2 different unknown vulnerabilities are used for hidden malware installation.
vulners.com/securityvulns/securityvulns:doc:15320