CVE Number | Vulnerability | Product | Severity | Date |
---|---|---|---|---|
CVE-2024-30097 | Microsoft Speech Application Programming Interface (SAPI) Remote Code Execution Vulnerability | Windows 11 | Important | 16-07-2024 |
Technical Information
A remote code execution vulnerability in Microsoft Speech Application Programming Interface(SAPI) where an unauthorized attacker requires an authenticated client to click a link in order to exploit a double free vulnerability within the OS SAPI to cause a denial of service or execute arbitrary code.
Patch release date: Jun 11, 2024
Further information on this vulnerability is available at : CVE-2024-30097
Affected Software
Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,
Windows 10 Version 1809 for ARM64-based Systems,
Windows Server 2019,
Windows Server 2019 (Server Core installation),
Windows Server 2022,
Windows Server 2022 (Server Core installation),
Windows 11 version 21H2 for x64-based Systems,
Windows 11 version 21H2 for ARM64-based Systems,
Windows 10 Version 21H2 for 32-bit Systems,
Windows 10 Version 21H2 for ARM64-based Systems,
Windows 10 Version 21H2 for x64-based Systems,
Windows 11 Version 22H2 for ARM64-based Systems,
Windows 11 Version 22H2 for x64-based Systems,
Windows 10 Version 22H2 for x64-based Systems,
Windows 10 Version 22H2 for ARM64-based Systems,
Windows 10 Version 22H2 for 32-bit Systems,
Windows 11 Version 23H2 for ARM64-based Systems,
Windows 11 Version 23H2 for x64-based Systems,
Windows Server 2022, 23H2 Edition (Server Core installation),
Windows 10 for 32-bit Systems,
Windows 10 for x64-based Systems,
Windows 10 Version 1607 for 32-bit Systems,
Windows 10 Version 1607 for x64-based Systems,
Windows Server 2016,
Windows Server 2016 (Server Core installation)