Skip to content

Commit a733de0

Browse files
committed
2 parents 5210d1d + 1cfa4a0 commit a733de0

File tree

1 file changed

+27
-0
lines changed

1 file changed

+27
-0
lines changed

yara/expl_wsus_cve_2025_59287.yar

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
rule EXPL_WSUS_Exploitation_Indicators_Oct25 {
2+
meta:
3+
description = "Detects indicators related to the exploitation of the Windows Server Update Services (WSUS) Remote Code Execution Vulnerability (CVE-2025-59287)"
4+
author = "Florian Roth"
5+
reference = "https://www.huntress.com/blog/exploitation-of-windows-server-update-services-remote-code-execution-vulnerability"
6+
date = "2025-10-25"
7+
score = 75
8+
strings:
9+
// Error traceback found in C:\Program Files\Update Services\Logfiles\SoftwareDistribution.log
10+
$sl1 = "at System.Data.DataSet.DeserializeDataSetSchema(SerializationInfo info, StreamingContext context" ascii wide
11+
$sl2 = "at System.Runtime.Serialization.ObjectManager.DoFixups()" ascii wide
12+
$sl3 = "at System.Runtime.Serialization.ObjectManager.CompleteISerializableObject" ascii wide
13+
$sl4 = "System.Reflection.TargetInvocationException: Exception has been thrown by the target of an invocation." ascii wide
14+
$sl5 = "ErrorWsusService.9HmtWebServices.CheckReportingWebServiceReporting WebService WebException:System.Net.WebException: Unable to connect to the remote server" ascii wide
15+
16+
// Encoded PowerShell command observed in exploitation attempts
17+
$se1 = "powershell -ec try{$r= (&{echo https://" ascii wide base64 base64wide
18+
$se2 = ":8531; net user /domain; ipconfig " ascii wide base64 base64wide
19+
20+
// Commands observed in follow-up activity
21+
$sa1 = "whoami;net user /domain" ascii wide base64 base64wide
22+
$sa2 = "net user /domain; ipconfig /all" ascii wide base64 base64wide
23+
condition:
24+
all of ($sl*)
25+
or 1 of ($se*)
26+
or all of ($sa*)
27+
}

0 commit comments

Comments
 (0)