Undeniable signatures were proposed to limit the public verification property of ordinary digital signature. In fact, the verification of such signatures cannot be obtained without the help of the signer via the confirmation/disavowal protocols. In this paper, we reconsider the security of the undeniable signature scheme proposed by Yuan et al. at ICICS 2007, and point out their scheme does not satisfy the security model of invisibility the authors presented.