October 2025 Patch Tuesday: Holes in Windows Server Update Service and an ancient modem driver

WSUS RCE

The cybersecurity landscape has recently been shaken by the emergence of CVE-2025-59287, a vulnerability within the Windows Server Update Service (WSUS) that could potentially enable remote code execution (RCE). With a staggering CVSSv3 score of 9.8, this vulnerability has been classified as critical and is deemed ‘Exploitation More Likely’ according to Microsoft’s Exploitability Index. The nature of this threat lies in an attacker’s ability to exploit the vulnerability by sending a specially crafted event that triggers the deserialization of untrusted data.

This incident marks only the third WSUS vulnerability addressed in Microsoft’s Patch Tuesday updates since the beginning of 2023, as highlighted by Tenable. Notably, it is the first RCE vulnerability and the first to be categorized as more likely to be exploited. Mike Walters, president of Action1, emphasizes the urgency of this situation, stating, “This vulnerability requires immediate CISO attention because it can compromise your entire patch management infrastructure.” He further elaborates that this critical deserialization flaw (CVSS 9.8) in WSUS poses a significant threat to the system responsible for distributing essential security patches across organizations.

In light of this vulnerability, organizations are advised to not only prioritize urgent patching but also to reassess their patch management architecture and the network exposure of their WSUS servers. A compromised WSUS environment could enable attackers to deploy malicious “updates” to all managed endpoints, creating a profound risk to organizational security.

Microsoft Office RCE

In another critical development, two remote code execution vulnerabilities—CVE-2025-59227 and CVE-2025-59234—have been identified within Microsoft Office. Tenable reports that these vulnerabilities can be exploited through social engineering tactics, wherein an attacker sends a malicious Microsoft Office document to a targeted individual. If successful, this exploitation would grant the attacker code execution privileges.

What makes these vulnerabilities particularly concerning is their reliance on the “Preview Pane” feature. This means that the targeted individual does not even need to open the document for the exploitation to take place. An attacker could simply trick the target into previewing an email containing the malicious attachment. Although Microsoft has classified these vulnerabilities as ‘Less Likely’ to be exploited, the potential for attack via the Preview Pane remains a serious concern.

Agere modem driver flaws

Among the critical vulnerabilities reported this month, the issues found in the Agere modem driver stand out. Satnam Narang, a senior staff research engineer at Tenable, points out that these vulnerabilities are particularly noteworthy due to the Agere Modem’s long-standing presence in Windows operating systems for nearly two decades. Despite their critical rating, the implications of these vulnerabilities extend beyond mere technical flaws, as they highlight the ongoing challenges associated with legacy software components in modern cybersecurity frameworks.

Winsage
October 2025 Patch Tuesday: Holes in Windows Server Update Service and an ancient modem driver