CVE Alert: CVE-2025-24052 – Microsoft – Windows 11 Version 25H2

CVE-2025-24052

HIGHNo exploitation known

Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update. Fax modem hardware dependent on this specific driver will no longer work on Windows. Microsoft recommends removing any existing dependencies on this hardware.

CVSS v3.1 (7.8)
Vendor
Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft
Product
Windows 11 Version 25H2, Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows Server 2025 (Server Core installation), Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 Version 24H2, Windows Server 2025, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 Service Pack 2 (Server Core installation), Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation)
Versions
10.0.26200.0 lt 10.0.26200.6899 | 10.0.17763.0 lt 10.0.17763.7919 | 10.0.17763.0 lt 10.0.17763.7919 | 10.0.17763.0 lt 10.0.17763.7919 | 10.0.20348.0 lt 10.0.20348.4294 | 10.0.19044.0 lt 10.0.19044.6456 | 10.0.22621.0 lt 10.0.22621.6060 | 10.0.19045.0 lt 10.0.19045.6456 | 10.0.26100.0 lt 10.0.26100.6899 | 10.0.22631.0 lt 10.0.22631.6060 | 10.0.25398.0 lt 10.0.25398.1913 | 10.0.26100.0 lt 10.0.26100.6899 | 10.0.26100.0 lt 10.0.26100.6899 | 10.0.10240.0 lt 10.0.10240.21161 | 10.0.14393.0 lt 10.0.14393.8519 | 10.0.14393.0 lt 10.0.14393.8519 | 10.0.14393.0 lt 10.0.14393.8519 | 6.0.6003.0 lt 6.0.6003.23571 | 6.0.6003.0 lt 6.0.6003.23571 | 6.1.7601.0 lt 6.1.7601.27974 | 6.1.7601.0 lt 6.1.7601.27974 | 6.2.9200.0 lt 6.2.9200.25722 | 6.2.9200.0 lt 6.2.9200.25722 | 6.3.9600.0 lt 6.3.9600.22824 | 6.3.9600.0 lt 6.3.9600.22824
CWE
CWE-121, CWE-121: Stack-based Buffer Overflow
Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
Published
2025-10-14T17:00:11.660Z
Updated
2025-10-14T18:47:43.475Z

AI Summary Analysis

Risk verdict

High risk: high-severity elevation of privilege with local access requirements and PoC exploit visibility; fix should be treated as a priority when available.

Why this matters

An attacker who already has local access could escalate to SYSTEM-like privileges, enabling full control of affected hosts, credential access, and potential lateral movement within the network. Enterprises with legacy Agere modem/fax modem deployments are particularly exposed, as the vulnerable driver is active on many Windows builds.

Most likely attack path

The exploit requires local access, low privileges, and no user interaction, with kernel/driver-level execution leading to complete compromise of the targeted host. The unchanged scope means the impact remains within the compromised device, though privilege escalation can enable broader persistence and system-wide damage.

Who is most exposed

End-user devices and servers running affected Windows versions that include the Agere modem driver, especially in organisations with older hardware or legacy modem configurations still in use.

Detection ideas

  • Watch for attempts to load or unload the ltmdm64.sys driver or related Agere components.
  • Detect privilege-escalation attempts without user interaction, including abnormal service creation or driver-install activity.
  • Monitor for kernel-mode memory access patterns or unusual process trees following modem-driver events.
  • Look for system updates that remove the legacy driver and any remnants or rollback attempts.
  • EDR alerts on anomalous driver-related file access in the modem pathway.

Mitigation and prioritisation

  • Apply the October cumulative Windows update that removes the ltmdm64.sys driver; confirm driver removal across devices.
  • If patching is delayed, disable or uninstall the Agere modem/fax driver and disable related devices where feasible.
  • Enforce least-privilege, restrict local account elevation, and strengthen kernel/user separation (HBSS/EDR rules, AppLocker, driver-signing checks).
  • Validate patch compliance in asset inventories; document remediation timelines and test in pilot groups.
  • If KEV true or EPSS ≥ 0.5, treat as priority 1; data on KEV/EPSS is not provided here.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.