Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft IIS Web Deploy Vulnerability Let Attackers Execute Remote Code

Posted on August 16, 2025August 16, 2025 By CWS

A crucial vulnerability within the Microsoft Net Deploy software might permit authenticated attackers to execute distant code on affected programs. 

The vulnerability, tracked as CVE-2025-53772, was disclosed on August 12, 2025, and carries a CVSS rating of 8.8, indicating excessive severity.

The flaw stems from the deserialization of untrusted knowledge in Net Deploy, categorised underneath the CWE-502 weak point class. 

Key Takeaways1. CVE-2025-53772 in Net Deploy 4.0 permits distant code execution.2. Requires solely low privileges and no consumer interplay.3. Set up safety updates instantly to forestall potential system compromise.

This vulnerability impacts Net Deploy 4.0 and requires low privileges to take advantage of, making it notably regarding for organizations utilizing this deployment software of their infrastructure. 

The Microsoft Safety Response Middle (MSRC) has confirmed that whereas the vulnerability has not been publicly exploited, it poses important dangers to system confidentiality, integrity, and availability.

Microsoft Net Deploy Vulnerability

The vulnerability permits an authenticated attacker to take advantage of the system by network-based assaults with low complexity. 

Attackers can leverage this flaw by sending malicious HTTP requests to the net server internet hosting Net Deploy companies. 

The assault requires low privileges and no consumer interplay, making it comparatively straightforward to take advantage of as soon as an attacker good points preliminary entry to the system.

The CVSS vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C signifies that profitable exploitation might lead to excessive affect to confidentiality, integrity, and availability of the focused system. 

Microsoft’s exploitability evaluation charges this vulnerability as “Exploitation Much less Doubtless,” although safety consultants advocate speedy patching because of the potential for distant code execution.

The safety researcher Batuhan Er from HawkTrace found and responsibly disclosed this vulnerability to Microsoft by coordinated vulnerability disclosure. 

Danger FactorsDetailsAffected ProductsWeb Deploy 4.0ImpactRemote Code ExecutionExploit Conditions– Community access- Low privileges required- No consumer interplay needed- Authenticated entry to internet serverCVSS 3.1 Score8.8 (Excessive)

Microsoft has launched safety replace model 10.0.2001 for Net Deploy 4.0, which addresses the deserialization flaw and prevents distant code execution assaults.

Organizations utilizing Microsoft Net Deploy ought to instantly apply the obtainable safety replace by Microsoft’s obtain heart. 

The Microsoft Safety Response Middle continues to observe for potential exploitation makes an attempt and has offered complete steering by its Safety Replace Information to assist directors assess and mitigate dangers of their environments.

Enhance your SOC and assist your staff defend your online business with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attackers, Code, Deploy, Execute, IIS, Microsoft, Remote, Vulnerability, Web

Post navigation

Previous Post: New Gmail Phishing Attack With Weaponized Login Flow Steals Login Credentials
Next Post: Google Awards $250,000 Bounty for Chrome RCE Vulnerability Discovery

Related Posts

Flipper Zero ‘DarkWeb’ Firmware Bypasses Rolling Code Security on Major Vehicle Brands Cyber Security News
First AI Ransomware ‘PromptLock’ Uses OpenAI gpt-oss-20b Model for Encryption Cyber Security News
Streamlined Patch Management for Endpoint Device Security Cyber Security News
Hacktivist Groups Attacks on Critical ICS Systems to Steal Sensitive Data Cyber Security News
Threat Actors Adapting Android Droppers Even to Deploy Simple Malware to Stay Future-Proof Cyber Security News
First-ever AI-powered ‘MalTerminal’ Malware uses OpenAI GPT-4 to Generate Ransomware Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News