Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Windows Agere Modem Driver 0-Day Vulnerabilities Actively Exploited To Escalate Privileges

Posted on October 15, 2025October 15, 2025 By CWS

Microsoft has disclosed two crucial zero-day vulnerabilities within the Agere Modem driver bundled with Home windows working programs, confirming lively exploitation to escalate privileges.

The issues, tracked as CVE-2025-24990 and CVE-2025-24052, have an effect on the ltmdm64.sys driver and will permit low-privileged attackers to achieve full administrator entry.

These points have been patched within the October 2025 cumulative replace, however Microsoft warns that affected fax modem {hardware} will stop functioning post-update.

Vulnerabilities Uncovered In Legacy Driver

The Agere Modem driver, a third-party element shipped natively in Home windows, has lengthy been a dormant threat.

CVE-2025-24990 stems from an untrusted pointer dereference (CWE-822), enabling attackers to control reminiscence and bypass safety boundaries.

With a CVSS 3.1 rating of seven.8, it requires solely native entry and low privileges, but yields excessive impacts on confidentiality, integrity, and availability.

Microsoft’s menace intelligence crew, MSTIC, together with researchers from r-tec IT Safety and an nameless contributor, recognized exploitation within the wild.

The second flaw, CVE-2025-24052, includes a stack-based buffer overflow (CWE-121), scoring 7.8 on CVSS. Publicly disclosed with proof-of-concept code out there, it poses the same menace however has not but been noticed in lively assaults.

Each vulnerabilities persist even with out lively modem use, affecting all supported Home windows variations from Home windows 10 onward. Attackers needn’t work together with {hardware}; a easy native exploit suffices to raise rights.

CVE IDDescriptionCVSS ScoreExploit StatusWeaknessCVE-2025-24990Untrusted Pointer Dereference in ltmdm64.sys7.8 (Essential)Actively Exploited (Purposeful PoC)CWE-822CVE-2025-24052Stack-based Buffer Overflow in ltmdm64.sys7.8 (Essential)Proof-of-Idea AvailableCWE-121

No indicators of compromise (IoCs) have been detailed in disclosures, however Microsoft urges scanning for ltmdm64.sys presence.

These zero-days spotlight the risks of legacy drivers in trendy ecosystems. An attacker with an preliminary foothold, maybe by way of phishing or malware, might load the weak driver and execute code to impersonate admins.

In enterprise settings, this escalates to area management, knowledge exfiltration, or ransomware deployment. Fabian Mosch from r-tec famous that exploits goal driver loading throughout system boot or service calls, evading user-mode defenses.

The proof-of-concept for CVE-2025-24990 includes crafting malformed enter to the driving force’s IOCTL handler, which triggers the dereference of a managed pointer.

For CVE-2025-24052, overflow exploits stack corruption by way of outsized buffers in modem emulation routines. Researchers demonstrated privilege jumps from customary person to SYSTEM stage with out crashes.

Microsoft’s Response And Consumer Steering

Within the October Patch Tuesday launch, Microsoft eliminated ltmdm64.sys completely, rendering dependent Agere modems out of date. Customers reliant on fax {hardware} should search options, as no backward compatibility exists.

The corporate advises speedy patching and auditing for the driving force by way of instruments like Autoruns. For unpatched programs, disable the driving force by Machine Supervisor or group coverage.

This incident underscores the necessity to part out outdated parts. Cybersecurity specialists advocate endpoint detection guidelines for anomalous driver masses and common vulnerability scans.

As exploitation continues, organizations ought to prioritize these fixes to thwart privilege escalation chains.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:0Day, Actively, Agere, Driver, Escalate, Exploited, Modem, Privileges, Vulnerabilities, Windows

Post navigation

Previous Post: Two New Windows Zero-Days Exploited in the Wild — One Affects Every Version Ever Shipped
Next Post: Windows 11 And Server 2025 Will Start Caching Plaintext Credentials By Enabling WDigest Authentication

Related Posts

Hackers Can Manipulate BitLocker Registry Keys Via WMI to Execute Malicious Code as Interactive User Cyber Security News
ThreatBook Peer-Recognized as a Strong Performer in the 2025 Gartner® Peer Insights™ Voice of the Customer for Network Detection and Response — for the Third Consecutive Year Cyber Security News
Zscaler Acquires Enterprise AI Security Firm SPLX to Boost Zero Trust Exchange Cyber Security News
Akira Ransomware Uses Windows Drivers to Bypass AV/EDR in SonicWall Attacks Cyber Security News
Microsoft Office Vulnerabilities Let Attackers Execute Remote Code Cyber Security News
New LockBit 5.0 Ransomware Variant Attacking Windows, Linux, and ESXi Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Personal Information Compromised in Freedom Mobile Data Breach
  • 5 Threats That Reshaped Web Security This Year [2025]
  • Marquis Data Breach Impacts Over 780,000 People
  • Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens
  • New ‘Sryxen’ Stealer Bypasses Chrome Encryption via Headless Browser Technique

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Personal Information Compromised in Freedom Mobile Data Breach
  • 5 Threats That Reshaped Web Security This Year [2025]
  • Marquis Data Breach Impacts Over 780,000 People
  • Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens
  • New ‘Sryxen’ Stealer Bypasses Chrome Encryption via Headless Browser Technique

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark