WSUS RCE: Update Weaponized

On2it Infographic Banner

Find Threat Talks on

WSUS RCE: Update Weaponized

Microsoft’s Windows Server Update Services (WSUS) is supposed to harden your environment by centralizing patching.

Instead, a single flaw turned it into one of the cleanest remote-code-execution paths in Windows networks.

Unauthenticated. SYSTEM-level. Exploited in the wild.

Chinese APT groups have already used this vulnerability to run PowerCat in memory, open reverse shells, and deploy ShadowPad – all from the update server every Windows machine implicitly trusts.

Patching removes the immediate flaw, but the deeper issue remains:
update infrastructure is over-trusted, under-segmented, and an ideal foothold for attackers.

Host Lieuwe Jan Koning, with Rob Maas (Blue Team) and Luca Cipriano (Red Team), breaks down how the RCE works, how real intrusions unfolded, and what Zero Trust looks like when applied to patching infrastructure.

 

What you’ll learn
• How a WSUS design weakness became an unauthenticated RCE
Why a hardcoded encryption key and insecure deserialization created a perfect execution path.

• The real attack chain: from one SOAP request to full domain exposure
PowerCat → reverse shell → ShadowPad → lateral movement.

• Why update servers are a dangerous trust gap
Every Windows device talks to them – and attackers know it.

• How Microsoft’s WSUS patch works – and what it didn’t fix
Why segmentation, outbound restrictions, and endpoint detections still matter.

• Zero Trust for update infrastructure
Least privilege, strict egress, workload boundaries, and visibility into WSUS behaviors.
This isn’t about one vulnerability.

It’s about what happens when infrastructure trust is assumed – not verified.

 

Your cybersecurity experts

Lieuwe

Lieuwe Jan Koning

Co-Founder and CTO
ON2IT

Luca Cipriano, Threat Intel Specialst, ON2IT

Luca Cipriano

Red Team & Cyber Threat Intelligence Program Lead
ON2IT

Rob Maas, Field CTO, ON2IT

Rob Maas

Field CTO
ON2IT

Episode details

 
It started as a patching convenience – and became a remote-execution path hiding in plain sight.

WSUS was designed to securely distribute updates across Windows environments.
But its authentication process contained two critical weaknesses:
• A hardcoded encryption key attackers can replicate
• A blind deserialization routine that executes attacker-controlled objects

The result:
a crafted SOAP request can execute arbitrary code as SYSTEM with zero authentication.
Once inside, attackers don’t waste time.

They load PowerCat in memory, establish a reverse shell, and deploy ShadowPad through DLL sideloading – gaining long-term, stealthy control.

And because WSUS is a central Microsoft Windows update server, its traffic blends naturally into the environment. Attackers use that trust to pivot across the network, quietly escalating until domain controllers and business-critical systems are exposed.

Even after patching, the structural risks remain:
over-trusted update servers, weak segmentation, and unrestricted outbound access all create similar stealth paths.

WSUS RCE wasn’t a one-off bug.
It was a reminder that infrastructure built on implicit trust becomes a perfect entry point for adversaries.

On2it Infographic Banner

Get your Hacker T-shirt

Join the treasure hunt!

Find the code within this episode and receive your own hacker t-shirt for free.

15 + 4 =

Christmas Hacker