- Description
- Use after free in DNS Server allows an unauthorized attacker to execute code over a network.
- Source
- secure@microsoft.com
- NVD status
- Analyzed
- Products
- windows_server_2008, windows_server_2012, windows_server_2016, windows_server_2019, windows_server_2022, windows_server_2022_23h2, windows_server_2025
CVSS 3.1
- Type
- Primary
- Base score
- 8.1
- Impact score
- 5.9
- Exploitability score
- 2.2
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- secure@microsoft.com
- CWE-416
- Hype score
- Not currently trending
【メールマガジン(FROM JPRS)】バックナンバーを更新しました。 通常号 vol.1188 「Windowsドメインネームサービスの脆弱性情報が公開されました(CVE-2025-24064)」など https://t.co/ti2tzdMQEL
@JPRS_official
24 Mar 2025
130 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
Windowsドメインネームサービスの脆弱性情報が公開されました(CVE-2025-24064) https://t.co/wz0WeoS23L #%E6%8A%80%E8%A1%93%E7%B3%BB-%20%E8%B3%87%E6%96%99 #feedly
@likecoffee
17 Mar 2025
18 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
【注意喚起】Windowsドメインネームサービスの脆弱性情報が公開されました(CVE-2025-24064) https://t.co/NDJyJV7HRY
@JPRS_official
17 Mar 2025
619 Impressions
2 Retweets
7 Likes
3 Bookmarks
0 Replies
0 Quotes
【自分用メモ】CVE-2025-24064 - セキュリティ更新プログラム ガイド - Microsoft - Windows ドメイン ネーム サービスのリモートでコードが実行される脆弱性 https://t.co/MForTVnevp
@OrangeMorishita
13 Mar 2025
93 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
1 Quote
🚨 CVE-2025-24064 🔴 HIGH (8.1) 🏢 Microsoft - Windows Server 2019 🏗️ 10.0.17763.0 🔗 https://t.co/x3SbgKTGD2 #CyberCron #VulnAlert #InfoSec https://t.co/JZfMHkBfrR
@cybercronai
13 Mar 2025
34 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-24064 Use after free in DNS Server allows an unauthorized attacker to execute code over a network. https://t.co/6Mi9e5GCMS
@CVEnew
11 Mar 2025
42 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C7610CDB-A02B-4C62-B17F-6DCE2B3DE4F0",
"versionEndExcluding": "10.0.14393.7876"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D271422D-A29F-4DBF-BF72-BCD90E393A5A",
"versionEndExcluding": "10.0.17763.7009"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "AAACC9C4-DDC5-4059-AFE3-A49DB2347A86",
"versionEndExcluding": "10.0.20348.3270"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2569319C-B855-466E-B4A5-D5774DBBD516",
"versionEndExcluding": "10.0.20348.3328",
"versionStartExcluding": "10.0.20348.3270"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "96046A7B-76A1-4DCF-AEA5-25344D37E492",
"versionEndExcluding": "10.0.25398.1486"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "CF81B44C-8FF7-4C61-9974-3F98DA9D492C",
"versionEndExcluding": "10.0.26100.3403"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1438B9AF-92B2-439B-8656-C87B8F8E30A5",
"versionEndExcluding": "10.0.26100.3476",
"versionStartExcluding": "10.0.26100.3403"
}
],
"operator": "OR"
}
]
}
]