{"id":28593,"date":"2019-08-21T19:31:48","date_gmt":"2019-08-21T19:31:48","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/30423\/Researcher-Publishes-Second-Steam-Zero-Day.html"},"modified":"2019-08-21T19:31:48","modified_gmt":"2019-08-21T19:31:48","slug":"researcher-publishes-second-steam-zero-day","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/","title":{"rendered":"Researcher Publishes Second Steam Zero Day"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2018\/11\/08\/ca0bf9b4-d91d-4d6f-9e15-cf6eefc92c42\/7844a0473607ee3fcfc61d0d07970245\/steam.png\" class alt=\"steam.png\"><\/span><\/p>\n<p>A Russian security researcher has published details about a zero-day in the Steam gaming client. This is the second Steam zero-day the researcher has made public in the past two weeks.<\/p>\n<p>However, while the security researcher reported the first one to Valve and tried to have it fixed before public disclosure, he said he couldn&#8217;t do the same with the second because the company banned him from submitting further bug reports via its public bug bounty program on the HackerOne platform.<\/p>\n<h3>Valve gets criticized<\/h3>\n<p>The entire chain of events behind the public disclosure of these two zero-days has caused quite a drama and discussions in the infosec community.<\/p>\n<p>All the negative comments have been aimed at Valve and the HackerOne staff, with both being acused of unprofessional behavior.<\/p>\n<div class=\"twitterContainer\" readability=\"4.8426395939086\">\n<blockquote class=\"twitter-tweet\" readability=\"4.0355329949239\">\n<p lang=\"en\" dir=\"ltr\">i am disappointed that valve does this kinda stuff <a href=\"https:\/\/t.co\/z1JPKJmHhQ\">https:\/\/t.co\/z1JPKJmHhQ<\/a><\/p>\n<p>\u2014 D\u0315\u0312\u0342\u1d48a\u0306\u1d43n\u0315\u1db0 T\u030c\u0360\u033e\u033e\u0313\u0350\u0352\u1d57e\u0357\u0311\u0361\u0341\u030b\u0302\u0341\u1d49n\u0305\u1db0t\u1d57l\u0340\u0313\u0358\u1dabe\u0343\u0312\u0302\u031a\u1d49r\u02b3 (@Viss) <a href=\"https:\/\/twitter.com\/Viss\/status\/1164055856230440960?ref_src=twsrc%5Etfw\">August 21, 2019<\/a><\/p><\/blockquote>\n<\/div>\n<p>Security researchers and regular Steam users alike are mad because Valve refused to acknowledge the reported issue as a security flaw, and declined to patch it.<\/p>\n<p>When the security researcher &#8212; named Vasily Kravets&#8211; wanted to publicly disclose the vulnerability, a HackerOne staff member forbade him from doing so, even if Valve had no intention of fixing the issue &#8212; effectively trying to prevent the researcher from letting users know there was a problem with the Steam client at all.<\/p>\n<p>Kravets did eventually publish <a href=\"https:\/\/amonitoring.ru\/article\/steamclient-0day\/\" target=\"_blank\" rel=\"noopener noreferrer\">details about the Steam zero-day<\/a>, which was an elevation of privilege (also known as a local privilege escalation) bug that allowed other apps or malware on a user&#8217;s computer to abuse the Steam client to run code with admin rights.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>Kravets said he was banned from the platform following the public disclosure of the first zero-day. His bug report was heavily covered in the media, and Valve did eventually ship a fix, more as a reaction to all the bad press the company was getting.<\/p>\n<p>The patch was almost immediatelly proved to be insufficient, and another security researcher found an easy way to go around it almost right away.<\/p>\n<h3>Valve bungled the same bug report twice<\/h3>\n<p>Furthermore, a well-known and highly respected security researcher named Matt Nelson also revealed he found the same exact bug, but after Kravets, which he too reported to Valve&#8217;s HackerOne program, only to go through a similar bad experience as Kravets.<\/p>\n<p>Nelson said Valve and HackerOne took five days to acknowledge the bug, refused to patch it, and then locked the bug report when Nelson wanted to disclose the bug publicly and warn users.<\/p>\n<p>Nelson later released proof-of-concept code for the first Steam zero-day, and also criticized Valve and HackerOne for their abysmall handling of his bug report.<\/p>\n<div class=\"twitterContainer\" readability=\"5.2635869565217\">\n<blockquote class=\"twitter-tweet\" readability=\"4.8586956521739\">\n<p lang=\"en\" dir=\"ltr\">The company at fault here is Valve (Steam). Good luck reporting anything that doesn\u2019t fit their crappy bounty scope. <a href=\"https:\/\/t.co\/vLHmTQ0qmq\">https:\/\/t.co\/vLHmTQ0qmq<\/a><\/p>\n<p>\u2014 Matt Nelson (@enigma0x3) <a href=\"https:\/\/twitter.com\/enigma0x3\/status\/1148031014171811841?ref_src=twsrc%5Etfw\">July 8, 2019<\/a><\/p><\/blockquote>\n<\/div>\n<div class=\"twitterContainer\" readability=\"6.5765765765766\">\n<blockquote class=\"twitter-tweet\" readability=\"7.015015015015\">\n<p lang=\"en\" dir=\"ltr\">I&#8217;d like to take this Valve fiasco and highlight a few points:<br \/>1. Don&#8217;t scope your program so tightly that it completely removes things like LPE<br \/>2. If you do, give researchers a place to go that isn&#8217;t Twitter.<br \/>3. Don&#8217;t lock an issue when disclosure is mentioned <a href=\"https:\/\/t.co\/lygNLkiUiz\">pic.twitter.com\/lygNLkiUiz<\/a><\/p>\n<p>\u2014 Matt Nelson (@enigma0x3) <a href=\"https:\/\/twitter.com\/enigma0x3\/status\/1160961861560479744?ref_src=twsrc%5Etfw\">August 12, 2019<\/a><\/p><\/blockquote>\n<\/div>\n<h3>Second Steam zero-day disclosed today<\/h3>\n<p>Today, Kravets published details about a second Valve zero-day, which is another EoP\/LPE in the Steam client, allowing malicious apps to gain admin rights through Valve&#8217;s Steam app. Demos of the second Steam zero-day are embedded below, and a technical write-up is available <a href=\"https:\/\/amonitoring.ru\/article\/onemore_steam_eop_0day\/\" target=\"_blank\" rel=\"noopener noreferrer\">on Kravets&#8217; site<\/a>.<\/p>\n<section class=\"shortcode media-source\">\n<p><iframe loading=\"lazy\" width=\"500\" height=\"282\" allowfullscreen title=\"YouTube content\" id=\"iframe_youtube\" src=\"https:\/\/www.youtube.com\/embed\/ZCHrjP0cMew\">[embedded content]<\/iframe><\/p>\n<\/section>\n<section class=\"shortcode media-source\">\n<p><iframe loading=\"lazy\" width=\"500\" height=\"282\" allowfullscreen title=\"YouTube content\" id=\"iframe_youtube\" src=\"https:\/\/www.youtube.com\/embed\/I93aH86BUaE\">[embedded content]<\/iframe><\/p>\n<\/section>\n<p>A Valve spokesperson did not reply to a request for comment, but the company rarely comments on security issues.<\/p>\n<h3>Problem: Valve doesn&#8217;t view EoP\/LPE as security flaws<\/h3>\n<p>All of Valve&#8217;s problems seem to come from the fact that the company has placed EoP\/LPE vulnerabilities as &#8220;out-of-scope&#8221; for its HackerOne platform, meaning the company doesn&#8217;t view them as security issues.<\/p>\n<p>Nelson, a security researcher who has made a name for himself for finding a slew of interesting bugs in Microsoft products, doesn&#8217;t agree with Valve&#8217;s decision.<\/p>\n<div class=\"twitterContainer\" readability=\"5.6682464454976\">\n<blockquote class=\"twitter-tweet\" data-conversation=\"none\" readability=\"5.2322274881517\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/steam_games?ref_src=twsrc%5Etfw\">@steam_games<\/a> that\u2019s not really how that works. You can\u2019t pick and choose what you define as a vulnerability. Your software is breaking the Windows security model.<\/p>\n<p>\u2014 Matt Nelson (@enigma0x3) <a href=\"https:\/\/twitter.com\/enigma0x3\/status\/1161021122739130371?ref_src=twsrc%5Etfw\">August 12, 2019<\/a><\/p><\/blockquote>\n<\/div>\n<p>EoP\/LPE vulnerabilities can&#8217;t allow a threat actor to hack a remote app or computer. They are vulnerabilities abused during post-exploitation, mostly so attackers can take full control over a target by gaining root\/admin\/system rights.<\/p>\n<p>While Valve doesn&#8217;t consider these as security flaws, everyone else does. For example, Microsoft patches tens of EoP\/LPE flaws each month, and OWASP considers EoP\/LPE as <a href=\"https:\/\/www.owasp.org\/index.php\/Top_10-2017_A5-Broken_Access_Control\" target=\"_blank\" rel=\"noopener noreferrer\">the fifth most dangerous security flaw<\/a> in its infamous Top 10 Vulnerabilities list.<\/p>\n<p>By refusing to patch the first zero-day, Valve inadvertantly sent a message out that it doesn&#8217;t care about the security of its product, putting the company&#8217;s 100+ million Windows users in danger just by having the Steam client installed on their computers.<\/p>\n<p>Sure! Valve is right, in its own way. An attacker can&#8217;t use an EoP\/LPE to break into a Steam user&#8217;s client. That&#8217;s a fact. But, that&#8217;s not the point.<\/p>\n<p>When users install the Steam client on their computers, they also don&#8217;t expect the app to be a launching pad for malware or other attacks.<\/p>\n<p>An app and users&#8217; security is more than remote code execution (RCE) bugs. Otherwise, if EoP\/LPE bugs weren&#8217;t a big deal, everyone else wouldn&#8217;t bother patching them either.<\/p>\n<h3>More vulnerability reports:<\/h3>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/30423\/Researcher-Publishes-Second-Steam-Zero-Day.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":28594,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[7530],"class_list":["post-28593","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerflawzero-day"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Researcher Publishes Second Steam Zero Day 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Researcher Publishes Second Steam Zero Day 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-21T19:31:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/researcher-publishes-second-steam-zero-day.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Researcher Publishes Second Steam Zero Day\",\"datePublished\":\"2019-08-21T19:31:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/\"},\"wordCount\":950,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/researcher-publishes-second-steam-zero-day.png\",\"keywords\":[\"headline,hacker,flaw,zero day\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/\",\"name\":\"Researcher Publishes Second Steam Zero Day 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/researcher-publishes-second-steam-zero-day.png\",\"datePublished\":\"2019-08-21T19:31:48+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/researcher-publishes-second-steam-zero-day.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/researcher-publishes-second-steam-zero-day.png\",\"width\":1000,\"height\":425},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,flaw,zero day\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerflawzero-day\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Researcher Publishes Second Steam Zero Day\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Researcher Publishes Second Steam Zero Day 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/","og_locale":"en_US","og_type":"article","og_title":"Researcher Publishes Second Steam Zero Day 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-08-21T19:31:48+00:00","og_image":[{"width":1000,"height":425,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/researcher-publishes-second-steam-zero-day.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Researcher Publishes Second Steam Zero Day","datePublished":"2019-08-21T19:31:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/"},"wordCount":950,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/researcher-publishes-second-steam-zero-day.png","keywords":["headline,hacker,flaw,zero day"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/","url":"https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/","name":"Researcher Publishes Second Steam Zero Day 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/researcher-publishes-second-steam-zero-day.png","datePublished":"2019-08-21T19:31:48+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/researcher-publishes-second-steam-zero-day.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/researcher-publishes-second-steam-zero-day.png","width":1000,"height":425},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/researcher-publishes-second-steam-zero-day\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,flaw,zero day","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerflawzero-day\/"},{"@type":"ListItem","position":3,"name":"Researcher Publishes Second Steam Zero Day"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28593","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=28593"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28593\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/28594"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=28593"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=28593"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=28593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}