Cyber Posture

CVE-2025-24064

High

Published: 11 March 2025

Published
11 March 2025
Modified
02 July 2025
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0049 65.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-24064 is a high-severity Use After Free (CWE-416) vulnerability in Microsoft Windows Server 2008. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 34.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates timely remediation of known flaws like this use-after-free vulnerability in the DNS server through patching.

prevent

Implements memory protection mechanisms such as address space randomization and execution prevention to block exploitation of the use-after-free vulnerability.

prevent

Enforces secure configuration settings for the DNS server to minimize the attack surface and reduce exposure to remote exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The use-after-free vulnerability in the DNS Server component allows unauthenticated remote code execution over the network (AV:N), directly enabling T1190 (Exploit Public-Facing Application) as the primary attack vector for initial access and code execution on the exposed service.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Use after free in DNS Server allows an unauthorized attacker to execute code over a network.

Deeper analysisAI

CVE-2025-24064 is a use-after-free vulnerability (CWE-416) affecting the DNS Server component. Published on 2025-03-11, it carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). The flaw enables an unauthorized attacker to execute code over a network.

An unauthorized network attacker with no required privileges or user interaction can exploit this vulnerability. Due to the high attack complexity, successful exploitation allows remote code execution with high impacts on confidentiality, integrity, and availability.

The Microsoft Security Response Center advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24064 provides details on patches and mitigation guidance.

Details

CWE(s)

Affected Products

microsoft
windows server 2008
all versions, r2
microsoft
windows server 2012
all versions, r2
microsoft
windows server 2016
≤ 10.0.14393.7876
microsoft
windows server 2019
≤ 10.0.17763.7009
microsoft
windows server 2022
≤ 10.0.20348.3270 · 10.0.20348.3270 — 10.0.20348.3328
microsoft
windows server 2022 23h2
≤ 10.0.25398.1486
microsoft
windows server 2025
≤ 10.0.26100.3403 · 10.0.26100.3403 — 10.0.26100.3476

CVEs Like This One

CVE-2025-49735Same product: Microsoft Windows Server 2012
CVE-2025-50163Same product: Microsoft Windows Server 2008
CVE-2025-21297Same product: Microsoft Windows Server 2008
CVE-2025-59287Same product: Microsoft Windows Server 2012
CVE-2025-49673Same product: Microsoft Windows Server 2008
CVE-2025-49729Same product: Microsoft Windows Server 2008
CVE-2025-47998Same product: Microsoft Windows Server 2008
CVE-2025-49669Same product: Microsoft Windows Server 2008
CVE-2025-49674Same product: Microsoft Windows Server 2008
CVE-2025-48824Same product: Microsoft Windows Server 2008

References