Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
PoC Exploit Released for IIS WebDeploy Remote Code Execution Vulnerability

PoC Exploit Released for IIS WebDeploy Remote Code Execution Vulnerability

Posted on September 3, 2025September 3, 2025 By CWS

A proof-of-concept exploit for CVE-2025-53772, a crucial distant code execution vulnerability in Microsoft’s IIS Internet Deploy (msdeploy) software, was printed this week, elevating pressing alarms throughout the .NET and DevOps communities. 

The flaw resides within the unsafe deserialization of HTTP header contents in each the msdeployagentservice and msdeploy.axd endpoints, enabling authenticated attackers to execute arbitrary code on course servers.

Key Takeaways1. IIS Internet Deploy deserialization RCE (CVSS 8.8)2. PoC makes use of MSDeploy.SyncOptions header to spawn commands3. Mitigate by disabling agent, tightening entry, and patching

Proof-of-Idea for IIS WebDeploy RCE Flaw

On the coronary heart of CVE-2025-53772 is a customized deserialization routine that neglects sturdy enter validation. 

Hawktrace experiences that the susceptible code path processes a Base64-encoded, GZip-compressed payload taken from the MSDeploy.SyncOptions HTTP header.

The sequence Base64 decoding adopted by GZip decompression and BinaryFormatter.Deserialize() fails to implement kind whitelisting, permitting malicious payloads to instantiate harmful objects. 

Particularly, crafting a SortedSet object backed by a manipulated MulticastDelegate invocation checklist triggers Course of the beginning, resulting in distant code execution.

The publicly accessible PoC demonstrates how an attacker can abuse .NET’s serialization mechanics:

Sending this payload in an HTTP POST to /msdeploy.axd ends in calc.exe launching on the server.

Danger FactorsDetailsAffected ProductsMicrosoft Internet Deploy (msdeployagentservice & msdeploy.axd)ImpactRemote Code Execution (RCE)Exploit PrerequisitesAuthenticated Internet Deploy person; community entry to deployment endpoint; capacity to ship crafted HTTP headersCVSS 3.1 Score8.8 (Excessive)

Mitigation 

Microsoft has assigned a CVSS rating of 8.8 for CVE-2025-53772. Instant mitigation steps embrace disabling the Internet Deploy Agent Service (MsDepSvc), implementing strict community ACLs on the msdeploy.axd endpoint, and making use of inbound filtering to dam surprising MSDeploy.SyncOptions headers. 

Lengthy-term remediation requires changing BinaryFormatter with a safe serializer (e.g., DataContractSerializer with specific kind contracts) and validating all header inputs earlier than deserialization.

As PoC exploits flow into, organizations that leverage IIS Internet Deploy should prioritize patching and hardening to stop authenticated attackers from exploiting this crucial RCE vector.

Discover this Story Fascinating! Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates.

Cyber Security News Tags:Code, Execution, Exploit, IIS, PoC, Released, Remote, Vulnerability, WebDeploy

Post navigation

Previous Post: New TinyLoader Malware Attacking Windows Users Via Network Shares and Fake Shortcuts Files
Next Post: Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack

Related Posts

Threat Actors Embed Malicious RMM Tools to Gain Silent Initial Access to Organizations Threat Actors Embed Malicious RMM Tools to Gain Silent Initial Access to Organizations Cyber Security News
VMware Tools and Aria Operations Vulnerabilities Let Attackers Escalate Privileges to Root VMware Tools and Aria Operations Vulnerabilities Let Attackers Escalate Privileges to Root Cyber Security News
English-Speaking Cybercriminal Ecosystem ‘The COM’ Drives a Wide Spectrum of Cyberattacks English-Speaking Cybercriminal Ecosystem ‘The COM’ Drives a Wide Spectrum of Cyberattacks Cyber Security News
KimJongRAT Attacking Windows Users via Weaponized .hta Files to Steal Logins KimJongRAT Attacking Windows Users via Weaponized .hta Files to Steal Logins Cyber Security News
Conti Group Member Responsible for Deploying Ransomware Extradited to USA Conti Group Member Responsible for Deploying Ransomware Extradited to USA Cyber Security News
Threat Actors Actively Hacking Websites to Inject Malicious Links and Boost their SEO Threat Actors Actively Hacking Websites to Inject Malicious Links and Boost their SEO Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark