Microsoft: Patch for WSUS flaw disabled Windows Server hotpatching
嗯,用户让我用中文帮他总结一篇文章,控制在100字以内,而且不需要以“文章内容总结”这样的开头。首先,我需要仔细阅读这篇文章,理解其主要内容。 文章讲的是微软发布了一个紧急的安全更新KB5070881,用来修复一个被积极利用的Windows Server Update Service(WSUS)漏洞CVE-2025-59287。这个漏洞是一个远程代码执行(RCE)漏洞,已经被多家网络安全公司确认在野外被利用。荷兰国家网络安全中心也警告了这个风险,并且已经有一个PoC利用存在。 然而,这个更新却导致了一些Windows Server 2025设备上的热补丁功能失效。微软后来停止向这些设备提供这个更新,并建议已经安装的用户将无法再接收热补丁更新,转而使用需要重启的常规安全更新。 幸运的是,微软随后发布了另一个更新KB5070893,修复了这个问题,不会破坏热补丁功能。用户可以通过暂停更新并重新扫描来安装正确的更新。 此外,微软还关闭了WSUS错误报告中同步错误详情的显示,并修复了其他一些问题。 现在我需要把这些信息浓缩到100字以内。重点包括:紧急修复漏洞、导致热补丁问题、微软后续处理、新补丁解决以及关闭错误详情。 可能的结构是:微软发布紧急补丁修复WSUS漏洞CVE-2025-59287,但导致部分Windows Server 2025设备热补丁失效。随后发布新补丁KB5070893解决该问题,并关闭错误详情显示。 </think> 微软发布紧急安全更新KB5070881修复被利用的Windows Server Update Service(WSUS)漏洞CVE-2025-59287远程代码执行风险,但导致部分Windows Server 2025设备热补丁功能失效。随后发布的KB5070893解决了该问题,并关闭了WSUS错误详情显示。 2025-11-3 15:30:22 Author: www.bleepingcomputer.com(查看原文) 阅读量:9 收藏

Windows Server

An out-of-band (OOB) security update that patches an actively exploited Windows Server Update Service (WSUS) vulnerability has broken hotpatching on some Windows Server 2025 devices.

KB5070881, the emergency update causing this issue, was released on the same day that several cybersecurity companies confirmed the critical-severity CVE-2025-59287 remote code execution (RCE) flaw was being exploited in the wild. The Netherlands National Cyber Security Centre (NCSC-NL) confirmed the companies' findings, warning IT admins of the increased risk given that a PoC exploit is already available.

Days later, the Cybersecurity and Infrastructure Security Agency (CISA) ordered U.S. government agencies to secure their systems after adding it to its catalog of security flaws that have been abused in attacks. The Shadowserver Internet watchdog group is now tracking over 2,600 WSUS instances with the default ports (8530/8531) exposed online, although it didn't share how many have already been patched.

Wiz

However, in an update to the original KB5070881 support document, Microsoft says that some of the Hotpatch-enrolled Windows Server 2025 systems have now lost their hotpatch enrollment status after receiving the OOB update that addresses the CVE-2025-59287 vulnerability.

"A very limited number of Hotpatch-enrolled machines received the update before the issue was corrected. The update is now offered only to machines that are not enrolled to receive Hotpatch updates," Microsoft says. "This issue only impacts Windows Server 2025 devices and virtual machines (VMs) enrolled to receive Hotpatch updates."

Microsoft has stopped offering the KB5070881 update to Hotpatch-enrolled Windows Server 2025 devices, and states that those who have already installed it will no longer receive Hotpatch updates in November and December.

They will instead be offered the regular monthly security updates, which will require a restart, and will join the hotpatching rollout after installing the planned baseline for January 2026.

New security update doesn't break hotpatching

Luckily, admins who have only downloaded the buggy update and have yet to deploy it can install the KB5070893 security update (released one day after KB5070881 and specifically designed to patch the CVE-2025-59287 flaw without breaking hotpatching) by going into Settings > Windows Update and selecting Pause updates. Next, they have to unpause and scan for updates to receive the correct update.

"Hotpatch-enrolled machines that have not installed this update will be offered the October 24, 2025, Security Update for Windows Server Update Services (KB5070893) on top of the planned baseline update for October 2025 (KB5066835)," Microsoft added.

"Machines installing KB5070893 will remain 'on the Hotpatch train' and will continue to receive Hotpatch updates in November and December. Only those machines that have WSUS enabled will be prompted to restart after installing the Security Update, KB5070893."

To address the CVE-2025-59287 RCE vulnerability, Microsoft has also turned off the display of synchronization error details within its WSUS error reporting.

Last week, Microsoft acknowledged a bug that prevented users from quitting the Windows 11 Task Manager after installing the October 2025 optional update. Additionally, it fixed the Windows 11 Media Creation Tool (MCT) and resolved 0x800F081F update errors affecting Windows 11 24H2 systems since January.

Wiz

Secrets Security Cheat Sheet: From Sprawl to Control

Whether you're cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start.

Get the cheat sheet and take the guesswork out of secrets management.


文章来源: https://www.bleepingcomputer.com/news/microsoft/microsoft-patch-for-wsus-flaw-disabled-windows-server-hotpatching/
如有侵权请联系:admin#unsafe.sh