WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships (TLP:CLEAR) Vulnerability Notification – CISA Sends Security Alert for Critical RCE Vulnerability in Microsoft WSUS (CVE-2025-59287)
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

(TLP:CLEAR) Vulnerability Notification – CISA Sends Security Alert for Critical RCE Vulnerability in Microsoft WSUS (CVE-2025-59287)

TLP:CLEAR

Author: Chase Snow

Created: Thursday, October 30, 2025 - 8:59

Categories: Cybersecurity, Federal & State Resources, Security Preparedness

ACTION MAY BE REQUIRED for utilities using Microsoft Windows Server Update Service (WSUS) in Windows Server 2012, 2016, 2019, 2022, and 2025. Utilities that outsource technology support may need to consult with their service providers for assistance with remediation actions.

Summary: Last week, Microsoft released out-of-band security updates to patch a high-severity Windows Server Update Service (WSUS) vulnerability (CVE-2025-59287), which has come under active exploitation in the wild. On Friday, CISA issued an alert urging organizations to implement Microsoft’s updated Windows Server Update Service (WSUS) Remote Code Execution Vulnerability guidance.

Analyst Note: WaterISAC is sending this vulnerability notification for member awareness as this high-severity vulnerability could allow an unauthenticated actor to achieve remote code execution (RCE) with system privileges. Additionally, active exploitation of this vulnerability is currently being observed by cybersecurity researchers. Organizations using affected products are urged to take immediate action.

Immediate actions include: (See CISA and Microsoft for more comprehensive guidance)

  1. Identify servers that are currently configured to be vulnerable.
  2. Apply the out-of-band security update released on October 23, 2025, to all servers identified in Step 1.
  3. Apply updates to remaining Windows servers.

Additional Reading:

  • Microsoft Releases Emergency Patch for Exploited Critical Remote Code Execution Vulnerability (CVE-2025-59287)
  • Newly Patched Critical Microsoft WSUS Flaw Comes Under Active Exploitation

Incident Reporting:

WaterISAC encourages any members who have experienced malicious or suspicious activity to email an*****@*******ac.org, call 866-H2O-ISAC, or use the confidential online incident reporting form.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 7, 2026)

May 7, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness
Members Only

(TLP:GREEN) Gate 15 TARGET Report – Identity Centric Attacks: The Shift from Network to Identity as the Primary Attack Surface

May 7, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) CISA and Partners Release Guidance for Careful Adoption of Agentic AI Services

May 7, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar