{"id":46735,"date":"2022-05-19T15:47:47","date_gmt":"2022-05-19T15:47:47","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/33467\/2-Vulnerabilities-With-9.8-Severity-Rating-Are-Under-Exploit.-A-3rd-Looms.html"},"modified":"2022-05-19T15:47:47","modified_gmt":"2022-05-19T15:47:47","slug":"2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/","title":{"rendered":"2 Vulnerabilities With 9.8 Severity Rating Are Under Exploit. A 3rd Looms"},"content":{"rendered":"<figure class=\"intro-image intro-left\"> <img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/05\/caution-tape-800x600.jpeg\" alt=\"2 vulnerabilities with 9.8 severity ratings are under exploit. A 3rd looms\"><figcaption class=\"caption\">\n<div class=\"caption-credit\">Getty Images<\/div>\n<\/figcaption><\/figure>\n<aside id=\"social-left\" class=\"social-left\" aria-label=\"Read the comments or share this article\"> <a title=\"39 posters participating, including story author\" class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/information-technology\/2022\/05\/2-vulnerabilities-with-9-8-severity-ratings-are-under-exploit-a-3rd-looms\/?comments=1\"> <\/p>\n<h4 class=\"comment-count-before\">reader comments<\/h4>\n<p> <span class=\"comment-count-number\">52<\/span> <span class=\"visually-hidden\"> with 39 posters participating, including story author<\/span> <\/a> <\/p>\n<div class=\"share-links\">\n<h4>Share this story<\/h4>\n<\/p><\/div>\n<\/aside>\n<p> <!-- cache hit 124:single\/related:a2f7d3afef63e440e8ba0f0b13e238c8 --><!-- empty --><\/p>\n<p>Malicious hackers, some believed to be state-backed, are actively exploiting two unrelated vulnerabilities\u2014both with severity ratings of 9.8 out of a possible 10\u2014in hopes of infecting sensitive enterprise networks with backdoors, botnet software, and other forms of malware.<\/p>\n<p>The ongoing attacks target unpatched versions of multiple product lines from VMware and of BIG-IP software from F5, security researchers said. Both vulnerabilities give attackers the ability to remotely execute malicious code or commands that run with unfettered root system privileges. The largely uncoordinated exploits appear to be malicious, as opposed to benign scans that attempt to identify vulnerable servers and quantify their number.<\/p>\n<h2>First up: VMware<\/h2>\n<p>On April 6, VMware disclosed and patched a remote code execution vulnerability tracked as CVE-2022-22954 and a privilege escalation flaw tracked as CVE-2022-22960. According to an <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-138b\">advisory<\/a> published on Wednesday by the Cybersecurity and Infrastructure Security Agency, \u201cmalicious cyber actors were able to reverse engineer the updates to develop an exploit within 48 hours and quickly began exploiting the disclosed vulnerabilities in unpatched devices.\u201d<\/p>\n<p>CISA said the actors were likely part of an advanced persistent threat, a term for sophisticated and well-financed hacker groups typically backed by a nation-state. Once the hackers have compromised a device, they use their root access to install a webshell known as Dingo J-spy on the networks of at least three organizations.<\/p>\n<p>\u201cAccording to trusted third-party reporting, threat actors may chain these vulnerabilities. At one compromised organization, on or around April 12, 2022, an unauthenticated actor with network access to the web interface leveraged CVE-2022-22954 to execute an arbitrary shell command as a VMware user,\u201d Wednesday\u2019s advisory stated. \u201cThe actor then exploited CVE-2022-22960 to escalate the user\u2019s privileges to root. With root access, the actor could wipe logs, escalate permissions, and move laterally to other systems.\u201d<\/p>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<p>Independent security researcher Troy Mursch said in a direct message that exploits he\u2019s captured in a honeypot have included payloads for botnet software, webshells, and cryptominers. CISA\u2019s advisory came the same day VMware <a href=\"https:\/\/www.vmware.com\/security\/advisories\/VMSA-2022-0014.html\">disclosed and patched<\/a> two new vulnerabilities. One of the vulnerabilities, CVE-2022-22972, also carries a severity rating of\u2014you guessed it\u20149.8. The other one, CVE-2022-22973, is rated 7.8.<\/p>\n<p>Given the exploits already underway for the VMware vulnerabilities fixed last month, CISA said it \u201cexpects malicious cyber actors to quickly develop a capability to exploit newly released vulnerabilities CVE-2022-22972 and CVE-2022-22973 in the same impacted VMware products.<\/p>\n<h2>BIG-IP also under fire<\/h2>\n<p>Meanwhile, enterprise networks are also under attack from hackers exploiting CVE-2022-1388, an unrelated vulnerability with a 9.8 severity rating found in BIG-IP, a software package from F5. Nine days ago, the company disclosed and patched the vulnerability, which hackers can exploit to execute commands that run with root system privileges. The scope and magnitude of the vulnerability prompted marvel and shock in some security circles and earned it a high severity rating.<\/p>\n<p>Within a few days, exploit code became publicly available and almost immediately after that, researchers reported \u200b\u200b<a href=\"https:\/\/arstechnica.com\/information-technology\/2022\/05\/hackers-are-actively-exploiting-big-ip-vulnerability-with-a-9-8-severity-rating\/\">exploit attempts<\/a>. It wasn\u2019t clear then if blackhats or whitehats carried out the activity.<\/p>\n<p>In more recent days, however, researchers captured thousands of malicious requests that demonstrate a significant portion of the exploits are used for nefarious purposes. In an email, researchers from security firm Greynoise wrote:<\/p>\n<blockquote>\n<p>Given that the requests involving this exploit require a POST request and result in an unauthenticated command shell on the F5 Big-IP device, we have classified actors using this exploit as malicious. We have observed actors using this exploit through anonymity services such as VPNs or TOR exit nodes in addition to known internet VPS providers.<\/p>\n<p>We expect actors attempting to find vulnerable devices to utilize non-invasive techniques that do not involve a POST request or result in a command shell, which are catalogued in our tag for F5 Big-IP crawlers:&nbsp;<a href=\"https:\/\/viz.greynoise.io\/tag\/f5-big-ip-crawler\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/viz.greynoise.io\/tag\/f5-big-ip-crawler&amp;source=gmail&amp;ust=1652976376062000&amp;usg=AOvVaw1uJRYCmvYfwW1wtwqaV9aT\">https:\/\/viz.<wbr>greynoise.io\/tag\/f5-big-ip-<wbr>crawler<\/a>.&nbsp;This crawler tag did experience a rise in traffic correlated with the release of CVE-2022-1388.<\/p>\n<\/blockquote>\n<p>Mursch said that the BIG-IP exploits attempt to install the same trio of webshells, malware for performing distributed denial-of-service attacks, and cryptominers seen in the attacks on unpatched VMware machines. The image below, for instance, shows an attack that attempts to install <a href=\"https:\/\/www.virustotal.com\/gui\/file\/ee310139ba31770b69650d464c999c3526aa5cc4ab924ddcc53cf3cb06727c37\/detection\">widely recognized DDoS malware<\/a>.<\/p>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<figure class=\"image shortcode-img center full\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/05\/bigip-exploit01.png\" width=\"536\" height=\"560\"><figcaption class=\"caption\">\n<div class=\"caption-credit\">Troy Mursch<\/div>\n<\/figcaption><\/figure>\n<p>The following three images show hackers exploiting the vulnerability to execute commands that fish for encryption keys and other types of sensitive data stored on a compromised server.<\/p>\n<figure class=\"image shortcode-img center full\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/05\/bigip-payload03.png\" width=\"383\" height=\"278\"><figcaption class=\"caption\">\n<div class=\"caption-credit\">Troy Mursch<\/div>\n<\/figcaption><\/figure>\n<figure class=\"image shortcode-img center full\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/05\/bigip-payload04.png\" width=\"240\" height=\"31\"><figcaption class=\"caption\">\n<div class=\"caption-credit\">Troy Mursch<\/div>\n<\/figcaption><\/figure>\n<figure class=\"image shortcode-img center large\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/05\/bigip-payload02.png\" class=\"enlarge\" data-height=\"647\" data-width=\"810\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/05\/bigip-payload02-640x511.png\" width=\"640\" height=\"511\" srcset=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/05\/bigip-payload02.png 2x\"><\/a><figcaption class=\"caption\">\n<div class=\"caption-credit\">Troy Mursch<\/div>\n<\/figcaption><\/figure>\n<p>Given the threat posed by ransomware and nation-state hacking campaigns like the ones used against customers of <a href=\"https:\/\/arstechnica.com\/information-technology\/2020\/12\/solarwinds-hackers-have-a-clever-way-to-bypass-multi-factor-authentication\/\">SolarWinds<\/a> and <a href=\"https:\/\/arstechnica.com\/gadgets\/2021\/06\/solarwinds-hackers-breach-new-victims-including-a-microsoft-support-agent\/\">Microsoft<\/a>, the potential damage from these vulnerabilities is substantial. Administrators should prioritize investigating these vulnerabilities on their networks and act accordingly. Advice and guidance from CISA, VMware, and F5 are <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-138b\">here<\/a>,&nbsp;<a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-138a\">here<\/a>, <a href=\"https:\/\/kb.vmware.com\/s\/article\/88099\">here<\/a>, and <a href=\"https:\/\/support.f5.com\/csp\/article\/K23605346\">here<\/a>. READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/33467\/2-Vulnerabilities-With-9.8-Severity-Rating-Are-Under-Exploit.-A-3rd-Looms.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":46736,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[256],"class_list":["post-46735","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinehackerflaw"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>2 Vulnerabilities With 9.8 Severity Rating Are Under Exploit. A 3rd Looms 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2 Vulnerabilities With 9.8 Severity Rating Are Under Exploit. A 3rd Looms 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-19T15:47:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/05\/caution-tape-800x600.jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"2 Vulnerabilities With 9.8 Severity Rating Are Under Exploit. A 3rd Looms\",\"datePublished\":\"2022-05-19T15:47:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/\"},\"wordCount\":822,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms.jpg\",\"keywords\":[\"headline,hacker,flaw\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/\",\"name\":\"2 Vulnerabilities With 9.8 Severity Rating Are Under Exploit. A 3rd Looms 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms.jpg\",\"datePublished\":\"2022-05-19T15:47:47+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms.jpg\",\"width\":800,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,flaw\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerflaw\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"2 Vulnerabilities With 9.8 Severity Rating Are Under Exploit. A 3rd Looms\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2 Vulnerabilities With 9.8 Severity Rating Are Under Exploit. A 3rd Looms 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/","og_locale":"en_US","og_type":"article","og_title":"2 Vulnerabilities With 9.8 Severity Rating Are Under Exploit. A 3rd Looms 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-05-19T15:47:47+00:00","og_image":[{"url":"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/05\/caution-tape-800x600.jpeg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"2 Vulnerabilities With 9.8 Severity Rating Are Under Exploit. A 3rd Looms","datePublished":"2022-05-19T15:47:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/"},"wordCount":822,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms.jpg","keywords":["headline,hacker,flaw"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/","url":"https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/","name":"2 Vulnerabilities With 9.8 Severity Rating Are Under Exploit. A 3rd Looms 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms.jpg","datePublished":"2022-05-19T15:47:47+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms.jpg","width":800,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/2-vulnerabilities-with-9-8-severity-rating-are-under-exploit-a-3rd-looms\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,flaw","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerflaw\/"},{"@type":"ListItem","position":3,"name":"2 Vulnerabilities With 9.8 Severity Rating Are Under Exploit. A 3rd Looms"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46735","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46735"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46735\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/46736"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46735"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46735"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46735"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}