uPlay DRM grants unauthorised access to user's computers.
The DRM used by Ubisoft's online network uPlay has allegedly been exposed as rootkit by members of the hacking community.
The report, which was posted on the 'Hacker News' section of Ycombinator.com, states that Ubisoft's software "installs a backdoor that allows any website to take over your computer".
If true, the software poses significant risk of unauthorised access to uPlay users' computers.
The website compares the findings to Sony BMG's software, which was exposed as rootkit back in 2005.
As a result, Sony BMG ended up recalling all affected CDs. A number of lawsuits were also filed against the computer.
Rootkit is the term given to a piece of software that grants remote users unauthorised access to sensitive files.
According to Ycombinator, the list of games that support uPlay - and allegedly leave users open to being hacked - include the following:
- Assassin's Creed II
- Assassin's Creed: Brotherhood
- Assassin's Creed: Project Legacy
- Assassin's Creed Revelations
- Assassin's Creed III
- Beowulf: The Game
- Brothers in Arms: Furious 4
- Call of Juarez: The Cartel
- Driver: San Francisco
- Heroes of Might and Magic VI
- Just Dance 3
- Prince of Persia: The Forgotten Sands
- Pure Football
- Shaun White Skateboarding
- Silent Hunter 5: Battle of the Atlantic
- The Settlers 7: Paths to a Kingdom
- Tom Clancy's H.A.W.X. 2
- Tom Clancy's Ghost Recon: Future Soldier
- Tom Clancy's Splinter Cell: Conviction
- Your Shape: Fitness Evolved
Ubisoft told VideoGamer.com that it is preparing a statement in response to today's claims.