Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Patch for WSUS Flaw has Broken Hotpatching on Windows Server 2025

Posted on November 3, 2025November 3, 2025 By CWS

In a latest setback for Home windows directors, Microsoft’s October 2025 safety replace addressing a important vulnerability in Home windows Server Replace Providers (WSUS) has inadvertently damaged hotpatching performance on a subset of Home windows Server 2025 methods.

The flaw, tracked as CVE-2025-59287, permits distant code execution in WSUS environments, posing important dangers to enterprise replace infrastructures. Microsoft confirmed the difficulty on October 24, 2025, emphasizing that it impacts solely units operating the most recent server version.

The problematic replace was initially pushed to all Home windows Server 2025 machines, bypassing enrollment standing for Microsoft’s progressive Hotpatch function.

Hotpatching allows seamless safety updates with out reboots, a key promoting level for decreasing downtime in virtualized setups. Nevertheless, a small variety of Hotpatch-enrolled units, primarily bodily servers and digital machines (VMs), obtained the replace earlier than Microsoft halted distribution.

Now, the patch is restricted to non-Hotpatch methods, leaving enrolled customers to navigate workarounds amid ongoing threats.

This glitch highlights the complexities of rolling out zero-downtime updates in hybrid cloud environments, the place WSUS serves as a central hub for patch administration.

Safety consultants warn that delaying fixes for CVE-2025-59287 may expose networks to exploitation, particularly in sectors equivalent to finance and healthcare that depend on uninterrupted server operations. Microsoft’s speedy response underscores the challenges of balancing pace and stability in patch cycles.

Workarounds and Path Ahead for Affected Programs

For the restricted units that put in the defective replace, Microsoft advises persistence. These machines are quickly sidelined from the Hotpatch observe, that means they received’t obtain November or December hotpatches.

As a substitute, they’ll pull normal month-to-month safety updates requiring restarts, making certain compliance however growing operational friction. Come January 2026, a deliberate baseline replace (KB5066835) will realign them, with Hotpatch resuming in February 2026. Directors ought to monitor replace histories by way of Home windows Replace logs to verify standing.

Gadgets that downloaded however haven’t put in the replace can keep away from disruption by navigating to Settings > Home windows Replace, pausing updates, then unpausing and rescanning. This triggers the corrected model, preserving Hotpatch eligibility.

Hotpatch-enrolled methods untouched by the preliminary rollout will obtain the WSUS repair by a layered strategy. Beginning October 24, 2025, they’ll get the safety replace KB5070893 on high of the October baseline (KB5066835).

This combo delivers CVE-2025-59287 mitigation with out derailing the Hotpatch schedule customers keep on observe for November and December releases. Notably, solely WSUS-enabled machines face a post-install restart, minimizing broader impression.

Microsoft urges fast motion and supplies detailed steering on its assist web site. As enterprises grapple with this, it serves as a reminder of the trade-offs in adopting rebootless patching amid evolving threats.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Broken, Flaw, Hotpatching, Microsoft, Patch, Server, Windows, WSUS

Post navigation

Previous Post: Ukrainian Extradited to US Faces Charges in Jabber Zeus Cybercrime Case
Next Post: Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data

Related Posts

Hackers Sabotage Iranian Ships Using Maritime Communications Terminals in Its MySQL Database Cyber Security News
Gigabyte UEFI Firmware Vulnerability Let Attackers Execute Arbitrary Code in the SMM Environment Cyber Security News
10 Best ZTNA Solutions (Zero Trust Network Access) in 2025 Cyber Security News
WatchGuard VPN Vulnerability Let Remote Attacker Execute Arbitrary Code Cyber Security News
New NFC-Driven PhantomCard Android Malware Attacking Banking Users Cyber Security News
OpenSSL Vulnerabilities Let Attackers Execute Malicious Code and Recover Private Key Remotely Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Detects “SesameOp” Backdoor Using OpenAI’s API as a Stealth Command Channel
  • AMD Zen 5 Processors RDSEED Vulnerability Breaks Integrity With Randomness
  • Open VSX Registry Addresses Leaked Tokens and Malicious Extensions in Wake of Security Scare
  • New TruffleNet BEC Campaign Leverages AWS SES Using Stolen Credentials to Compromise 800+ Hosts
  • Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Detects “SesameOp” Backdoor Using OpenAI’s API as a Stealth Command Channel
  • AMD Zen 5 Processors RDSEED Vulnerability Breaks Integrity With Randomness
  • Open VSX Registry Addresses Leaked Tokens and Malicious Extensions in Wake of Security Scare
  • New TruffleNet BEC Campaign Leverages AWS SES Using Stolen Credentials to Compromise 800+ Hosts
  • Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News