Skip to main content
Mallory

Active Exploitation of WSUS Vulnerability and Urgent Security Guidance for Microsoft Exchange and WSUS Servers

actively-exploited-vulnerabilitygovernment-vulnerability-catalogwidely-deployed-product-advisorycredential-stealer-activityend-of-life-software
Updated March 21, 2026 at 03:32 PM2 sources
Share:
Active Exploitation of WSUS Vulnerability and Urgent Security Guidance for Microsoft Exchange and WSUS Servers

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Cybersecurity authorities including CISA and NSA, in collaboration with international partners, have issued urgent guidance to secure on-premise Microsoft Exchange Server and Windows Server Update Services (WSUS) instances. The recommendations emphasize restricting administrative access, enforcing multi-factor authentication, maintaining strict security baselines, and decommissioning end-of-life servers to mitigate ongoing threats. Organizations are urged to apply security updates promptly, enable advanced security features, and adopt zero trust principles to defend against persistent malicious activity targeting these critical Microsoft services.

Simultaneously, a newly disclosed vulnerability in WSUS, tracked as CVE-2025-59287, is being actively exploited by cybercriminals to deploy the Skuld Stealer malware. Despite Microsoft's initial and subsequent out-of-band patches, attackers have leveraged the flaw to gain remote control over WSUS servers, using legitimate tools like PowerShell and cURL for malicious purposes. The exploitation prompted CISA to add the vulnerability to its list of known exploited vulnerabilities, underscoring the urgency for organizations to implement the latest security updates and follow best practices to protect their infrastructure.

Timeline

  1. Oct 31, 2025

    CISA and NSA issue urgent guidance on securing WSUS and Exchange

    CISA and the NSA published urgent guidance advising organizations to harden and secure WSUS and Microsoft Exchange servers. The guidance reflects official concern over the security risks and need for immediate defensive action.

  2. Oct 31, 2025

    Attackers exploit the WSUS flaw to distribute Skuld Stealer

    Hackers were reported exploiting the WSUS vulnerability to spread the Skuld Stealer malware, indicating active abuse despite Microsoft's patch. This marked the operational use of the flaw in malware delivery.

  3. Oct 31, 2025

    Microsoft releases a patch for a WSUS flaw

    Microsoft had already issued a security patch for a Windows Server Update Services (WSUS) vulnerability before later reporting showed attackers were still exploiting it. The patch release is referenced as preceding the observed abuse campaign.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Entities

Related Stories

Microsoft WSUS Remote Code Execution Vulnerability Actively Exploited

Microsoft WSUS Remote Code Execution Vulnerability Actively Exploited

Microsoft released an urgent out-of-band security update to address a critical remote code execution vulnerability in Windows Server Update Services (WSUS), identified as CVE-2025-59287. The flaw was reportedly under active exploitation in the wild, prompting Microsoft to issue a comprehensive fix outside of its regular update cycle. Security advisories and industry news highlighted the severity of the vulnerability and its inclusion in the U.S. CISA Known Exploited Vulnerabilities catalog, underscoring the immediate risk to organizations relying on WSUS for patch management. The vulnerability allowed attackers to potentially execute arbitrary code on affected WSUS servers, posing a significant threat to enterprise environments. Security experts urged organizations to apply the patch without delay to mitigate the risk of compromise. The rapid response from Microsoft and the attention from security agencies reflect the critical nature of the flaw and the ongoing threat landscape targeting core infrastructure components like WSUS.

1 months ago
Remote Code Execution Vulnerabilities in Microsoft Update Services Exploited

Remote Code Execution Vulnerabilities in Microsoft Update Services Exploited

A critical remote code execution (RCE) vulnerability was discovered in Microsoft's Update Health Tools (KB4023057), a utility designed to facilitate rapid security updates via Intune. Researchers found that a misconfiguration involving abandoned Azure blob storage allowed attackers to register a storage account and receive requests from vulnerable devices worldwide, enabling arbitrary code execution. Microsoft has since responded to the disclosure, and newer versions of the tool have addressed the issue, but devices running the original version remain at risk if not updated. Separately, a remote code execution vulnerability in Microsoft Windows Server Update Services (WSUS), tracked as CVE-2025-59287, was actively exploited by threat actors to deploy the ShadowPad backdoor malware. Attackers leveraged this flaw to gain system-level access using PowerCat and subsequently installed ShadowPad via `certutil` and `curl`. The exploitation of these vulnerabilities highlights the risks associated with update management tools and the importance of timely patching and secure configuration to prevent compromise by advanced persistent threats.

1 months ago
ProxyShell Exchange RCE Chain Remains a High-Risk Path to Server Compromise

ProxyShell Exchange RCE Chain Remains a High-Risk Path to Server Compromise

`CVE-2021-34473` remains a critical entry point in the **ProxyShell** attack chain against Microsoft Exchange Server, enabling unauthenticated attackers to exploit improper URL normalization and SSRF behavior in the Client Access Service and autodiscover components. Security reporting and public tooling show the flaw can be chained with `CVE-2021-34523` and `CVE-2021-31207` to reach privileged backend services, access Exchange PowerShell, deploy webshells, read mailboxes, exfiltrate email, and move laterally across victim environments. The vulnerability has been actively exploited in the wild and is listed in CISA's Known Exploited Vulnerabilities catalog, with affected builds including Exchange Server 2013 CU23, Exchange Server 2016 CU19/CU20, and Exchange Server 2019 CU8/CU9. Public exploit resources, including GitHub-hosted scripts and scanning templates, continue to lower the barrier to exploitation by documenting attack paths and automating discovery of exposed systems. Researchers originally tied the issue set to Orange Tsai's work, and defenders are being urged to apply Microsoft's security updates, hunt for indicators such as suspicious autodiscover requests and webshells, monitor for PowerShell launched by `w3wp.exe`, and reduce risk by limiting external exposure of Exchange services. A separate Synacktiv report on newer Windows authentication reflection flaws highlights how incomplete mitigations can leave relay and privilege-escalation paths open, reinforcing concern that exposed Microsoft infrastructure remains vulnerable when patching and hardening are delayed.

5 days ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.