Attack Matrix
Story: Microsoft Fixes Critical WSUS RCE Flaw CVE-2025-59287 Under Active Attack
Identified Techniques: T1203, T1203.001, T1059 - Command and Scripting Interpreter, T1059.001 - PowerShell, T1071 - Application Layer Protocol, T1071.001 - Web Protocols, T1041 - Exfiltration Over C2 Channel, T1041.001
Note: Sub-techniques are displayed under their parent techniques in the matrix below.
Legend:
Standard Techniques
Techniques Identified in This Story
| Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
|---|---|---|---|---|---|---|---|---|---|---|---|
About MITRE ATT&CK®:
MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.