InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Critical, newly patched Microsoft WSUS flaw exploited
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Critical, newly patched Microsoft WSUS flaw exploited
Technology

Critical, newly patched Microsoft WSUS flaw exploited

October 25, 2025 6 Min Read
Share
Critical WSUS Vulnerability
SHARE

Microsoft on Thursday released an out-of-band security update that patches a critical severity vulnerability in Windows Server Update Service (WSUS) using a publicly available proof-of-concept (POC) exploit. This exploit is being used in the wild.

The vulnerability in question is CVE-2025-59287 (CVSS score: 9.8), the WSUS remote code execution flaw was originally fixed by the tech giant as part of the Patch Tuesday update published last week.

Three security researchers, MEOW, f7d8c52bec79e42795cf15888b85cbad, and Markus Wulftange of CODE WHITE GmbH, are credited with discovering and reporting this bug.

This shortcoming pertains to cases in which WSUS deserializes untrusted data, allowing an unauthorized attacker to execute code over the network. Note that this vulnerability does not affect Windows servers that do not have the WSUS server role enabled.

In a hypothetical attack scenario, a remote unauthenticated attacker could send a crafted event that triggers insecure object deserialization in a “traditional serialization mechanism”, leading to remote code execution.

According to Batuhan Er, a security researcher at HawkTrace, the issue is caused by “insecure deserialization of the AuthorizationCookie object sent to the GetCookie() endpoint. The encrypted cookie data is decrypted using AES-128-CBC and then deserialized by a BinaryFormatter without proper type validation, allowing remote code execution with SYSTEM privileges.”

It is worth noting that Microsoft itself previously recommended that developers stop using BinaryFormatter for deserialization due to the fact that it is unsafe to use BinaryFormatter with untrusted input. The BinaryFormatter implementation was then removed from .NET 9 in August 2024.

.NET executables deployed via CVE‑2025‑59287

“To comprehensively address CVE-2025-59287, Microsoft is updating supported versions of Windows Server: Windows Server 2012, Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server 2022, Windows Server 2022, 23H2 Edition (Server Core installation), and Windows Server We have released an out-of-band security update for 2025,” Redmond said. Update.

See also  Sneaky 2FA phishing kit adds BitB pop-up designed to mimic browser address bar

After installing the patch, we recommend restarting your system for the update to take effect. If out-of-band cannot be applied, users can take one of the following actions to protect against defects:

  • Disable the WSUS server role for the server (if enabled)
  • Block incoming traffic to ports 8530 and 8531 on the host firewall.

“Do not revert these workarounds until you have installed the updates,” Microsoft warns.

The development comes after the Dutch National Cyber ​​Security Center (NCSC) announced that it had “learned from a trusted partner that an exploit of CVE-2025-59287 was observed on October 24, 2025.”

Eye Security, which notified NCSC-NL of the actual exploit, said it first observed the vulnerability being exploited at 6:55 a.m. UTC, dropping a Base64-encoded payload targeting anonymous customers. The payload, a .NET executable file, “takes the value ‘aaaa’ request header and executes it directly using cmd.exe.”

“This is a payload that is sent to a server and uses a request header named ‘aaaa’ as the source of the command to be executed,” Eye Security CTO Piet Kerkhofs told The Hacker News. “This prevents the command from appearing directly in the log.”

When asked if the exploit could have occurred earlier than today, Kerkhofs noted, “The HawkTrace PoC was released two days ago and can use a standard ysoserial .NET payload, so the elements of exploitation were present.”

Cybersecurity firm Huntress also said that it detected a threat actor targeting WSUS instances exposed on default ports (8530/TCP and 8531/TCP) starting at approximately 23:34 UTC on October 23, 2025. However, the company notes that WSUS does not often expose ports 8530 and 8531, so exploitation of CVE-2025-59287 is likely to be limited.

“The attacker leveraged the exposed WSUS endpoint to send a specially crafted request (multiple POST calls to the WSUS web service) that triggered a deserialization RCE to the update service.”

See also  WhatsApp malware 'Maverick' hijacks browser sessions and targets Brazil's largest banks

The exploit activity causes the WSUS worker process to spawn a “cmd.exe” and PowerShell instance, leading to the download and execution of a Base64-encoded PowerShell payload whose purpose is to enumerate exposed servers for network and user information and exfiltrate the results to an attacker-controlled Webhook(.) site URL.

“We re-released this CVE after confirming that the initial update did not fully mitigate the issue. Customers who installed the latest update are already protected,” a Microsoft spokesperson told the publication when asked for comment.

The company also emphasized that this issue does not affect servers that do not have the WSUS server role enabled, and encouraged affected customers to follow the guidance on the CVE page.

Given that PoC exploits are available and exploits have been detected, it is important for users to patch as soon as possible to mitigate the threat. The US Cybersecurity and Infrastructure Security Agency (CISA) has also added the flaw to its Known Exploited Vulnerabilities (KEV) catalog and requires federal agencies to fix it by November 14, 2025.

(Article updated after publication with additional insights from Eye Security, Huntress, and response from Microsoft.)

Share This Article
Twitter Copy Link
Previous Article Malys, the demon-exorcist roguelike deck builder, reaches 1.0 with an evil vibe that stands out from the rest Malys, the demon-exorcist roguelike deck builder, reaches 1.0 with an evil vibe that stands out from the rest
Next Article The youth movement is shaking up the Democratic Party. Does age equal obsolescence? The youth movement is shaking up the Democratic Party. Does age equal obsolescence?

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

Batshadow Group hunts job seekers using the new GO-based "Vampire Bot" malware
Technology

Batshadow Group hunts job seekers using the new GO-based “Vampire Bot” malware

4 Min Read
GPT-5 agent that automatically detects and fixes code defects
Technology

GPT-5 agent that automatically detects and fixes code defects

3 Min Read
The new report links research firms Bieta and CIII to MSS Cyber ​​Operations in China
Technology

The new report links research firms Bieta and CIII to MSS Cyber ​​Operations in China

4 Min Read
Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year
Technology

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

4 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?