Call of Duty: WW2 is the latest Activision first-person shooter to land on Xbox Game Pass. The 2017 title is experiencing a dramatic boost in player counts, but it's also exposing a dangerous security flaw. Social media is full of reports of gamers who suffered from a Remote Code Execution (RCE) exploit during multiplayer action. The incidents highlight the risks of adding an older title to a popular subscription service without security updates.
This RCE hack enables bad actors to take control of another player's computer. Once executed, the potential for harm is unlimited. Call of Duty: WW2 participants could have sensitive information stolen or malware installed without knowing it. In some cases, the exploit can damage an OS to the point that a reinstall is necessary.
As discovered by CyberInsider, one Call of Duty: WW2 player describes how explicit content appeared on a second monitor. Another fan observed a Notepad window suddenly pop up with a message confirming a successful exploit. So far, these individuals have managed to avoid a catastrophic attack. Still, if a hacker obtains passwords or bank account details, the ramifications may take weeks to surface.
Gamers are recommending that players avoid multiplayer modes in the latest addition to Xbox Game Pass. Neither Microsoft nor Activision has made a statement on the issue. Notably, multiple Call of Duty Games went offline on July 2nd for maintenance. Even so, it's unclear if any patch introduced security measures.
Adding to the frustrations, similar exploits and hacks plagued past Call of Duty games. Some supporters resorted to third-party launchers that addressed security holes. Players are livid that the developers didn't tackle the problems before exposing the title to the large Xbox Game Pass audience.