The Update: Microsoft has released an emergency, out-of-band security update to address a critical Remote Code Execution (RCE) vulnerability, tracked as CVE-2025-59287, in the Windows Server Update Service (WSUS). The vulnerability, which carries a maximum CVSS score of 9.8, stems from an unsafe deserialisation of untrusted data, allowing an unauthenticated attacker to execute code over a network with SYSTEM privileges.
The US Cybersecurity and Infrastructure Security Agency (CISA) has added the flaw to its Known Exploited Vulnerabilities (KEV) Catalog, confirming active exploitation and mandating federal agencies to patch immediately. This emergency fix supersedes a previous, incomplete patch.
A Microsoft spokesperson confirmed the re-release, stating, "We re-released this CVE after identifying that the initial update did not fully mitigate the issue. Customers who have installed the latest updates are already protected."
Why it Matters: The WSUS vulnerability presents a severe risk as it allows a complete takeover of the server, which can then be used to distribute malicious payloads across the entire connected network, effectively compromising the entire domain.
The exploit is particularly dangerous because it can be executed by an unauthenticated attacker, meaning no login credentials are required to initiate the attack. Security researchers have noted that attackers are using sophisticated methods, such as custom request headers, to execute commands and avoid detection in server logs.
Organisations must treat this as a high-priority incident and apply the out-of-band patch immediately, or block inbound traffic to ports 8530/8531 as a temporary measure.