Soooo...
One company says they found 25 exposed, the other 8000+?
Also how many are honeypots?
I can't think of a single reason to have a WSUS server with those ports open facing outwards.
Governments and private security sleuths warned that attackers are already exploiting a critical bug in Microsoft Windows Server Update Services, shortly after Redmond pushed an emergency patch for the remote code execution (RCE) vulnerability. Plus, there's at least one proof-of-concept attack floating around in cyberspace, …
Been a while since I maintained WSUS, would have been up to 2010 at the latest but it was never exposed to the Internet. Neither was any other domain service.
You could sort of get away with less than optimal security configuration until the late 90s, after that you took your life into your hands. I miss some of the sysadmin side, I definitely don't miss securing networks - complex, difficult, and thankless.
From the late 90s onwards most homes were 'protected' by the use of NAT - you had to specifically forward a port to allow an incoming connection. Let us not mentioned the abomination that is UPnP...
But I guess many enterprises had an IPv4 block so they would just be open by default, which seems utterly bonkers now!
Critical 9.8-rated vulnerability in a Microsoft product or service, you say? Microsoft silent on the topic, you say? How very...rare. And unusual, too. Most shocking, to be sure.
It's almost like they don't care, or maybe they don't understand what's happening.
Maybe they'll consult with a technology company for more information, or check in with their completely reliable and totally trustworthy AI to solve this dilemma. Or is it a conundrum? Maybe the AI will cover that, too.
Regardless, best of luck to them in their future endeavors.
Maybe I'm just getting old, but I'm having trouble getting worked up over this. Only a fool would open unnecessary ports to the Internet, so they have to get on my local network first. I'm the only one on my local net, so I'm sleeping just fine knowing WSUS has a vulnerability. I'll continue to use it as I wait for my Win10 machines to die of old age.
BTW, you are aware that WSUS is deprecated as well. If you are a large or high risk environment you should already be migrating off of it.
To what, though?
If you're a high risk environment, you don't want your clients directly contacting the Internet, because it massively increases your attack surface. So you can't use InTune.
As far as I know, there is nothing to replace WSUS - the one or two on-prem servers that can see the Internet, which hold and distribute Windows updates to clients that cannot.
My lab servers installed KB5070883 and rebooted over the weekned - all of them. not just the WSUS one (they are set to automatically download and install updates when available - exactly to test them). KB5070883 is a re-issued cumulative update. Why the whole of it, and not just a fix for WSUS?
Reading the KB documentation, the issue is in the synchronization error handling - it has been disabled wholly to fix it (temporarly, I hope).
All Microsoft products seem to rely on a combination of security by obscurity, good luck, defaults that make things open to all and the hope that people will not install them in a bad way.
However, the engineer / support person / person given the opportunity to prove themself, even though they don't have the relevant background experience, will give it a go. They tend to stop when it works and declare victory. They don't stop when its secure and installed in line with the documentation. This is why mistakes happen and the bad guys know this.
Back in the olden days, there were different teams, networks, server, client, storage, perimiter security teams and one team would help prevent another from making a bad decision.
But now, with cloud everwhere, a single person can deploy a whole stack of network, server, client and storage and nobody will ask the question of why or how on security.
This is why things go wrong.