Electronic Arts-owned Respawn Entertainment on my microblog commented on fans’ concerns over reports of the vulnerability of sci-fi shooter Titanfall 2 on PC and consoles.
On the night of September 8-9, users Discord and Steam started warning about a bug that allows “Executing local code from the server”… Titanfall 2 owners were advised not to launch and remove it altogether.
According to the player under the pseudonym Blueghost, the issue is related to a buffer overflow in the Titanfall 2 temp file used for invitations. From a similar bug in 2017 year other projects on the Source Engine suffered – Counter-Strike: Global Offensive, Portal 2, and Team Fortress 2.
Further explanation for the security issue involving Titanfall pic.twitter.com/XltViv5PFJ
– Titanfall Forever (@ Titanfall4Ever) September 8, 2021
Respawn Entertainment’s response was not long in coming. The studio is still investigating the issue, but found nothing threatening the security of Titanfall 2 users.
“We are still working on this issue, but our engineers are confident that we are dealing with a simple exploit that can be used to provoke crashes from the game.”– reported Respawn Entertainment.
An Update: We’re still investigating this issue but our engineers believe that we’re dealing with a simple exploit that can be used to crash games.
We do not believe there are any more serious risks to affected players or their machines.
We’ll update again as we learn more.
– Respawn (@Respawn) September 9, 2021
The developers added that they did not see the situation as problems for the affected players, with the exception of the one mentioned (crashes), and promised to share details of what happened as the investigation progressed.
As a reminder, the original Titanfall has been plagued by network attacks since 2019. In early July 2021, hackers hacked Apex Legends, and then organized a DDoS attack on the console versions of Titanfall 2.