Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft’s Update Health Tools Configuration Vulnerability Let Attackers Execute Arbitrary Code Remotely

Posted on November 25, 2025November 25, 2025 By CWS

A vital distant code execution (RCE) vulnerability in Microsoft’s Replace Well being Instruments (KB4023057). A broadly deployed Home windows element designed to expedite safety updates by Intune.

The flaw stems from the device connecting to dropped Azure Blob storage accounts that attackers may register and management.​

How the Vulnerability Works

The vulnerability exists in model 1.0 of the Replace Well being Instruments, which makes use of Azure Blob storage accounts following a predictable naming sample (payloadprod0 by payloadprod15.blob.core.home windows.web) to fetch configuration information and instructions.

Eye Safety researchers discovered that Microsoft had left 10 of the 15 storage accounts unregistered and unused.

After registering these deserted endpoints, the researchers noticed over 544,000 HTTP requests inside seven days from almost 10,000 distinctive Azure tenants worldwide.

The device’s uhssvc.exe service, positioned at C:Program FilesMicrosoft Replace Well being Instruments, was actively resolving these domains throughout a number of enterprise environments.​

uhssvc.exe file

The vital subject lies within the device’s “ExecuteTool” motion, which permits execution of Microsoft-signed binaries.

By crafting malicious JSON payloads that time to respectable Home windows executables corresponding to explorer.exe, attackers can obtain arbitrary code execution on susceptible techniques.​

The newer model 1.1 implements a correct net service at devicelistenerprod.microsoft.com, although backward-compatibility choices may nonetheless expose techniques.​

Eye Safety reported the vulnerability to Microsoft on July 7, 2025, and Microsoft confirmed the habits on July 17.

Hashicorp researchers transferred possession of all compromised storage accounts again to Microsoft on July 18, 2025, successfully closing the assault vector.​

Organizations ought to guarantee they’re operating the newest model of Replace Well being Instruments and confirm no legacy configurations stay enabled.

Safety groups ought to monitor for uncommon community site visitors to Azure Blob storage endpoints from replace providers.​

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Arbitrary, Attackers, Code, Configuration, Execute, Health, Microsofts, Remotely, Tools, Update, Vulnerability

Post navigation

Previous Post: Canon Says Subsidiary Impacted by Oracle EBS Hack 
Next Post: HashiCorp Vault Vulnerability Allow Attackers to Authenticate to Vault Without Valid Credentials

Related Posts

Microsoft Confirms Windows 11 24H2 Update Broken Multiple Core Features Cyber Security News
CISA Warns of WhatsApp 0-Day Vulnerability Exploited in Attacks Cyber Security News
Securing Multi-Cloud Infrastructures in 2025 Enterprise Deployments Cyber Security News
Denodo Scheduler Vulnerability Let Attackers Execute Remote Code Cyber Security News
New Malware Attack Leverages SVGs, Email Attachments to Deliver XWorm and Remcos RAT Cyber Security News
Cisco IOS 0-Day RCE Vulnerability Actively Exploited in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Major US Banks Impacted by SitusAMC Hack
  • ToddyCat’s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens
  • 3 SOC Challenges You Need to Solve Before 2026
  • 640 NPM Packages Infected in New ‘Shai-Hulud’ Supply Chain Attack
  • Canon Allegedly Breached by Clop Ransomware via Oracle E-Business Suite 0-Day Hack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Major US Banks Impacted by SitusAMC Hack
  • ToddyCat’s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens
  • 3 SOC Challenges You Need to Solve Before 2026
  • 640 NPM Packages Infected in New ‘Shai-Hulud’ Supply Chain Attack
  • Canon Allegedly Breached by Clop Ransomware via Oracle E-Business Suite 0-Day Hack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark