number of entries, the schedule for Day Two will not be available until after 5:00pm PDT today.