
CVE-2025-59287 is a critical deserialization of untrusted data vulnerability that allows an unauthorized attacker to execute code on vulnerable machines by sending a specially crafted event to the WSUS server without any user interaction required. The vulnerability stems from insecure deserialization when WSUS improperly deserializes untrusted objects, allowing attackers to send specially crafted requests to the WSUS service.
Only Windows Server systems with the WSUS Server Role enabled are affected; servers without that role are not vulnerable.
Supported affected families include Windows Server 2012/2012 R2/2016/2019/2022/23H2/2025 prior to the out-of-band updates listed below.
Corresponding KBs: 2025 (KB5070881), 23H2 (KB5070879), 2022 (KB5070884), 2019 (KB5070883), 2016 (KB5070882), 2012 R2 (KB5070886), 2012 (KB5070887).
To exploit the vulnerability, an attacker would have to:
Attacks might result in:
Here are a few recommendations on how to mitigate the risk of CVE-2025-59287:
Hunting this vulnerability with Zafran compresses time-to-risk-reduction aligned to the CTEM process.
First we first scope the environment by automatically enumerating every server with the WSUS role across on-prem and cloud estates, helping to validate whether the specific vulnerable processes are run on an exposed server. We then facilitate prioritization by weighting exposures using context such as internet reachability (identifying the specific open ports) and runtime presence (is it loaded in memory). Relying simply on scanner findings will likely result in several false positives, so it is important to consider this context for prioritizing what is truly a risk in your environment.
Further, Zafran will automatically provide specific mitigations against CVE-2025-59287, leveraging new rules by your security vendors, once issued. And finally, Zafran mobilizes closure by helping its customers to assign accountable owners, enforce SLAs, and track patching processes within their organization.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.
Block quote
Ordered list
Unordered list
Bold text
Emphasis
Superscript
Subscript
test
Traditional vulnerability management must change. So many are drowning in detections, and still lack insights. The time-to-exploit window sits at 5 days. Implementing a Continuous Threat Exposure Management (CTEM) program is the path forward. Moving from vulnerability management to CTEM doesn't have to be complicated. This guide outlines steps you can take to begin, continue, or refine your CTEM journey.
