Three hackers say they have exploited a vulnerability in Research In Motion's PlayBook tablet to gain root access to the device, a claim that could damage the BlackBerry maker's hard-won reputation for security.
Root access means a user has permission to alter any file or program on a device and can control hardware functions.
In a response to queries, RIM said it is investigating the claim, and if a "jailbreak" is confirmed will release a patch to plug the hole.
The three hackers - who identify themselves as xpvqs, neuralic and Chris Wade - plan to release their data within a week as a tool called DingleBerry.
Apple's iOS and Google's Android operating systems are frequently attacked by users who want to run programs that have not been authorised by the manufacturers, but breaches of RIM's software are more rare.
The PlayBook runs on a different operating system than RIM's current BlackBerry smartphones. However, the QNX system will be incorporated into its smartphones starting next year.
The PlayBook in July became the first tablet device to win a security certification approving it for US government use.
In a video posted on YouTube, Wade shows the DingleBerry tool allowing the PlayBook to access the Internet video service Hulu, which is not currently available on RIM's tablet.
Hulu blocks all mobile browsers by default and has yet to offer an app for the PlayBook.
A second video showed neuralic typing commands into a computer to turn the PlayBook's LED indicators on and off.
Copyright Reuters. Click for restrictions.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @itnews.com.au to your white-listed senders.