Advertisement Β· 728 Γ— 90

Posts by Neodyme

The correct CVE is: CVE-2024-4762

3 weeks ago 0 0 0 0
Preview
Lenovo DCC: Part 2 - Trusted IPC and a Malicious Firmware Update The [Lenovo Display Control Center](https://support.lenovo.com/de/de/downloads/ds547223-lenovo-display-control-center-thinkcolor), commonly deployed in Windows enterprise environments, could be used f...

New blog post 🚨

We're diving deeper into a privilege escalation issue (CVE-2024-476) in Lenovo Display Control Center used across Windows enterprise environments.

πŸ‘‰ Read the full breakdown: neodyme.io/en/blog/leno...

3 weeks ago 0 0 1 0
Preview
Drone Hacking Part 1: Dumping Firmware and Bruteforcing ECC Desoldering a drone's flash chip and reconstructing the firmware from broken data.

Drones are hot - their security is not.
Here is how removed the NAND, dumped firmware, and reverse-engineered ECC on a consumer drone. Stay tuned for part 2!
neodyme.io/de/blog/dron...

3 months ago 2 2 0 1

Thanks to @thezdi.bsky.social for hosting yet another well-run and inspiring Pwn2Own edition!

5 months ago 3 0 0 0
Post image Post image

Another amazing #Pwn2Own in the books! πŸ’ͺ
Our team pulled off some great hacks:
πŸ–¨οΈ HP Printer β€” $20K / 2 MoP
🏠 Home Assistant β€” $15K / 3 MoP
πŸ”Œ Smart Plug β€” $20K / 2 MoP
πŸ“Έ Canon β€” $10K / 2 MoP
Total: $65K / 9 MoP
So proud of what we achieved together! 🧠⚑

5 months ago 1 1 1 0
Post image Post image

Verified! Team @neodyme.io used a single integer overflow to exploit the Canon imageCLASS MF654Cdw. Their unique bugs earns them $10,000 for the 8th round win and 2 Master of Pwn points. #Pwn2Own

5 months ago 1 1 0 0
Preview
Diving into the depths of Widevine L3 This post explores various approaches to attacking Widevine L3, a DRM system commonly used by streaming services. We analyzed the Android library and instrumented it dynamically to extract the keybox ...

Check out our new blog post on a research-driven look at software-only DRM. Explore how the Qiling emulation framework can be used to analyze Widevine and how Differential Fault Analysis (DFA) and emulation aid de-obfuscation.
▢️ Read more: neodyme.io/en/blog/wide...

5 months ago 3 0 0 1

πŸ–¨οΈ Print victory! Team @neodyme.io just hacked the Canon imageCLASS MF654Cdw at #Pwn2Own. They head off to the disclosure room once more to provide the details of their exploit. #P2OIreland

5 months ago 5 2 0 0
Post image

Confirmed! Team @neodyme.io used three bugs to exploit the Amazon Smart plug. In doing so, they earn themselves $20,000 and 2 Master of Pwn points. #Pwn2Own

5 months ago 1 1 0 0
Advertisement

Success! We had a little configuration confusion, but Team Neodyme hopped for joy as their exploit of the Amazon Smart Plug was successful. Their attack went over Bluetooth & WiFI, so they used the RF enclosure. They head off to the disclosure room with details. #Pwn2Own

5 months ago 1 1 0 0
From Pwn2Own Ireland 2025: NEODYME VS HP
From Pwn2Own Ireland 2025: NEODYME VS HP YouTube video by Trend Zero Day Initiative

Shout-out to our colleagues at #Pwn2Own in Cork: www.youtube.com/watch?v=e20D...

5 months ago 0 0 0 0
Post image Post image

πŸ“’ Confirmed: Team Neodyme used 2 bugs to exploit the Home Assistant Green, but only 1 was unique. They still earn $15,000 and 3 Master of Pwn points. #Pwn2Own

5 months ago 2 1 0 0

🏠 Well that was quick. Team Neodyme needed only one second to demonstrate their exploit of the Home Automation Green. We know they took their time creating the exploit, but wasted no time showing it off. The head off to the disclosure room to dish the deets. #Pwn2Own

5 months ago 1 1 0 0
Preview
Pwn2Own Ireland 2024: QNAP Qhora-322 In 2024, we competed as team Neodyme in the Pwn2Own Ireland contest, targeting the "SOHO Smashup" category and all available printers. For our entry, we focused on the QNAP QHora-322 router, successfu...

While our colleagues hack live at #Pwn2Own in Cork, take a look at our newly published last year's writeup on our blog: We compromised a QNAP router to take over a networked Canon printer.
▢️ Read the findings and how we got there: neodyme.io/en/blog/pwn2...

5 months ago 0 0 0 0
Post image

Our first confirmation of #Pwn2Own Ireland is in! Team Neodyme used a stack based buffer overflow to exploit the HP DeskJet 2855e. They earn $20,000 and 2 Master of Pwn points. #P2OIreland

5 months ago 3 1 0 0
Agenda Agenda - Hack.lu and CTI summit 2025

Heading to #hack_lu? πŸ”
Our colleague Felipe will discuss how partial emulation and DFA can be used to study a legacy version of Widevine L3, Google's software-based DRM.
➑️ Dive into the past to strengthen future DRM security.

πŸ—“οΈ Oct 23 at 2:15pm
2025.hack.lu/agenda/

6 months ago 1 0 0 0
Preview
Lenovo DCC: Part 1 - A simple ACL Exploit The Lenovo Display Control Center (DCC), widely deployed in Windows enterprise environments, contained a critical local privilege escalation vulnerability enabling unauthorized elevation to administra...

⚑️ Lenovo DCC contained an easy-to-exploit LPE: a weak ACL bug β†’ local privilege escalation β†’ full admin πŸ–₯οΈπŸ‘¨β€πŸ’»
We break it down with reverse engineering, process tracing, & two exploit strategies. Read Part 1 of our deep dive: πŸ‘‰ neodyme.io/de/blog/leno...

6 months ago 0 0 0 0
Preview
Building Our Own Post-Quantum FIDO Token We have built our own FIDO2 token based on post-quantum crypto. Here is how.

▢️ We built a proof-of-concept post-quantum FIDO authenticator. It's phishing- AND quantum-resistant.
βœ…οΈ Bonus: it even outperforms Google's prototype. πŸ‘€
Full write-up here: neodyme.io/en/blog/pqc-...

7 months ago 1 0 0 0
Post image Post image

β˜€οΈ Teamwork doesn't just happen at the desk. This week, our crew is in Mallorca, building ideas, strengthening bonds, and enjoying some well-deserved sunshine together. 🌴

Great collaboration comes from trust, connection, and a shared good vibe ✨

7 months ago 0 0 0 0
Advertisement
Post image

Back from @blackhatevents.bsky.social & @defcon.bsky.social! πŸŽ‰
Our colleagues delivered insightful trainings on crypto hacking and binary exploitation and got amazing feedback from the crowd πŸ™Œ
Missed it? We offer tailored security trainings for companies too. Just reach out.

8 months ago 0 0 0 0
CVE-2025-6812 β€’ Parallels Client Local Privilege Escalation Vulnerability The AppServer service installed with Parallel Client searches for an OpenSSL config file in an unsecured location, which allowed low privileged users to escalate their privileges.

We reported a vulnerability in Parallels Client via the ZDI last year.
πŸ”₯ The issue (CVE-2025-6812) - now fixed: A privileged service searched for an OpenSSL config file in an unsecured location, enabling LPE.
➑️ Advisory here: neodyme.io/en/advisorie...
β˜‚οΈ Patch your systems!

8 months ago 1 0 0 0
Post image

πŸ”§βœ¨ On our company retreat this week, we're diving into hardware and protocol hacking: fingerprint sensors, smart locks, drones and Bluetooth speakers. A great mix of hands-on research, creative exploration, and team bonding over board games! 🎲

9 months ago 2 1 0 0

🎀At 4pm today at the "Festival der Zukunft", our colleagues dive into:
"Black Hat, White Hat, Cyberwar - Modern Attacks and Defense"

From hacking-as-a-service to cyberwarfare, discover how attacks are evolving and what it means for digital defense.
πŸ•΅οΈβ€β™€οΈ Don't miss it!

9 months ago 2 0 0 0
Preview
Did You Train on My Voice? Exploring Privacy Risks in ASR This post explores a recent research paper on membership inference attacks targeting Automatic Speech Recognition (ASR) models. It breaks down how subtle signals like input perturbation and model loss...

Think your speech model is secure?
It might be quietly leaking what it was trained on.

In a new blog post, we explain membership inference attacks and why they matter for cyber security experts.
πŸ”— neodyme.io/en/blog/memb...

9 months ago 5 2 0 0
Post image Post image

Meet our colleagues at the "Festival der Zukunft" at Deutsches Museum in Munich. Don't miss our talk on July 3 at 4pm!
Check it out here: www.1e9.community/festival-der...

9 months ago 1 0 0 0
Preview
Your router might be a security nightmare: Tales from Pwn2Own Toronto 2022 Three years ago, Neodyme took aim the "SOHO Smashup" category at Pwn2Own Toronto 2022, targeting a Netgear RAX30 router and an HP M479fdw printer. We successfully gained remote code execution on both ...

πŸ† Throwback to #Pwn2Own Toronto 2022: "Routers are just Linux boxes with antennas." So we treated one like it. At #Pwn2Own 2022, we turned a Netgear RAX30 into a stepping stone for a full LAN pivot. Story: neodyme.io/en/blog/pwn2...

10 months ago 5 1 0 0
Preview
Riverguard: Mutation Rules for Finding Vulnerabilities Riverguard, the first line of defense for all Solana contracts

Part 3 of our Riverguard series is out!
We're looking under the hood at the "fuzzcases" Riverguard uses to catch real-world bugs in Solana smart contracts.
Still shocked how often some of these pop up.
Check it out πŸ‘‰ neodyme.io/en/blog/rive...

10 months ago 1 0 0 0
Advertisement
Post image

Once again this year, a few colleagues couldn’t resist jumping into the HTB CTF to take on experts from around the world. πŸ’»
A great challenge with a wide range of categories.
The result: 1st place in πŸ‡©πŸ‡ͺ and top 3 in πŸ‡ͺπŸ‡Ί.

10 months ago 0 0 0 0
Preview
Pwn2Own Ireland 2024: Canon imageCLASS MF656Cdw This blogpost starts a series about various exploits at Pwn2Own 2024 Ireland (Cork). This and the upcoming posts will detail our research methodology and journey in exploiting different devices. We st...

At #Pwn2Own Ireland 2024, we successfully targeted the SOHO Smashup category. πŸ–¨οΈ
Starting with a QNAP QHora-322 NAS, we pivoted to the Canon imageCLASS MF656Cdw - and ended up with shellcode execution.
Read the full vulnerability deep dive here πŸ‘‰ neodyme.io/en/blog/pwn2...

10 months ago 3 2 0 0
Post image

Day 2 at OffensiveCon has just started and our colleagues Kolja Grassmann and Alain RΓΆdel are right in the middle of it! πŸ”₯
Can't wait to hear the insights they bring back from some of the sharpest minds in offensive security. If you're there too, make sure to say hi!

11 months ago 1 0 0 0