Microsoft has removed the legacy Agere soft‑modem driver (ltmdm64.sys) from supported Windows images after identifying an elevation‑of‑privilege vulnerability tracked as CVE‑2025‑24990, and that removal was shipped in the October 2025 cumulative updates; any fax or analog modem hardware that depends on this specific driver will cease functioning on systems that install the update.
The Agere modem family (historically tied to Lucent/LSI and subsequently Agere) includes a Windows driver commonly named ltmdm64.sys, which provided analog data and fax modem support for many OEM laptops and add‑in cards over the past two decades. That driver has remained in some Windows images as an in‑box component for compatibility with legacy telephony hardware.
In mid‑October 2025 Microsoft’s Security Update Guide and October cumulative update release notes made two important points explicit: Microsoft acknowledged vulnerabilities in the third‑party Agere modem driver and took the atypical step of removing the ltmdm64.sys driver from the OS package rather than issuing an in‑place patch for continued compatibility. The removal appeared in the October 14, 2025 cumulative updates for Windows 10 and Windows 11.
Industry vulnerability trackers assign the issue the identifier CVE‑2025‑24990, describe it as an elevation‑of‑privilege issue (CWE‑822: Untrusted Pointer Dereference), and list a CVSS v3.1 score of 7.8 (High). Those aggregators also note the practical mitigation Microsoft chose: removal of the driver from current Windows images.
Strengths of the removal approach:
Source: MSRC Security Update Guide - Microsoft Security Response Center
Background
The Agere modem family (historically tied to Lucent/LSI and subsequently Agere) includes a Windows driver commonly named ltmdm64.sys, which provided analog data and fax modem support for many OEM laptops and add‑in cards over the past two decades. That driver has remained in some Windows images as an in‑box component for compatibility with legacy telephony hardware.In mid‑October 2025 Microsoft’s Security Update Guide and October cumulative update release notes made two important points explicit: Microsoft acknowledged vulnerabilities in the third‑party Agere modem driver and took the atypical step of removing the ltmdm64.sys driver from the OS package rather than issuing an in‑place patch for continued compatibility. The removal appeared in the October 14, 2025 cumulative updates for Windows 10 and Windows 11.
Industry vulnerability trackers assign the issue the identifier CVE‑2025‑24990, describe it as an elevation‑of‑privilege issue (CWE‑822: Untrusted Pointer Dereference), and list a CVSS v3.1 score of 7.8 (High). Those aggregators also note the practical mitigation Microsoft chose: removal of the driver from current Windows images.
What changed in October 2025
Removal, not a patch
Instead of shipping a revised signed driver, Microsoft removed ltmdm64.sys from the cumulative update payloads and prevented the driver from being provisioned to updated systems. That means:- Systems that install the October 14, 2025 cumulative updates will no longer receive ltmdm64.sys as an in‑box driver.
- Devices that require that driver will stop enumerating or functioning normally once the update is applied.
- Microsoft explicitly recommends removing dependencies on affected hardware and planning migration strategies where fax or dial‑up modem functionality remains required.
Which KBs contain the removal
The driver removal is referenced in the October 14, 2025 cumulative update release notes for both Windows 10 (example: KB5066791) and Windows 11 (example: KB5066835). These KB pages explicitly call out the removal of ltmdm64.sys as a compatibility change.Who is affected
No impact for most modern users
For the vast majority of home and enterprise users who no longer rely on analog modems or fax‑over‑modem hardware, this change is purely protective: the vulnerable kernel component is removed and no functionality is lost.High impact for legacy fax/modem workflows
Organizations and appliances that continue to depend on local analog modems—commonly in:- Fax servers using local modem cards,
- Point‑of‑sale or medical devices that rely on modems for legacy communications,
- Industrial control systems or field devices that use PSTN fallback,
- Remote site appliances that dial out for status or reporting—
Enterprise considerations
Enterprises that maintain large fleets should inventory driver and device dependencies centrally (SCCM, Intune, or other asset‑management tools) and classify systems by criticality before applying broad cumulative updates. In some scenarios, short‑term deferral of the update may be necessary while migration paths are implemented—but deferral exposes systems to other important security fixes contained in the same cumulative update and should be considered a last‑resort, temporary measure.Technical summary and verification
- Driver name and path: ltmdm64.sys, typically located under C:\Windows\System32\drivers on x64 Windows images. This filename appears repeatedly in driver inventories and Microsoft update notes.
- CVE identifier: CVE‑2025‑24990; classification: Elevation of Privilege; weakness mapped to CWE‑822 (Untrusted Pointer Dereference) according to public CVE aggregators. The scoring published by trackers is CVSS v3.1 = 7.8 (High).
- Microsoft action: Removal of the driver from supported Windows OS images via October 2025 cumulative updates (documented in Windows update release notes).
Why Microsoft removed the driver (analysis)
Removing a legacy kernel driver instead of issuing a compatibility patch is an uncommon but defensible choice when:- The driver is third‑party code no longer maintained by the original vendor or where upstream remediation is impractical.
- The driver runs in kernel mode, hosting a high‑privilege attack surface where memory corruption or pointer misuse can escalate to SYSTEM or kernel compromise.
- Compatibility fixing would require significant reengineering, re‑signing, or architectural changes that Microsoft judges unsafe or time‑consuming relative to the security risk.
Strengths of the removal approach:
- Definitive risk closure for updated systems—no vulnerable code remains to be abused.
- Avoids long tails of partial fixes that can still be misused.
- Reduces future maintenance burden from an obsolete, rarely used driver.
- Operational disruption for workflows that still rely on the driver (fax, legacy communications).
- Support burden for IT teams that must triage exceptions or roll back updates for specific machines.
- Potential for shadow IT where users seek unsupported workarounds, increasing security risk.
Short‑term detection, mitigation, and response
Immediate checklist for administrators
- Inventory: locate any systems referencing ltmdm64.sys or Agere modem drivers. Quick local checks:
- Check driver path: C:\Windows\System32\drivers\ltmdm64.sys.
- List modem class devices: Get‑PnpDevice -Class Modem (PowerShell).
- Query loaded driver via SCM: sc query ltmdm64.
- Decide update policy:
- If the local modem is non‑essential, apply the October 2025 cumulative updates and accept the removal.
- If the modem is essential, plan a controlled deferral only after assessing the risk of missing other fixes in that cumulative update. Maintain compensating controls (isolation, limited network connectivity) while a migration plan is executed.
- Short‑term mitigations:
- Replace local modem dependencies with network or cloud fax gateways (SaaS) where feasible.
- For inflexible legacy appliances, consider an isolated legacy host retained for required modem use, segmenting it from production networks and applying strict compensating controls. This is an operational stopgap, not a long‑term fix.
- Communication:
- Notify affected business units and compliance teams; provide timelines and steps to preserve continuity of operations.
- Log and track incidents where functionality is lost after the update for audit and remediation planning.
Detection and monitoring tips
- Watch for modem‑related alerts and sudden device removal events after applying the October cumulative update.
- Monitor helpdesk tickets for surge in faxing failures or modem‑operated device errors.
- Use EDR and SIEM to hunt for processes or drivers attempting to access legacy modem device interfaces unexpectedly—this could indicate attempted exploitation or misconfiguration.
Migration strategies (practical options)
- Move to a cloud fax service or SIP/VoIP gateway with integrated fax‑to‑email functionality. These remove reliance on local hardware and place the fax function behind managed, updated services.
- Replace physical modem cards with modern, supported USB or PCIe modems whose vendors offer signed drivers compatible with current Windows builds—validate vendor support and driver signing before procurement.
- For highly regulated cases (legal, healthcare, government) where fax must be retained on‑premises, choose an actively maintained appliance that provides vendor‑supported, signed drivers and a documented security lifecycle.
- If replacement is impossible, maintain an isolated, minimally connected legacy host for modem operations and accept the increased maintenance overhead and residual risk. This should include strict backup, physical controls, network segmentation, and logging.
Risk assessment and long‑term lessons
This event underscores three strategic points for IT teams and security leaders:- Maintain a current inventory of third‑party kernel drivers and their vendor support lifecycles. Legacy drivers are an increasing source of kernel vulnerabilities and are costly to mitigate once discovered.
- Plan migrations away from hardware and software dependencies that lack active vendor support. Legacy telephony/analog components are especially brittle.
- Accept that platform vendors may remove in‑box components if remediation is impractical—organizations must be prepared operationally for that scenario and prioritize modernization where business processes depend on older hardware.
Questions about exploitation and verification (cautionary notes)
Public documentation and vendor advisories sometimes omit exploit mechanics to avoid accelerating attacks. At the time Microsoft removed the driver, the public advisories stressed the removal action and operational guidance more than detailed exploit chains. Security professionals should therefore:- Treat any public technical claims about the exact root cause or exploit technique as unverified until independent security research or detailed vendor technical notes are published.
- Prioritize the operational guidance (driver removal and migration) as the immediate defensive action rather than awaiting deeper technical analysis.
Practical remediation playbook
- Run a fleet‑wide driver inventory within 48 hours:
- Query for ltmdm64.sys and modem class devices.
- Produce a list of business functions tied to identified devices.
- Segregate and protect any systems that must remain unpatched temporarily:
- Use strict network segmentation and isolate from internet‑facing resources.
- Restrict administrative access and tightly monitor logs and EDR telemetry.
- Schedule updates and migrations:
- Pilot the cumulative update on a subset that can accept hardware loss.
- For critical systems needing the modem, prepare a migration plan to an alternate solution and schedule an update window.
- Communicate to stakeholders:
- Provide timelines and fallback arrangements for teams that rely on fax or dial‑up services.
- Coordinate with vendors of industry‑specific devices (medical, POS) to learn of compatible replacements or vendor support statements.
- After migration:
- Retire or securely store legacy hardware; update asset records and compliance documentation.
- Validate that endpoint imaging and provisioning no longer include the deprecated driver.
Conclusion
Microsoft’s removal of the Agere modem driver ltmdm64.sys in the October 2025 cumulative updates (documented in the Windows update KB notes) represents a decisive security action that eliminates a high‑risk kernel component but also forces operational change for anyone still dependent on legacy fax/modem hardware. Administrators should inventory affected systems, prioritize migration to supported alternatives (cloud or modern hardware), and avoid making long‑term exceptions that leave endpoints vulnerable to other patched issues. The removal demonstrates a broader platform security trend: when legacy kernel components cannot be safely remediated, vendors will remove them to protect the ecosystem—forcing organizations to modernize their operational dependencies.Source: MSRC Security Update Guide - Microsoft Security Response Center