CVE-2025-24990: CWE-822: Untrusted Pointer Dereference in Microsoft Windows 11 Version 25H2
Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update. Fax modem hardware dependent on this specific driver will no longer work on Windows. Microsoft recommends removing any existing dependencies on this hardware.
AI Analysis
Technical Summary
CVE-2025-24990 is a vulnerability classified under CWE-822 (Untrusted Pointer Dereference) found in the Agere Modem driver (ltmdm64.sys) that ships natively with Windows 11 Version 25H2 (build 10.0.26200.0). The flaw allows an attacker with low privileges (PR:L) and no user interaction (UI:N) to exploit the driver by causing it to dereference untrusted pointers, potentially leading to arbitrary code execution with high impact on confidentiality, integrity, and availability. The vulnerability is local attack vector (AV:L), meaning the attacker needs local access to the system but can escalate privileges and fully compromise the system once exploited. Microsoft has addressed this issue by removing the vulnerable driver entirely in the October cumulative update, effectively disabling fax modem hardware dependent on ltmdm64.sys. This removal means that any fax modem relying on this driver will no longer function on updated Windows 11 systems. No public exploits or active exploitation have been reported, but the severity and potential impact warrant immediate attention. The vulnerability's exploitability is facilitated by the low complexity and lack of required user interaction, making it a significant risk for affected systems. Organizations using fax modems with this driver must plan hardware and software transitions to avoid operational disruptions.
Potential Impact
The vulnerability poses a high risk to European organizations that still use fax modem hardware dependent on the ltmdm64.sys driver. Exploitation can lead to full system compromise, allowing attackers to execute arbitrary code, access sensitive data, and disrupt system availability. This is particularly critical for sectors such as healthcare, legal, and government agencies where fax communication remains in use and where data confidentiality and system integrity are paramount. The removal of the driver in the October update means organizations will face operational impacts if they continue to rely on affected fax modems, potentially disrupting business processes. Additionally, the vulnerability could be leveraged by insiders or attackers with local access to escalate privileges and move laterally within networks. The lack of known exploits reduces immediate threat but does not eliminate risk, especially as attackers may develop exploits given the public disclosure. Organizations must balance the risk of exploitation against the operational impact of removing legacy hardware support.
Mitigation Recommendations
European organizations should immediately apply the October cumulative update for Windows 11 Version 25H2 or later to ensure the vulnerable driver is removed. They must audit their environments to identify any dependencies on fax modem hardware using the ltmdm64.sys driver and plan to replace or retire such hardware. Transitioning to modern communication methods that do not rely on legacy fax modems is strongly recommended. For environments where fax functionality is critical, consider virtualized or software-based fax solutions that do not depend on vulnerable drivers. Implement strict access controls and monitoring on systems with local user access to reduce the risk of exploitation. Additionally, maintain up-to-date endpoint protection and intrusion detection systems to detect any anomalous behavior indicative of exploitation attempts. Document and communicate the removal impact to affected business units to ensure operational continuity.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Finland
CVE-2025-24990: CWE-822: Untrusted Pointer Dereference in Microsoft Windows 11 Version 25H2
Description
Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update. Fax modem hardware dependent on this specific driver will no longer work on Windows. Microsoft recommends removing any existing dependencies on this hardware.
AI-Powered Analysis
Technical Analysis
CVE-2025-24990 is a vulnerability classified under CWE-822 (Untrusted Pointer Dereference) found in the Agere Modem driver (ltmdm64.sys) that ships natively with Windows 11 Version 25H2 (build 10.0.26200.0). The flaw allows an attacker with low privileges (PR:L) and no user interaction (UI:N) to exploit the driver by causing it to dereference untrusted pointers, potentially leading to arbitrary code execution with high impact on confidentiality, integrity, and availability. The vulnerability is local attack vector (AV:L), meaning the attacker needs local access to the system but can escalate privileges and fully compromise the system once exploited. Microsoft has addressed this issue by removing the vulnerable driver entirely in the October cumulative update, effectively disabling fax modem hardware dependent on ltmdm64.sys. This removal means that any fax modem relying on this driver will no longer function on updated Windows 11 systems. No public exploits or active exploitation have been reported, but the severity and potential impact warrant immediate attention. The vulnerability's exploitability is facilitated by the low complexity and lack of required user interaction, making it a significant risk for affected systems. Organizations using fax modems with this driver must plan hardware and software transitions to avoid operational disruptions.
Potential Impact
The vulnerability poses a high risk to European organizations that still use fax modem hardware dependent on the ltmdm64.sys driver. Exploitation can lead to full system compromise, allowing attackers to execute arbitrary code, access sensitive data, and disrupt system availability. This is particularly critical for sectors such as healthcare, legal, and government agencies where fax communication remains in use and where data confidentiality and system integrity are paramount. The removal of the driver in the October update means organizations will face operational impacts if they continue to rely on affected fax modems, potentially disrupting business processes. Additionally, the vulnerability could be leveraged by insiders or attackers with local access to escalate privileges and move laterally within networks. The lack of known exploits reduces immediate threat but does not eliminate risk, especially as attackers may develop exploits given the public disclosure. Organizations must balance the risk of exploitation against the operational impact of removing legacy hardware support.
Mitigation Recommendations
European organizations should immediately apply the October cumulative update for Windows 11 Version 25H2 or later to ensure the vulnerable driver is removed. They must audit their environments to identify any dependencies on fax modem hardware using the ltmdm64.sys driver and plan to replace or retire such hardware. Transitioning to modern communication methods that do not rely on legacy fax modems is strongly recommended. For environments where fax functionality is critical, consider virtualized or software-based fax solutions that do not depend on vulnerable drivers. Implement strict access controls and monitoring on systems with local user access to reduce the risk of exploitation. Additionally, maintain up-to-date endpoint protection and intrusion detection systems to detect any anomalous behavior indicative of exploitation attempts. Document and communicate the removal impact to affected business units to ensure operational continuity.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-01-30T15:14:20.992Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ee85823dd1bfb0b7e3e08c
Added to database: 10/14/2025, 5:16:50 PM
Last enriched: 11/24/2025, 6:51:21 PM
Last updated: 12/4/2025, 11:41:46 AM
Views: 195
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14010: Vulnerability in Red Hat Red Hat Ceph Storage 5
MediumCVE-2025-12826: CWE-862 Missing Authorization in webdevstudios Custom Post Type UI
MediumCVE-2025-12782: CWE-862 Missing Authorization in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
MediumCVE-2025-13513: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codejunkie Clik stats
MediumCVE-2025-11727: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codisto Omnichannel for WooCommerce: Google, Amazon, eBay & Walmart Integration – Powered by Codisto
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.