Categories: Gaming & Tech News

Microsoft Removes Unity-Based Titles From Store After Security Vulnerability

Microsoft Removes Unity-Based Titles From Store After Security Vulnerability

What happened

In October 2025, Unity Technologies disclosed a significant security vulnerability affecting Unity-based games and applications built with Unity 2017.1 or later. The flaw could potentially enable exploitation across Android, Windows, macOS, and Linux builds. While there have been no reported exploits or user impacts to date, Microsoft reacted proactively by temporarily removing a number of Unity-powered titles from its digital storefronts as it works with Unity to deploy fixes.

Microsoft stated that updates to affected products would be rolled out as they become available. In the meantime, the company recommended users consider uninstalling affected software until patches are released and noted that some titles might not be downloadable on the store until the updates are deployed.

Affected titles announced by Microsoft

The list published by Microsoft includes a mix of games, companion apps, and artbooks associated with Unity-based content. Notable entries include:

  • Avowed Artbook
  • DOOM: The Dark Ages Companion App
  • Fallout Shelter
  • Ghostwire: Tokyo Prelude
  • Grounded 2 Artbook
  • Hearthstone
  • すすめ!じでんしゃナイツ
  • Pillars of Eternity II: Deadfire
  • Starfield Companion App
  • The Bard’s Tale Trilogy
  • The Elder Scrolls IV: Oblivion Remastered Companion App
  • The Elder Scrolls: Blades
  • The Elder Scrolls: Castles
  • Warcraft Rumble
  • Wasteland 3
  • Wasteland Remastered

Some of these entries, such as Knights and Bikes, have already received updates or patches, allowing downloads to resume in certain regions. However, others facing the vulnerability remain unavailable on storefronts like Steam and Google Play until fixes are deployed.

What this means for players

The situation underscores how platform holders and publishers balance security with access. For affected games and apps, players should monitor official advisories from both Microsoft and the respective developers. Until patches are released, uninstalling instructions provided by the store can help reduce risk. In some cases, Microsoft noted that the storefront itself might restrict downloads temporarily to ensure users only obtain secured, patched versions once available.

Why Unity’s vulnerability matters

The vulnerability centers on Unity builds created with Unity 2017.1 and later, impacting multiple operating systems. While Unity Technologies has indicated no known exploitation at the time of disclosure, the cross-platform nature of Unity means the potential risk spans Android, Windows, macOS, and Linux devices. This has prompted publishers to reevaluate release timelines and, in some instances, pause distribution of Unity-powered content until confidence in security is restored.

<h2 Looking ahead: updates and accountability

Unity Technologies has indicated ongoing collaboration with affected publishers to deliver patches. For developers, this event highlights the importance of rapid, transparent security responses and robust update channels across storefronts. For consumers, staying informed through official store notices and developer communications will be key to safely continuing to enjoy Unity-powered games and experiences.

Bottom line

The Unity vulnerability episode demonstrates the complex ecosystem of modern game distribution, where engine-level security can ripple through a wide array of titles, from AAA adventures to companion apps and artbooks. While the temporary removals may disrupt access for some players, the steps taken by Microsoft and Unity aim to protect users and preserve the integrity of the gaming experience as patches roll out.