The security researchers say the vulnerability was present in the server software used by many of the major online games and video games that compete with each other.
They have been trying to help developers and game makers fix the problem.
The researchers say they have found multiple examples of the vulnerability in a large number of major games, including the popular game Overwatch.
They say they hope to publish their findings later this week.
They released their report today and say they will also release a patch later this year.
The report details the vulnerability on the server system used by popular online games like World of Warcraft, World of Tanks, and Battlefield.
They note that the vulnerability is not only present in World of WarCraft, but the other popular multiplayer online games, like League of Legends, Dota 2, and Counter-Strike: Global Offensive.
The security team also said they found evidence of an issue with the game’s server software that could allow a hacker to take control of a server.
“This vulnerability could allow an attacker to install a malicious plugin that installs code into the game server, and could be exploited by a malicious party to take full control of the server,” the report said.
The hackers also found evidence that a third-party software package could be installed into the server.
The code could enable a user to play the game by clicking on a button, or by connecting to a server, the report stated.
“We identified that some servers were vulnerable to this vulnerability because of an outdated version of their server software, which we believed was causing the vulnerability,” the researchers wrote.
“The update will fix this issue in all games, but some of the games may require a manual patch to resolve this issue.”
Blizzard issued a statement to ABC News saying that it has been aware of the issue and is working on a fix.
“Since Blizzard’s initial discovery of this vulnerability in September, the company has made significant improvements to the patch to prevent this issue from happening again,” the statement read.
“Additionally, we continue to work closely with security researchers to develop patches to address this issue.
The patches are available for download for all customers.
This is an ongoing issue and we are actively working to mitigate it.”
A Blizzard representative did not immediately respond to ABC news’ request for comment.
The game servers in question are not the ones affected by the flaw, but a handful of servers that host a few other popular games, such as the game Hearthstone.
It’s unclear whether other popular online gaming companies have already fixed the issue.
However, there is concern that it could affect the stability of some games.
“In order to ensure the integrity of our games, we have implemented a patching system for each game server that includes a number of fixes that are specific to each game, such that we do not need to rely on the patching patch for all games,” a Blizzard representative said in a statement.
“If the patch in question does not address this vulnerability, we recommend that all customers apply the patch immediately and make sure that they do not install this update.”
The company has already released patches for other issues, including a bug that allows attackers to execute malicious code remotely.
In the past, Blizzard has said that the flaw affects more than 10 million games, although the actual number is much higher.
However a Blizzard spokesperson told ABC News that it is not aware of any players that have already experienced this vulnerability.
“For now, we do know that there is an issue that affects only a small number of the servers,” the company said.
“Our team is working diligently to fix this vulnerability as quickly as possible.”
The security experts have not yet published a patch for this vulnerability or any other problems that they found.
The vulnerabilities that the security team identified can be used to remotely install malicious software, including ransomware, the hackers said.
They said that in the past they have been able to exploit the vulnerability by tricking users into downloading malicious software by using the same technique used by a hacker who has gained access to the botnet known as botnet-affiliated actors.
In some cases, the attackers have also used the same techniques to take over servers.
“Even with this patched patch, it’s not clear whether or not it will work,” the security researchers wrote in their report.
“Because of the patch, we think that most servers are not vulnerable to the issue, and even if they are, we would not recommend installing the patch.
There is no need to download this patch.”
The researchers did say that they are working on ways to help the game developers and developers of these popular online titles.
“To mitigate the issue for these popular games (especially the popular World of Warships), we have been working closely with developers, who are already working on fixing the issue,” the research team wrote.