Windows Domain Name Service Remote Code Execution Vulnerability
CVE-2024-49091

7.2HIGH

Summary

The vulnerability in the Windows Domain Name Service allows remote code execution, potentially enabling an attacker to take control of an affected system. Exploitation of this vulnerability can occur when the DNS service fails to properly handle requests, leading to unauthorized actions carried out on the system. This risk emphasizes the importance of regular updates and security monitoring to safeguard network infrastructure.

Affected Version(s)

Windows Server 2012 (Server Core installation) x64-based Systems 6.2.9200.0 < 6.2.9200.25222

Windows Server 2012 R2 (Server Core installation) x64-based Systems 6.3.9600.0 < 6.3.9600.22318

Windows Server 2012 R2 x64-based Systems 6.3.9600.0 < 6.3.9600.22318

References

EPSS Score

0% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre DatabaseMicrosoft Feed
.