Scans for Port 8530/8531 (TCP). Likely related to WSUS Vulnerability CVE-2025-59287, (Sun, Nov 2nd)
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。首先,我得仔细阅读文章内容,抓住关键点。 文章提到,防火墙日志显示过去一周对8530/TCP和8531/TCP端口的扫描显著增加。这些扫描来自Shadowserver和其他研究人员,还有一些未知来源。接着,文章指出CVE-2025-59287漏洞被利用,攻击者通过连接受影响的WSUS服务器端口执行脚本。最后提到暴露的服务器可能已被入侵。 我需要把这些信息浓缩成一句话,确保涵盖主要事件:端口扫描增加、漏洞利用、攻击行为和潜在风险。同时要注意用词简洁,不超过100字。 可能的结构是:描述扫描情况,指出漏洞及其影响,最后说明后果。这样既全面又简洁。 现在组织语言:“过去一周检测到针对8530/TCP和8531/TCP端口的大量扫描活动,可能与CVE-2025-59287漏洞相关。攻击者通过连接受影响的WSUS服务器执行脚本,暴露的服务器被认为已被入侵。” 检查字数是否在限制内,并确保信息准确无误。 </think> 过去一周检测到针对8530/TCP和8531/TCP端口的大量扫描活动,可能与CVE-2025-59287漏洞相关。攻击者通过连接受影响的WSUS服务器执行脚本,暴露的服务器被认为已被入侵。 2025-11-2 17:50:48 Author: isc.sans.edu(查看原文) 阅读量:9 收藏

Sensors reporting firewall logs detected a significant increase in scans for port 8530/TCP and 8531/TCP over the course of last week. Some of these reports originate from Shadowserver, and likely other researchers, but there are also some that do not correspond to known research-related IP addresses.

graph showing an increase in scans for port 8531 over the last few days.

CVE-2025-59287 is exploited by connecting to affected WSUS servers on port 8530/TCP (non-TLS) or 8531/TCP (TLS). Once connected, an attacker could exploit the vulnerability to execute scripts on a vulnerable server. Typically, an attacker begins by conducting reconnaissance and subsequently follows up with a network compromise.

Sufficient details have been made public about the attack to suggest that any exposed vulnerable servers should be considered compromised at this point.

--
Johannes B. Ullrich, Ph.D. , Dean of Research, SANS.edu
Twitter|


文章来源: https://isc.sans.edu/diary/rss/32440
如有侵权请联系:admin#unsafe.sh