CVE Alert: CVE-2025-24990 – Microsoft – Windows 11 Version 25H2

CVE-2025-24990

HIGHExploitation active

Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update. Fax modem hardware dependent on this specific driver will no longer work on Windows. Microsoft recommends removing any existing dependencies on this hardware.

CVSS v3.1 (7.8)
Vendor
Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft
Product
Windows 11 Version 25H2, Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows 10 Version 21H2, Windows 11 version 22H2, Windows 10 Version 22H2, Windows Server 2025 (Server Core installation), Windows 11 Version 23H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 Version 24H2, Windows Server 2025, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2008 Service Pack 2, Windows Server 2008 Service Pack 2 (Server Core installation), Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2012, Windows Server 2012 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation)
Versions
10.0.26200.0 lt 10.0.26200.6899 | 10.0.17763.0 lt 10.0.17763.7919 | 10.0.17763.0 lt 10.0.17763.7919 | 10.0.17763.0 lt 10.0.17763.7919 | 10.0.20348.0 lt 10.0.20348.4294 | 10.0.19044.0 lt 10.0.19044.6456 | 10.0.22621.0 lt 10.0.22621.6060 | 10.0.19045.0 lt 10.0.19045.6456 | 10.0.26100.0 lt 10.0.26100.6899 | 10.0.22631.0 lt 10.0.22631.6060 | 10.0.25398.0 lt 10.0.25398.1913 | 10.0.26100.0 lt 10.0.26100.6899 | 10.0.26100.0 lt 10.0.26100.6899 | 10.0.10240.0 lt 10.0.10240.21161 | 10.0.14393.0 lt 10.0.14393.8519 | 10.0.14393.0 lt 10.0.14393.8519 | 10.0.14393.0 lt 10.0.14393.8519 | 6.0.6003.0 lt 6.0.6003.23571 | 6.0.6003.0 lt 6.0.6003.23571 | 6.1.7601.0 lt 6.1.7601.27974 | 6.1.7601.0 lt 6.1.7601.27974 | 6.2.9200.0 lt 6.2.9200.25722 | 6.2.9200.0 lt 6.2.9200.25722 | 6.3.9600.0 lt 6.3.9600.22824 | 6.3.9600.0 lt 6.3.9600.22824
CWE
CWE-822, CWE-822: Untrusted Pointer Dereference
Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
Published
2025-10-14T17:00:10.973Z
Updated
2025-10-14T18:47:42.682Z

AI Summary Analysis

Risk verdict

Active exploitation is reported; this local privilege escalation vulnerability on Windows drivers warrants urgent remediation.

Why this matters

An attacker with limited local access can escalate to SYSTEM rights, enabling full control and potential data exposure or deployment of subsequent payloads. The affected surface spans multiple Windows client and server SKUs, including recent versions, increasing the chance of encountering at-risk hosts across organisations.

Most likely attack path

Exploitation relies on local access (no user interaction required) to trigger a kernel-mode vulnerability in the Agere modem driver. An attacker could leverage this to bypass normal permissions, enabling persistence and lateral movement via trusted components or services that interact with the driver. Given the driver’s role, exploitation is more feasible on endpoints with legacy fax/modem hardware or vendor-provided driver stacks still present.

Who is most exposed

Desktops, laptops and servers with installed Agere modem components and legacy fax hardware are most at risk, particularly on organisations with older imaging or update timelines and limited patching windows.

Detection ideas

  • Kernel-mode driver load events for ltmdm64.sys outside normal maintenance windows.
  • Unusual device-driver activity or failed I/O control calls targeting the modem subsystem.
  • Surges in privilege-escalation attempts post-user login or during service startup.
  • Anomalous process creation or service manipulation tied to modem-related components.
  • Event log spikes around device installation/removal correlated with recent updates.

Mitigation and prioritisation

  • Patch: apply the October cumulative update that removes the ltmdm64.sys driver; if unavailable, disable/uninstall the Agere modem component or remove fax/modem dependencies.
  • Controls: restrict kernel-driver loading, enforce application and device installation policies, and strengthen endpoint MFA and least-privilege.
  • Detection: enable kernel and device-driver monitoring; deploy targeted EDR rules for modem-driver activity.
  • Change-management: inventory affected hardware, schedule patching in a controlled window, test hardware functionality post-removal.
  • If KEV/EPSS indicators become available and are favorable, elevate to priority 1.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.