CVE-2025-59287

ENISA EUVD: EUVD-2025-34268 ↗
Exploited in the Wild ✓ Confirmed 0-Day
Triaged: March 5, 2026 7 articles Published: 2025-10-14

EPSS Score

Source: FIRST.org · 2026-05-23
69.07%
probability
This CVE has a 69.07% probability of being exploited in the next 30 days.
0% Top 98.7th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
9.8
CRITICAL
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Temporal
Exploit Code Maturity
Proof-of-Concept
Remediation Level
Official Fix
Report Confidence
Confirmed
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C

Description

NVD
Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network.

Affected Products

Microsoft
Windows Server 2012
6.2.9200.0
Microsoft
Windows Server 2012 (Server Core installation)
6.2.9200.0
Microsoft
Windows Server 2012 R2
6.3.9600.0
Microsoft
Windows Server 2012 R2 (Server Core installation)
6.3.9600.0
Microsoft
Windows Server 2016
10.0.14393.0

Attack Intelligence

Exploits & PoC

M507/CVE-2025-59287-PoC

Unauthenticated RCE PoC in Microsoft Windows Server Update Service (WSUS) - CVE-2025-59287 & CVE-2023-35317

13 2025-12-10
0 2025-12-26
salman5230/CVE-2025-59287

🔍 Analyze WSUS deserialization behavior to enhance security, generate reports, and identify configuration weaknesses in your infrastructure.

0 2026-05-23
8 repos — triés par ⭐ Rechercher sur GitHub ↗

Signal Intelligence

Confidence
92%
EPSS 69.07%
CVSS v3.1 9.8
Mentions 7
Last Seen Nov 24, 2025

CNA Information

CNA Assigner
microsoft
CNA Title
Windows Server Update Service (WSUS) Remote Code Execution Vulnerability

Analyst Note

CVE-2025-59287 shows clear zero-day indicators: Microsoft released an out-of-band patch on 2025-10-14, and multiple authoritative sources (TheHackerNews, BleepingComputer) explicitly document active exploitation in the wild occurring concurrently with patch availability. ShadowPad malware exploitation and CISA/NSA guidance further corroborate active attacks. The timing aligns with zero-day criteria (exploitation simultaneous with patch).

Threat Actors 34

Mustang Panda
apt_group Information theft and espionage 🇨🇳 CN
APT27
apt_group Information theft and espionage 🇨🇳 CN
Cobalt
apt_group Financial crime 🇷🇺 RU
APT 28
apt_group Information theft and espionage 🇷🇺 RU
EMISSARY PANDA
apt_group Information theft and espionage 🇨🇳 CN
Hacking Team
apt_group 🇮🇹 IT
Watchdog
apt_group 🇨🇳 CN
Operation C-Major
apt_group Information theft and espionage 🇵🇰 PK
HAZY TIGER
apt_group Information theft and espionage 🇮🇳 IN
Infy
apt_group Information theft and espionage 🇮🇷 IR
Group 27
apt_group Information theft and espionage 🇨🇳 CN
TA428
apt_group Information theft and espionage 🇨🇳 CN
Earth Lamia
apt_group Information theft and espionage 🇨🇳 CN
UNC5174
apt_group 🇨🇳 CN
APT-C-27
apt_group Information theft and espionage 🇸🇾 SY
APT 22
apt_group Information theft and espionage 🇨🇳 CN
RTM
apt_group Financial crime 🇷🇺 RU
GOBLIN PANDA
apt_group Information theft and espionage 🇨🇳 CN
Operation Cobalt Whisper
apt_group Financial crime 🇨🇳 CN
APT 6
apt_group Information theft and espionage 🇨🇳 CN
UNC215
apt_group Information theft and espionage 🇨🇳 CN
Bitwise Spider
apt_group Financial gain 🇷🇺 RU
Red October
apt_group 🇷🇺 RU
The White Company
apt_group Information theft and espionage 🇨🇳 CN
Pat Bear
apt_group 🇸🇾 SY
Unnamed Actor
apt_group 🇨🇳 CN
Shadow Network
apt_group Information theft and espionage 🇨🇳 CN
Mana Team
apt_group 🇨🇳 CN
Iron Group
apt_group Information theft and espionage 🇨🇳 CN
BRONZE SPRING
apt_group Information theft and espionage 🇨🇳 CN
SharpPanda
apt_group Information theft and espionage 🇨🇳 CN
APT 5
apt_group Information theft and espionage 🇨🇳 CN
Cyber Alliance
apt_group 🇺🇦 UA
Dark Partners
apt_group

Triage Info

Decided atMar 05, 2026
Published DateOct 14, 2025