Zero to Hero: Revolutionizing Automotive Cybersecurity With the Best Zero-Day Threat Intelligence

January 29, 2024
VicOne
Zero to Hero: Revolutionizing Automotive Cybersecurity With the Best Zero-Day Threat Intelligence

By Ling Cheng (Senior Product Marketing Manager) 

What is threat intelligence, and why is it so crucial? Let’s break it down with an example. Picture a company that manages a significant volume of sensitive customer data using a specific operating system. Suddenly, a new strain of malware emerges, specifically targeting vulnerabilities in the company’s chosen system. Complicating matters, this vulnerability hasn’t received widespread attention or made its way into common vulnerability databases. As a result, the company is left exposed and “unaware” of the potential threat. 

In situations like this, having access to threat intelligence becomes vital. It provides the company with an opportunity to proactively strengthen its defense mechanisms. Alternatively, in the event of an attack, it facilitates a rapid incident response, effectively minimizing the potential risks associated with data breaches, system disruptions, or other security incidents. Thus, threat intelligence acts as a critical informant, offering valuable insights for organizations to respond promptly and effectively to the constantly evolving landscape of cyberthreats.  

This demand is progressively catching the attention of the automotive industry. Currently, prevalent forms of automotive threat intelligence originate from the following data sources: 

  • Known vulnerabilities: National Vulnerability Database (NVD), Japan Vulnerability Notes (JVN), Project Zero, MITRE CWE, bug reports, etc.  
  • Open-source intelligence: automotive cybersecurity news, forums, social media, researchers’ public blogs/posts, code-sharing websites, etc. 
  • Deep web crawling: private social media groups, private forums, etc. 
  • Dark web crawling: malicious paste sites, closed hacking forums, illegal marketplaces, etc. 
  • Anti-cybercrime groups: collaborations with Interpol or the FBI. 
  • Automotive security community: information from groups such as Automotive Security Research Group (ASRG), Automotive Information Sharing and Analysis Center (Auto-ISAC), and Open-Source Security Foundation (OpenSSF). 

The missing piece 

There’s an important element that should be included in automotive threat intelligence: zero-day vulnerabilities. These refer to flaws in software, firmware, or hardware that are unknown to and thus are unpatched by the affected vendors. In most cases, even if threat researchers have disclosed the issues, the official fixes will remain unavailable for weeks or months.  

A zero-day vulnerability is alarming for two main reasons: First, there is currently no solution, and second, it has already been verified as exploitable. For example, two zero-day vulnerabilities were uncovered by Synacktiv at Pwn2Own Vancouver 2023, posing a threat that could enable malicious actors to remotely control a Tesla vehicle. The entire process unfolded in about four minutes. 

It’s no wonder that not only do zero-day vulnerabilities command substantial rewards in legitimate bug bounty programs but they’re also highly coveted in underground markets.

Figure 1. VicOne, backed by complete automotive threat intelligence

Figure 1. VicOne, backed by complete automotive threat intelligence

In response to this growing challenge, VicOne collaborated with Trend Micro’s Zero Day Initiative (ZDI), known for its industry integrity and leadership position in vulnerability disclosure since 2007, to host the first-ever Pwn2Own Automotive. This competition, specifically designed for the automotive industry, aims to uncover hidden, hard-to-detect zero-day vulnerabilities in connected cars. 

After three days of competition, VicOne and the ZDI concluded the inaugural edition of Pwn2Own Automotive with the discovery of 49 unique zero-day vulnerabilities. These included vulnerabilities that enabled the NCC Group EDG team to play the popular first-person shooter game Doom on an in-vehicle infotainment (IVI) system. They also included ones that enabled the Synacktiv team to execute successful attacks on the Tesla modem and the Tesla IVI system, ultimately earning them the title of Master of Pwn as the overall winner of the competition.

Protection beyond others’: Unmatched zero-day vulnerability threat intelligence

Thanks to the ZDI’s well-established vulnerability management process developed over the past decade, any zero-day vulnerabilities discovered during Pwn2Own Automotive are duly reported to the respective vendors. The ZDI team can collaborate with these vendors to develop effective patches. As a valued partner, VicOne gains early access to all new vulnerabilities and attack scenarios through the Pwn2Own Automotive event. This collaborative effort allows us to work closely with both vendors and the ZDI team, contributing our expertise in automotive cybersecurity. Together, we work to prepare virtual patches, ensuring that a proactive defense is in place before the official vendor patch release.

Figure 2. The vulnerability management process

Figure 2. The vulnerability management process

One and only: Detection of zero-day vulnerabilities in ECU software package

In collaboration with the ZDI and through strategic initiatives like Pwn2Own Automotive, our mission to explore zero-day vulnerabilities not only adds extra vulnerability intelligence to our automotive threat intelligence but also enables us to collectively safeguard our customers. With VicOne’s superior vulnerability and software bill of materials (SBOM) management system, xZETA, our customers can proactively identify zero-day vulnerabilities in the firmware or binary of their electronic control units (ECUs). This enables product security incident response teams (PSIRTs) or engineering teams to receive early warnings, facilitating early assessments. Once a zero-day vulnerability is publicly disclosed, virtual patching is ready. This empowers customers to harness our unique virtual patching technology for effective mitigation before vendor patch release.

Figure 3. VicOne’s xZETA covers zero-day vulnerability intelligence from the ZDI and strategic initiatives like Pwn2Own Automotive.

Figure 3. VicOnes xZETA covers zero-day vulnerability intelligence from the ZDI and strategic initiatives like Pwn2Own Automotive.

Earliest cyberattack detection

Our unique automotive threat intelligence also benefits the VSOC team. After accessing this threat intelligence, our automotive threat experts can analyze suspicious behaviors and map them to tactics, techniques, and procedures (TTPs) outlined in Automotive Attack Mapping (inspired by MITRE ATT&CK®). This process aids in creating corresponding threat expert rules, empowering our xNexus next-gen VSOC platform to detect similar attacks. With one click, the VSOC team can gain quick insights into real-world incidents, evaluating whether the systems in use might be susceptible to exploitable zero-day vulnerabilities. The VSOC team can access detailed information on important factors such as attack vectors, paths, and TTPs for comprehensive automotive cybersecurity insights.    

Our achievement is underscored by our recent recognition as the winner of the Best Threat Intelligence Technology award at the SC Awards Europe 2023. Judges have lauded VicOne as a “great automotive solution.”

As the threat landscape undergoes continuous changes, the significance of VicOne’s automotive threat intelligence only escalates. With the strong backing of the ZDI and initiatives like Pwn2Own Automotive, VicOne is dedicated to providing organizations with only the best automotive threat intelligence necessary to safeguard their systems against cyberattacks. 

Our News and Views

Gain Insights Into Automotive Cybersecurity

  • From On-board AI to Physical AI: Why Automotive Cyber Risk Has Entered a New Era
    Blog
    January 30, 2026
    Modern vehicles are now Physical AI systems, where probabilistic decisions control real-world actions and raise new safety and cyber risks. Securing them requires AI-aware threat modeling, lifecycle governance, and continuous assurance to keep systems safe.
    Read More
  • Pwn2Own Automotive 2026 Day 3: New Master of Pwn Announced and Other Highlights
    Blog
    January 26, 2026
    Pwn2Own Automotive 2026 set a new record with 76 unique zero-day vulnerabilities discovered, exposing the rapidly expanding attack surface across SDVs, IVI systems, and EV charging infrastructure. The final day crowned Fuzzware.io as Master of Pwn 2026, with 28 Master of Pwn points.
    Read More
  • Pwn2Own Automotive 2026 Day 2: EV Chargers Hit Full Throttle
    Blog
    January 23, 2026
    Day 2 delivered 29 new zero-days, pushing the total to a record 66. Researchers repeatedly compromised Level 2/3 EV chargers and IVI systems using practical flaws like exposed interfaces and command injection. The takeaway: automotive and charging infrastructure attacks are now repeatable at scale—shifting cyber risk from theoretical to immediate operational impact.
    Read More
  • Pwn2Own Automotive 2026: Uncovering 37 Unique Zero-Days
    Blog
    January 22, 2026
    Pwn2Own Automotive 2026 Day 1 opened with record-breaking momentum, with researchers successfully compromising infotainment systems, EV chargers, and Tesla interfaces—highlighting how expansive today’s automotive attack surface has become. The surge in entries and chained exploits confirms a clear shift: in the SDV era, automotive cyber risk is no longer isolated to the vehicle, but systemic across the entire ecosystem.
    Read More
Visit Our Blog

Accelerate Your Automotive Cybersecurity Journey Today

Contact Us