Active Exploitation of 0-Day Vulnerabilities in Windows Agere Modem Driver to Gain Elevated Privileges

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

Microsoft Alarms Over Two Zero-Day Vulnerabilities in Agere Modem Driver

Microsoft has unveiled the presence of two significant zero-day vulnerabilities within the Agere Modem driver, which is integrated into Windows operating systems. These flaws, identified as CVE-2025-24990 and CVE-2025-24052, have been confirmed to be under active exploitation, permitting attackers to elevate their privileges to administrator levels.

The vulnerabilities affect the ltmdm64.sys driver. Although these issues were addressed in the cumulative update issued in October 2025, Microsoft has cautioned that the affected fax modem hardware will become non-functional following this update.

Examination of Vulnerabilities in Legacy Drivers

The Agere Modem driver, a third-party software component shipped directly with Windows, has become a persistent, albeit dormant, security risk. Specifically, CVE-2025-24990 emerges from an untrusted pointer dereference (CWE-822) issue, allowing attackers to manipulate memory and evade established security protocols.

This vulnerability has received a CVSS 3.1 score of 7.8, necessitating only local access and minimal privileges while posing substantial risks to confidentiality, integrity, and availability.

Detected through collaborative efforts between Microsoft’s threat intelligence team (MSTIC) and external researchers, including r-tec IT Security, exploitation of this flaw has been observed in live environments.

The second concern, CVE-2025-24052, pertains to a stack-based buffer overflow (CWE-121), also scoring 7.8 on the CVSS scale. Although it has been publicly disclosed with available proof-of-concept code, there have been no recorded active attacks utilizing this particular vulnerability as of yet.

Importantly, these vulnerabilities exist independently of active modem usage, affecting all supported Windows versions from Windows 10 onwards. Attackers can elevate their privileges through simple local exploits without needing direct interaction with the hardware.

CVE IDDescriptionCVSS ScoreExploit StatusWeakness
CVE-2025-24990Untrusted Pointer Dereference in ltmdm64.sys7.8 (Important)Actively Exploited (Functional PoC)CWE-822
CVE-2025-24052Stack-based Buffer Overflow in ltmdm64.sys7.8 (Important)Proof-of-Concept AvailableCWE-121

While detailed indicators of compromise (IoCs) have not been explicitly provided, Microsoft encourages users to conduct a thorough check for the presence of ltmdm64.sys.

These zero-day vulnerabilities underscore the inherent perils associated with legacy drivers in contemporary digital environments.

An attacker who secures an initial foothold—potentially through phishing or malware—could exploit the vulnerable driver and execute malicious code, masquerading as an administrator.

In corporate settings, such exploitation could escalate into domain control, unauthorized data access, or even the deployment of ransomware.

Fabian Mosch from r-tec elucidated that these exploits often target driver loading during the system’s boot phase or through service calls, thereby circumventing user-mode defenses.

The proof-of-concept for CVE-2025-24990 entails crafting malformed inputs directed at the driver’s IOCTL handler, which consequently triggers the dereferencing of a controlled pointer.

In the instance of CVE-2025-24052, overflow exploits result in stack corruption through oversized buffers in modem emulation routines, with researchers demonstrating the ability to elevate privileges from standard user to SYSTEM level without inducing system crashes.

Microsoft’s Strategic Response and User Recommendations

Close-up of a black keyboard with the Windows logo key in focus.

In its October Patch Tuesday release, Microsoft chose to entirely eliminate ltmdm64.sys, thereby rendering the Agere modems dependent on this driver obsolete.

Users reliant on fax hardware must now seek alternative solutions, as there is no provision for backward compatibility.

The company strongly urges users to apply updates promptly and conduct audits for the driver utilizing tools such as Autoruns.

For those with unpatched systems, it is advisable to disable the driver via Device Manager or implement group policy restrictions.

This incident serves as a stark reminder of the importance of phasing out outdated components within software ecosystems.

Cybersecurity experts advocate for the establishment of endpoint detection rules to monitor anomalous driver loads, alongside regular vulnerability assessments.

As the threat landscape evolves, organizations must prioritize these patches to mitigate the risks associated with privilege escalation.

Source link: Cybersecuritynews.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

RS Web Solutions

We provide the best tutorials, reviews, and recommendations on all technology and open-source web-related topics. Surf our site to extend your knowledge base on the latest web trends.
Share the Love
Related News Worth Reading