CVE-2025-59287
Published: 14 October 2025
Summary
CVE-2025-59287 is a critical-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Microsoft Windows Server 2012. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 1.3% of CVEs by exploit likelihood; CISA has added it to the Known Exploited Vulnerabilities catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely flaw remediation through patching directly eliminates the deserialization vulnerability in WSUS, preventing remote code execution as urged by CISA and Microsoft.
Information input validation checks untrusted data received by WSUS before deserialization, directly mitigating CWE-502 exploitation.
Boundary protection restricts network access to the vulnerable WSUS service, reducing the attack surface for unauthorized remote attackers.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE-2025-59287 enables remote code execution via deserialization in the public-facing WSUS server without authentication or privileges, directly facilitating T1190: Exploit Public-Facing Application.
NVD Description
Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network.
Deeper analysisAI
CVE-2025-59287 is a critical deserialization of untrusted data vulnerability (CWE-502) in the Windows Server Update Service (WSUS). It enables an unauthorized attacker to execute arbitrary code over a network, earning a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
The vulnerability can be exploited remotely by any unauthorized attacker with network access to a vulnerable WSUS server, requiring no privileges, user interaction, or special conditions. Successful exploitation grants remote code execution (RCE), potentially allowing full compromise of the server with high confidentiality, integrity, and availability impacts.
Microsoft's update guide at msrc.microsoft.com provides patching details, while CISA has ordered federal agencies to patch due to active exploitation in attacks, as reported by BleepingComputer. Vicarius offers detection and mitigation scripts for immediate response.
This flaw has seen real-world exploitation, prompting urgent patching directives from CISA.
Details
- CWE(s)
- KEV Date Added
- 24 October 2025