Activision

Activision

Call of Duty: WWII was pulled offline due to a serious remote code execution vulnerability that allowed malicious players to take complete control of other gamers’ computers during live multiplayer matches. The vulnerability put thousands of PC gamers at risk, with reports of attackers opening command prompts, sending mocking messages, forcing remote shutdowns, and changing desktop wallpapers to inappropriate content. The issue was exacerbated by the game's reliance on peer-to-peer networking, which created entry points for exploitation.

Source: https://cybersecuritynews.com/gamers-playing-call-of-duty-hacked-rce-exploited/

TPRM report: https://scoringcyber.rankiteo.com/company/activision

"id": "act342070825",
"linkid": "activision",
"type": "Vulnerability",
"date": "7/2025",
"severity": "100",
"impact": "",
"explanation": "Attack threatening the organization’s existence"
{'affected_entities': [{'customers_affected': 'Thousands of PC gamers',
                        'industry': 'Gaming',
                        'name': 'Activision',
                        'type': 'Game Developer'}],
 'attack_vector': 'Peer-to-peer (P2P) networking',
 'description': 'A serious remote code execution vulnerability in Call of '
                'Duty: WWII allowed malicious players to take complete control '
                'of other gamers’ computers during live multiplayer matches.',
 'impact': {'brand_reputation_impact': 'High',
            'operational_impact': 'Game taken offline',
            'systems_affected': 'Windows PCs'},
 'initial_access_broker': {'entry_point': 'Peer-to-peer (P2P) networking'},
 'lessons_learned': 'Even established gaming titles can pose significant '
                    'security risks to players’ entire computer systems.',
 'motivation': 'Unclear, possibly for disruption and harassment',
 'post_incident_analysis': {'root_causes': 'Peer-to-peer (P2P) networking '
                                           'vulnerability'},
 'recommendations': ['Avoid playing affected games until a security update is '
                     'released',
                     'Install security updates promptly',
                     'Maintain active anti-malware software'],
 'response': {'communication_strategy': ['Official channels for updates'],
              'containment_measures': ['Game taken offline',
                                       'Security updates recommended'],
              'remediation_measures': ['Security updates',
                                       'Anti-malware software',
                                       'Monitoring official channels']},
 'threat_actor': 'Malicious players',
 'title': 'Call of Duty: WWII Remote Code Execution Vulnerability',
 'type': 'Remote Code Execution (RCE)',
 'vulnerability_exploited': 'Remote code execution vulnerability'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.