…“The vulnerable driver ships with every version of Windows, up to and including Server 2025,” Adam Barnett, lead software engineer at Rapid7, said. “Maybe your fax modem uses a different chipset, and so you don’t need the Agere driver? Perhaps you’ve simply discovered email? Tough luck. Your PC is still vulnerable, and a local attacker with a minimally privileged account can elevate to administrator.”…
The exploits are addressed in the patch released yesterday, on the final day of support.
Generally such exploits aren’t released to the public until they have been patched, to prevent wider abuse of the exploits in the meantime.
https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24990
As you can see here near the bottom of the page it lists security updates for this epxloit having been released on October 14rh, 2025, the final day of Win10 support. These updates will still be available to Windows 10 systems even after October 14th, they will just be unable to get new patches after that date.
@SnotFlickerman
So will MS leave people in the lurch or issue an emergency patch? The former will drive people straight to replacements and the community need to be like a predator ready to move in to injured prey.
If we don’t it will be a massive opportunity lost.
Did you even read the comment? MS already patched it in Win10.
Why not bother reading the comment you responded to?
The patch has already been released, that’s literally my point. It was part of their final patches released for Windows 10 yesterday.
This is from the CVE page for the exploits discussed in the srticle.