302. Hunting for CVE-2025-59287 Exploitation

Hello everyone!

I think you already heard about a vulnerability in Microsoft's Windows Server Update Services (WSUS). Today we'll talk about Exploit Public-Facing Application (T1190) and CVE-2025-59287.

So, the vulnerability is already actively exploited ITW. According to this report, successful exploitation leads to spawning command and scripting interpreters from wsusservice.exe and w3wp.exe.

Here we have the first part of our detection opportunities. 

The first one:

event_type: "processcreatewin"

AND

proc_file_path: ("cmd.exe" OR "powershell.exe")

AND

proc_p_file_path: "wsusservice.exe"

The second:

event_type: "processcreatewin"

AND

proc_file_path: ("cmd.exe" OR "powershell.exe")

AND

proc_p_file_path: "w3wp.exe"

AND

proc_p_cmdline: "wsuspool"

Also, the adversary leveraged a PowerShell payload to exfiltrate data to a webhook.site endpoint. And this is another detection opportunity:

event_type: "dnsreqwin"

AND

dns_rname: "webhook.site"

AND

proc_file_path: "powershell.exe"

See you tomorrow!


Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge