Hackers are actively exploiting a critical flaw in Microsoft’s Windows Server Update Services (WSUS), with security researchers reporting widespread attempts in the wild.
The vulnerability, tracked as CVE-2025-59287, allows remote code execution on unpatched WSUS servers, potentially granting attackers full control over enterprise networks.
As of October 27, 2025, firms monitoring global scan data have identified at least 2,800 exposed WSUS instances online, scanned via ports 8530 and 8531, though not all may be vulnerable.
The issue stems from a deserialization flaw in WSUS’s update approval process, first disclosed earlier this month. Microsoft rated it as critical with a CVSS 3.1 score of 9.8, highlighting its ease of exploitation without authentication.
A proof-of-concept (POC) exploit surfaced on underground forums shortly after patching guidance was released on October 15, fueling rapid attacks.
“We’re seeing exploitation attempts spike since the POC dropped,” said a spokesperson for cybersecurity firm ShadowPeak, which began fingerprinting WSUS deployments last week.
Their scans on October 25 revealed the 2,800 instances, primarily in North America and Europe, underscoring the vulnerability’s reach in corporate environments.
Exploitation Tactics And Real-World Impact
Attackers are leveraging the POC to chain the flaw with lateral movement techniques, targeting WSUS servers that manage patch deployments across Windows fleets.
Once compromised, hackers can deploy malicious updates, exfiltrate sensitive data, or install persistent backdoors.
Early indicators include anomalous traffic to WSUS endpoints and unusual update approvals logged in the event viewer IDs 10016 and 20005.
A notable incident involved a mid-sized U.S. financial firm, where intruders used the vulnerability to access internal Active Directory, leading to a brief outage on October 23.
While Microsoft has urged immediate patching via its October 2025 security bulletin, adoption lags, with only 40% of scanned instances showing signs of mitigation, per ShadowPeak’s telemetry.
This delay amplifies risks for organizations relying on WSUS for automated updates, especially in hybrid cloud setups where servers expose HTTP/HTTPS ports to the internet.
| CVE ID | Affected Product | CVSS 3.1 Score | Description | Impact |
|---|---|---|---|---|
| CVE-2025-59287 | Microsoft WSUS (versions < 10.0.20348.2000) | 9.8 (Critical) | Deserialization vulnerability in update handling | Remote code execution; network compromise |
Experts warn that unmonitored WSUS setups, often overlooked in legacy infrastructure, are prime targets for ransomware groups like LockBit 3.0, which have referenced the POC in their leak sites.
Mitigations
To counter the threat, Microsoft recommends applying the latest cumulative updates and restricting WSUS port access via firewalls, ideally, limiting it to internal VPNs.
Tools like Nessus or custom scripts can fingerprint exposures, while endpoint detection platforms should flag deserialization anomalies.
“This isn’t just a patch issue; it’s a reminder to audit update servers regularly,” advised cybersecurity analyst Elena Vasquez.
As exploitation evolves, the 2,800 exposed instances signal a ticking clock for IT teams. With no end to the scans in sight, the vulnerability could drive a wave of breaches if patching doesn’t accelerate.
Organizations should prioritize WSUS hardening to safeguard their update ecosystems against this pervasive peril.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.



