What?
If you have WSUS exposed to the internet and don't require a client certificate, you and your employer deserve it.
More threat intel teams are sounding the alarm about a critical Windows Server Update Services (WSUS) remote code execution vulnerability, tracked as CVE-2025-59287 and now under active exploitation, just days after Microsoft pushed an emergency patch and the US Cybersecurity and Infrastructure Security Agency added the bug to …
When processing XML data - which means is really in some .NET libraries, maybe some ancient one, since WSUS saw very little improvements over the years.
This "fix" disabled error processing completely - until it's fully fixed you can't see synch errors any longer. That means the underlying bug is not fixed yet. As long as it is something used by WSUS only, the workaround can work. It it is used by some other important process, it may open other attack paths.