Attackers at the moment are exploiting a critical-severity Home windows Server Replace Service (WSUS) vulnerability, which already has publicly obtainable proof-of-concept exploit code.
Tracked as CVE-2025-59287, this distant code execution (RCE) flaw impacts solely Home windows servers with the WSUS Server function enabled to behave as an replace supply for different WSUS servers inside the group (a function that is not enabled by default).
Menace actors can exploit this vulnerability remotely in low-complexity assaults that do not require privileges or consumer interplay, permitting them to run malicious code with SYSTEM privileges. Underneath these circumstances, the safety flaw is also doubtlessly wormable between WSUS servers.
On Thursday, Microsoft launched out-of-band safety updates for all impacted Home windows Server variations to “comprehensively deal with CVE-2025-59287,” and suggested IT directors to put in them as quickly as doable:
Microsoft additionally shared workarounds for admins who cannot instantly deploy the emergency patches, together with disabling the WSUS Server function on susceptible programs to take away the assault vector.
Over the weekend, cybersecurity agency HawkTrace Safety launched proof-of-concept exploit code for CVE-2025-59287 that would not enable arbitrary command execution.
Exploited within the wild
Dutch cybersecurity agency Eye Safety reported earlier at this time that it has already noticed scanning and exploitation makes an attempt this morning, with not less than one in every of its clients’ programs compromised utilizing a special exploit than the one shared by Hawktrace over the weekend.
Additionally, whereas WSUS servers aren’t often uncovered on-line, Eye Safety says it discovered roughly 2,500 situations worldwide, together with 250 in Germany and about 100 within the Netherlands.
American cybersecurity firm Huntress additionally discovered proof of CVE-2025-59287 assaults focusing on WSUS situations with their default ports (8530/TCP and 8531/TCP) uncovered on-line beginning Thursday, October 23.
“We anticipate exploitation of CVE-2025-59287 to be restricted; WSUS isn’t usually exposing ports 8530 and 8531. Throughout our companion base, we’ve noticed ~25 hosts prone,” Huntress stated.
Within the assaults noticed by Huntress, the risk actors executed a PowerShell command that carried out reconnaissance of the interior Home windows area, which was then despatched to a webhook.
This information included the output from the next instructions:
- whoami – The at present logged in consumer identify.
- web consumer /area – Lists each consumer account within the Home windows area.
- ipconfig /all – Show the community configuration for all community interfaces.
The Netherlands Nationwide Cyber Safety Centre (NCSC-NL) confirmed the 2 corporations’Â findings at this time, advising admins of the elevated threat given {that a} PoC exploit is already obtainable.
“The NCSC has discovered from a trusted companion that exploitation of the vulnerability with identifier CVE-2025-59287 was noticed on October 24, 2025,” the NCSC-NL warned in a Friday advisory.
“It isn’t frequent follow for a WSUS service to be publicly accessible through the web. Public proof-of-concept code for the vulnerability is now obtainable, rising the danger of exploitation.”
Microsoft has categorised CVE-2025-59287 as “Exploitation Extra Possible,” indicating it’s an interesting goal for attackers; nevertheless, it has not but up to date its advisory to verify energetic exploitation.
Replace October 24, 13:51 EDT: Added extra particulars on energetic exploitation from Huntress Labs.

