CVE Alert: CVE-2025-59287 – Microsoft – Windows Server 2019

CVE-2025-59287

CRITICALExploitation active

Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network.

CVSS v3.1 (9.8)
Vendor
Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft
Product
Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows Server 2025 (Server Core installation), Windows Server 2022, 23H2 Edition (Server Core installation), Windows Server 2025, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation)
Versions
10.0.17763.0 lt 10.0.17763.7922 | 10.0.17763.0 lt 10.0.17763.7922 | 10.0.20348.0 lt 10.0.20348.4297 | 10.0.26100.0 lt 10.0.26100.6905 | 10.0.25398.0 lt 10.0.25398.1916 | 10.0.26100.0 lt 10.0.26100.6905 | 10.0.14393.0 lt 10.0.14393.8524 | 10.0.14393.0 lt 10.0.14393.8524 | 6.2.9200.0 lt 6.2.9200.25728 | 6.2.9200.0 lt 6.2.9200.25728 | 6.3.9600.0 lt 6.3.9600.22826 | 6.3.9600.0 lt 6.3.9600.22826
CWE
CWE-502, CWE-502: Deserialization of Untrusted Data
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
Published
2025-10-14T17:01:47.629Z
Updated
2025-10-24T17:37:44.954Z

AI Summary Analysis

Risk verdict

Critical risk with active exploitation indicators; urgent patching and containment warranted.

Why this matters

The vulnerability enables remote code execution with no authentication and no user interaction, effectively giving an attacker full control of the WSUS server. Compromise of the update management infrastructure can facilitate broad lateral movement to connected devices and critical servers, undermining patching, security controls, and incident response.

Most likely attack path

Attacker can target WSUS over the network (AV:N) with low complexity and no privileges required (PR:N, UI:N), enabling immediate code execution. Once on the WSUS host, the attacker could expand access to adjacent systems via update distribution mechanisms, scheduled tasks, or service accounts, potentially compromising domain-joined endpoints and escalating impact (C/I/A: High).

Who is most exposed

Enterprises using on-premises WSUS across data centres or cloud-connected networks; servers often sit in internal networks with limited segmentation, making WSUS a high-value, high-visibility target.

Detection ideas

  • Unusual or failed/deserialization-related events on WSUS (Application logs) indicating CWE-502 activity.
  • Unexpected network connections to/from WSUS, or spikes in update traffic to downstream servers.
  • New or altered services, scheduled tasks, or service accounts on WSUS hosts.
  • Anomalous PowerShell or WMI activity originating from the WSUS server.
  • Indicators of post-exploitation movement targeting update infrastructure (e.g., access from non-admin hosts).

Mitigation and prioritisation

  • Apply the latest Microsoft patch for the affected Windows Server versions immediately; verify patch status across all WSUS hosts.
  • If patching is delayed, implement strict network access controls: limit WSUS exposure to trusted management hosts; segment network with firewall rules.
  • Enable and tune EDR/AMT to detect deserialization, remote code execution, and process integrity changes on WSUS.
  • Validate backups and plan a controlled patch rollout with change-management sign-off; test in staging before broad deployment.
  • Review and harden WSUS configuration, reduce unnecessary remote access, and monitor for anomalous updates or replication activity.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features