CVE-2025-24052: CWE-121: Stack-based Buffer Overflow in Microsoft Windows 11 Version 25H2
Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update. Fax modem hardware dependent on this specific driver will no longer work on Windows. Microsoft recommends removing any existing dependencies on this hardware.
AI Analysis
Technical Summary
CVE-2025-24052 is a stack-based buffer overflow vulnerability classified under CWE-121, found in the third-party Agere Modem driver (ltmdm64.sys) that ships natively with Windows 11 Version 25H2 (build 10.0.26200.0). The vulnerability allows an attacker with local privileges to execute arbitrary code by exploiting improper handling of data on the stack, leading to potential corruption of memory and control flow hijacking. The vulnerability impacts confidentiality, integrity, and availability of affected systems. Microsoft has acknowledged this issue and addressed it by removing the vulnerable ltmdm64.sys driver in the October cumulative update, which disables fax modem hardware dependent on this driver. The removal means that affected hardware will no longer function on updated Windows 11 systems, and organizations must remove dependencies on this hardware to avoid operational disruptions. The CVSS v3.1 score of 7.8 reflects high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and partial scope (S:U). The exploitability is rated as probable (E:P), with official remediation (RL:O) and confirmed fix (RC:C). No known exploits have been reported in the wild as of the publication date. The vulnerability was reserved early in 2025 and published in October 2025, indicating a relatively recent discovery and patch cycle. The technical impact includes potential arbitrary code execution and system compromise via local access, emphasizing the need for patching and hardware transition.
Potential Impact
For European organizations, the impact of CVE-2025-24052 is significant, especially for those relying on legacy fax modem hardware integrated with Windows 11 Version 25H2. The removal of the vulnerable driver disables this hardware, potentially disrupting business processes that depend on fax communications. The vulnerability itself poses a high risk of local privilege escalation and arbitrary code execution, threatening sensitive data confidentiality, system integrity, and availability. Insider threats or compromised local accounts could exploit this vulnerability to gain elevated control over systems. Critical infrastructure sectors, healthcare, legal, and financial institutions that still use fax modems for secure communications may face operational challenges and increased risk exposure. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity score demands urgent attention. Failure to update systems or transition hardware could lead to exploitation attempts, data breaches, or service outages.
Mitigation Recommendations
1. Immediately apply the October cumulative update for Windows 11 Version 25H2 to remove the vulnerable ltmdm64.sys driver and mitigate the vulnerability. 2. Conduct an inventory of all fax modem hardware dependent on the Agere Modem driver and develop a plan to replace or phase out this hardware to prevent operational disruptions. 3. Restrict local administrative privileges and monitor for unusual local activity that could indicate exploitation attempts. 4. Implement endpoint detection and response (EDR) solutions to identify suspicious behavior related to buffer overflow exploitation. 5. Educate IT staff and users about the risks associated with legacy hardware and the importance of applying updates promptly. 6. For organizations that must maintain fax capabilities, consider transitioning to secure digital fax solutions that do not rely on vulnerable hardware or drivers. 7. Regularly audit systems for compliance with update policies and verify that no legacy drivers remain active post-update. 8. Establish incident response procedures specifically addressing potential local privilege escalation scenarios.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-24052: CWE-121: Stack-based Buffer Overflow in Microsoft Windows 11 Version 25H2
Description
Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update. Fax modem hardware dependent on this specific driver will no longer work on Windows. Microsoft recommends removing any existing dependencies on this hardware.
AI-Powered Analysis
Technical Analysis
CVE-2025-24052 is a stack-based buffer overflow vulnerability classified under CWE-121, found in the third-party Agere Modem driver (ltmdm64.sys) that ships natively with Windows 11 Version 25H2 (build 10.0.26200.0). The vulnerability allows an attacker with local privileges to execute arbitrary code by exploiting improper handling of data on the stack, leading to potential corruption of memory and control flow hijacking. The vulnerability impacts confidentiality, integrity, and availability of affected systems. Microsoft has acknowledged this issue and addressed it by removing the vulnerable ltmdm64.sys driver in the October cumulative update, which disables fax modem hardware dependent on this driver. The removal means that affected hardware will no longer function on updated Windows 11 systems, and organizations must remove dependencies on this hardware to avoid operational disruptions. The CVSS v3.1 score of 7.8 reflects high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and partial scope (S:U). The exploitability is rated as probable (E:P), with official remediation (RL:O) and confirmed fix (RC:C). No known exploits have been reported in the wild as of the publication date. The vulnerability was reserved early in 2025 and published in October 2025, indicating a relatively recent discovery and patch cycle. The technical impact includes potential arbitrary code execution and system compromise via local access, emphasizing the need for patching and hardware transition.
Potential Impact
For European organizations, the impact of CVE-2025-24052 is significant, especially for those relying on legacy fax modem hardware integrated with Windows 11 Version 25H2. The removal of the vulnerable driver disables this hardware, potentially disrupting business processes that depend on fax communications. The vulnerability itself poses a high risk of local privilege escalation and arbitrary code execution, threatening sensitive data confidentiality, system integrity, and availability. Insider threats or compromised local accounts could exploit this vulnerability to gain elevated control over systems. Critical infrastructure sectors, healthcare, legal, and financial institutions that still use fax modems for secure communications may face operational challenges and increased risk exposure. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity score demands urgent attention. Failure to update systems or transition hardware could lead to exploitation attempts, data breaches, or service outages.
Mitigation Recommendations
1. Immediately apply the October cumulative update for Windows 11 Version 25H2 to remove the vulnerable ltmdm64.sys driver and mitigate the vulnerability. 2. Conduct an inventory of all fax modem hardware dependent on the Agere Modem driver and develop a plan to replace or phase out this hardware to prevent operational disruptions. 3. Restrict local administrative privileges and monitor for unusual local activity that could indicate exploitation attempts. 4. Implement endpoint detection and response (EDR) solutions to identify suspicious behavior related to buffer overflow exploitation. 5. Educate IT staff and users about the risks associated with legacy hardware and the importance of applying updates promptly. 6. For organizations that must maintain fax capabilities, consider transitioning to secure digital fax solutions that do not rely on vulnerable hardware or drivers. 7. Regularly audit systems for compliance with update policies and verify that no legacy drivers remain active post-update. 8. Establish incident response procedures specifically addressing potential local privilege escalation scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-01-16T23:11:19.732Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ee85823dd1bfb0b7e3e089
Added to database: 10/14/2025, 5:16:50 PM
Last enriched: 11/27/2025, 3:36:52 AM
Last updated: 12/4/2025, 4:47:14 PM
Views: 223
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66516: CWE-611 Improper Restriction of XML External Entity Reference in Apache Software Foundation Apache Tika core
CriticalCVE-2025-65516: n/a
HighCVE-2025-61148: n/a
UnknownCVE-2025-57213: n/a
UnknownCVE-2025-57212: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.