InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Critical, newly patched Microsoft WSUS flaw exploited
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Critical, newly patched Microsoft WSUS flaw exploited
Technology

Critical, newly patched Microsoft WSUS flaw exploited

October 25, 2025 6 Min Read
Share
Critical WSUS Vulnerability
SHARE

Microsoft on Thursday released an out-of-band security update that patches a critical severity vulnerability in Windows Server Update Service (WSUS) using a publicly available proof-of-concept (POC) exploit. This exploit is being used in the wild.

The vulnerability in question is CVE-2025-59287 (CVSS score: 9.8), the WSUS remote code execution flaw was originally fixed by the tech giant as part of the Patch Tuesday update published last week.

Three security researchers, MEOW, f7d8c52bec79e42795cf15888b85cbad, and Markus Wulftange of CODE WHITE GmbH, are credited with discovering and reporting this bug.

This shortcoming pertains to cases in which WSUS deserializes untrusted data, allowing an unauthorized attacker to execute code over the network. Note that this vulnerability does not affect Windows servers that do not have the WSUS server role enabled.

In a hypothetical attack scenario, a remote unauthenticated attacker could send a crafted event that triggers insecure object deserialization in a “traditional serialization mechanism”, leading to remote code execution.

According to Batuhan Er, a security researcher at HawkTrace, the issue is caused by “insecure deserialization of the AuthorizationCookie object sent to the GetCookie() endpoint. The encrypted cookie data is decrypted using AES-128-CBC and then deserialized by a BinaryFormatter without proper type validation, allowing remote code execution with SYSTEM privileges.”

It is worth noting that Microsoft itself previously recommended that developers stop using BinaryFormatter for deserialization due to the fact that it is unsafe to use BinaryFormatter with untrusted input. The BinaryFormatter implementation was then removed from .NET 9 in August 2024.

.NET executables deployed via CVE‑2025‑59287

“To comprehensively address CVE-2025-59287, Microsoft is updating supported versions of Windows Server: Windows Server 2012, Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server 2022, Windows Server 2022, 23H2 Edition (Server Core installation), and Windows Server We have released an out-of-band security update for 2025,” Redmond said. Update.

See also  WhatsApp malware 'Maverick' hijacks browser sessions and targets Brazil's largest banks

After installing the patch, we recommend restarting your system for the update to take effect. If out-of-band cannot be applied, users can take one of the following actions to protect against defects:

  • Disable the WSUS server role for the server (if enabled)
  • Block incoming traffic to ports 8530 and 8531 on the host firewall.

“Do not revert these workarounds until you have installed the updates,” Microsoft warns.

The development comes after the Dutch National Cyber ​​Security Center (NCSC) announced that it had “learned from a trusted partner that an exploit of CVE-2025-59287 was observed on October 24, 2025.”

Eye Security, which notified NCSC-NL of the actual exploit, said it first observed the vulnerability being exploited at 6:55 a.m. UTC, dropping a Base64-encoded payload targeting anonymous customers. The payload, a .NET executable file, “takes the value ‘aaaa’ request header and executes it directly using cmd.exe.”

“This is a payload that is sent to a server and uses a request header named ‘aaaa’ as the source of the command to be executed,” Eye Security CTO Piet Kerkhofs told The Hacker News. “This prevents the command from appearing directly in the log.”

When asked if the exploit could have occurred earlier than today, Kerkhofs noted, “The HawkTrace PoC was released two days ago and can use a standard ysoserial .NET payload, so the elements of exploitation were present.”

Cybersecurity firm Huntress also said that it detected a threat actor targeting WSUS instances exposed on default ports (8530/TCP and 8531/TCP) starting at approximately 23:34 UTC on October 23, 2025. However, the company notes that WSUS does not often expose ports 8530 and 8531, so exploitation of CVE-2025-59287 is likely to be limited.

“The attacker leveraged the exposed WSUS endpoint to send a specially crafted request (multiple POST calls to the WSUS web service) that triggered a deserialization RCE to the update service.”

See also  Hackers exploit Triofox flaw to install remote access tools via antivirus

The exploit activity causes the WSUS worker process to spawn a “cmd.exe” and PowerShell instance, leading to the download and execution of a Base64-encoded PowerShell payload whose purpose is to enumerate exposed servers for network and user information and exfiltrate the results to an attacker-controlled Webhook(.) site URL.

“We re-released this CVE after confirming that the initial update did not fully mitigate the issue. Customers who installed the latest update are already protected,” a Microsoft spokesperson told the publication when asked for comment.

The company also emphasized that this issue does not affect servers that do not have the WSUS server role enabled, and encouraged affected customers to follow the guidance on the CVE page.

Given that PoC exploits are available and exploits have been detected, it is important for users to patch as soon as possible to mitigate the threat. The US Cybersecurity and Infrastructure Security Agency (CISA) has also added the flaw to its Known Exploited Vulnerabilities (KEV) catalog and requires federal agencies to fix it by November 14, 2025.

(Article updated after publication with additional insights from Eye Security, Huntress, and response from Microsoft.)

Share This Article
Twitter Copy Link
Previous Article Malys, the demon-exorcist roguelike deck builder, reaches 1.0 with an evil vibe that stands out from the rest Malys, the demon-exorcist roguelike deck builder, reaches 1.0 with an evil vibe that stands out from the rest
Next Article The youth movement is shaking up the Democratic Party. Does age equal obsolescence? The youth movement is shaking up the Democratic Party. Does age equal obsolescence?

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

Stealit Malware Abuses Node.js Single Executable Feature
Technology

Stealit malware exploits a single executable feature in Node.js via game and VPN installers

4 Min Read
ASD warns of ongoing BADCANDY attack exploiting Cisco IOS XE vulnerability
Technology

ASD warns of ongoing BADCANDY attack exploiting Cisco IOS XE vulnerability

3 Min Read
Hackers exploit WordPress sites to power next-generation ClickFix phishing attacks
Technology

Hackers exploit WordPress sites to power next-generation ClickFix phishing attacks

7 Min Read
WhatsApp malware 'Maverick' hijacks browser sessions and targets Brazil's largest banks
Technology

WhatsApp malware ‘Maverick’ hijacks browser sessions and targets Brazil’s largest banks

9 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?