Mar 2025: Windows Domain Name Service Remote Code Execution Vulnerability
CVE-2025-24064 Published on March 11, 2025

Windows Domain Name Service Remote Code Execution Vulnerability
Use after free in DNS Server allows an unauthorized attacker to execute code over a network.

Vendor Advisory NVD

Weakness Type

What is a Dangling pointer Vulnerability?

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

CVE-2025-24064 has been classified to as a Dangling pointer vulnerability or weakness.


Products Associated with CVE-2025-24064

Want to know whenever a new CVE is published for Microsoft products? stack.watch will email you.

 
 
 
 
 
 
 
 
 
 
 

Affected Versions

Microsoft Windows Server 2008 R2 Service Pack 1: Microsoft Windows Server 2008 R2 Service Pack 1 (Server Core installation): Microsoft Windows Server 2008 Service Pack 2: Microsoft Windows Server 2008 Service Pack 2 (Server Core installation): Microsoft Windows Server 2012: Microsoft Windows Server 2012 (Server Core installation): Microsoft Windows Server 2012 R2: Microsoft Windows Server 2012 R2 (Server Core installation): Microsoft Windows Server 2016: Microsoft Windows Server 2016 (Server Core installation): Microsoft Windows Server 2019: Microsoft Windows Server 2019 (Server Core installation): Microsoft Windows Server 2022: Microsoft Windows Server 2022, 23H2 Edition (Server Core installation): Microsoft Windows Server 2025: Microsoft Windows Server 2025 (Server Core installation):

Exploit Probability

EPSS
0.46%
Percentile
63.91%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.