CVE-2025-59287
ENISA EUVD: EUVD-2025-34268 ↗
Exploited in the Wild
✓ Confirmed 0-Day
Triaged: March 5, 2026
7 articles
Published: 2025-10-14
EPSS Score
Source: FIRST.org · 2026-05-23
69.07%
probability
This CVE has a 69.07% probability
of being exploited in the next 30 days.
0%
Top 98.7th percentile of all CVEs
100%
CVSS v3.1
Source: VulnerabilityLookup (CIRCL)9.8
CRITICAL
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Temporal
Exploit Code Maturity
Proof-of-Concept
Remediation Level
Official Fix
Report Confidence
Confirmed
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
Description
NVDDeserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network.
Affected Products
Microsoft
Windows Server 2012
6.2.9200.0
Microsoft
Windows Server 2012 (Server Core installation)
6.2.9200.0
Microsoft
Windows Server 2012 R2
6.3.9600.0
Microsoft
Windows Server 2012 R2 (Server Core installation)
6.3.9600.0
Microsoft
Windows Server 2016
10.0.14393.0
Attack Intelligence
Exploits & PoC
M507/CVE-2025-59287-PoC
Unauthenticated RCE PoC in Microsoft Windows Server Update Service (WSUS) - CVE-2025-59287 & CVE-2023-35317
13
2025-12-10
2
2026-01-16
1
2025-11-15
1
2025-11-21
gud425/gud425.github.io
CVE-2025-59287
0
2025-12-26
salman5230/CVE-2025-59287
🔍 Analyze WSUS deserialization behavior to enhance security, generate reports, and identify configuration weaknesses in your infrastructure.
0
2026-05-23
0
2026-02-18
0
2026-03-09
8 repos — triés par ⭐
Rechercher sur GitHub ↗
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287
vendor-advisory
patch
Signal Intelligence
Confidence
92%
EPSS
69.07%
CVSS v3.1
9.8
Mentions
7
Last Seen
Nov 24, 2025
CNA Information
CNA Assigner
microsoft
CNA Title
Windows Server Update Service (WSUS) Remote Code Execution Vulnerability
Analyst Note
CVE-2025-59287 shows clear zero-day indicators: Microsoft released an out-of-band patch on 2025-10-14, and multiple authoritative sources (TheHackerNews, BleepingComputer) explicitly document active exploitation in the wild occurring concurrently with patch availability. ShadowPad malware exploitation and CISA/NSA guidance further corroborate active attacks. The timing aligns with zero-day criteria (exploitation simultaneous with patch).
Threat Actors 34
Mustang Panda
apt_group
Information theft and espionage
🇨🇳 CN
APT27
apt_group
Information theft and espionage
🇨🇳 CN
Cobalt
apt_group
Financial crime
🇷🇺 RU
APT 28
apt_group
Information theft and espionage
🇷🇺 RU
EMISSARY PANDA
apt_group
Information theft and espionage
🇨🇳 CN
Hacking Team
apt_group
🇮🇹 IT
Watchdog
apt_group
🇨🇳 CN
Operation C-Major
apt_group
Information theft and espionage
🇵🇰 PK
HAZY TIGER
apt_group
Information theft and espionage
🇮🇳 IN
Infy
apt_group
Information theft and espionage
🇮🇷 IR
Group 27
apt_group
Information theft and espionage
🇨🇳 CN
TA428
apt_group
Information theft and espionage
🇨🇳 CN
Earth Lamia
apt_group
Information theft and espionage
🇨🇳 CN
UNC5174
apt_group
🇨🇳 CN
APT-C-27
apt_group
Information theft and espionage
🇸🇾 SY
APT 22
apt_group
Information theft and espionage
🇨🇳 CN
RTM
apt_group
Financial crime
🇷🇺 RU
GOBLIN PANDA
apt_group
Information theft and espionage
🇨🇳 CN
Operation Cobalt Whisper
apt_group
Financial crime
🇨🇳 CN
APT 6
apt_group
Information theft and espionage
🇨🇳 CN
UNC215
apt_group
Information theft and espionage
🇨🇳 CN
Bitwise Spider
apt_group
Financial gain
🇷🇺 RU
Red October
apt_group
🇷🇺 RU
The White Company
apt_group
Information theft and espionage
🇨🇳 CN
Pat Bear
apt_group
🇸🇾 SY
Unnamed Actor
apt_group
🇨🇳 CN
Shadow Network
apt_group
Information theft and espionage
🇨🇳 CN
Mana Team
apt_group
🇨🇳 CN
Iron Group
apt_group
Information theft and espionage
🇨🇳 CN
BRONZE SPRING
apt_group
Information theft and espionage
🇨🇳 CN
SharpPanda
apt_group
Information theft and espionage
🇨🇳 CN
APT 5
apt_group
Information theft and espionage
🇨🇳 CN
Cyber Alliance
apt_group
🇺🇦 UA
Dark Partners
apt_group
Triage Info
Decided atMar 05, 2026
Published DateOct 14, 2025