CVE-2025-24990

7.8 HIGH CISA KEV

📋 TL;DR

This CVE describes an elevation of privilege vulnerability in the Agere Modem driver (ltmdm64.sys) that ships with Windows. Attackers could exploit this to gain SYSTEM privileges on affected systems. Organizations using fax modem hardware dependent on this driver are affected.

💻 Affected Systems

Products:
  • Microsoft Windows
Versions: All supported Windows versions with the Agere Modem driver installed
Operating Systems: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if the ltmdm64.sys driver is present, which typically requires fax modem hardware. Most modern systems don't have this hardware by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM privileges leading to complete control over the affected Windows system, data theft, and lateral movement within the network.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install malware, or access restricted system resources.

🟢

If Mitigated

No impact if the driver has been removed via the October cumulative update or if fax modem hardware is not in use.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to exploit.
🏢 Internal Only: HIGH - Malicious insiders or attackers who gain initial access could exploit this to escalate privileges and move laterally.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

CISA has added this to their Known Exploited Vulnerabilities catalog, confirming active exploitation. Exploitation requires local access to the system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: October 2024 cumulative update

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24990

Restart Required: Yes

Instructions:

1. Install the October 2024 cumulative update for your Windows version. 2. The update removes the vulnerable ltmdm64.sys driver. 3. Restart the system to complete the installation.

🔧 Temporary Workarounds

Remove Agere Modem driver manually

windows

Manually remove the vulnerable ltmdm64.sys driver if you cannot apply the patch immediately

sc stop ltmdm64
sc delete ltmdm64
del C:\Windows\System32\drivers\ltmdm64.sys

Disable fax services

windows

Disable Windows fax services to reduce attack surface

sc config Fax stop= disabled
sc stop Fax

🧯 If You Can't Patch

  • Remove or disconnect fax modem hardware from affected systems
  • Implement strict access controls to limit who can access systems with this hardware

🔍 How to Verify

Check if Vulnerable:

Check if ltmdm64.sys exists in C:\Windows\System32\drivers\ or if the Agere Modem driver is listed in Device Manager under Modems

Check Version:

wmic qfe list | findstr "October 2024"

Verify Fix Applied:

Verify the October 2024 cumulative update is installed and ltmdm64.sys is no longer present in the drivers directory

📡 Detection & Monitoring

Log Indicators:

  • Event ID 7045: Service installation for ltmdm64
  • Unexpected SYSTEM privilege escalation events
  • Driver loading events for ltmdm64.sys

Network Indicators:

  • Unusual outbound connections from systems with fax modem hardware

SIEM Query:

EventID=7045 AND ServiceName="ltmdm64" OR ProcessName="ltmdm64.sys"

🔗 References

📤 Share & Export