Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network.
| Product | Version Start | Version End (excl.) | Status |
|---|---|---|---|
| windows_server_2012 | - | - | vulnerable |
| windows_server_2012 | r2 | r2 | vulnerable |
| windows_server_2016 | * | 10.0.14393.8524 | vulnerable |
| windows_server_2019 | * | 10.0.17763.7922 | vulnerable |
| windows_server_2022 | * | 10.0.20348.4297 | vulnerable |
| windows_server_2022_23h2 | * | 10.0.25398.1916 | vulnerable |
| windows_server_2025 | * | 10.0.26100.6905 | vulnerable |
Apply vendor patches immediately.
Update to the latest patched version.
Restrict access to affected services.
Monitor for signs of exploitation.
Monitor network traffic for indicators of compromise.
Experience superior visibility and a simpler approach to cyber risk management