back to article WSUS attacks hit 'multiple' orgs as Google and other infosec sleuths ring Redmond’s alarm bell

More threat intel teams are sounding the alarm about a critical Windows Server Update Services (WSUS) remote code execution vulnerability, tracked as CVE-2025-59287 and now under active exploitation, just days after Microsoft pushed an emergency patch and the US Cybersecurity and Infrastructure Security Agency added the bug to …

  1. Anonymous Coward
    Anonymous Coward

    What?

    If you have WSUS exposed to the internet and don't require a client certificate, you and your employer deserve it.

    1. Anonymous Anti-ANC South African Coward Silver badge

      Re: What?

      Glad my WSUS are not exposed to the wibbly wobbly web at all... one less worry for me then.

      Maybe this can be used as a honeypot - something to lure in ne'er-do-wells and then tarpit them...

    2. kmorwath

      Re: What?

      The largest attack surface is always the lazy sysadmin.

      1. Jou (Mxyzptlk) Silver badge

        Re: What?

        lazydumb

        TIFIFY...

    3. DCdave

      Re: What?

      True, but since it's cookie-based and works on both HTTP and HTTPS ports, it's likely the requirement for client certificates will not protect against the vulnerability. Indeed Microsoft says that WSUS should be disabled or blocked until the patch is installed.

      1. Anonymous Coward
        Anonymous Coward

        Re: What?

        If you are using client-basef certificates to authentic access to the website, failure to authenticate means no TLS connection to send HTTP commands.

        No HTTP commands means no exploitable web server.

        1. Anonymous Coward
          Anonymous Coward

          Re: What?

          WSUS requires both HTTP and HTTPS ports to be open (unless not using HTTPS at all).

  2. kmorwath

    The bug is in the synchronization error processing

    When processing XML data - which means is really in some .NET libraries, maybe some ancient one, since WSUS saw very little improvements over the years.

    This "fix" disabled error processing completely - until it's fully fixed you can't see synch errors any longer. That means the underlying bug is not fixed yet. As long as it is something used by WSUS only, the workaround can work. It it is used by some other important process, it may open other attack paths.

    1. Jou (Mxyzptlk) Silver badge

      Re: The bug is in the synchronization error processing

      It is not the XML, that is fine. One of the few things Microsoft implemented surprisingly good. The famous bobby tables catches after the XML decoding.

  3. Anonymous Coward
    Anonymous Coward

    Why would you expose WSUS directly to the web? Doing that is asking for trouble.

    We don't use it any more, but when we did it was behind a firewall.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon