Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-59287— Windows Server Update Service (WSUS) Remote Code Execution Vulnerability

CVSS 9.8 · Critical KEV EPSS 71.40% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-59287

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Windows Server Update Service (WSUS) Remote Code Execution Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
可信数据的反序列化
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Windows Server 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Windows Server是美国微软(Microsoft)公司的一套服务器操作系统。 Microsoft Windows Server存在代码问题漏洞,该漏洞源于攻击者利用该漏洞可以远程执行代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
MicrosoftWindows Server 2012 6.2.9200.0 ~ 6.2.9200.25728 -
MicrosoftWindows Server 2012 (Server Core installation) 6.2.9200.0 ~ 6.2.9200.25728 -
MicrosoftWindows Server 2012 R2 6.3.9600.0 ~ 6.3.9600.22826 -
MicrosoftWindows Server 2012 R2 (Server Core installation) 6.3.9600.0 ~ 6.3.9600.22826 -
MicrosoftWindows Server 2016 10.0.14393.0 ~ 10.0.14393.8524 -
MicrosoftWindows Server 2016 (Server Core installation) 10.0.14393.0 ~ 10.0.14393.8524 -
MicrosoftWindows Server 2019 10.0.17763.0 ~ 10.0.17763.7922 -
MicrosoftWindows Server 2019 (Server Core installation) 10.0.17763.0 ~ 10.0.17763.7922 -
MicrosoftWindows Server 2022 10.0.20348.0 ~ 10.0.20348.4297 -
MicrosoftWindows Server 2022, 23H2 Edition (Server Core installation) 10.0.25398.0 ~ 10.0.25398.1916 -
MicrosoftWindows Server 2025 10.0.26100.0 ~ 10.0.26100.6905 -
MicrosoftWindows Server 2025 (Server Core installation) 10.0.26100.0 ~ 10.0.26100.6905 -

II. Public POCs for CVE-2025-59287

#POC DescriptionSource LinkShenlong Link
1PoC from hawktracehttps://github.com/keeganparr1/CVE-2025-59287-hawktracePOC Details
2WSUS Unauthenticated RCEhttps://github.com/jiansiting/CVE-2025-59287POC Details
3It is an Working exploit of new CVE found in WSUS.https://github.com/garvitv14/CVE-2025-59287POC Details
4Windows Server Update Service contains an insecure deserialization vulnerability caused by deserialization of untrusted data. An unauthorized attacker with network access can exploit this to execute arbitrary code remotely, potentially leading to full system compromise. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-59287.yamlPOC Details
5PoC for CVE-2025-59287https://github.com/0xBruno/WSUSploit.NETPOC Details
6Defensive PoC decoy for CVE-2025-59287 (WSUS) - emulates WSUS endpoints, captures request bodies and metadata, saves evidence for forensic analysis, and provides validation harness and detection rules.https://github.com/Lupovis/Honeypot-for-CVE-2025-59287-WSUSPOC Details
7CVE-2025-59287https://github.com/FurkanKAYAPINAR/CVE-2025-59287POC Details
8powershell version of hawktrace POC exploithttps://github.com/tecxx/CVE-2025-59287-WSUSPOC Details
9Module PowerShell de réponse à l'incident CVE-2025-59287 — WSUS Remote Code Execution (RCE)https://github.com/RadzaRr/WSUSResponderPOC Details
10Helps defenders find their WSUS configurations in the wake of CVE-2025-59287https://github.com/mubix/Find-WSUSPOC Details
11CVE-2025-59287 is a critical RCE vulnerability in Windows Server Update Services (WSUS) caused by unsafe deserialization of untrusted data. It allows remote attackers to execute arbitrary code without authentication. Urgent patching is advised due to active exploitation.https://github.com/mrk336/Breaking-the-Update-Chain-Inside-CVE-2025-59287-and-the-WSUS-RCE-ThreatPOC Details
12CVE-2025-59287 — Critical unauthenticated RCE in Windows Server Update Services (WSUS) via unsafe deserialization of an AuthorizationCookie, enabling SYSTEM-level compromise and active exploitation; patch or isolate WSUS (ports 8530/8531) immediately.https://github.com/AdityaBhatt3010/CVE-2025-59287-When-your-patch-server-becomes-the-attack-vectorPOC Details
13Guía de respuesta rápida y script de auditoría para CVE-2025-59287 (RCE crítica en WSUS).https://github.com/esteban11121/WSUS-RCE-Mitigation-59287POC Details
14Verificacion de vulnerabilidad en WSUS https://github.com/fsanzmoya/wsus_CVE-2025-59287POC Details
15CVE-2025-59287 注入WolfShell内存马https://github.com/0x7556/CVE-2025-59287POC Details
16This is an exploit script written in C# to aid gaining a reverse shell on targets with Windows Server Update Service(WSUS) CVE-2025-59287. We will deliver a reverse shell payload through encrypted SOAP req.https://github.com/QurtiDev/WSUS-CVE-2025-59287-RCEPOC Details
17WSUS vulnerability PoChttps://github.com/Sid6Effect/CVE-2025-59287POC Details
18Exploitation proof-of-concept for CVE-2025-59287 - a critical vulnerability in the Windows Server Update Service (WSUS) caused by the deserialization of untrusted data. This flaw allows an unauthorized attacker to execute arbitrary code over a network, posing a significant security risk.https://github.com/dexterm300/cve-2025-59287-exploit-pocPOC Details
19WSUS vulnerability PoChttps://github.com/th1n0/CVE-2025-59287POC Details
20Nonehttps://github.com/Twodimensionalitylevelcrossing817/CVE-2025-59287POC Details
21Nonehttps://github.com/Adel-kaka-dz/cve-2025-59287POC Details
22Nonehttps://github.com/17patmaks/CVE-2025-59287-Sigma-RulePOC Details
23CVE-2025-59287https://github.com/gud425/gud425.github.ioPOC Details
24Nonehttps://github.com/LuemmelSec/CVE-2025-59287---WSUS-SCCM-RCEPOC Details
25CVE 2025 59287https://github.com/you-dream-1hall/CVE-2025-59287POC Details
26🔍 Analyze WSUS deserialization behavior to enhance security, generate reports, and identify configuration weaknesses in your infrastructure.https://github.com/salman5230/CVE-2025-59287POC Details
27Nonehttps://github.com/ross-ns/WSUS-CVE-2025-59287POC Details
28CVE 2025 59287https://github.com/vatslaaeytoygag/CVE-2025-59287POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-59287

登录查看更多情报信息。

Same Patch Batch · Microsoft · 2025-10-14 · 167 CVEs total

CVE-2025-497089.9 CRITICALMicrosoft Graphics Component Elevation of Privilege Vulnerability
CVE-2025-553159.9 CRITICALASP.NET Security Feature Bypass Vulnerability
CVE-2025-592138.8 HIGHConfiguration Manager Elevation of Privilege Vulnerability
CVE-2025-587188.8 HIGHRemote Desktop Client Remote Code Execution Vulnerability
CVE-2025-592958.8 HIGHWindows URL Parsing Remote Code Execution Vulnerability
CVE-2025-592498.8 HIGHMicrosoft Exchange Server Elevation of Privilege Vulnerability
CVE-2025-592288.8 HIGHMicrosoft SharePoint Remote Code Execution Vulnerability
CVE-2025-587168.8 HIGHWindows Speech Runtime Elevation of Privilege Vulnerability
CVE-2025-587158.8 HIGHWindows Speech Runtime Elevation of Privilege Vulnerability
CVE-2025-592378.8 HIGHMicrosoft SharePoint Remote Code Execution Vulnerability
CVE-2025-537828.4 HIGHMicrosoft Exchange Server Elevation of Privilege Vulnerability
CVE-2025-592368.4 HIGHMicrosoft Excel Remote Code Execution Vulnerability
CVE-2025-592928.2 HIGHAzure Compute Gallery Elevation of Privilege Vulnerability
CVE-2025-592918.2 HIGHConfidential Azure Container Instances Elevation of Privilege Vulnerability
CVE-2025-592508.1 HIGHJDBC Driver for SQL Server Spoofing Vulnerability
CVE-2025-592337.8 HIGHMicrosoft Excel Remote Code Execution Vulnerability
CVE-2025-556977.8 HIGHAzure Local Elevation of Privilege Vulnerability
CVE-2025-592077.8 HIGHWindows Kernel Elevation of Privilege Vulnerability
CVE-2025-592317.8 HIGHMicrosoft Excel Remote Code Execution Vulnerability
CVE-2025-587147.8 HIGHWindows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Showing top 20 of 167 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2025-59287

No comments yet


Leave a comment