CVE-2025-59287

CRITICAL KEV RANSOMWARE NUCLEI

Microsoft Windows Server 2012 - Insecure Deserialization

Title source: rule

Description

Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network.

Exploits (25)

github WORKING POC 169 stars
by jiansiting · pythonremote
https://github.com/jiansiting/CVE-2025-59287
github WRITEUP 26 stars
by Lupovis · shellpoc
https://github.com/Lupovis/Honeypot-for-CVE-2025-59287-WSUS
github WORKING POC 14 stars
by garvitv14 · pythonremote
https://github.com/garvitv14/CVE-2025-59287
github WORKING POC 12 stars
by tecxx · powershellremote
https://github.com/tecxx/CVE-2025-59287-WSUS
nomisec WORKING POC 7 stars
by M507 · poc
https://github.com/M507/CVE-2025-59287-PoC
github WRITEUP 7 stars
by AdityaBhatt3010 · sqlpoc
https://github.com/AdityaBhatt3010/CVE-2025-59287-When-your-patch-server-becomes-the-attack-vector
github WORKING POC 4 stars
by dexterm300 · pythonremote
https://github.com/dexterm300/cve-2025-59287-exploit-poc
github WORKING POC 4 stars
by mrk336 · remote
https://github.com/mrk336/Breaking-the-Update-Chain-Inside-CVE-2025-59287-and-the-WSUS-RCE-Threat
github WORKING POC 3 stars
by QurtiDev · c#remote
https://github.com/QurtiDev/WSUS-CVE-2025-59287-RCE
github WORKING POC 2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-59287
github WORKING POC 1 stars
by N3k0t-dev · pythonpoc
https://github.com/N3k0t-dev/PoC-CVE-collection
nomisec WORKING POC 1 stars
by Adel-kaka-dz · remote
https://github.com/Adel-kaka-dz/cve-2025-59287
nomisec WORKING POC 1 stars
by LuemmelSec · remote
https://github.com/LuemmelSec/CVE-2025-59287---WSUS-SCCM-RCE
nomisec 1 stars
by Twodimensionalitylevelcrossing817 · poc
https://github.com/Twodimensionalitylevelcrossing817/CVE-2025-59287
github NO CODE 1 stars
by fsanzmoya · pythonpoc
https://github.com/fsanzmoya/wsus_CVE-2025-59287
github NO CODE 1 stars
by keeganparr1 · remote
https://github.com/keeganparr1/CVE-2025-59287-hawktrace
github WORKING POC
by ross-ns · powershellremote
https://github.com/ross-ns/WSUS-CVE-2025-59287
nomisec TROJAN
by vatslaaeytoygag · poc
https://github.com/vatslaaeytoygag/CVE-2025-59287
nomisec TROJAN
by salman5230 · poc
https://github.com/salman5230/CVE-2025-59287
nomisec WORKING POC
by swoon69 · poc
https://github.com/swoon69/CVE-2025-59287-Exercise-Use
github WORKING POC
by 0xBruno · c#remote
https://github.com/0xBruno/WSUSploit.NET
github WORKING POC
by FurkanKAYAPINAR · pythonremote
https://github.com/FurkanKAYAPINAR/CVE-2025-59287
nomisec WRITEUP
by gud425 · remote
https://github.com/gud425/gud425.github.io
metasploit WORKING POC GREAT
by mwulftange, msutovsky-r7 · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/wsus_deserialization_rce.rb

Nuclei Templates (1)

Windows Server Update Service - Insecure Deserialization
CRITICALVERIFIEDby pussycat0x,princechaddha
Shodan: cpe:"cpe:2.3:o:microsoft:windows_server_2012"

Scores

CVSS v3 9.8
EPSS 0.7588
EPSS Percentile 98.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2025-10-24
VulnCheck KEV 2025-10-24
ENISA EUVD EUVD-2025-34268
Ransomware Use Confirmed

Classification

CWE
CWE-502
Status published

Affected Products (7)

microsoft/windows_server_2012
microsoft/windows_server_2012
microsoft/windows_server_2016 < 10.0.14393.8524
microsoft/windows_server_2019 < 10.0.17763.7922
microsoft/windows_server_2022 < 10.0.20348.4297
microsoft/windows_server_2022_23h2 < 10.0.25398.1916
microsoft/windows_server_2025 < 10.0.26100.6905

Timeline

Published Oct 14, 2025
KEV Added Oct 24, 2025
Tracked Since Feb 18, 2026