Windows Server 2019 - RCE (CVE-2025-59287)
198Exploiting IPs reported
Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network.
CrowdSec analysis
CVE-2025-59287 is a critical vulnerability in Windows Server Update Service across multiple Windows Server versions, where deserialization of untrusted data allows unauthorized attackers to execute arbitrary code remotely. This flaw could be exploited over a network, potentially leading to full system compromise, data theft, or disruption of services without requiring user interaction.
CrowdSec has been tracking this vulnerability and its exploits since 17th of December 2025.
According to CrowdSec data, while opportunistic exploitation dominates, a portion of threat actors trying to exploit CVE-2025-59287 apply basic targeting methods such as port or service detection. This indicates emerging patterns of selective targeting. Additionally, according to week-over-week analysis by CrowdSec, exploitation of CVE-2025-59287 is surging. Attack volumes are spiking well above historical norms, indicating widespread and escalating interest from threat actors. CVE-2025-59287 is currently experiencing high visibility and active exploitation across the internet.
Attackers exploit this vulnerability by sending crafted SOAP/XML requests to WSUS endpoints such as /ReportingWebService/ReportingWebService.asmx, /SimpleAuthWebService/SimpleAuth.asmx, and /ClientWebService/Client.asmx, leveraging insecure deserialization to achieve remote code execution. These exploitation attempts typically involve chained requests to these SOAP services, targeting the deserialization logic in the Windows Server Update Service.
Exploitation
Get real-time information about exploitation attempts and actors involved.
Common Weakness Enumeration (CWE)
Protection
Find out relevant information to protect your stack against this CVE.
Blocklist
With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.
To increase your protection against this CVE, block exploitation attempts with this list of identified actors.