Answer Brief
Taiwan’s TWCERT/CC is urging organizations to urgently patch a high-severity Windows Server Update Services (WSUS) vulnerability, CVE-2025-59287 (CVSS 9.8), after U.S. CISA added it to the Known Exploited Vulnerabilities (KEV) catalog and Dutch NCSC-NL also confirmed real-world exploitation. The flaw enables unauthenticated remote code execution as SYSTEM via a deserialization trigger, but only impacts Windows Server systems where the WSUS server role is enabled. TWCERT/CC also cited Huntress reporting attacker scanning for exposed WSUS ports 8530/8531 and delivering malicious requests, with post-exploitation activity potentially involving PowerShell-based payload execution and data discovery/exfiltration.

Executive Summary: Taiwan’s TWCERT/CC is urging organizations to urgently patch a high-severity Windows Server Update Services (WSUS) vulnerability, CVE-2025-59287 (CVSS 9.8), after U.S. CISA added it to the Known Exploited Vulnerabilities (KEV) catalog and Dutch NCSC-NL also confirmed real-world exploitation. The flaw enables unauthenticated remote code execution as SYSTEM via a deserialization trigger, but only impacts Windows Server systems where the WSUS server role is enabled. TWCERT/CC also cited Huntress reporting attacker scanning for exposed WSUS ports 8530/8531 and delivering malicious requests, with post-exploitation activity potentially involving PowerShell-based payload execution and data discovery/exfiltration.
Why It Matters
Why this matters globally: WSUS is a foundational enterprise update distribution component, and exploitation at the WSUS server layer can become an outsized infrastructure risk because it sits at a high-trust junction between Windows fleets and patching workflows. TWCERT/CC’s warning is notable not only for Taiwan-based defenders, but for any multinational organization with Windows Server estates where WSUS is exposed or reachable from untrusted networks.
What is confirmed in the source: CVE-2025-59287 is described by TWCERT/CC as a high-severity WSUS vulnerability (CVSS 9.8) that permits unauthenticated remote attackers to trigger deserialization via crafted requests, leading to arbitrary code execution with SYSTEM privileges on the target server. The alert emphasizes this affects Windows Server systems only when the WSUS server role is enabled (and notes WSUS is not enabled by default). TWCERT/CC further states that CISA added the CVE to KEV and observed active exploitation, and that NCSC-NL also issued a warning confirming exploitation in the wild.
Observed attacker behavior (as attributed by TWCERT/CC): TWCERT/CC cites Huntress reporting scanning activity for externally reachable WSUS ports 8530 and 8531, followed by malicious requests sent to reachable servers. The alert says attackers may use PowerShell to decode and execute payloads, enumerate servers and user information inside the network, and transmit stolen data to a remote server, while using proxy infrastructure to obscure operations. These are presented as observed/assessed behaviors by Huntress as summarized by TWCERT/CC, not as independently verified by TWCERT/CC.
Operational impact framing: For infrastructure and identity teams, the combination of unauthenticated reachability, SYSTEM-level code execution, and observed scanning for default WSUS ports creates a rapid-risk profile for internet-exposed deployments. Even where WSUS is internal-only, exposure through misconfigured firewalls, VPN split tunneling, or partner connectivity could elevate risk. For global cloud and hybrid operators, WSUS servers sometimes sit in shared services networks that also host identity, monitoring, and automation tooling; compromise could therefore become a lateral-movement staging point.
Mitigation signals highlighted by TWCERT/CC: The alert strongly prioritizes applying Microsoft’s security updates for affected versions, minimizing unnecessary WSUS deployments (disable/remove the role if not needed), and blocking inbound external traffic to ports 8530/8531 at host and perimeter firewalls. It also recommends secure serialization practices and ongoing monitoring/log analysis for WSUS-related traffic and system logs to detect suspicious behavior. (These are recommendations in the TWCERT/CC notice; organizations should align actions to their own risk and change-control policies.)
Event Type: security
Importance: high
Affected Companies
- Huntress
- Microsoft
Affected Sectors
- Cloud & Infrastructure
- Cybersecurity
- IT Operations
Key Numbers
- CVSS: 9.8
- Exposed WSUS ports observed in scanning: 8530/8531
Timeline
- Microsoft disclosed WSUS vulnerability CVE-2025-59287 in its regular monthly security updates (per TWCERT/CC).
- TWCERT/CC published an alert stating the vulnerability is being actively exploited and urging immediate updates.