# Windows Server Update Service 远程代码执行漏洞
## 概述
Windows Server Update Service (WSUS) 中存在一个不安全的反序列化漏洞,允许未经授权的攻击者通过网络执行代码。
## 影响版本
受影响的版本包括:
- Windows Server Update Services 3.0 SP2 及之前版本
- 具体版本需参考微软官方的安全公告或更新日志。
## 细节
攻击者可利用此漏洞向 WSUS 服务发送特制数据,触发反序列化操作,从而在目标系统上执行任意代码。此攻击可在无需认证的情况下通过网络发起。
## 影响
成功利用此漏洞可导致:
- 攻击者在系统上获得与服务相同的权限执行任意代码
- 潜在造成系统完全沦陷、数据泄露或进一步横向移动的风险。
是否为 Web 类漏洞: 是
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | PoC from hawktrace | https://github.com/keeganparr1/CVE-2025-59287-hawktrace | POC详情 |
| 2 | WSUS Unauthenticated RCE | https://github.com/jiansiting/CVE-2025-59287 | POC详情 |
| 3 | It is an Working exploit of new CVE found in WSUS. | https://github.com/garvitv14/CVE-2025-59287 | POC详情 |
| 4 | Windows Server Update Service contains an insecure deserialization vulnerability caused by deserialization of untrusted data. An unauthorized attacker with network access can exploit this to execute arbitrary code remotely, potentially leading to full system compromise. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-59287.yaml | POC详情 |
| 5 | PoC for CVE-2025-59287 | https://github.com/0xBruno/WSUSploit.NET | POC详情 |
| 6 | Defensive PoC decoy for CVE-2025-59287 (WSUS) - emulates WSUS endpoints, captures request bodies and metadata, saves evidence for forensic analysis, and provides validation harness and detection rules. | https://github.com/Lupovis/Honeypot-for-CVE-2025-59287-WSUS | POC详情 |
| 7 | CVE-2025-59287 | https://github.com/FurkanKAYAPINAR/CVE-2025-59287 | POC详情 |
| 8 | powershell version of hawktrace POC exploit | https://github.com/tecxx/CVE-2025-59287-WSUS | POC详情 |
| 9 | Module PowerShell de réponse à l'incident CVE-2025-59287 — WSUS Remote Code Execution (RCE) | https://github.com/RadzaRr/WSUSResponder | POC详情 |
| 10 | Helps defenders find their WSUS configurations in the wake of CVE-2025-59287 | https://github.com/mubix/Find-WSUS | POC详情 |
| 11 | CVE-2025-59287 is a critical RCE vulnerability in Windows Server Update Services (WSUS) caused by unsafe deserialization of untrusted data. It allows remote attackers to execute arbitrary code without authentication. Urgent patching is advised due to active exploitation. | https://github.com/mrk336/Breaking-the-Update-Chain-Inside-CVE-2025-59287-and-the-WSUS-RCE-Threat | POC详情 |
| 12 | CVE-2025-59287 — Critical unauthenticated RCE in Windows Server Update Services (WSUS) via unsafe deserialization of an AuthorizationCookie, enabling SYSTEM-level compromise and active exploitation; patch or isolate WSUS (ports 8530/8531) immediately. | https://github.com/AdityaBhatt3010/CVE-2025-59287-When-your-patch-server-becomes-the-attack-vector | POC详情 |
| 13 | Guía de respuesta rápida y script de auditoría para CVE-2025-59287 (RCE crítica en WSUS). | https://github.com/esteban11121/WSUS-RCE-Mitigation-59287 | POC详情 |
| 14 | Verificacion de vulnerabilidad en WSUS | https://github.com/fsanzmoya/wsus_CVE-2025-59287 | POC详情 |
| 15 | CVE-2025-59287 注入WolfShell内存马 | https://github.com/0x7556/CVE-2025-59287 | POC详情 |
| 16 | This is an exploit script written in C# to aid gaining a reverse shell on targets with Windows Server Update Service(WSUS) CVE-2025-59287. We will deliver a reverse shell payload through encrypted SOAP req. | https://github.com/QurtiDev/WSUS-CVE-2025-59287-RCE | POC详情 |
| 17 | WSUS vulnerability PoC | https://github.com/Sid6Effect/CVE-2025-59287 | POC详情 |
| 18 | Exploitation proof-of-concept for CVE-2025-59287 - a critical vulnerability in the Windows Server Update Service (WSUS) caused by the deserialization of untrusted data. This flaw allows an unauthorized attacker to execute arbitrary code over a network, posing a significant security risk. | https://github.com/dexterm300/cve-2025-59287-exploit-poc | POC详情 |
| 19 | WSUS vulnerability PoC | https://github.com/th1n0/CVE-2025-59287 | POC详情 |
| 20 | None | https://github.com/Twodimensionalitylevelcrossing817/CVE-2025-59287 | POC详情 |
| 21 | None | https://github.com/Adel-kaka-dz/cve-2025-59287 | POC详情 |
| 22 | None | https://github.com/17patmaks/CVE-2025-59287-Sigma-Rule | POC详情 |
| 23 | CVE-2025-59287 | https://github.com/gud425/gud425.github.io | POC详情 |
| 24 | None | https://github.com/LuemmelSec/CVE-2025-59287---WSUS-SCCM-RCE | POC详情 |
| 25 | CVE 2025 59287 | https://github.com/you-dream-1hall/CVE-2025-59287 | POC详情 |
标题: CVE-2025-59287 - Security Update Guide - Microsoft - Windows Server Update Service (WSUS) Remote Code Execution Vulnerability -- 🔗来源链接
标签:vendor-advisory
神龙速读:
从这个网页截图中可以获取到以下关于漏洞的关键信息:
- **漏洞名称**: Windows Server Update Service (WSUS) Remote Code Execution Vulnerability
- **CVE编号**: CVE-2025-59287
- **发布日期**: Oct 14, 2025
- **最大严重性**: Critical
- **影响**: Remote Code Execution
- **弱点**: CWE-502: Deserialization of Untrusted Data
- **CVSS评分**:
- 基本分数: 9.8
- 临时分数: 8.5
### CVSS Base Score Metrics
- **攻击向量**: Network
- **攻击复杂度**: Low
- **所需权限**: None
- **用户交互**: None
- **作用范围**: Unchanged
- **机密性影响**: High
- **完整性影响**: High
- **可用性影响**: High
### CVSS Temporal Score Metrics
- **利用代码成熟度**: Unproven
- **修复级别**: Official Fix
- **报告置信度**: Confirmed
暂无评论