CVE-2025-59287

9.8 CRITICAL CISA KEV

📋 TL;DR

CVE-2025-59287 is a critical deserialization vulnerability in Windows Server Update Service (WSUS) that allows unauthenticated remote attackers to execute arbitrary code on affected servers. This affects organizations running WSUS for Windows update management. Attackers can exploit this over the network without requiring user interaction.

💻 Affected Systems

Products:
  • Windows Server Update Service
Versions: Multiple versions of WSUS on Windows Server 2012 R2 through Windows Server 2022
Operating Systems: Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: WSUS servers exposed to network traffic are vulnerable. The vulnerability is in the WSUS component itself, not dependent on specific configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of WSUS server leading to domain admin privileges, lateral movement across the network, deployment of ransomware or persistent backdoors, and compromise of all systems managed by WSUS.

🟠

Likely Case

Initial access to WSUS server followed by privilege escalation, installation of malware, data exfiltration, and use as a pivot point for attacking other internal systems.

🟢

If Mitigated

Limited impact due to network segmentation, strict firewall rules, and proper access controls preventing lateral movement from the compromised WSUS server.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Active exploitation in the wild has been confirmed by CISA and security researchers. Attack tools are publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply the latest Windows Server security updates from Microsoft

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287

Restart Required: Yes

Instructions:

1. Download and install the latest Windows Server security updates from Microsoft Update Catalog or WSUS. 2. Restart the WSUS server. 3. Verify the patch is applied successfully.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to WSUS servers using firewall rules to only allow necessary traffic from authorized clients.

Disable WSUS HTTP API

windows

Temporarily disable the vulnerable WSUS HTTP API if patching cannot be immediately performed (this will break update functionality).

Stop-Service WsusService
Set-Service WsusService -StartupType Disabled

🧯 If You Can't Patch

  • Isolate WSUS servers in a dedicated network segment with strict firewall rules allowing only necessary update traffic
  • Implement network-based intrusion detection/prevention systems to monitor for exploit attempts

🔍 How to Verify

Check if Vulnerable:

Check if WSUS service is running on Windows Server and verify the server has not been patched with the latest security updates.

Check Version:

Get-HotFix | Sort-Object InstalledOn -Descending | Select-Object -First 10

Verify Fix Applied:

Verify Windows Update history shows the latest security updates have been installed and the WSUS service version has been updated.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from WSUS service
  • Suspicious network connections from WSUS server
  • Failed authentication attempts followed by successful exploitation

Network Indicators:

  • Unusual HTTP requests to WSUS API endpoints
  • Suspicious outbound connections from WSUS server to external IPs
  • Anomalous network traffic patterns from WSUS server

SIEM Query:

source="WSUS" AND (event_id=4688 OR event_id=5156) AND process_name="powershell.exe" OR cmd.exe

🔗 References

📤 Share & Export