| 
 [內容說明:]轉發 國家資安資訊分享與分析中心 NISAC-200-202510-00000233
 研究人員發現Windows Server Update Services存在不安全之反序列化(Deserialization of Untrusted Data)漏洞(CVE-2025-59287)。未經身分鑑別之遠端攻擊者,可透過向WSUS伺服器發送特製事件以系統權限執行任意程式碼。該漏洞已遭駭客利用,請儘速確認並進行修補。
 
 [影響平台:]
 - Windows Server 2025 (Server Core installation)
 - Windows Server 2025
 - Windows Server 2022, 23H2 Edition (Server Core installation)
 - Windows Server 2022 (Server Core installation)
 - Windows Server 2022
 - Windows Server 2019 (Server Core installation)
 - Windows Server 2019
 - Windows Server 2016 (Server Core installation)
 - Windows Server 2016
 - Windows Server 2012 R2 (Server Core installation)
 - Windows Server 2012 R2
 - Windows Server 2012 (Server Core installation)
 - Windows Server 2012
 
 [建議措施:]
 官方已針對漏洞釋出修復更新,請參考官方說明進行更新,網址如下:
 - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287
 
 [參考資料:]
 1. https://nvd.nist.gov/vuln/detail/CVE-2025-59287
 2. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287
 3. https://www.cisa.gov/news-events/alerts/2025/10/24/microsoft-releases-out-band-security-update-mitigate-windows-server-update-service-vulnerability-cve
 4. https://www.helpnetsecurity.com/2025/10/24/wsus-vulnerability-cve-2025-59287-exploited/
 |