Samsung Galaxy S22 was hacked in just 55 seconds during Pwn2Own Day 3.

Pwn2Own’s third day saw contestants hack the Samsung Galaxy S22 for the fourth time, this time in 55 seconds.

After demonstrating a zero-day vulnerability in a Successful Improper Input Validation Attack against Samsung’s flagship phone, Pentest Limited security researchers from penetration testing provider Pentest pulled it off

They were awarded $25,000 and 50% respectively. This was also the fourth time that the Galaxy S22 had been hacked in the Pwn2Own Toronto contest 2022.

Tri Dang of Qrious Secure and Toan Phham from Qrious Secure tried to bypass the security features on the smartphone, but within the allotted time.

The saw the STAR Labs and a security researcher known only as Chim demonstrate two more zero-day exploits that were used in successful attacks against the Galaxy S22.

According to the , all the cases involved smartphones running Android OS version 5.0 with all updates.

Pentest Limited to the Samsung Galaxy S22 (ZDI).

Pwn2Own Toronto’s third day was concluded with Trend Micro’s Zero Day Initiative, which awarded $253,500 to 14 bugs from multiple categories.

Throughout the day contestants demonstrated exploits that targeted zero-day vulnerabilities in routers and smart speakers and printers and Network Attached Storage devices (NAS) from Cisco, NETGEAR and Canon.

According to Dustin Childs, Head of Threat Awareness at ZDI, this brings the total awarded to Pwn2Own for 60 zero-days, which is $934,750.

After 26 contestants registered to exploit the 66 targets and four teams, Pwn2Own Toronto 2022’s consumer-focused hacking contest has been extended for an additional day. It takes place from December 6th through December 8th.

Here The complete contest schedule as well as the schedule for day three are available.

The fourth day will see contestants demonstrate new zero-days across multiple categories of consumer devices, such as printers and wireless routers.

[embedded content]