PT-2025-42147 · Microsoft · Windows Server Update Services+1

Published

2025-10-14

·

Updated

2026-03-19

·

CVE-2025-59287

CVSS v2.0

10

Critical

AV:N/AC:L/Au:N/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions Microsoft Windows Server Update Services (WSUS) versions prior to the October 2025 security updates.
Description A critical remote code execution (RCE) vulnerability exists in Windows Server Update Services (WSUS) due to unsafe deserialization of untrusted data. This allows unauthenticated attackers to execute arbitrary code with system privileges. The vulnerability, identified as CVE-2025-59287, has been actively exploited in the wild, with attackers using tools like PowerCat and certutil to deploy malware such as ShadowPad and Skuld Stealer. Exploitation involves sending crafted requests to the WSUS service, potentially leading to full system compromise and data theft. Multiple security researchers and CISA have confirmed active exploitation and have issued alerts. Attackers have been observed using various techniques, including DLL sideloading and PowerShell scripts, to maintain persistence and evade detection.
Recommendations Apply the latest security updates released by Microsoft for WSUS. If patching is not immediately possible, restrict access to the WSUS server and block inbound traffic on ports 8530 and 8531. Monitor WSUS server logs for suspicious activity and indicators of compromise.

Exploit

Fix

RCE

LPE

Deserialization of Untrusted Data

Weakness Enumeration

Related Identifiers

BDU:2025-12999
CVE-2025-59287

Affected Products

Windows
Windows Server Update Services