{"id":150222,"date":"2025-10-28T21:04:15","date_gmt":"2025-10-28T21:04:15","guid":{"rendered":"https:\/\/www.europesays.com\/ie\/150222\/"},"modified":"2025-10-28T21:04:15","modified_gmt":"2025-10-28T21:04:15","slug":"warnings-mount-over-windows-server-update-services-hacks","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ie\/150222\/","title":{"rendered":"Warnings Mount Over Windows Server Update Services Hacks"},"content":{"rendered":"<p>                    Thousands of Windows Server Update Services Observed Online<\/p>\n<p>                                                <a class=\"author-link\" href=\"https:\/\/www.bankinfosecurity.com\/authors\/akshaya-asokan-i-2924\" rel=\"nofollow noopener\" target=\"_blank\">Akshaya Asokan<\/a> (<a href=\"https:\/\/www.twitter.com\/asokan_akshaya\" rel=\"nofollow noopener\" target=\"_blank\">asokan_akshaya<\/a>)                                                    \u2022<br \/>\n                        October 28, 2025 \u00a0 \u00a0 <a href=\"https:\/\/www.bankinfosecurity.com\/warnings-mount-over-windows-server-update-services-hacks-a-29869#disqus_thread\" rel=\"nofollow noopener\" target=\"_blank\"><\/p>\n<p>                <img decoding=\"async\" src=\"https:\/\/www.europesays.com\/ie\/wp-content\/uploads\/2025\/10\/warnings-mount-over-windows-server-update-services-hacks-image_large-5-a-29869.jpg\" alt=\"Warnings Mount Over Windows Server Update Services Hacks\" class=\"img-responsive \"\/><br \/>\n                Image: bluestork\/Shutterstock            <\/p>\n<p>Warnings over hackers exploiting a Windows Server Update have compounded since Microsoft rushed out a patch Friday against a flaw allowing unauthenticated attackers to execute arbitrary code.<\/p>\n<p><b>See Also:<\/b> <a href=\"https:\/\/www.bankinfosecurity.com\/rise-agentic-commerce-building-secure-trusted-payments-for-ai-driven-economy-a-29800?rf=RAM_SeeAlso\" rel=\"nofollow noopener\" target=\"_blank\">The Rise of Agentic Commerce: Building Secure, Trusted Payments for the AI-Driven Economy<\/a><\/p>\n<p>The flaw, tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-59287\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-59287<\/a> is a deserialization of untrusted data in the Windows Server Update Service. Microsoft <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-59287\" target=\"_blank\" rel=\"nofollow noopener\">describes<\/a> the flaw&#8217;s source as a &#8220;legacy serialization mechanism.&#8221; Windows Server Update Services, a tool for managing Microsoft&#8217;s many updates, itself is <a href=\" https:\/\/learn.microsoft.com\/en-gb\/windows-server\/get-started\/removed-deprecated-features-windows-server?tabs=ws25\" target=\"_blank\">no longer under active development<\/a>.<\/p>\n<p>The Cybersecurity and Infrastructure Security Agency <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2025\/10\/24\/microsoft-releases-out-band-security-update-mitigate-windows-server-update-service-vulnerability-cve?utm_source=chatgpt.com\" target=\"_blank\" rel=\"nofollow noopener\">added<\/a> the vulnerability to its Known Exploited Vulnerabilities catalog on Friday. Cybersecurity firms <a href=\"https:\/\/research.eye.security\/wsus-deserialization-exploit-in-the-wild-cve-2025-59287\/\" target=\"_blank\" rel=\"nofollow noopener\">Eye Security<\/a> and <a href=\"https:\/\/unit42.paloaltonetworks.com\/microsoft-cve-2025-59287\/\" target=\"_blank\" rel=\"nofollow noopener\">Palo Alto Networks Unit 42<\/a> say they&#8217;ve observed active hacks and that thousands of Windows Server Update Services appear exposed to the internet. Unit 42 characterized the attacks as focused on reconnaissance likely as &#8220;a precursor to broader network compromise.&#8221;<\/p>\n<p>By compromising a single server, an attacker could take over the entire patch distribution system to gain system-level control to potentially carry out an internal supply chain attack, said Justin Moore, senior manager of threat intel research at Unit 42.<\/p>\n<p>&#8220;They can push malware to every workstation and server in the organization, all disguised as a legitimate Microsoft update. This turns the trusted service into a weapon of mass distribution,&#8221; he said.<\/p>\n<p>The <a href=\"https:\/\/www.cyber.gc.ca\/en\/alerts-advisories\/al25-015-vulnerability-impacting-microsoft-windows-server-update-services-cve-2025-59287\" target=\"_blank\" rel=\"nofollow noopener\">Canadian Center for Cybersecurity<\/a> and the <a href=\"https:\/\/www.cyber.gov.au\/about-us\/view-all-content\/alerts-and-advisories\/critical-vulnerability-in-Microsoft-Windows-Server-Update-Service\" target=\"_blank\" rel=\"nofollow noopener\">Australian Cyber Security Centre<\/a> also published alerts about the flaw.<\/p>\n<p>Microsoft attempted to head off hackers exploiting this flaw through a normal Patch Tuesday fix pushed out on Oct. 15. The patch didn&#8217;t fully resolve the issue &#8211; meaning that a <a href=\" https:\/\/hawktrace.com\/blog\/CVE-2025-59287\" target=\"_blank\">proof of concept<\/a> published by HawkTrace shortly afterward had a greater reach than it otherwise might have had.<\/p>\n<p>&#8220;In the brief window between the flawed initial patch and the emergency fix, threat actors weaponized this vulnerability almost instantaneously, granting them a critical head start before the complete remediation was available,&#8221; Moore said. <\/p>\n<p>Attackers can use multiple attack paths including one that takes advantage of how Windows Server Update Services deserializes AuthorizationCookie objects. That attack method allows a threat actor to send &#8220;malicious encrypted cookies to the GetCookie() endpoint,&#8221; HawkTrace wrote in a follow up blog post. Another path is through ReportingWebService, through which unsafe deserialization can be triggered via  SoapFormatter.<\/p>\n<p>&#8220;The vulnerability is particularly concerning because its target, WSUS, is often neglected,&#8221; Moore said. &#8220;Many IT teams adopt a &#8216;set it and forget it&#8217; posture, leaving it a vulnerable target. A WSUS server should never be exposed to the Internet, it&#8217;s an internal patch system, not a public target.&#8221;<\/p>\n<p>            <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"Thousands of Windows Server Update Services Observed Online Akshaya Asokan (asokan_akshaya) \u2022 October 28, 2025 \u00a0 \u00a0 Image:&hellip;\n","protected":false},"author":2,"featured_media":150223,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[74],"tags":[41891,39766,41876,41879,41878,41877,18,41885,41886,41887,41888,41890,19,21713,41882,41884,41883,41881,41880,17,31773,8085,41889,82],"class_list":{"0":"post-150222","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-anti-money-laundering","9":"tag-authentication","10":"tag-bank-information-security","11":"tag-bank-information-security-regulations","12":"tag-bank-regulations","13":"tag-banking-information-security","14":"tag-eire","15":"tag-fdic","16":"tag-fincen","17":"tag-gao","18":"tag-glba","19":"tag-identity-theft","20":"tag-ie","21":"tag-information-security","22":"tag-information-security-articles","23":"tag-information-security-events","24":"tag-information-security-news","25":"tag-information-security-webinars","26":"tag-information-security-white-papers","27":"tag-ireland","28":"tag-phishing","29":"tag-risk-management","30":"tag-sarbanes-oxley-sox","31":"tag-technology"},"share_on_mastodon":{"url":"","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts\/150222","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/comments?post=150222"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts\/150222\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/media\/150223"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/media?parent=150222"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/categories?post=150222"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/tags?post=150222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}