module
Windows Server Update Service Deserialization Remote Code Execution
| Disclosed | Created |
|---|---|
| Oct 14, 2025 | Nov 12, 2025 |
Disclosed
Oct 14, 2025
Created
Nov 12, 2025
Description
This module exploits deserialization vulnerability in legacy serialization mechanism in Windows Server Update Services (WSUS). The vulnerability allows unauthenticated attacker to create specially crafted event, which triggers unsafe deserialization upon server synchronization. The module does not require any other options and upon successful exploitation, the payload is executed in context of administrator.
Authors
mwulftange
msutovsky-r7
msutovsky-r7
Platform
Windows
Architectures
cmd
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.