Windows Server Flaws Targeted by Hackers to Spread Malware – Here’s What We Know


  • Chinese state-sponsored actors exploit CVE-2025-59287, a critical WSUS flaw that allows unauthorized RCE with SYSTEM privileges
  • AhnLab reports attackers using PowerCat and certutil/curl to implement ShadowPad, a PlugX successor backdoor
  • Likely targets include government, defense, telecommunications and critical infrastructure

Chinese state-sponsored threat actors are reportedly actively exploiting a vulnerability in Microsoft Windows Server Update Services (WSUS) to spread malware, experts have warned.

As part of the October 2025 Patch Tuesday cumulative update, Microsoft addressed CVE-2025-59287, a “deserialization of untrusted data” flaw found in the Windows Server Update Service (WSUS). The flaw was given a severity score of 9.8/10 (Critical) as it apparently allows for remote code execution (RCE) attacks. It can be abused in low-complexity attacks without user interaction, giving unauthorized, unprivileged threat actors the ability to run malicious code with SYSTEM privileges. In theory, this would allow them to pivot and infect other WSUS servers as well.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top