Windows Server bug attacked by hackers to spread malware – here’s what we know



  • Chinese state-sponsored actors are exploiting CVE-2025-59287, a critical WSUS flaw that allows unauthenticated RCE with SYSTEM privileges
  • AhnLab reports that attackers use PowerCat and certutil/curl to implement ShadowPad, a successor backdoor to PlugX
  • Likely targets include the government, defense, telecommunications and critical infrastructure sectors.

Experts have warned that Chinese state-sponsored threat actors are actively exploiting a vulnerability in Microsoft Windows Server Update Services (WSUS) to spread malware.

As part of its October 2025 Patch Tuesday cumulative update, Microsoft addressed CVE-2025-59287, an “untrusted data deserialization” flaw found in Windows Server Update Service (WSUS). The flaw received a severity score of 9.8/10 (critical) as it apparently enables remote code execution (RCE) attacks. It can be abused in low complexity attacks, without user interaction, giving unauthenticated and unprivileged threat actors the ability to execute malicious code with SYSTEM privileges. In theory, it would allow them to pivot and infect other WSUS servers as well.



Leave a Comment

Your email address will not be published. Required fields are marked *