Critical RCE Flaw in WSUS Allows Unauthenticated SYSTEM Takeover

Critical Unauthenticated RCE Vulnerability (CVE-2025-59287, CVSS 9.8) Disclosed in Microsoft WSUS

CRITICAL
October 19, 2025
October 24, 2025
4m read
VulnerabilityPatch ManagementSupply Chain Attack

Related Entities(initial)

Organizations

Products & Tech

Windows Server Update Services (WSUS)Windows Server

CVE Identifiers

CVE-2025-59287
CRITICAL
CVSS:9.8

Full Report(when first published)

Executive Summary

A critical vulnerability, CVE-2025-59287, has been disclosed in Microsoft Windows Server Update Services (WSUS). This flaw carries a CVSS base score of 9.8 (Critical) and allows an unauthenticated attacker with network access to achieve remote code execution (RCE) with SYSTEM privileges on the WSUS server. The attack can be initiated by sending a specially crafted encrypted cookie to a specific web service endpoint. A successful exploit would grant an attacker complete control over the update server, potentially enabling a catastrophic internal supply chain attack. Microsoft released a patch as part of the October 2025 Patch Tuesday, and administrators are urged to apply it immediately.


Vulnerability Details

  • CVE ID: CVE-2025-59287
  • CVSS Score: 9.8 (Critical)
  • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Description: The vulnerability lies within the GetCookie() endpoint of the WSUS web service. It is caused by the unsafe deserialization of an AuthorizationCookie object. The server's EncryptionHelper.DecryptData() method uses a hardcoded AES-128-CBC key to decrypt cookie data provided by an attacker. The decrypted data is then passed to BinaryFormatter for deserialization without any type validation.

This lack of validation is the crux of the issue. An attacker can craft a malicious object, serialize it, encrypt it using the known AES key and initialization vector, and send it within the AuthorizationCookie. The server will blindly decrypt and deserialize this object, leading directly to arbitrary code execution in the context of the WSUS application pool, which runs with SYSTEM privileges.

This type of vulnerability is particularly dangerous because it is unauthenticated, requires no user interaction, and results in the highest level of privilege on a highly sensitive server.


Affected Systems

  • All versions of Windows Server running the Windows Server Update Services (WSUS) role are affected.
  • This includes but is not limited to Windows Server 2016, 2019, and 2022.

Exploitation Status

As of the disclosure, Microsoft is not aware of any active exploitation of CVE-2025-59287 in the wild. However, the company has assessed that exploitation is "more likely." Given the public availability of technical details and the critical nature of the flaw, proof-of-concept (PoC) exploits are expected to be developed quickly by security researchers and threat actors.


Impact Assessment

The impact of exploiting this vulnerability is catastrophic. A WSUS server is a central point of trust within an enterprise network, responsible for approving and distributing software updates to all Windows clients and servers. An attacker with SYSTEM access to a WSUS server could:

  • Deploy Malware Enterprise-Wide: Approve and push malicious updates disguised as legitimate patches from Microsoft, leading to a widespread compromise of the entire organization.
  • Denial of Service: Prevent legitimate security patches from being deployed, leaving the organization vulnerable to other attacks.
  • Espionage and Data Exfiltration: Use the WSUS server as a powerful, trusted pivot point to move laterally across the network and exfiltrate sensitive data.

Compromising WSUS is a classic supply chain attack, but one that occurs inside the victim's own network perimeter.


Detection Methods

  • Vulnerability Scanning: Use authenticated vulnerability scans to identify WSUS servers that are missing the October 2025 security update.
  • Web Log Analysis: Monitor IIS logs on WSUS servers for requests to the GetCookie() endpoint in /ClientWebService/client.asmx. While some legitimate traffic may exist, a spike in requests or requests from unusual internal IP addresses should be investigated.
  • Endpoint Monitoring: An EDR solution on the WSUS server may detect suspicious post-exploitation activity, such as the spawning of cmd.exe or powershell.exe by the w3wp.exe process associated with the WSUS application pool.

D3FEND Techniques for Detection:


Remediation Steps

  1. Apply Security Update Immediately: The only effective remediation is to install the security updates for CVE-2025-59287 released in the October 2025 Patch Tuesday. This should be treated as an emergency change.
  2. Network Segmentation (Compensating Control): If patching is not immediately possible, restrict network access to the WSUS server. Only client endpoints that need to receive updates and a small number of administrative workstations should be able to communicate with it on the required ports (typically 8530/8531).
  3. Verify Patching: After deployment, confirm that the patch has been successfully installed on all WSUS servers in the environment.

D3FEND Countermeasures:

  • Harden: The primary countermeasure is D3-SU - Software Update. Applying the patch from Microsoft directly fixes the unsafe deserialization flaw.
  • Isolate: As a compensating control, use D3-NI - Network Isolation to limit network access to the WSUS server, reducing its attack surface.

Timeline of Events

1
October 14, 2025
Microsoft releases a patch for CVE-2025-59287 as part of its October 2025 Patch Tuesday.
2
October 19, 2025
This article was published

Article Updates

October 24, 2025

WSUS RCE (CVE-2025-59287) now actively exploited in the wild; CISA adds to KEV catalog, prompting emergency out-of-band patch.

MITRE ATT&CK Mitigations

Applying the security update from Microsoft is the most direct and effective way to remediate this vulnerability.

Mapped D3FEND Techniques:

As a compensating control, restricting network access to the WSUS server to only authorized clients and administrators can limit the attack surface.

Mapped D3FEND Techniques:

While patching is key, general exploit protection mechanisms can sometimes disrupt the exploitation chain of deserialization vulnerabilities.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The immediate and highest-priority action for all organizations using WSUS is to apply the October 2025 security update that addresses CVE-2025-59287. This is not a routine patch; it is an emergency change. Due to the 9.8 CVSS score, the unauthenticated nature of the exploit, and the catastrophic potential of a WSUS server compromise, this patch must be deployed without delay. Use your organization's patch management system to push the update to all WSUS servers and use vulnerability scanning tools to verify that the patch has been successfully applied and the vulnerability is closed. No other mitigation provides the same level of protection as fixing the underlying code flaw.

As a critical compensating control, WSUS servers should be placed in a highly restricted network segment. This vulnerability allows an attacker with any network access to the server to exploit it. Therefore, it is vital to reduce that access to the absolute minimum. Configure firewall rules to ensure that only client subnets can communicate with the WSUS server on its required ports (e.g., 8530/8531), and only a small, dedicated set of administrative jump boxes can access it for management purposes. All other inbound traffic should be explicitly denied. This network isolation drastically reduces the attack surface, ensuring that only a limited number of systems could even attempt to exploit CVE-2025-59287, even before it is patched.

Sources & References(when first published)

Patch Tuesday, October 2025 'End of 10' Edition
Krebs on Security (krebsonsecurity.com) October 14, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

CVE-2025-59287WSUSRCEPatch Tuesdaydeserializationcritical vulnerabilitysupply chain

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading