Researchers Earn Over $1.2 Million for Exploiting 47 Zero-Days at Pwn2Own Berlin 2026

The Pwn2Own Berlin 2026 hacking contest recently concluded, rewarding security researchers with a total of $1,298,250 for successfully exploiting 47 zero-day vulnerabilities across multiple software targets. The event highlights ongoing efforts to identify and responsibly disclose critical security flaws within widely used technology products.
What happened
During the Pwn2Own Berlin 2026 contest, security researchers demonstrated exploits for 47 previously unknown zero-day vulnerabilities. These exploits targeted a range of software products, allowing the hackers to earn over $1.29 million in total rewards. The contest promotes the discovery of critical security issues under controlled conditions to encourage timely patching by vendors.
Why it matters
The disclosure of this large number of zero-day vulnerabilities underscores the persistent presence of security weaknesses in critical software and the importance of proactive vulnerability research. Events like Pwn2Own help accelerate patch development and distribution by bringing attention to these flaws, ultimately improving the security posture of affected products and their users.
What security teams should do
Security teams are encouraged to stay informed about patches and updates released following Pwn2Own disclosures. Applying vendor-provided security updates promptly will mitigate the risks posed by the identified zero-day vulnerabilities. Organizations should continue monitoring advisories from software vendors and security researchers related to these flaws.
Key technical details
The 47 zero-day exploits confirmed during the contest covered multiple software platforms, though specific technical details and affected products were not detailed in the report. Zero-day vulnerabilities represent unknown flaws that can be used by attackers to gain unauthorized access or compromise systems. The Pwn2Own contest provides a controlled environment where researchers test these exploits and responsibly disclose their findings.
Affected organizations/products
The contest involved a variety of widely used software products, but the exact affected vendors or products were not specified in the source material. The findings from this contest typically lead to important security patches that benefit a broad range of users globally.