Critical Microsoft WSUS Flaw Exploited Despite Recent Patch

Published:

spot_img

Critical WSUS Vulnerability Requires Immediate Attention

Microsoft Releases Urgent Security Update

On Thursday, Microsoft issued an urgent out-of-band security update to address a serious vulnerability affecting the Windows Server Update Services (WSUS). This flaw, identified as CVE-2025-59287, has received significant attention due to its potential for exploitation, with a proof-of-concept (PoC) exploit publicly available. The vulnerability has been actively exploited in the wild, prompting swift action from Microsoft.

Details of the Vulnerability

CVE-2025-59287 is classified as a remote code execution (RCE) vulnerability, carrying a high Common Vulnerability Scoring System (CVSS) score of 9.8. Originally introduced in a Patch Tuesday update, this flaw stems from a critical oversight related to the deserialization of untrusted data within WSUS. If successfully exploited, it allows unauthorized users to execute arbitrary code over a network. It’s important to note that only Windows servers with the WSUS Server Role enabled are affected; servers without this role remain secure.

Three researchers—MEOW, f7d8c52bec79e42795cf15888b85cbad, and Markus Wulftange from CODE WHITE GmbH—played a pivotal role in discovering and disclosing this vulnerability to Microsoft.

Mechanics of the Attack

In a typical attack scenario, an unauthenticated remote attacker could craft a malicious event designed to exploit the unsafe deserialization in a legacy serialization method. This vulnerability primarily revolves around the deserialization of AuthorizationCookie objects sent to the GetCookie() endpoint. According to Batuhan Er, a security researcher at HawkTrace, the exploit occurs when encrypted cookie data is decrypted using AES-128-CBC and then deserialized via the BinaryFormatter without adequate type validation. This flaw enables attackers to execute code with system-level privileges.

Historically, Microsoft has recommended developers avoid using BinaryFormatter due to associated security risks when handling untrusted input. As part of ongoing security improvements, the implementation of BinaryFormatter was eliminated from the upcoming .NET 9 release scheduled for August 2024.

Patch Availability and Recommendations

To address CVE-2025-59287 adequately, Microsoft has rolled out a security update for several supported Windows Server versions, including Windows Server 2012, 2016, and 2022, among others. Users are urged to reboot their systems after applying the update to ensure full protection.

For those unable to implement the out-of-band update immediately, Microsoft has suggested two workarounds:

  • Disable the WSUS Server Role if it is currently enabled.
  • Block inbound traffic to Ports 8530 and 8531 on the server’s firewall.

Microsoft emphasizes that these workarounds should only be undone once the patch has been successfully installed.

Insights from Cybersecurity Experts

Recent reports from the Dutch National Cyber Security Centre (NCSC) indicate that exploitation of CVE-2025-59287 was observed as early as October 24, 2025. Eye Security first noted attempts to exploit the vulnerability targeting a specific customer, demonstrating the proactive nature of attackers. The malicious payload relies on Base64-encoded data and utilizes cmd.exe for command execution, cleverly avoiding direct log entry.

Cybersecurity firm Huntress also corroborated that threat actors began targeting publicly exposed WSUS instances on default ports around October 23, 2025. While the exploitation of this vulnerability appears limited, due to the relatively uncommon exposure of the relevant ports, it underscores the urgency for timely patch application.

Conclusion

Given the active exploitation of CVE-2025-59287 and the availability of a PoC exploit, it is crucial for system administrators and organizations to prioritize the installation of Microsoft’s patch. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, mandating that federal agencies address it by November 14, 2025.

As the situation continues to evolve, impacted users should take immediate steps to enhance their security posture and stay informed about any subsequent updates from Microsoft.

spot_img

Related articles

Recent articles

Walmart Shoppers Beware: Major Scam Hits Millions

A large-scale robocall scam is targeting millions of Walmart shoppers in the U.S. by impersonating the retailer’s customer service and inventing fake high-value purchases...

GCCA Celebrates Supreme Council’s Decision to Create GCC Civil Aviation Authority

GCC Civil Aviation Authority: A New Era for Gulf Air Travel A Significant Development for the Gulf Region The General Civil Aviation Authority (GCAA) of the...

Researchers Find Over 30 Vulnerabilities in AI Coding Tools That Risk Data Theft and RCE Attacks

Unveiling the IDEsaster: Security Flaws in AI-Powered Coding Environments Overview of Recent Vulnerabilities A recent investigation has uncovered over 30 security vulnerabilities lurking within popular AI-powered...

XIXILI Transforms Plus-Size Lingerie in Malaysia

## A New Era for Plus Size Lingerie: Introducing XIXILI’s Collection ### Redefining Lingerie Shopping KUALA LUMPUR, MALAYSIA - In a bold move that reshapes the...