SOC Prime Bias: Critical

27 Oct 2025 09:11

CVE-2025-59287: Windows Server Update Services Remote Code Execution Vulnerability

Author Photo
Ruslan Mikhalov Chief of Threat Research at SOC Prime linkedin icon Follow
CVE-2025-59287: Windows Server Update Services Remote Code Execution Vulnerability
shield icon

Detection stack

  • AIDR
  • Alert
  • ETL
  • Query

Summary

Threat actors are abusing a newly disclosed remote code execution flaw in Microsoft Windows Server Update Services. The vulnerability (CVE-2025-59287) allows unauthenticated attackers to send crafted requests to WSUS endpoints on ports 8530 and 8531 and achieve code execution. Exploited hosts run PowerShell payloads that enumerate system information and exfiltrate data to external webhooks. The activity was observed across multiple customer environments by Huntress.

Vulnerability Details

Huntress detected malicious POST requests to WSUS web services that triggered deserialization in the AuthorizationCookie. Process chains showed wsusservice.exe or w3wp.exe spawning cmd.exe and powershell.exe to run a Base64‑encoded PowerShell command. The payload gathered user and network data and sent it to a remote webhook via Invoke‑WebRequest or curl. Proxy networks were used to hide the attackers’ origin.

The bug has been observed exploited in the wild and a public PoC exists; Microsoft issued an out-of-band fix on October 23, 2025, and interim mitigations include disabling the WSUS Server role or blocking inbound access to WSUS management ports until patched.

Mitigation

Microsoft released an out‑of‑band patch for CVE-2025-59287; organizations should apply the update immediately. Limit exposure by restricting inbound traffic to WSUS ports 8530/TCP and 8531/TCP to trusted management hosts only. Isolate WSUS servers from the internet and monitor for unauthorized POST requests to WSUS web service endpoints.

Attack Flow

CVE-2025-59287 Simulation

Simulation Execution

Prerequisite: The Telemetry & Baseline Pre‑flight Check must have passed.

Rationale: This section details the precise execution of the adversary technique (TTP) designed to trigger the detection rule. The commands and narrative MUST directly reflect the TTPs identified and aim to generate the exact telemetry expected by the detection logic. Abstract or unrelated examples will lead to misdiagnosis.

Attack Narrative & Commands:

Step 1 – Prepare a decoy WSUS binary:
Copy a legitimate system binary (e.g., C:\Windows\System32\wsusservice.exe does not normally exist, so we clone cmd.exe and rename it to mimic the vulnerable service.


Step 2 – Exploit CVE‑2025‑59287:
The vulnerability allows an attacker to supply a command line to the WSUS service which is executed with SYSTEM privileges.
The attacker crafts a payload that causes the fake wsusservice.exe to launch cmd.exe and a child PowerShell process.


Step 3 – Generate the expected process chain:
wsusservice.exe (parent) → cmd.exe (child) → cmd.exe (grand‑child) and powershell.exe (grand‑child).
This exact chain satisfies the Sigma rule’s selection_wsusservice condition.
Regression Test Script: