Windows WSSUS的一个关键缺陷(CVE-2025-59287)使远程代码执行成为可能,引发紧急补丁和紧急系统更新。
A critical Windows WSUS flaw (CVE-2025-59287) enables remote code execution, prompting an emergency patch and urgent system updates.
在微软Windows服务器更新服务(CVE-2025-59287)中,微软Windows服务器更新服务(CVE-2025-59287)中一个受到积极利用的严重脆弱性使得由于不安全的脱序,可以进行未经验证的远程代码执行,其严重程度得分为9.8。
A critical, actively exploited vulnerability in Microsoft Windows Server Update Services (CVE-2025-59287) allows unauthenticated remote code execution due to insecure deserialization, with a 9.8 severity score.
微软公司于2025年10月23日发出紧急带外补丁,
Microsoft issued an emergency out-of-band patch on October 23, 2025, after an initial fix proved insufficient.
2012年至2025年,Windows服务器的缺陷影响到Windows Server的WSUS,而概念证据开发代码是公开的。
The flaw affects WSUS on Windows Server 2012 through 2025, and proof-of-concept exploit code is public.
攻击者将目标对准在默认端口的暴露的WSUS服务器,冒数据盗窃和恶意更新的风险。
Attackers are targeting exposed WSUS servers on default ports, risking data theft and malicious updates.
CISA和荷兰网络安全机构警告无源系统可能受到破坏。
CISA and Dutch cybersecurity agencies warn unpatched systems are likely compromised.
微软敦促立即进行补丁,建议防火墙阻止8530和8531端口作为解决方案,并建议从过时的WSUS迁移到像Intune这样的新工具.
Microsoft urges immediate patching, recommends firewall blocking of ports 8530 and 8531 as a workaround, and advises migration from deprecated WSUS to newer tools like Intune.