Feb. 8, 2023, 9:55 a.m. | Jan Vojtěšek

Avast Threat Labs decoded.avast.io

Avast discovered an exploit for CVE-2021-38003 was used in the wild to attack Dota 2 players. This exploit achieved remote code execution on other players' machines by taking advantage of Dota's usage of an outdated V8 version. In response to Avast's findings, Valve patched the vulnerability on January 12, 2023.


The post Dota 2 Under Attack: How a V8 Bug Was Exploited in the Game appeared first on Avast Threat Labs.

attack avast backdoor bug code code execution cve cve-2021-38003 dota 2 exploit exploited findings game gaming january machines pc remote code remote code execution response under valve version vulnerability

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC