Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24990: CWE-822: Untrusted Pointer Dereference in Microsoft Windows 11 Version 25H2

0
High
VulnerabilityCVE-2025-24990cvecve-2025-24990cwe-822
Published: Tue Oct 14 2025 (10/14/2025, 17:00:10 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 11 Version 25H2

Description

Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update. Fax modem hardware dependent on this specific driver will no longer work on Windows. Microsoft recommends removing any existing dependencies on this hardware.

AI-Powered Analysis

AILast updated: 11/24/2025, 18:51:21 UTC

Technical Analysis

CVE-2025-24990 is a vulnerability classified under CWE-822 (Untrusted Pointer Dereference) found in the Agere Modem driver (ltmdm64.sys) that ships natively with Windows 11 Version 25H2 (build 10.0.26200.0). The flaw allows an attacker with low privileges (PR:L) and no user interaction (UI:N) to exploit the driver by causing it to dereference untrusted pointers, potentially leading to arbitrary code execution with high impact on confidentiality, integrity, and availability. The vulnerability is local attack vector (AV:L), meaning the attacker needs local access to the system but can escalate privileges and fully compromise the system once exploited. Microsoft has addressed this issue by removing the vulnerable driver entirely in the October cumulative update, effectively disabling fax modem hardware dependent on ltmdm64.sys. This removal means that any fax modem relying on this driver will no longer function on updated Windows 11 systems. No public exploits or active exploitation have been reported, but the severity and potential impact warrant immediate attention. The vulnerability's exploitability is facilitated by the low complexity and lack of required user interaction, making it a significant risk for affected systems. Organizations using fax modems with this driver must plan hardware and software transitions to avoid operational disruptions.

Potential Impact

The vulnerability poses a high risk to European organizations that still use fax modem hardware dependent on the ltmdm64.sys driver. Exploitation can lead to full system compromise, allowing attackers to execute arbitrary code, access sensitive data, and disrupt system availability. This is particularly critical for sectors such as healthcare, legal, and government agencies where fax communication remains in use and where data confidentiality and system integrity are paramount. The removal of the driver in the October update means organizations will face operational impacts if they continue to rely on affected fax modems, potentially disrupting business processes. Additionally, the vulnerability could be leveraged by insiders or attackers with local access to escalate privileges and move laterally within networks. The lack of known exploits reduces immediate threat but does not eliminate risk, especially as attackers may develop exploits given the public disclosure. Organizations must balance the risk of exploitation against the operational impact of removing legacy hardware support.

Mitigation Recommendations

European organizations should immediately apply the October cumulative update for Windows 11 Version 25H2 or later to ensure the vulnerable driver is removed. They must audit their environments to identify any dependencies on fax modem hardware using the ltmdm64.sys driver and plan to replace or retire such hardware. Transitioning to modern communication methods that do not rely on legacy fax modems is strongly recommended. For environments where fax functionality is critical, consider virtualized or software-based fax solutions that do not depend on vulnerable drivers. Implement strict access controls and monitoring on systems with local user access to reduce the risk of exploitation. Additionally, maintain up-to-date endpoint protection and intrusion detection systems to detect any anomalous behavior indicative of exploitation attempts. Document and communicate the removal impact to affected business units to ensure operational continuity.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-01-30T15:14:20.992Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee85823dd1bfb0b7e3e08c

Added to database: 10/14/2025, 5:16:50 PM

Last enriched: 11/24/2025, 6:51:21 PM

Last updated: 12/4/2025, 11:41:46 AM

Views: 195

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats