PT-2025-42147 · Microsoft · Windows Server Update Services +1
Published
2025-10-14
·
Updated
2025-12-13
·
CVE-2025-59287
CVSS v2.0
10
10
Critical
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Windows Server Update Service (WSUS) versions prior to the October 24, 2025 patch.
Description
A critical remote code execution (RCE) vulnerability exists in Windows Server Update Service (WSUS) due to unsafe deserialization of untrusted data. This allows unauthenticated attackers to execute arbitrary code with SYSTEM privileges. The vulnerability, identified as CVE-2025-59287, has been actively exploited in the wild, with attackers using it to deploy malware such as ShadowPad. Exploitation involves sending crafted requests to the WSUS service, potentially through the
ClientWebService or SimpleAuthWebService endpoints. Attackers have been observed using tools like PowerCat, curl, and certutil to gain shell access and install malicious payloads. CISA has added CVE-2025-59287 to its Known Exploited Vulnerabilities Catalog, requiring federal agencies to patch by November 14, 2025. Several threat actors, including those associated with China, have been observed exploiting this vulnerability.Recommendations
Apply the out-of-band security update released by Microsoft on October 24, 2025, to address CVE-2025-59287. If patching is not immediately possible, consider disabling the WSUS role or blocking inbound traffic on ports 8530 and 8531. Monitor WSUS server logs for suspicious activity, including unusual network traffic and attempts to exploit the vulnerability. Implement YARA rules to detect exploitation attempts. Verify that the patch has been successfully applied and review system configurations for any signs of compromise.
Exploit
Fix
RCE
LPE
Deserialization of Untrusted Data
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-12999
CVE-2025-59287
Affected Products
Windows
Windows Server Update Services
References · 460
- 🔥 https://github.com/th1n0/CVE-2025-59287⭐ 229 🔗 86 · Exploit
- 🔥 https://github.com/Sid6Effect/CVE-2025-59287⭐ 210 🔗 65 · Exploit
- 🔥 https://github.com/Lupovis/Honeypot-for-CVE-2025-59287-WSUS⭐ 2 🔗 1 · Exploit
- 🔥 https://github.com/SUmidcyber/YaraRule/tree/main/CVE-2025-59287⭐ 1 · Exploit
- 🔥 https://gist.github.com/hawktrace/880b54fb9c07ddb028baaae401bd3951 · Exploit
- 🔥 https://hawktrace.com/blog/CVE-2025-59287 · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2025-59287 · Security Note
- https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287 · Vendor Advisory
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-59287 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59287 · Security Note
- https://bdu.fstec.ru/vul/2025-12999 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287 · Vendor Advisory
- https://github.com/besimorhino/powercat⭐ 2309 🔗 492 · Note
- https://github.com/SUmidcyber/YaraRule⭐ 1 · Note
- https://twitter.com/Cyber_O51NT/status/1993122143513567656 · Twitter Post