Categories: Cyber Security News

Hackers Exploiting Microsoft WSUS Vulnerability In The Wild – 2800 Instances Exposed Online

Hackers are actively exploiting a critical flaw in Microsoft’s Windows Server Update Services (WSUS), with security researchers reporting widespread attempts in the wild.

The vulnerability, tracked as CVE-2025-59287, allows remote code execution on unpatched WSUS servers, potentially granting attackers full control over enterprise networks.

As of October 27, 2025, firms monitoring global scan data have identified at least 2,800 exposed WSUS instances online, scanned via ports 8530 and 8531, though not all may be vulnerable.

The issue stems from a deserialization flaw in WSUS’s update approval process, first disclosed earlier this month. Microsoft rated it as critical with a CVSS 3.1 score of 9.8, highlighting its ease of exploitation without authentication.

A proof-of-concept (POC) exploit surfaced on underground forums shortly after patching guidance was released on October 15, fueling rapid attacks.

“We’re seeing exploitation attempts spike since the POC dropped,” said a spokesperson for cybersecurity firm ShadowPeak, which began fingerprinting WSUS deployments last week.

Their scans on October 25 revealed the 2,800 instances, primarily in North America and Europe, underscoring the vulnerability’s reach in corporate environments.

Exploitation Tactics And Real-World Impact

Attackers are leveraging the POC to chain the flaw with lateral movement techniques, targeting WSUS servers that manage patch deployments across Windows fleets.

Once compromised, hackers can deploy malicious updates, exfiltrate sensitive data, or install persistent backdoors.

Early indicators include anomalous traffic to WSUS endpoints and unusual update approvals logged in the event viewer IDs 10016 and 20005.

A notable incident involved a mid-sized U.S. financial firm, where intruders used the vulnerability to access internal Active Directory, leading to a brief outage on October 23.

While Microsoft has urged immediate patching via its October 2025 security bulletin, adoption lags, with only 40% of scanned instances showing signs of mitigation, per ShadowPeak’s telemetry.

This delay amplifies risks for organizations relying on WSUS for automated updates, especially in hybrid cloud setups where servers expose HTTP/HTTPS ports to the internet.

CVE ID Affected Product CVSS 3.1 Score Description Impact
CVE-2025-59287 Microsoft WSUS (versions < 10.0.20348.2000) 9.8 (Critical) Deserialization vulnerability in update handling Remote code execution; network compromise

Experts warn that unmonitored WSUS setups, often overlooked in legacy infrastructure, are prime targets for ransomware groups like LockBit 3.0, which have referenced the POC in their leak sites.

Mitigations

To counter the threat, Microsoft recommends applying the latest cumulative updates and restricting WSUS port access via firewalls, ideally, limiting it to internal VPNs.

Tools like Nessus or custom scripts can fingerprint exposures, while endpoint detection platforms should flag deserialization anomalies.

“This isn’t just a patch issue; it’s a reminder to audit update servers regularly,” advised cybersecurity analyst Elena Vasquez.

As exploitation evolves, the 2,800 exposed instances signal a ticking clock for IT teams. With no end to the scans in sight, the vulnerability could drive a wave of breaches if patching doesn’t accelerate.

Organizations should prioritize WSUS hardening to safeguard their update ecosystems against this pervasive peril.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post Hackers Exploiting Microsoft WSUS Vulnerability In The Wild – 2800 Instances Exposed Online appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

DC’s Absolute Universe Dominates the 2026 Eisner Award Nominations

The list of nominees for the 2026 Will Eisner Comic Industry Awards has been revealed.…

42 minutes ago

New Malware Framework Enables Screen Control, Browser Artifact Access, and UAC Bypass

A newly uncovered malware framework is raising serious alarms across the cybersecurity community. Researchers have…

1 hour ago

node-ipc npm Package with 822K Weekly Downloads Compromised in Supply Chain Attack

A widely used JavaScript inter-process communication library has been weaponized again. Socket and Stepsecurity have…

1 hour ago

Anthropic’s Mythos AI Reportedly Found macOS Vulnerabilities that Could Bypass Apple Security

Security researchers at Calif, a Palo Alto-based cybersecurity firm, have used techniques derived from an…

1 hour ago

Hackers Compromise 170 npm Packages to Steal GitHub, npm, AWS, and Kubernetes Secrets

A sprawling supply chain attack has put software developers worldwide on high alert after hackers…

1 hour ago

Critical Canon MailSuite Vulnerability Enables Remote Code Execution Attacks

Enterprise email infrastructure remains one of the most critical and vulnerable targets for cybercriminals. A…

1 hour ago

This website uses cookies.