Number: AL25-015
Date: October 24, 2025
Audience
This Alert is intended for IT professionals and managers.
Purpose
An Alert is used to raise awareness of a recently identified cyber threat that may impact cyber information assets, and to provide additional detection and mitigation advice to recipients. The Canadian Centre for Cyber Security ("Cyber Centre") is also available to provide additional assistance regarding the content of this Alert to recipients as requested.
Details
On October 24, 2025, Microsoft published an out-of-band security update to a critical vulnerability in the Windows Server Update Service (WSUS)Footnote1.
CVE-2025-59287 involves the deserialization of untrusted data in WSUS, allowing an unauthorized attacker to execute code over a network.
The WSUS Server Role is not enabled by default on Windows servers, and Windows servers that do not have this role enabled are not vulnerable. In response to Microsoft’s disclosure, the Cyber Centre released an update to AV25-666 on October 24, 2025Footnote2.
The Cyber Centre is aware of active exploitation Footnote3
Suggested actions
The Cyber Centre strongly recommends that organizations follow Microsoft customer guidance for mitigation advice:
- Apply the recommended update. If this is not possible, apply the following mitigations:
- If the WSUS Server Role is enabled on your server, disable it. Note that clients will no longer receive updates from the server if WSUS is disabled.
- Block inbound traffic to Ports 8530 and 8531 on the host firewall (as opposed to blocking only at the network/perimeter firewall) in order to render WSUS non-operational.
Microsoft adds that this update is cumulative, so organizations do not need to apply any previous updates before installing this one, as it supersedes all previous updates for affected versions. They suggest that if the October 2025 Windows security update has not been applied, that this out-of-band update should be applied. After installation, a reboot will be required.
In addition, the Cyber Centre also strongly recommends that organizations review and implement the Cyber Centre’s Top 10 IT Security Actions with an emphasis on the following topicsFootnote4.
- Patching operating systems and applications
- Isolating Web-Facing applications
Should activity matching the content of this alert be discovered, recipients are encouraged to report via the My Cyber Portal, or email contact@cyber.gc.ca.
