From Microsoft's own web site:
https://nam05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fportal.msrc.microsoft.com%2Fen-us%2Fsecurity-guidance%2Fadvisory%2FCVE-2020-1350&data=02%7C01%7CDavid.Babbitt%40oneidentity.com%7C0827116c03b9461f319d08d83313075f%7C91c369b51c9e439c989c1867ec606603%7C0%7C0%7C637315504107270730&sdata=wKFCbVv7nijGbuHomc3LMFt%2FpLjytIsugrT93EmvLbo%3D&reserved=0
"A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the Local System Account. Windows servers that are configured as DNS servers are at risk from this vulnerability.
To exploit the vulnerability, an unauthenticated attacker could send malicious requests to a Windows DNS server."
Microsoft's KB article concerning the vulnerability states:
"This advisory describes a Critical Remote Code Execution (RCE) vulnerability that affects Windows servers that are configured to run the DNS Server role."