PT-2025-41973 · Agere +1 · Agere Modem Driver +1
Published
2025-10-14
·
Updated
2025-11-13
·
CVE-2025-24990
CVSS v3.1
7.8
7.8
High
| Base vector | Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Windows Agere Modem Driver (ltmdm64.sys) versions prior to the October 2025 cumulative update
Description
The Agere Modem Driver, a component used for dial-up or fax connections in Windows, contains a flaw related to the handling of untrusted pointers. Successful exploitation of this issue allows a local attacker to gain administrative privileges. A proof-of-concept exploit has been publicly released, and active exploitation has been observed. The driver has been removed in the October 2025 cumulative update. The vulnerability exists due to improper handling of user-mode to kernel-mode transitions, specifically within the
RtlQueryRegistryValues function and related IOCTL handlers that use METHOD NEITHER without proper pointer validation. This allows for arbitrary memory read and write operations in kernel space. Approximately 33 articles have been published about this vulnerability from various internet sources, indicating widespread attention.Recommendations
Install the October 2025 cumulative update to remove the vulnerable driver.
Remove any existing dependencies on fax modem hardware that relies on this driver.
As a temporary workaround, consider disabling or uninstalling the Agere Modem Driver (ltmdm64.sys) if it is not required.
Exploit
Fix
LPE
Untrusted Pointer Dereference
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-12995
CVE-2025-24990
Affected Products
Agere Modem Driver
Windows
References · 73
- 🔥 https://github.com/moiz-2x/CVE-2025-24990_POC⭐ 3 · Exploit
- https://safe-surf.ru/specialists/bulletins-nkcki/725770 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-24990 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24990 · Vendor Advisory
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24990 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-12995 · Security Note
- https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24990 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24990 · Security Note
- https://roboshadow.com/blog/patch-tuesday-october-2025 · Reddit Post
- https://twitter.com/CloneSystemsInc/status/1978429611609375018 · Twitter Post
- https://twitter.com/transilienceai/status/1987362274047369256 · Twitter Post
- https://t.me/cveNotify/138829 · Telegram Post
- https://twitter.com/TechNadu/status/1978371226889555987 · Twitter Post
- https://twitter.com/secured_cyber/status/1979729188027527621 · Twitter Post
- https://twitter.com/xiParas/status/1979618747712180549 · Twitter Post