On-Demand Webinar: Deep Session Inspection and rich metadata can change your security game.

CVE-2025-59287

CVE-2025-59287 Decoded: How a WSUS Deserialization Flaw Led to Critical Remote Exploits

Vulnerability Overview 

CVE ID: CVE-2025-59287 

CVE Title: Windows Server Update Services Deserialization Flaw Enabling Remote Code Execution 

Severity: Critical  

Exploit Status: Public proof-of-concept available; confirmed exploitation observed in the wild (late Oct 2025) 

Business Risk: High. A compromised WSUS server allows unauthenticated attackers to execute code as SYSTEM, enabling them to tamper with updates and impact all connected endpoints.

Summary

CVE-2025-59287 is a critical WSUS RCE vulnerability from unsafe data deserialization. Attackers can exploit it remotely without authentication. Microsoft released and later expanded October 2025 patches after exploitation began and CISA added the CVE to its KEV catalog.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2025-59287?

Technical Overview

How Does the CVE-2025-59287 Exploit Work?

The attack typically follows these steps:

CVE-2025-59287 Exploitation Process

What Causes CVE-2025-59287?

Vulnerability Root Cause:  

This vulnerability is caused by unsafe deserialization in WSUS’s handling of incoming event/cookie data. WSUS decrypts an incoming AuthorizationCookie (research analyses note AES-128-CBC) and then hands the result to a legacy .NET deserializer (BinaryFormatter in the published analyses) without enforcing strict type validation. Crafted serialized payloads therefore execute code during deserialization, allowing unauthenticated remote command execution on WSUS hosts with the WSUS role enabled.

How Can You Mitigate CVE-2025-59287?

If immediate patching is delayed or not possible:

  • Disable the WSUS Server Role on the host (removes attack surface; WSUS will stop serving updates).
  • Block inbound host firewall ports 8530 and 8531 on WSUS servers (host-level blocking recommended). Do not rely only on perimeter blocking.
  • Isolate the WSUS host from untrusted networks and suspend replication with external/untrusted peers.
  • Increase monitoring of WSUS/IIS logs and EDR for signs of exploit: deserialization errors in SoftwareDistribution.log, base64 serialized blobs (e.g. AAEAAAD…), or w3wp.exe spawning cmd.exe/powershell.exe.
  • Preserve forensic artifacts (logs, WSUS content directories, memory) if suspicious activity is found.
  • Do not remove these mitigations until the Microsoft update is applied and you’ve verified the host is patched and clean.

Which Assets and Systems Are at Risk?

Asset Types Affected:

Business-Critical Systems at Risk:

Exposure Level:

Will Patching CVE-2025-59287 Cause Downtime?

Patch application impact: Low. Installing Microsoft’s October 2025 update (and later fixes) resolves the flaw with minimal WSUS downtime. A brief restart may be needed.

Mitigation (if immediate patching is not possible): Restrict WSUS access to internal, trusted hosts and disable external exposure. These are temporary steps—only full patching fully removes the risk.

How Can You Detect CVE-2025-59287 Exploitation?

Exploitation Signatures:

MITRE ATT&CK Mapping:

Behavioral Indicators:

Alerting Strategy:

Remediation & Response

Mitigation Steps if No Patch:

Remediation Timeline:

Rollback Plan:

Incident Response Considerations:

CVSS Breakdown Table

MetricValue Description
Base Score9.8Critical severity indicating severe impact and easy exploitability
Attack VectorNetworkRemotely exploitable over the network (no local access required)
Attack ComplexityLowExploitation does not require special conditions
Privileges RequiredNoneNo authentication or elevated privileges needed
User Interaction NoneNo user action required to trigger the exploit
Scope UnChanged Impact is confined to the vulnerable component
Confidentiality Impact HighSuccessful exploitation can lead to full disclosure of sensitive data
Integrity ImpactHighExploitation can enable unauthorized modification of data or system state
Availability ImpactHighExploitation can significantly affect service availability

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.