Skip to Content

Windows Faces Critical Threat: Two New Zero-Day Vulnerabilities Exposed

Urgent Security Challenges for Windows Users

October 2025 has brought a wave of concern to Windows users worldwide. Microsoft’s latest Patch Tuesday revealed two actively exploited zero-day vulnerabilities that threaten nearly every version of Windows, highlighting the importance of robust and ongoing patch management. This comes as mainstream support for Windows 10 ends, making timely security updates more crucial than ever.

Zero-Day Vulnerabilities Uncovered

  • CVE-2025-24990: This flaw exists in the Windows Agere Modem Driver (ltmdm64.sys), which is installed by default across all Windows versions up to Server 2025. The vulnerability, rooted in legacy code, allows attackers with limited privileges to escalate to full administrative access. Microsoft intends to remove the driver entirely, as patching isn’t feasible. This issue poses a risk to every Windows device, regardless of hardware configuration.

  • CVE-2025-59230: Targeting the Windows Remote Access Connection Manager (RasMan), this zero-day is the first known exploit of its kind, though RasMan has seen over 20 patches since 2022. Attackers can leverage this to escalate privileges and run code as administrators, compounding the potential impact.

Details about attack methods and scale are scarce, but both vulnerabilities have prompted urgent warnings from security experts. The widespread exposure, especially from the Agere driver, means that nearly all Windows systems are at risk.

Secure Boot Bypass: Another Exploited Threat

In addition to Windows-specific flaws, CVE-2025-47827 has emerged as an exploited Secure Boot bypass in IGEL OS (pre-version 11). While this requires physical access (often through so-called “evil maid” attacks), successful exploitation can lead to stealthy rootkit installations and compromise of virtual desktop infrastructure. This vulnerability is now listed in the U.S. CISA Known Exploited Vulnerabilities catalog.

Other Critical and High-Impact Vulnerabilities

October’s Patch Tuesday addressed a total of 183 vulnerabilities, several of which are particularly severe for enterprise environments:

  • CVE-2025-59287: Critical remote code execution in Windows Server Update Services (WSUS).

  • CVE-2025-2884: Out-of-bounds read in TPM2.0, risking cryptographic security.

  • CVE-2025-59295: Remote code execution via malicious URL parsing.

  • CVE-2025-49708 (CVSS 9.9): Privilege escalation in Microsoft Graphics Component, allowing attackers to escape VM isolation and compromise host servers.

  • CVE-2025-55315 (CVSS 9.9): ASP.NET security feature bypass, letting authenticated users smuggle malicious requests.

Experts are especially alarmed by flaws that threaten virtualization. A single exploited VM could lead to SYSTEM-level access on the host, jeopardizing entire server environments and critical infrastructure.

Recommended Actions for Organizations

With active exploitation underway, organizations must prioritize patch deployment across all Windows systems, including those outside standard support. Administrators should monitor for Microsoft’s mitigation tools, especially regarding the Agere modem driver. Compliance deadlines are already in effect for regulated sectors and federal agencies, making immediate action essential.

Vigilance Is Key

This month’s security revelations underscore how legacy components can introduce systemic risk. Proactive patch management, close monitoring of vulnerability disclosures, and swift remediation are vital to defending against emerging threats in today’s complex IT landscape.

Source: The Hacker News (Read the full article)

Windows Faces Critical Threat: Two New Zero-Day Vulnerabilities Exposed
Joshua Berkowitz October 15, 2025
Views 4147
Share this post