Security sensors across the internet detected a sharp increase in network scans targeting TCP ports 8530 and 8531 last week, signaling active reconnaissance efforts aimed at exploiting CVE-2025-59287, a vulnerability affecting Windows Server Update Services (WSUS).
These scans represent a shift from research-related activities to what appears to be malicious reconnaissance efforts by threat actors searching for vulnerable systems.
The scanning activity comes from diverse sources worldwide. While security researchers from organizations like Shadowserver Foundation have been conducting legitimate monitoring, network logs reveal additional scan traffic originating from IP addresses with no connection to known research initiatives.
This distinction suggests that attackers are now actively hunting for vulnerable WSUS servers exposed to the internet, marking the transition from theoretical exploitation to real-world attack attempts.
How the Vulnerability Works
CVE-2025-59287 targets WSUS installations and can be exploited by connecting directly to affected servers on either port 8530 (unencrypted connection) or port 8531 (encrypted TLS connection).
Once an attacker successfully connects to a vulnerable WSUS server, they can execute arbitrary scripts with the privileges of the WSUS service.
This capability grants attackers significant control over the compromised system, potentially allowing them to deploy malware, establish persistent access, or move laterally through an organization’s network.
The vulnerability follows a typical attack pattern. Threat actors begin with reconnaissance activities exactly what the recent port scanning represents to identify vulnerable systems.
After locating exposed WSUS servers, attackers would then launch targeted exploitation attempts to establish initial access. From there, the compromise can expand to other systems on the victim’s network.
The widespread availability of exploit details has dramatically lowered the barrier to entry for attackers.
Security researchers have publicly documented the vulnerability’s mechanics, technical specifications, and attack procedures.
This public information means that any WSUS server exposed directly to the internet and running an unpatched version should be considered already compromised at this point.
Attackers with basic technical knowledge can now attempt exploitation with minimal effort.
Organizations running WSUS infrastructure face immediate risk.
The combination of publicly available exploit details, active reconnaissance scanning, and direct internet exposure creates a critical threat environment.
System administrators cannot rely on security through obscurity or assume that their WSUS servers remain undiscovered.
Organizations should prioritize applying available security patches immediately, even if systems are not currently known to be compromised.
Additionally, security teams should restrict to authorized networks only, implement network segmentation to isolate update infrastructure, and monitor firewall logs for scanning attempts targeting ports 8530 and 8531.
Organizations with exposed WSUS servers should investigate their systems immediately for signs of compromise and consider them potentially breached until proven otherwise.
Cyber Awareness Month Offer: Upskill With 100+ Premium Cybersecurity Courses From EHA's Diamond Membership: Join Today