Out-of-Band Security Update to Mitigate Windows Server Update Service Vulnerability - CVE-2025-59287

Published on: October 29, 2025

Out-of-Band Security Update to Mitigate Windows Server Update Service Vulnerability - CVE-2025-59287

Overview:

A critical remote code execution (RCE) vulnerability has been identified in the Windows Server Update Services (WSUS) component of certain Microsoft Windows Server versions, tracked as CVE?2025?59287. The vulnerability stems from unsafe deserialization of untrusted data, enabling an unauthenticated attacker to execute arbitrary code with SYSTEM-level privileges on a vulnerable WSUS server. 

An out-of-band security update was released by Microsoft on 23-24 October 2025 to address this flaw, following the appearance of proof-of-concept (PoC) exploit code and evidence of active exploitation in the wild

Who It Impacts:

  • Organisations that host WSUS servers — i.e., servers where the WSUS Server Role is enabled. Servers without the WSUS role are not affected.
  • Windows Server installations of versions 2012, 2012 R2, 2016, 2019, 2022 (including 23H2 Server Core) and 2025, when configured with the WSUS Server Role.
  • Any enterprise environment where the WSUS instance is reachable (internally or externally) — especially if exposed via default ports or lacking proper isolation.

How It Impacts:

  • The vulnerability allows a remote, unauthenticated attacker to send a specially crafted request to the WSUS service, triggering unsafe object deserialization and resulting in SYSTEM-level code execution.
  • Because WSUS is responsible for distributing updates to many client machines, a compromised WSUS server can act as a pivot point: malicious updates or code can be pushed downstream, leading to widespread enterprise compromise. 
  • The flaw has a very high severity with CVSS score of 9.8 and some described as potentially “wormable” between WSUS servers. 
  • If the WSUS server is exposed to the internet (or reachable by attackers), the risk increases significantly. Even internally reachable WSUS servers are at risk of lateral movement by attackers already inside the network.

Because WSUS servers are typically trusted infrastructure components, exploitation can lead to a supply-chain-like compromise within the organization.

Affected Versions:

ProductAffected
Windows Server 2012 / 2012 R2Yes
Windows Server 2016Yes
Windows Server 2019Yes
Windows Server 2022Yes
Windows Server 2025Yes
Windows Server Core (23H2 and later)Yes

Note: Systems without the WSUS Server Role enabled are not affected.

Recommendations:

  1. Immediate Patch Deployment:
    • Apply Microsoft’s out-of-band update released for CVE-2025-59287 (October 23-24, 2025) on all affected WSUS servers. 
    • Reboot the server after installation to complete the mitigation.
    • Confirm that the update supersedes any earlier October 2025 update for this vulnerability.
  2. If Patching Cannot Be Immediately Completed:
    • Disable the WSUS Server Role temporarily until patching can be performed — understanding this will stop update distribution. 
    • Block inbound traffic to WSUS default ports 8530 (HTTP) and 8531 (HTTPS) at the host firewall (not just network perimeter) until the server is patched. 
  3. Review Network Exposure:
    • Confirm that WSUS servers are not publicly accessible if at all possible. Restrict access to trusted networks only. 
    • Audit firewall and perimeter configurations to ensure that WSUS ports are not exposed or reachable by untrusted actors.
  4. Monitoring and Logging:
    • Review WSUS server logs and host-level event logs for unusual activity (e.g., unexpected HTTP POSTs to WSUS endpoints, process creation by WSUS worker process, unexpected network connections).
    • Monitor for lateral movement or suspicious update distribution activity stemming from WSUS.
  5. Update Patch Management Policies:
    • Ensure that all WSUS instances are identified and tracked in your asset/inventory management.
    • Validate that update management workflows account for emergency (out-of-band) patches outside normal monthly cycles.
    • Consider the risk of continuing to rely on on-premises WSUS in highly exposed environments; evaluate alternatives such as cloud-based update services if appropriate.

Reference:

https://www.cisa.gov/news-events/alerts/2025/10/24/microsoft-releases-out-band-security-update-miti…

https://unit42.paloaltonetworks.com/microsoft-cve-2025-59287/?utm

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287

https://www.cve.org/CVERecord?id=CVE-2025-59287

Conclusion:

This is a high-urgency vulnerability for any organization using WSUS servers. Immediate patching is strongly recommended. If patching cannot be done immediately, disable the WSUS role or block the relevant ports until the update is applied. Failure to address this could lead to full compromise of the WSUS server, potential malicious update propagation, and significant enterprise risk.