Close Menu

    Subscribe to Updates

    Get the latest tech news from Tallwire.

      What's Hot

      Cybersecurity & Resilience Bill Raises Compliance Stakes For Providers

      February 28, 2026

      AI Password Generation Poses Major Security Risk, Experts Warn

      February 28, 2026

      Starkiller Phishing Kit Exposes Dangerous New Wave of Proxy-Based Credential Theft

      February 28, 2026
      Facebook X (Twitter) Instagram
      • Tech
      • AI
      • Get In Touch
      Facebook X (Twitter) LinkedIn
      TallwireTallwire
      • Tech

        Microsoft Copilot Bug Exposed “Confidential” Emails Despite Label

        February 28, 2026

        Taara Beam Launch Brings 25Gbps Optical Wireless Networks to Cities

        February 27, 2026

        Global Memory Shortage Set to Push Up Prices on Phones, Laptops, and More

        February 27, 2026

        OpenAI’s Stargate Data Center Ambitions Hit Major Roadblocks

        February 27, 2026

        Large Hadron Collider Enters Third Shutdown For Major Upgrade

        February 26, 2026
      • AI

        AI Password Generation Poses Major Security Risk, Experts Warn

        February 28, 2026

        Microsoft Copilot Bug Exposed “Confidential” Emails Despite Label

        February 28, 2026

        AI Productivity Gains Concentrated Among High-Skilled Workers, Study Finds

        February 28, 2026

        X to Let Users Mark Posts ‘Made With AI’ as Platform Eyes Voluntary Disclosure Feature

        February 27, 2026

        Uber Rolls Out “Uber Autonomous Solutions” To Support Third-Party Robotaxi Partners

        February 27, 2026
      • Security

        AI Password Generation Poses Major Security Risk, Experts Warn

        February 28, 2026

        Microsoft Copilot Bug Exposed “Confidential” Emails Despite Label

        February 28, 2026

        Starkiller Phishing Kit Exposes Dangerous New Wave of Proxy-Based Credential Theft

        February 28, 2026

        Single Compromised Account Exposes 1.2 Million French Banking Records

        February 28, 2026

        PayPal Data Breach Exposed Customer Personal Information For Months

        February 27, 2026
      • Health

        Social Media Addiction Trial Draws Grieving Parents Seeking Accountability From Tech Platforms

        February 19, 2026

        Portugal’s Parliament OKs Law to Restrict Children’s Social Media Access With Parental Consent

        February 18, 2026

        Parents Paint 108 Names, Demand Snapchat Reform After Deadly Fentanyl Claims

        February 18, 2026

        UK Kids Turning to AI Chatbots and Acting on Advice at Alarming Rates

        February 16, 2026

        Landmark California Trial Sees YouTube Defend Itself, Rejects ‘Social Media’ and Addiction Claims

        February 16, 2026
      • Science

        Microsoft Claims 100 Percent Renewable Energy Match Across Global Electricity Use

        February 28, 2026

        Taara Beam Launch Brings 25Gbps Optical Wireless Networks to Cities

        February 27, 2026

        Large Hadron Collider Enters Third Shutdown For Major Upgrade

        February 26, 2026

        Google Phases Out Android’s Built-In Weather App, Replacing It With Search-Based Forecasts

        February 25, 2026

        Microsoft’s Breakthrough Suggests Data Could Be Preserved for 10,000 Years on Glass

        February 24, 2026
      • Tech

        Sam Altman Says ‘AI Washing’ Is Being Used to Mask Corporate Layoffs

        February 28, 2026

        Zuckerberg Testifies In Landmark Trial Over Alleged Teen Social Media Harms

        February 23, 2026

        Gay Tech Networks Under Spotlight In Silicon Valley Culture Debate

        February 23, 2026

        Google Co-Founder’s Epstein Contacts Reignite Scrutiny of Elite Tech Circles

        February 7, 2026

        Bill Gates Denies “Absolutely Absurd” Claims in Newly Released Epstein Files

        February 6, 2026
      TallwireTallwire
      Home»Tech»Microsoft Rushes Emergency Patch After Critical WSUS Vulnerability Actively Exploited in the Wild
      Tech

      Microsoft Rushes Emergency Patch After Critical WSUS Vulnerability Actively Exploited in the Wild

      Updated:February 21, 20265 Mins Read
      Facebook Twitter Pinterest LinkedIn Tumblr Email
      Microsoft Rushes Emergency Patch After Critical WSUS Vulnerability Actively Exploited in the Wild
      Microsoft Rushes Emergency Patch After Critical WSUS Vulnerability Actively Exploited in the Wild
      Share
      Facebook Twitter LinkedIn Pinterest Email

      A serious security flaw, tracked as CVE-2025-59287, has emerged in Microsoft‘s Windows Server Update Services (WSUS), enabling unauthenticated attackers to execute arbitrary code with SYSTEM-level privileges on servers that have the WSUS role enabled. According to the security firm Unit 42, Microsoft initially addressed the vulnerability in its October Patch Tuesday update but found the mitigation incomplete and subsequently issued an out-of-band (OOB) emergency update on October 23, 2025. The flaw involves unsafe deserialization of untrusted data via the GetCookie() endpoint, enabling remote code execution, and has been actively exploited in the wild with exposed WSUS instances under attack. The U.S. Cybersecurity & Infrastructure Security Agency (CISA) added the vulnerability to its Known Exploited Vulnerabilities Catalog on October 24 and ordered federal agencies to apply patches or disable WSUS role access immediately. Reports indicate hundreds to thousands of WSUS servers globally remain exposed via the default ports (8530/8531) and are attractive targets for lateral-movement attacks inside networks.

      Sources: Unit42, IT Pro

      Key Takeaways

      – Attackers are actively exploiting CVE-2025-59287 in the wild, targeting WSUS servers exposed via ports 8530/8531 and using crafted deserialization payloads to gain SYSTEM privileges.

      – The patch released during Microsoft’s regular October update did not fully mitigate the flaw, prompting an urgent out-of-band update and a CISA directive for federal agencies to patch or isolate affected systems.

      – Organizations that operate WSUS should immediately verify the WSUS role is not exposed to the internet, block inbound traffic on ports 8530 and 8531 if patching is delayed, or disable the WSUS server role altogether until fully secured.

      In-Depth

      The technology world is witnessing a grave reminder of how even trusted infrastructure components can become weaponised when security hygiene slips. In this case, the spotlight falls on Microsoft’s Windows Server Update Services (WSUS), a core enterprise tool for distributing patches across a network. The recently disclosed flaw, CVE-2025-59287, allows an unauthenticated remote adversary to execute arbitrary code with SYSTEM privileges merely by sending a specially crafted request to key WSUS endpoints. According to research by Unit 42, the root cause lies in unsafe deserialization of untrusted data (specifically AuthorizationCookie objects) via the venerable but deprecated BinaryFormatter, which is still present in these server installations. The vulnerability affects Windows Server versions spanning from 2012 up through 2025, provided the WSUS role is enabled.

      What elevates the urgency is the observation of active exploitation in real time. Threat-intelligence firms report that within hours of Microsoft’s emergency fix, attackers were scanning for exposed WSUS instances and launching reconnaissance sequences—commands such as whoami, net user /domain, ipconfig /all—via spawned cmd.exe and powershell.exe processes (often via wsusservice.exe or w3wp.exe). These reconnaissance actions are early steps toward lateral movement, data exfiltration, or full-scale compromise of an enterprise’s trust structure. One report cited the monitoring of some 100,000 hits in a week and hundreds of thousands of exposed WSUS servers.

      From a conservative operational perspective, this is a scenario that screams “act now or regret later.” The fact that the initial Microsoft patch was incomplete adds a layer of avoidable risk: enterprise IT teams often rely on routine monthly patches, and the assumption that a “Patch Tuesday” fix is sufficient may have bred complacency. The subsequent out-of-band patch and the step by CISA to add the flaw to its Known Exploited Vulnerabilities (KEV) catalog underline that this is not a theoretical threat—it’s a lived one. For federal agencies, the directive is clear and binding; for private enterprises, the logic remains stark: any delay in applying the proper updates or implementing interim mitigations like disabling the WSUS role or blocking inbound traffic to the default WSUS ports increases exposure to potentially catastrophic compromise.

      Moreover, the broader implication is a re-emphasis on segmentation and default-role exposure. WSUS is not designed to be a publicly exposed service; when it is, it becomes an ideal foothold for attackers masquerading inside trusted update distribution flows. The conservative takeaway: treat WSUS infrastructure with the same level of scrutiny and protection as you would your primary domain controllers or edge authentication servers. Disable any internet-facing WSUS endpoints immediately, audit your firewall rules, apply the out-of-band update today, and verify via logs and telemetry whether any anomalous POST requests or process chains (wsusservice.exe → cmd.exe → powershell.exe) have occurred.

      From a governance and risk standpoint, this incident should prompt a broader review of “trusted services” that are often forgotten once deployed. Legacy code paths like BinaryFormatter remain dangerous in modern environments, yet many organisations continue to rely on systems that have not been reviewed or hardened. The ability for an attacker to pivot from a WSUS server into an enterprise update chain, distribute malicious payloads disguised as legitimate updates, and silently compromise thousands of endpoints is a strategic risk that aligns all too well with recent supply-chain threat vectors.

      In short, for any enterprise running WSUS: time is of the essence. The risk is real, the fix is available, and the window to act has already begun to close.

      Microsoft Tim Cook
      Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
      Previous ArticleMicrosoft Pledges $15.2 Billion in UAE Investment After U.S. Clears Nvidia AI Chip Exports
      Next Article Microsoft’s Ambitious Rust Migration Plan Sparks Debate Over AI-Driven Rewrite Of C/C++ Codebase

      Related Posts

      Microsoft Copilot Bug Exposed “Confidential” Emails Despite Label

      February 28, 2026

      Microsoft Claims 100 Percent Renewable Energy Match Across Global Electricity Use

      February 28, 2026

      Taara Beam Launch Brings 25Gbps Optical Wireless Networks to Cities

      February 27, 2026

      Global Memory Shortage Set to Push Up Prices on Phones, Laptops, and More

      February 27, 2026
      Add A Comment
      Leave A Reply Cancel Reply

      Editors Picks

      Microsoft Copilot Bug Exposed “Confidential” Emails Despite Label

      February 28, 2026

      Taara Beam Launch Brings 25Gbps Optical Wireless Networks to Cities

      February 27, 2026

      Global Memory Shortage Set to Push Up Prices on Phones, Laptops, and More

      February 27, 2026

      OpenAI’s Stargate Data Center Ambitions Hit Major Roadblocks

      February 27, 2026
      Popular Topics
      picks Series A UAE Tech Series B Sundar Pichai Quantum computing Tim Cook Tesla Cybertruck Robotics SpaceX Qualcomm Samsung trending Ransomware spotlight Taiwan Tech Startup Satya Nadella Tesla Sam Altman
      Major Tech Companies
      • Apple News
      • Google News
      • Meta News
      • Microsoft News
      • Amazon News
      • Samsung News
      • Nvidia News
      • OpenAI News
      • Tesla News
      • AMD News
      • Anthropic News
      • Elbit News
      AI & Emerging Tech
      • AI Regulation News
      • AI Safety News
      • AI Adoption
      • Quantum Computing News
      • Robotics News
      Key People
      • Sam Altman News
      • Jensen Huang News
      • Elon Musk News
      • Mark Zuckerberg News
      • Sundar Pichai News
      • Tim Cook News
      • Satya Nadella News
      • Mustafa Suleyman News
      Global Tech & Policy
      • Israel Tech News
      • India Tech News
      • Taiwan Tech News
      • UAE Tech News
      Startups & Emerging Tech
      • Series A News
      • Series B News
      • Startup News
      Tallwire
      Facebook X (Twitter) LinkedIn Threads Instagram RSS
      • Tech
      • Entertainment
      • Business
      • Government
      • Academia
      • Transportation
      • Legal
      • Press Kit
      © 2026 Tallwire. Optimized by ARMOUR Digital Marketing Agency.

      Type above and press Enter to search. Press Esc to cancel.