What's Happening?
Security researchers at Huntress have discovered active exploitation of a remote code execution (RCE) vulnerability in Windows Server Update Services (WSUS). This vulnerability, indexed as CVE-2025-59287,
allows unauthenticated attackers to remotely execute code with elevated SYSTEM privileges. Microsoft issued an out-of-band patch for this vulnerability earlier this month, rating it with a critical severity score of 9.8 out of 10. The United States Cybersecurity Infrastructure Agency (CISA) has added this vulnerability to its Known Exploited Vulnerabilities catalogue. Huntress observed threat actors exploiting the flaw across four of its customers, involving the execution of Base64-encoded payloads to enumerate servers and exfiltrate sensitive network and user information to a remote webhook site.
Why It's Important?
The exploitation of this vulnerability poses significant risks to enterprise networks, as WSUS is widely used by administrators to manage and distribute updates. The ability for attackers to execute code with elevated privileges can lead to unauthorized access and potential data breaches. This situation underscores the importance of timely patching and robust cybersecurity measures to protect sensitive information. Organizations that rely on WSUS must take immediate action to apply the available patches and mitigate the risk of exploitation. The incident highlights the ongoing challenges in securing software systems against vulnerabilities and the need for continuous vigilance in cybersecurity practices.
What's Next?
Organizations are advised to block inbound traffic to TCP ports 8530 and 8531, except for management hosts and Microsoft Update servers that require access to WSUS infrastructure. Microsoft has provided patches for Windows Server versions from 2012 to 2025, and reboots are required after updating. As WSUS servers are typically not exposed to the internet, Huntress expects limited in-the-wild exploitation. However, enterprises must remain alert to potential threats and ensure their systems are updated promptly. The cybersecurity community will likely continue monitoring the situation and provide further guidance as necessary.
Beyond the Headlines
The vulnerability exploits a .NET language serialization class called BinaryFormatter, which Microsoft has deemed insecure and removed in .NET version 9, released in 2024. This highlights the importance of using secure coding practices and the need for developers to stay informed about deprecated and insecure components. The incident may prompt organizations to review their software development and update processes to prevent similar vulnerabilities in the future.











