微软近日为Windows Server发布紧急安全更新,修复编号CVE-2025-59287的远程代码执行漏洞。该漏洞影响启用WSUS服务器角色的系统,攻击者无需权限即可通过特制事件触发反序列化过程,获取SYSTEM级别权限控制服务器。由于漏洞概念验证代码已公开,微软建议受影响用户立即安装对应系统更新。若无法及时更新,可通过禁用WSUS角色或防火墙屏蔽8530/8531端口进行临时防护。该功能默认...
Source Link微软近日为Windows Server发布紧急安全更新,修复编号CVE-2025-59287的远程代码执行漏洞。该漏洞影响启用WSUS服务器角色的系统,攻击者无需权限即可通过特制事件触发反序列化过程,获取SYSTEM级别权限控制服务器。由于漏洞概念验证代码已公开,微软建议受影响用户立即安装对应系统更新。若无法及时更新,可通过禁用WSUS角色或防火墙屏蔽8530/8531端口进行临时防护。该功能默认...
Source LinkDisclaimer: Investing carries risk. This is not financial advice. The above content should not be regarded as an offer, recommendation, or solicitation on acquiring or disposing of any financial products, any associated discussions, comments, or posts by author or other users should not be considered as such either. It is solely for general information purpose only, which does not consider your own investment objectives, financial situations or needs. TTM assumes no responsibility or warranty for the accuracy and completeness of the information, investors should do their own research and may seek professional advice before investing.