CVE-2025-59287
📋 TL;DR
CVE-2025-59287 is a critical deserialization vulnerability in Windows Server Update Service (WSUS) that allows unauthenticated remote attackers to execute arbitrary code on affected servers. This affects organizations running WSUS for Windows update management. Attackers can exploit this over the network without requiring user interaction.
💻 Affected Systems
- Windows Server Update Service
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of WSUS server leading to domain admin privileges, lateral movement across the network, deployment of ransomware or persistent backdoors, and compromise of all systems managed by WSUS.
Likely Case
Initial access to WSUS server followed by privilege escalation, installation of malware, data exfiltration, and use as a pivot point for attacking other internal systems.
If Mitigated
Limited impact due to network segmentation, strict firewall rules, and proper access controls preventing lateral movement from the compromised WSUS server.
🎯 Exploit Status
Active exploitation in the wild has been confirmed by CISA and security researchers. Attack tools are publicly available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply the latest Windows Server security updates from Microsoft
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287
Restart Required: Yes
Instructions:
1. Download and install the latest Windows Server security updates from Microsoft Update Catalog or WSUS. 2. Restart the WSUS server. 3. Verify the patch is applied successfully.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to WSUS servers using firewall rules to only allow necessary traffic from authorized clients.
Disable WSUS HTTP API
windowsTemporarily disable the vulnerable WSUS HTTP API if patching cannot be immediately performed (this will break update functionality).
Stop-Service WsusService
Set-Service WsusService -StartupType Disabled
🧯 If You Can't Patch
- Isolate WSUS servers in a dedicated network segment with strict firewall rules allowing only necessary update traffic
- Implement network-based intrusion detection/prevention systems to monitor for exploit attempts
🔍 How to Verify
Check if Vulnerable:
Check if WSUS service is running on Windows Server and verify the server has not been patched with the latest security updates.
Check Version:
Get-HotFix | Sort-Object InstalledOn -Descending | Select-Object -First 10
Verify Fix Applied:
Verify Windows Update history shows the latest security updates have been installed and the WSUS service version has been updated.
📡 Detection & Monitoring
Log Indicators:
- Unusual process creation from WSUS service
- Suspicious network connections from WSUS server
- Failed authentication attempts followed by successful exploitation
Network Indicators:
- Unusual HTTP requests to WSUS API endpoints
- Suspicious outbound connections from WSUS server to external IPs
- Anomalous network traffic patterns from WSUS server
SIEM Query:
source="WSUS" AND (event_id=4688 OR event_id=5156) AND process_name="powershell.exe" OR cmd.exe
🔗 References
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287
- https://hawktrace.com/blog/CVE-2025-59287
- https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-windows-server-wsus-flaw-exploited-in-attacks/
- https://www.vicarius.io/vsociety/posts/cve-2025-59287-detection-script-rce-vulnerability-in-windows-server-update-service
- https://www.vicarius.io/vsociety/posts/cve-2025-59287-mitigation-script-rce-vulnerability-in-windows-server-update-service
- https://gist.github.com/hawktrace/880b54fb9c07ddb028baaae401bd3951
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-59287