CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership May 15, 2026

Microsoft Edge, Windows 11 and LiteLLM Hacked in Pwn2Own Berlin 2026

Cybersecurity News Archived May 15, 2026 ✓ Full text saved

Pwn2Own Berlin 2026 opened with a surge of zero-day exploits targeting modern browsers, operating systems, and emerging AI platforms. On Day One alone, security researchers successfully hacked Microsoft Edge, Windows 11, and LiteLLM, earning a total of $523,000 for 24 unique vulnerabilities. The results highlight a growing reality that AI ecosystems and core enterprise technologies […] The post Microsoft Edge, Windows 11 and LiteLLM Hacked in Pwn2Own Berlin 2026 appeared first on Cyber Security

Full text archived locally
✦ AI Summary · Claude Sonnet


    HomeCyber Security News Microsoft Edge, Windows 11 and LiteLLM Hacked in Pwn2Own Berlin 2026 By Abinaya May 15, 2026 Pwn2Own Berlin 2026 opened with a surge of zero-day exploits targeting modern browsers, operating systems, and emerging AI platforms. On Day One alone, security researchers successfully hacked Microsoft Edge, Windows 11, and LiteLLM, earning a total of $523,000 for 24 unique vulnerabilities. The results highlight a growing reality that AI ecosystems and core enterprise technologies are increasingly exposed to complex, chained attacks. Edge Sandbox Escape One of the most impactful demonstrations came from Orange Tsai of the DEVCORE Research Team, who executed a sophisticated sandbox escape against Microsoft Edge. The exploit chained four distinct logic vulnerabilities, turning minor flaws into a full system compromise. Microsoft Edge Exploited (Source: Zero Day Initiative) This advanced technique earned $175,000 and 17.5 Master of Pwn points, placing DEVCORE in the lead. The attack underscores how modern browser security can still be bypassed when multiple weaknesses are combined strategically. Windows 11 Privilege Escalations Microsoft Windows 11 emerged as another major target, with several successful privilege escalation attacks throughout the day. Windows 11 Exploited (Source: Zero Day Initiative) Additional researchers later demonstrated attacks using heap-based buffer overflows and use-after-free vulnerabilities. Angelboy and TwinkleStar03 of DEVCORE exploited an improper access control flaw to gain elevated privileges. Another Windows 11 Exploited (Source: Zero Day Initiative) These repeated compromises show that even mature operating systems remain vulnerable to memory corruption and access control issues. LiteLLM Exploited AI infrastructure faced serious scrutiny, with LiteLLM falling to a full-chain exploit by researcher k3vg3n. The attack combined three vulnerabilities, including Server-Side Request Forgery (SSRF) and code injection, allowing full system takeover. LiteLLM Exploited (Source: Zero Day Initiative) The exploit earned $40,000 and highlighted how AI frameworks, especially those handling external inputs and APIs, can introduce critical security gaps if not properly hardened. AI and Developer Tools Under Pressure Other AI-focused targets also experienced successful compromises. OpenAI Codex was exploited using a CWE-150 flaw by Compass Security researchers. NVIDIA’s Megatron Bridge was breached multiple times due to overly permissive allow lists and path-traversal vulnerabilities. NVIDIA Exploited (Source: Zero Day Initiative) Meanwhile, IBM X-Force researchers successfully exploited a single bug in the NV Container Toolkit. These findings reinforce concerns that AI and developer tooling ecosystems are still maturing in terms of secure design and threat resilience. Not every attempt succeeded. Several researchers failed to exploit targets such as OpenAI Codex and Oracle Autonomous AI Database within the time limit. Additionally, multiple “collision” cases were recorded, where working exploits relied on previously known vulnerabilities. Linux Exploited (Source: Zero Day Initiative) While still rewarded, these cases highlight a persistent issue: organizations failing to promptly patch known security flaws. According to Zero Day Initiative, Day One results from Pwn2Own Berlin 2026 reveal a major shift in the threat landscape. Attackers are no longer focused solely on traditional software but are actively targeting AI platforms, inference engines, and developer tools. With DEVCORE leading the competition and more high-value targets ahead, the event is expected to uncover even deeper vulnerabilities in the coming days, offering a stark warning to vendors and enterprises alike. Follow us on Google News, LinkedIn, and X to Get More Instant Updates. Tags cyber security cyber security news Copy URL Linkedin Twitter ReddIt Telegram Abinayahttps://cybersecuritynews.com/ Abi is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space. Trending News Crimenetwork Takedown Exposes 22,000 Users and Over 100 Illegal Sellers Google Warns of Hackers Using AI to Create Working Zero-Day Exploit Microsoft Warns of Attackers Using Trusted HPE Operations Agent for Malware-Free Intrusions Hackers Abuse Scheduled Tasks to Maintain Persistence in FrostyNeighbor Attacks 10 Best Full Disk Encryption Tools in 2026 Latest News Cyber Security News Microsoft Warns of Attackers Using Trusted HPE Operations Agent for Malware-Free Intrusions Cyber Security News Tycoon 2FA Operators Adopt OAuth Device Code Phishing to Bypass MFA Cyber Security News PraisonAI Vulnerability Exploited Within Hours of Public Disclosure Cyber Security News Amazon Redshift JDBC Driver Vulnerabilities Enables Remote Code Execution Attacks Cyber Security News Multiple cPanel Vulnerabilities Allows Access to Sensitive System Resources
    💬 Team Notes
    Article Info
    Source
    Cybersecurity News
    Category
    ◇ Industry News & Leadership
    Published
    May 15, 2026
    Archived
    May 15, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗