Microsoft came up the big winner in this year’s Pwnie Awards, but for all the wrong reasons.
From the PrintNightmare patching hiccups to the Exchange Server flaws to the NSA finding and disclosing a major bug in the Windows cryptography core, Microsoft’s security foibles highlighted the annual event that recognizes excellence and mocks incompetence in cybersecurity.
The worst of the awards — Most Epic Fail — went to Microsoft for its handling of the PrintNightmare Print Spooler vulnerability, a bug that led to a problematic patch and more questions about potentially vulnerable code.
The Pwnies description sums up the dubious victory:
Microsoft tried to fix it but failed. Then tried again to fix it but failed. They’re hopefully still trying. 2 patches, and it’s still kicking! It goes without saying that Microsoft identified CVE-2021-34527 as LPE; a little willpower and Twitter drama made it RCE. Microsoft came up with another patch (out-of-band) that doesn’t fix the RCE vector properly and doesn’t even try to fix the LPE anymore.
Microsoft’s buggy code also led to two additional wins, including one to unnamed researchers in the U.S. National Security Agency (NSA) for the discovery of a flaw in the verification of signatures in Windows.
[ Black Hat: New CISA Boss Introducers Herself to Hacker Community ]
The flaw — CVE-2020-0601 — completely broke the certificate trust chain and led to a major advisory from the intelligence agency.
Separately, the discovery of security defects in Microsoft Exchange Server led to a major acknowledgment for Orange Tsai, principal researcher at DEVCORE.
Orange Tsai’s work documenting entirely new attack surfaces on Exchange Server installations won the Pwnie Award for the Best Server-Side Bug, a project that pinpointed at least seven new vulnerabilities that expose businesses to remote attacks.
The Pwnies also recognized security industry pioneer and IDA creator Ilfak Guilfanov for 30 years of contributions to reverse engineering.
“Ilfak’s impact in vulnerability research should be obvious. IDA and Hex-Rays have had an epic impact on the security landscape and the thirty year history of driving the field forward is unprecedented.”
Here are the full descriptions of all the Pwnie winners.
Related: Windows Admins Scrambling to Contain ‘PrintNightmare’ Flaw
Related: Microsoft Ships Emergency PrintNightmare Patch
Related: Microsoft Patch Tuesday: 83 Vulnerabilities, 10 Critical, 1 Actively Exploited

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.
More from Ryan Naraine
- VMware Plugs Critical Flaws in Network Monitoring Product
- Keep Aware Raises $2.4M to Eliminate Browser Blind Spots
- OpenAI Unveils Million-Dollar Cybersecurity Grant Program
- Galvanick Banks $10 Million for Industrial XDR Technology
- Microsoft Catches Chinese .Gov Hackers Targeting US Critical Infrastructure
- Researchers Spot APTs Targeting Small Business MSPs
- Mikrotik Belatedly Patches RouterOS Flaw Exploited at Pwn2Own
- Red Hat Pushes New Tools to Secure Software Supply Chain
Latest News
- Cisco Patches Critical Vulnerability in Enterprise Collaboration Solutions
- Barracuda Urges Customers to Replace Hacked Email Security Appliances
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
- BBC, British Airways, Novia Scotia Among First Big-Name Victims in Global Supply-Chain Hack
- Sysdig Introduces CNAPP With Realtime CDR
- Stay Focused on What’s Important
- VMware Plugs Critical Flaws in Network Monitoring Product
- Google Patches Third Chrome Zero-Day of 2023
