Code Defence Cyber security

50+ Orgs Hit by WSUS Flaw (CVE-2025-59287) in Likely Reconnaissance Campaign

At least 50 organizations, mostly in the US, have been compromised by attackers exploiting a critical flaw (CVE-2025-59287) in Windows Server Update Service (WSUS). Researchers at Sophos and Google suspect this is a reconnaissance phase, with attackers gathering data for future, larger attacks.

Business Impact

Compromising WSUS is a “keys to the kingdom” attack. It allows attackers to control the update process for every Windows machine in the organization, enabling them to deploy malware (like ransomware) at scale, disguised as a legitimate Microsoft update.

Why It Happened

The RCE flaw in WSUS allows for deserialization of untrusted data. An initial patch from Microsoft was insufficient, requiring an emergency out-of-band patch last week, which many organizations have not yet applied, leaving them vulnerable.

Recommended Executive Action

Mandate the immediate application of the *second*, out-of-band emergency patch for CVE-2025-59287. Direct the SOC to use CISA’s guidance to hunt for signs of compromise, as attackers may already have a foothold in the network.

Hashtags: #WSUS #Microsoft #Vulnerability #PatchManagement #CyberSecurity #RCE #CVE #InfoSec

Scroll to Top

Review My Order

0

Subtotal