Respawn denies rumors of Titanfall 2 vulnerability that allows “local code execution from the server”

Electronic Arts-owned Respawn Entertainment on my microblog commented on fans’ concerns over reports of the vulnerability of sci-fi shooter Titanfall 2 on PC and consoles.

Image source: Steam

Image source: Steam

On the night of September 8-9, users Discord and Steam started warning about a bug that allows “Executing local code from the server”… Titanfall 2 owners were advised not to launch and remove it altogether.

According to the player under the pseudonym Blueghost, the issue is related to a buffer overflow in the Titanfall 2 temp file used for invitations. From a similar bug in 2017 year other projects on the Source Engine suffered – Counter-Strike: Global Offensive, Portal 2, and Team Fortress 2.

Respawn Entertainment’s response was not long in coming. The studio is still investigating the issue, but found nothing threatening the security of Titanfall 2 users.

“We are still working on this issue, but our engineers are confident that we are dealing with a simple exploit that can be used to provoke crashes from the game.”– reported Respawn Entertainment.

The developers added that they did not see the situation as problems for the affected players, with the exception of the one mentioned (crashes), and promised to share details of what happened as the investigation progressed.

As a reminder, the original Titanfall has been plagued by network attacks since 2019. In early July 2021, hackers hacked Apex Legends, and then organized a DDoS attack on the console versions of Titanfall 2.

About the author

Alan Foster

Alan Foster covers computers and games and all the news in the gaming industry.

Add Comment

Click here to post a comment