{"id":333959,"date":"2025-10-26T13:57:26","date_gmt":"2025-10-26T13:57:26","guid":{"rendered":"https:\/\/www.europesays.com\/us\/333959\/"},"modified":"2025-10-26T13:57:26","modified_gmt":"2025-10-26T13:57:26","slug":"act-now-microsoft-issues-emergency-windows-update-as-attacks-begin-2","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/us\/333959\/","title":{"rendered":"Act Now \u2014 Microsoft Issues Emergency Windows Update As Attacks Begin"},"content":{"rendered":"<p><img decoding=\"async\" class=\" top-image\" src=\"https:\/\/www.europesays.com\/us\/wp-content\/uploads\/2025\/10\/1761397753_588_960x0.jpg\" alt=\"Microsoft logo on smartphone.\" data-height=\"2554\" data-width=\"3832\" fetchpriority=\"high\" style=\"position:absolute;top:0\"\/><\/p>\n<p>Windows Server is under attack, act now.<\/p>\n<p>SOPA Images\/LightRocket via Getty Images<\/p>\n<p>Updated October 26 with more technical information regarding the latest Microsoft Windows emergency security update addressing CVE-2025-59287, a critical vulnerability within the Windows Server Update Service that could enable a threat actor to remotely execute malicious code and is already being used in attacks, according to the Cybersecurity Infrastructure and Security Agency.<\/p>\n<p>Hot on the heels of a <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/10\/24\/update-now---google-issues-emergency-fix-for-35-billion-chrome-users\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/10\/24\/update-now---google-issues-emergency-fix-for-35-billion-chrome-users\/\" target=\"_self\" aria-label=\"Chrome emergency security update\" rel=\"nofollow noopener\">Chrome emergency security update<\/a> issued by Google,  Microsoft has now also confirmed an emergency fix for a critical Windows vulnerability. Acting immediately is paramount, as the Cybersecurity and Infrastructure Security Agency has warned that attacks are already underway and issued a binding directive requiring federal agencies to update now. Here\u2019s what you need to know and do about CVE-2025-59287.<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-1\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/10\/24\/paypal-users-warned-do-not-pay-do-not-phone-as-attackers-strike\/\" target=\"_blank\" aria-label=\"PayPal Users Warned \u2018Do Not Pay, Do Not Phone\u2019 As Attackers Strike\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/10\/24\/paypal-users-warned-do-not-pay-do-not-phone-as-attackers-strike\/\" rel=\"nofollow noopener\">ForbesPayPal Users Warned \u2018Do Not Pay, Do Not Phone\u2019 As Attackers StrikeBy Davey Winder<\/a>Microsoft Confirms Emergency Security Update For Windows Server Users<\/p>\n<p>Less than a week after <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/10\/21\/update-microsoft-windows-server-10-and-11-now---attacks-underway\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/10\/21\/update-microsoft-windows-server-10-and-11-now---attacks-underway\/\" target=\"_self\" aria-label=\"CISA issued a warning\" rel=\"nofollow noopener\">CISA issued a warning<\/a> for federal agencies to update Windows Server, Windows 10 and Windows 11 due to ongoing server message block attacks, lightning has struck twice for Windows Servers users. Now CISA has confirmed that attacks are underway that exploit <a class=\"color-link\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-59287\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-59287\" aria-label=\"CVE-2025-59287\">CVE-2025-59287<\/a>, a critical vulnerability within the Windows Server Update Service that can enable a hacker to remotely execute malicious code over the network.<\/p>\n<p>Microsoft stated: \u201cThe WSUS Server Role is not enabled by default on Windows servers. Windows servers that do not have the WSUS server role enabled are not vulnerable to this vulnerability. If the WSUS server role is enabled, the server will become vulnerable if the fix is not installed before the WSUS server role is enabled.\u201d<\/p>\n<p>The Microsoft Windows Server CVE-2025-59287 Critical Vulnerability In More Detail<\/p>\n<p>\u201cOur team ran a preliminary search for WSUS servers across the internet,\u201d Bas van den Berg, a cybersecurity researcher at Eye Security, said. \u201cThey looked for Internet Information Service servers with specific ports 8530 (http) or 8531 (https) on Shodan and Fofa and yielded approximately 8,000 servers.\u201d Eye Security then notified the relevant authorities, as well as threat intelligence sharing partners with whom it works alongside. According to an Eye Security <a class=\"color-link\" href=\"https:\/\/www.linkedin.com\/posts\/eyesecurity_active-exploitation-of-\ud835\uddea\ud835\udde6\ud835\udde8\ud835\udde6-cve-2025-activity-7387398633383415808-tqLD\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.linkedin.com\/posts\/eyesecurity_active-exploitation-of-%F0%9D%97%AA%F0%9D%97%A6%F0%9D%97%A8%F0%9D%97%A6-cve-2025-activity-7387398633383415808-tqLD\/\" aria-label=\"LinkedIn post\">LinkedIn post<\/a>, which first confirmed active exploitation of CVE-2025-59287, its telemetry has revealed that there are now at least 2,500 WSUS servers still exposed and at risk across the world.<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-4\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/10\/25\/lastpass-warns-are-you-dead-master-password-hack-attacks-ongoing\/\" target=\"_blank\" aria-label=\"LastPass Warns \u2018Are You Dead?\u2019 Master Password Hack Attacks Ongoing\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/10\/25\/lastpass-warns-are-you-dead-master-password-hack-attacks-ongoing\/\" rel=\"nofollow noopener\">ForbesLastPass Warns \u2018Are You Dead?\u2019 Master Password Hack Attacks OngoingBy Davey Winder<\/a>America\u2019s Security Agency Urges Every Organization To Update Now As Attacks Continue<\/p>\n<p>CISA, meanwhile, has issued <a class=\"color-link\" href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2025\/10\/24\/cisa-adds-two-known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.cisa.gov\/news-events\/alerts\/2025\/10\/24\/cisa-adds-two-known-exploited-vulnerabilities-catalog\" aria-label=\"a warning\">a warning<\/a> giving certain federal agencies just two weeks to ensure they do so under a binding directive. America\u2019s Security Agency <a class=\"color-link\" href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2025\/10\/24\/microsoft-releases-out-band-security-update-mitigate-windows-server-update-service-vulnerability-cve\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.cisa.gov\/news-events\/alerts\/2025\/10\/24\/microsoft-releases-out-band-security-update-mitigate-windows-server-update-service-vulnerability-cve\" aria-label=\"also said\">also said<\/a> that it \u201cstrongly urges organizations to implement Microsoft\u2019s updated Windows Server Update Service Remote Code Execution Vulnerability guidance, or risk an unauthenticated actor achieving remote code execution with system privileges.\u201d<\/p>\n<p>CISA recommends the following course of action:<\/p>\n<ul>\n<li>Identify servers that are currently configured to be vulnerable to exploitation.<\/li>\n<li>Apply the out-of-band security update released on October 23, 2025, to all servers so identified.<\/li>\n<li>Reboot WSUS servers after installation to complete mitigation.<\/li>\n<\/ul>\n<p>If you cannot update right now, it is advised that the WSUS server role be disabled and that inbound traffic to ports 8530 and 8531 be blocked at the host firewall.<\/p>\n<p>Microsoft said that it\u2019s important that Windows Server admins \u201cdo not undo either of these workarounds until after you have installed the update.\u201d I know it\u2019s the weekend, but hey, you know what to do.<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-3\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/10\/24\/update-now---google-issues-emergency-fix-for-35-billion-chrome-users\/\" target=\"_blank\" aria-label=\"Act Now \u2014 Google Issues New  Emergency Update For 3 Billion Chrome Users\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/10\/24\/update-now---google-issues-emergency-fix-for-35-billion-chrome-users\/\" rel=\"nofollow noopener\">ForbesAct Now \u2014 Google Issues New  Emergency Update For 3 Billion Chrome UsersBy Davey Winder<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Windows Server is under attack, act now. SOPA Images\/LightRocket via Getty Images Updated October 26 with more technical&hellip;\n","protected":false},"author":3,"featured_media":331586,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[71547,164574,164573,164575,158,67,132,68,794,164569,164570,164572,93354,164571],"class_list":{"0":"post-333959","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-cisa-warning","9":"tag-critical-windows-update","10":"tag-cve-2025-59287","11":"tag-emergency-windows-update","12":"tag-technology","13":"tag-united-states","14":"tag-unitedstates","15":"tag-us","16":"tag-windows","17":"tag-windows-server","18":"tag-windows-server-update","19":"tag-windows-under-attack","20":"tag-windows-update","21":"tag-wsus"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@us\/115440821960251226","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/333959","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/comments?post=333959"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/333959\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media\/331586"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media?parent=333959"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/categories?post=333959"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/tags?post=333959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}