Microsoft came up the big winner in this year’s Pwnie Awards, but for all the wrong reasons.
From the PrintNightmare patching hiccups to the Exchange Server flaws to the NSA finding and disclosing a major bug in the Windows cryptography core, Microsoft’s security foibles highlighted the annual event that recognizes excellence and mocks incompetence in cybersecurity.
The worst of the awards — Most Epic Fail — went to Microsoft for its handling of the PrintNightmare Print Spooler vulnerability, a bug that led to a problematic patch and more questions about potentially vulnerable code.
The Pwnies description sums up the dubious victory:
Microsoft tried to fix it but failed. Then tried again to fix it but failed. They’re hopefully still trying. 2 patches, and it’s still kicking! It goes without saying that Microsoft identified CVE-2021-34527 as LPE; a little willpower and Twitter drama made it RCE. Microsoft came up with another patch (out-of-band) that doesn’t fix the RCE vector properly and doesn’t even try to fix the LPE anymore.
Microsoft’s buggy code also led to two additional wins, including one to unnamed researchers in the U.S. National Security Agency (NSA) for the discovery of a flaw in the verification of signatures in Windows.
[ Black Hat: New CISA Boss Introducers Herself to Hacker Community ]
The flaw — CVE-2020-0601 — completely broke the certificate trust chain and led to a major advisory from the intelligence agency.
Separately, the discovery of security defects in Microsoft Exchange Server led to a major acknowledgment for Orange Tsai, principal researcher at DEVCORE.
Orange Tsai’s work documenting entirely new attack surfaces on Exchange Server installations won the Pwnie Award for the Best Server-Side Bug, a project that pinpointed at least seven new vulnerabilities that expose businesses to remote attacks.
The Pwnies also recognized security industry pioneer and IDA creator Ilfak Guilfanov for 30 years of contributions to reverse engineering.
“Ilfak’s impact in vulnerability research should be obvious. IDA and Hex-Rays have had an epic impact on the security landscape and the thirty year history of driving the field forward is unprecedented.”
Here are the full descriptions of all the Pwnie winners.
Related: Windows Admins Scrambling to Contain ‘PrintNightmare’ Flaw
Related: Microsoft Ships Emergency PrintNightmare Patch
Related: Microsoft Patch Tuesday: 83 Vulnerabilities, 10 Critical, 1 Actively Exploited

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.
More from Ryan Naraine
- Microsoft Catches Chinese .Gov Hackers Targeting US Critical Infrastructure
- Researchers Spot APTs Targeting Small Business MSPs
- Mikrotik Belatedly Patches RouterOS Flaw Exploited at Pwn2Own
- Red Hat Pushes New Tools to Secure Software Supply Chain
- Investors Make $6M Bet on Manifest for SBOM Management Technology
- Entro Raises $6M to Tackle Secrets Sprawl
- IBM Snaps up DSPM Startup Polar Security
- Huntress Closes $60M Series C for MDR Expansion
Latest News
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Idaho Hospitals Working to Resume Full Operations After Cyberattack
- Enzo Biochem Ransomware Attack Exposes Information of 2.5M Individuals
- Apple Denies Helping US Government Hack Russian iPhones
- Zero-Day in MOVEit File Transfer Software Exploited to Steal Data From Organizations
- Google Temporarily Offering $180,000 for Full Chain Chrome Exploit
