Cyber Posture

CVE-2025-59287

CriticalCISA KEVActive ExploitationPublic PoCRCE

Published: 14 October 2025

Published
14 October 2025
Modified
12 November 2025
KEV Added
24 October 2025
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.7140 98.7th percentile
Risk Priority 82 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-59287 is a critical-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Microsoft Windows Server 2012. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 1.3% of CVEs by exploit likelihood; CISA has added it to the Known Exploited Vulnerabilities catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Timely flaw remediation through patching directly eliminates the deserialization vulnerability in WSUS, preventing remote code execution as urged by CISA and Microsoft.

prevent

Information input validation checks untrusted data received by WSUS before deserialization, directly mitigating CWE-502 exploitation.

prevent

Boundary protection restricts network access to the vulnerable WSUS service, reducing the attack surface for unauthorized remote attackers.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

CVE-2025-59287 enables remote code execution via deserialization in the public-facing WSUS server without authentication or privileges, directly facilitating T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network.

Deeper analysisAI

CVE-2025-59287 is a critical deserialization of untrusted data vulnerability (CWE-502) in the Windows Server Update Service (WSUS). It enables an unauthorized attacker to execute arbitrary code over a network, earning a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

The vulnerability can be exploited remotely by any unauthorized attacker with network access to a vulnerable WSUS server, requiring no privileges, user interaction, or special conditions. Successful exploitation grants remote code execution (RCE), potentially allowing full compromise of the server with high confidentiality, integrity, and availability impacts.

Microsoft's update guide at msrc.microsoft.com provides patching details, while CISA has ordered federal agencies to patch due to active exploitation in attacks, as reported by BleepingComputer. Vicarius offers detection and mitigation scripts for immediate response.

This flaw has seen real-world exploitation, prompting urgent patching directives from CISA.

Details

CWE(s)
KEV Date Added
24 October 2025

Affected Products

microsoft
windows server 2012
all versions, r2
microsoft
windows server 2016
≤ 10.0.14393.8524
microsoft
windows server 2019
≤ 10.0.17763.7922
microsoft
windows server 2022
≤ 10.0.20348.4297
microsoft
windows server 2022 23h2
≤ 10.0.25398.1916
microsoft
windows server 2025
≤ 10.0.26100.6905

CVEs Like This One

CVE-2025-53770Same vendor: Microsoftboth on KEV
CVE-2026-20963Same vendor: Microsoftboth on KEV
CVE-2025-50163Same product: Microsoft Windows Server 2012
CVE-2025-24064Same product: Microsoft Windows Server 2012
CVE-2025-54106Same product: Microsoft Windows Server 2012
CVE-2025-21309Same product: Microsoft Windows Server 2012
CVE-2026-26154Same product: Microsoft Windows Server 2012
CVE-2025-49735Same product: Microsoft Windows Server 2012
CVE-2025-49673Same product: Microsoft Windows Server 2012
CVE-2025-49729Same product: Microsoft Windows Server 2012

References