Microsoft Windows Server Update Service Is Under Attack, What You Need To Know
Analysts speaking to The Register note that one proof of concept has been available since October 21st. Current examples of the attack indicate that hackers are gaining access to a system and performing network reconnaissance by executing PowerShell commands to gain information about a given network and exfiltrate it to a Webhook.site endpoint. As Trend Micro's Dustin Childs warns, "If the patch doesn't fully address the vulnerability, the existence of a patch actually increases the risk to enterprises. It leads people to think they are protected when in fact they aren't. We need to start holding them accountable not only for patches that break functionality, but also for patches that don't fix the security issues they document."

Microsoft's official documentation encourages potential victims to disable the WSUS Server Role on their servers and block inbound traffic to Ports 8530 and 8531, both of which should prevent the Windows Server Update Service from being exploited. However, that documentation also points toward the October 23rd out of band security update actually fixing the issue, which doesn't seem to be the case based on reports we're still seeing of the exploit being active at the time of writing. Hopefully, Microsoft fully patches out the exploit sooner rather than later—until then, we'd advise users disable the Windows Server Update Service entirely.
Image Credit: Microsoft, WikiMedia Commons (unofficial Windows Server 2025 logo)

