Mar 2025: Windows Domain Name Service Remote Code Execution Vulnerability
CVE-2025-24064 Published on March 11, 2025
Windows Domain Name Service Remote Code Execution Vulnerability
Use after free in DNS Server allows an unauthorized attacker to execute code over a network.
Weakness Type
What is a Dangling pointer Vulnerability?
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
CVE-2025-24064 has been classified to as a Dangling pointer vulnerability or weakness.
Products Associated with CVE-2025-24064
Want to know whenever a new CVE is published for Microsoft products? stack.watch will email you.
Affected Versions
Microsoft Windows Server 2008 R2 Service Pack 1:- Version 6.1.7601.0 and below 6.1.7601.27618 is affected.
- Version 6.1.7601.0 and below 6.1.7601.27618 is affected.
- Version 6.0.6003.0 and below 6.0.6003.23168 is affected.
- Version 6.0.6003.0 and below 6.0.6003.23168 is affected.
- Version 6.2.9200.0 and below 6.2.9200.25368 is affected.
- Version 6.2.9200.0 and below 6.2.9200.25368 is affected.
- Version 6.3.9600.0 and below 6.3.9600.22470 is affected.
- Version 6.3.9600.0 and below 6.3.9600.22470 is affected.
- Version 10.0.14393.0 and below 10.0.14393.7876 is affected.
- Version 10.0.14393.0 and below 10.0.14393.7876 is affected.
- Version 10.0.17763.0 and below 10.0.17763.7009 is affected.
- Version 10.0.17763.0 and below 10.0.17763.7009 is affected.
- Version 10.0.20348.0 and below 10.0.20348.3328 is affected.
- Version 10.0.25398.0 and below 10.0.25398.1486 is affected.
- Version 10.0.26100.0 and below 10.0.26100.3476 is affected.
- Version 10.0.26100.0 and below 10.0.26100.3476 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.