CVE-2025-24990 is a high-severity vulnerability in the Windows Agere Modem driver. Learn about its impact, KEV status, and necessary remediation steps.
| Product | Version Start | Version End (excl.) | Status |
|---|---|---|---|
| windows_10_1507 | * | 10.0.10240.21161 | vulnerable |
| windows_10_1607 | * | 10.0.14393.8519 | vulnerable |
| windows_10_1809 | * | 10.0.17763.7919 | vulnerable |
| windows_10_21h2 | * | 10.0.19044.6456 | vulnerable |
| windows_10_22h2 | * | 10.0.19045.6456 | vulnerable |
| windows_11_22h2 | * | 10.0.22621.6060 | vulnerable |
| windows_11_23h2 | * | 10.0.22631.6060 | vulnerable |
| windows_11_24h2 | * | 10.0.26100.6899 | vulnerable |
| windows_11_25h2 | * | 10.0.26200.6899 | vulnerable |
| windows_server_2008 | - | - | vulnerable |
| windows_server_2008 | r2 | r2 | vulnerable |
| windows_server_2012 | - | - | vulnerable |
| windows_server_2012 | r2 | r2 | vulnerable |
| windows_server_2016 | * | 10.0.14393.8519 | vulnerable |
| windows_server_2019 | * | 10.0.17763.7919 | vulnerable |
| windows_server_2022 | * | 10.0.20348.4294 | vulnerable |
| windows_server_2022_23h2 | * | 10.0.25398.1913 | vulnerable |
| windows_server_2025 | * | 10.0.26100.6899 | vulnerable |
Install the October 2024 cumulative update or later for your specific Windows version. This update is designed to permanently remove the vulnerable ltmdm64.sys driver from the operating system to eliminate the attack surface.
Verify that systems are running builds newer than the vulnerable versions, such as Windows 10 22H2 (build 10.0.19045.6456), Windows 11 23H2 (build 10.0.22631.6060), and Windows Server 2025 (build 10.0.26100.6899).
Given the local attack vector, enforce strict access controls and the principle of least privilege (PoLP). If patches cannot be applied immediately, manually disable or uninstall Agere Modem devices via Device Manager to prevent the driver from loading.
Use EDR and SIEM tools to monitor for unusual driver loading events or system crashes associated with ltmdm64.sys. Watch for unauthorized attempts to escalate privileges or unexpected kernel-mode activity originating from local user accounts.
Detection should focus on identifying the presence of the vulnerable driver file, ltmdm64.sys, typically located in the C:\Windows\System32\drivers directory. Security teams should use file integrity monitoring or vulnerability scanners to locate this file across the fleet. Additionally, monitor Windows Event Logs for System Error events or bugchecks (BSODs) that reference this specific driver, as these may indicate exploitation attempts or memory corruption associated with CWE-822.
Experience superior visibility and a simpler approach to cyber risk management