CVE-2025-24064
Published: 11 March 2025
Summary
CVE-2025-24064 is a high-severity Use After Free (CWE-416) vulnerability in Microsoft Windows Server 2008. Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 34.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates timely remediation of known flaws like this use-after-free vulnerability in the DNS server through patching.
Implements memory protection mechanisms such as address space randomization and execution prevention to block exploitation of the use-after-free vulnerability.
Enforces secure configuration settings for the DNS server to minimize the attack surface and reduce exposure to remote exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The use-after-free vulnerability in the DNS Server component allows unauthenticated remote code execution over the network (AV:N), directly enabling T1190 (Exploit Public-Facing Application) as the primary attack vector for initial access and code execution on the exposed service.
NVD Description
Use after free in DNS Server allows an unauthorized attacker to execute code over a network.
Deeper analysisAI
CVE-2025-24064 is a use-after-free vulnerability (CWE-416) affecting the DNS Server component. Published on 2025-03-11, it carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). The flaw enables an unauthorized attacker to execute code over a network.
An unauthorized network attacker with no required privileges or user interaction can exploit this vulnerability. Due to the high attack complexity, successful exploitation allows remote code execution with high impacts on confidentiality, integrity, and availability.
The Microsoft Security Response Center advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24064 provides details on patches and mitigation guidance.
Details
- CWE(s)