Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24052: CWE-121: Stack-based Buffer Overflow in Microsoft Windows 11 Version 25H2

0
High
VulnerabilityCVE-2025-24052cvecve-2025-24052cwe-121
Published: Tue Oct 14 2025 (10/14/2025, 17:00:11 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 11 Version 25H2

Description

Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update. Fax modem hardware dependent on this specific driver will no longer work on Windows. Microsoft recommends removing any existing dependencies on this hardware.

AI-Powered Analysis

AILast updated: 11/27/2025, 03:36:52 UTC

Technical Analysis

CVE-2025-24052 is a stack-based buffer overflow vulnerability classified under CWE-121, found in the third-party Agere Modem driver (ltmdm64.sys) that ships natively with Windows 11 Version 25H2 (build 10.0.26200.0). The vulnerability allows an attacker with local privileges to execute arbitrary code by exploiting improper handling of data on the stack, leading to potential corruption of memory and control flow hijacking. The vulnerability impacts confidentiality, integrity, and availability of affected systems. Microsoft has acknowledged this issue and addressed it by removing the vulnerable ltmdm64.sys driver in the October cumulative update, which disables fax modem hardware dependent on this driver. The removal means that affected hardware will no longer function on updated Windows 11 systems, and organizations must remove dependencies on this hardware to avoid operational disruptions. The CVSS v3.1 score of 7.8 reflects high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and partial scope (S:U). The exploitability is rated as probable (E:P), with official remediation (RL:O) and confirmed fix (RC:C). No known exploits have been reported in the wild as of the publication date. The vulnerability was reserved early in 2025 and published in October 2025, indicating a relatively recent discovery and patch cycle. The technical impact includes potential arbitrary code execution and system compromise via local access, emphasizing the need for patching and hardware transition.

Potential Impact

For European organizations, the impact of CVE-2025-24052 is significant, especially for those relying on legacy fax modem hardware integrated with Windows 11 Version 25H2. The removal of the vulnerable driver disables this hardware, potentially disrupting business processes that depend on fax communications. The vulnerability itself poses a high risk of local privilege escalation and arbitrary code execution, threatening sensitive data confidentiality, system integrity, and availability. Insider threats or compromised local accounts could exploit this vulnerability to gain elevated control over systems. Critical infrastructure sectors, healthcare, legal, and financial institutions that still use fax modems for secure communications may face operational challenges and increased risk exposure. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity score demands urgent attention. Failure to update systems or transition hardware could lead to exploitation attempts, data breaches, or service outages.

Mitigation Recommendations

1. Immediately apply the October cumulative update for Windows 11 Version 25H2 to remove the vulnerable ltmdm64.sys driver and mitigate the vulnerability. 2. Conduct an inventory of all fax modem hardware dependent on the Agere Modem driver and develop a plan to replace or phase out this hardware to prevent operational disruptions. 3. Restrict local administrative privileges and monitor for unusual local activity that could indicate exploitation attempts. 4. Implement endpoint detection and response (EDR) solutions to identify suspicious behavior related to buffer overflow exploitation. 5. Educate IT staff and users about the risks associated with legacy hardware and the importance of applying updates promptly. 6. For organizations that must maintain fax capabilities, consider transitioning to secure digital fax solutions that do not rely on vulnerable hardware or drivers. 7. Regularly audit systems for compliance with update policies and verify that no legacy drivers remain active post-update. 8. Establish incident response procedures specifically addressing potential local privilege escalation scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-01-16T23:11:19.732Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee85823dd1bfb0b7e3e089

Added to database: 10/14/2025, 5:16:50 PM

Last enriched: 11/27/2025, 3:36:52 AM

Last updated: 12/4/2025, 4:47:14 PM

Views: 223

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats